Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
SHIPMENT DOCUMENTS.exe

Overview

General Information

Sample Name:SHIPMENT DOCUMENTS.exe
Analysis ID:756110
MD5:12dc06d3034a17be7a70a4aa45edce8d
SHA1:9b68ae25498a12f19360dc0dc023af61ca9bfa9d
SHA256:91826efe412b5c829801d1c52fbb43225cf1f0fc4cba201453ad877341c64b90
Tags:AgentTeslaexe
Infos:

Detection

AgentTesla
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
Malicious sample detected (through community Yara rule)
Yara detected AgentTesla
Yara detected AntiVM3
Sigma detected: Scheduled temp file as task from temp location
Multi AV Scanner detection for dropped file
Tries to steal Mail credentials (via file / registry access)
Initial sample is a PE file and has a suspicious name
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to harvest and steal ftp login credentials
.NET source code references suspicious native API functions
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Machine Learning detection for sample
May check the online IP address of the machine
.NET source code contains potential unpacker
Injects a PE file into a foreign processes
.NET source code contains method to dynamically call methods (often used by packers)
.NET source code contains very large array initializations
Machine Learning detection for dropped file
Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)
Uses schtasks.exe or at.exe to add and modify task schedules
Tries to harvest and steal browser information (history, passwords, etc)
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Uses 32bit PE files
Queries the volume information (name, serial number etc) of a device
Yara signature match
Antivirus or Machine Learning detection for unpacked file
May sleep (evasive loops) to hinder dynamic analysis
Uses code obfuscation techniques (call, push, ret)
Detected potential crypto function
Sample execution stops while process was sleeping (likely an evasion)
Yara detected Credential Stealer
JA3 SSL client fingerprint seen in connection with other malware
IP address seen in connection with other malware
Contains long sleeps (>= 3 min)
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Sample file is different than original file name gathered from version info
Drops PE files
Uses a known web browser user agent for HTTP communication
Detected TCP or UDP traffic on non-standard ports
Uses SMTP (mail sending)
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Monitors certain registry keys / values for changes (often done to protect autostart functionality)
Creates a process in suspended mode (likely to inject code)

Classification

  • System is w10x64
  • SHIPMENT DOCUMENTS.exe (PID: 3192 cmdline: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exe MD5: 12DC06D3034A17BE7A70A4AA45EDCE8D)
    • schtasks.exe (PID: 5900 cmdline: C:\Windows\System32\schtasks.exe" /Create /TN "Updates\cnWCiicEpxW" /XML "C:\Users\user\AppData\Local\Temp\tmp2A80.tmp MD5: 15FF7D8324231381BAD48A052F85DF04)
      • conhost.exe (PID: 1632 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
  • cnWCiicEpxW.exe (PID: 4444 cmdline: C:\Users\user\AppData\Roaming\cnWCiicEpxW.exe MD5: 12DC06D3034A17BE7A70A4AA45EDCE8D)
    • schtasks.exe (PID: 5740 cmdline: C:\Windows\System32\schtasks.exe" /Create /TN "Updates\cnWCiicEpxW" /XML "C:\Users\user\AppData\Local\Temp\tmpC7C9.tmp MD5: 15FF7D8324231381BAD48A052F85DF04)
      • conhost.exe (PID: 4512 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
    • cnWCiicEpxW.exe (PID: 3132 cmdline: {path} MD5: 12DC06D3034A17BE7A70A4AA45EDCE8D)
  • cleanup
{"Exfil Mode": "SMTP", "Host": "mail.southernboilers.org", "Username": "info@southernboilers.org", "Password": "Sksmoke2018#"}
SourceRuleDescriptionAuthorStrings
00000014.00000000.301553016.0000000000402000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
    00000014.00000000.301553016.0000000000402000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_AgentTesla_2Yara detected AgentTeslaJoe Security
      00000014.00000000.301553016.0000000000402000.00000040.00000400.00020000.00000000.sdmpWindows_Trojan_AgentTesla_d3ac2b2funknownunknown
      • 0x31ccf:$a13: get_DnsResolver
      • 0x303d4:$a20: get_LastAccessed
      • 0x326dc:$a27: set_InternalServerPort
      • 0x32a11:$a30: set_GuidMasterKey
      • 0x304e6:$a33: get_Clipboard
      • 0x304f4:$a34: get_Keyboard
      • 0x318ba:$a35: get_ShiftKeyDown
      • 0x318cb:$a36: get_AltKeyDown
      • 0x30501:$a37: get_Password
      • 0x31015:$a38: get_PasswordHash
      • 0x32110:$a39: get_DefaultCredentials
      0000001B.00000002.528419495.0000000003164000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
        0000001B.00000002.525674867.0000000003111000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
          Click to see the 16 entries
          SourceRuleDescriptionAuthorStrings
          20.0.SHIPMENT DOCUMENTS.exe.400000.0.unpackJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
            20.0.SHIPMENT DOCUMENTS.exe.400000.0.unpackJoeSecurity_AgentTesla_2Yara detected AgentTeslaJoe Security
              20.0.SHIPMENT DOCUMENTS.exe.400000.0.unpackMALWARE_Win_AgentTeslaV3AgentTeslaV3 infostealer payloadditekSHen
              • 0x349c0:$s10: logins
              • 0x34440:$s11: credential
              • 0x306e6:$g1: get_Clipboard
              • 0x306f4:$g2: get_Keyboard
              • 0x30701:$g3: get_Password
              • 0x31aaa:$g4: get_CtrlKeyDown
              • 0x31aba:$g5: get_ShiftKeyDown
              • 0x31acb:$g6: get_AltKeyDown
              20.0.SHIPMENT DOCUMENTS.exe.400000.0.unpackWindows_Trojan_AgentTesla_d3ac2b2funknownunknown
              • 0x31ecf:$a13: get_DnsResolver
              • 0x305d4:$a20: get_LastAccessed
              • 0x328dc:$a27: set_InternalServerPort
              • 0x32c11:$a30: set_GuidMasterKey
              • 0x306e6:$a33: get_Clipboard
              • 0x306f4:$a34: get_Keyboard
              • 0x31aba:$a35: get_ShiftKeyDown
              • 0x31acb:$a36: get_AltKeyDown
              • 0x30701:$a37: get_Password
              • 0x31215:$a38: get_PasswordHash
              • 0x32310:$a39: get_DefaultCredentials
              0.2.SHIPMENT DOCUMENTS.exe.3d715a0.1.unpackJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
                Click to see the 15 entries

                Persistence and Installation Behavior

                barindex
                Source: Process startedAuthor: Joe Security: Data: Command: C:\Windows\System32\schtasks.exe" /Create /TN "Updates\cnWCiicEpxW" /XML "C:\Users\user\AppData\Local\Temp\tmp2A80.tmp, CommandLine: C:\Windows\System32\schtasks.exe" /Create /TN "Updates\cnWCiicEpxW" /XML "C:\Users\user\AppData\Local\Temp\tmp2A80.tmp, CommandLine|base64offset|contains: *j, Image: C:\Windows\SysWOW64\schtasks.exe, NewProcessName: C:\Windows\SysWOW64\schtasks.exe, OriginalFileName: C:\Windows\SysWOW64\schtasks.exe, ParentCommandLine: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exe, ParentImage: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exe, ParentProcessId: 3192, ParentProcessName: SHIPMENT DOCUMENTS.exe, ProcessCommandLine: C:\Windows\System32\schtasks.exe" /Create /TN "Updates\cnWCiicEpxW" /XML "C:\Users\user\AppData\Local\Temp\tmp2A80.tmp, ProcessId: 5900, ProcessName: schtasks.exe
                No Snort rule has matched

                Click to jump to signature section

                Show All Signature Results

                AV Detection

                barindex
                Source: SHIPMENT DOCUMENTS.exeVirustotal: Detection: 36%Perma Link
                Source: SHIPMENT DOCUMENTS.exeReversingLabs: Detection: 32%
                Source: C:\Users\user\AppData\Roaming\cnWCiicEpxW.exeReversingLabs: Detection: 32%
                Source: SHIPMENT DOCUMENTS.exeJoe Sandbox ML: detected
                Source: C:\Users\user\AppData\Roaming\cnWCiicEpxW.exeJoe Sandbox ML: detected
                Source: 20.0.SHIPMENT DOCUMENTS.exe.400000.0.unpackAvira: Label: TR/Spy.Gen8
                Source: 20.0.SHIPMENT DOCUMENTS.exe.400000.0.unpackMalware Configuration Extractor: Agenttesla {"Exfil Mode": "SMTP", "Host": "mail.southernboilers.org", "Username": "info@southernboilers.org", "Password": "Sksmoke2018#"}
                Source: SHIPMENT DOCUMENTS.exeStatic PE information: EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
                Source: unknownHTTPS traffic detected: 52.20.78.240:443 -> 192.168.2.6:49713 version: TLS 1.2
                Source: unknownHTTPS traffic detected: 3.232.242.170:443 -> 192.168.2.6:49738 version: TLS 1.2
                Source: SHIPMENT DOCUMENTS.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                Source: Binary string: wv6MCeq.pdb source: SHIPMENT DOCUMENTS.exe, cnWCiicEpxW.exe.0.dr

                Networking

                barindex
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeDNS query: name: api.ipify.org
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeDNS query: name: api.ipify.org
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeDNS query: name: api.ipify.org
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeDNS query: name: api.ipify.org
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeDNS query: name: api.ipify.org
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeDNS query: name: api.ipify.org
                Source: C:\Users\user\AppData\Roaming\cnWCiicEpxW.exeDNS query: name: api.ipify.org
                Source: C:\Users\user\AppData\Roaming\cnWCiicEpxW.exeDNS query: name: api.ipify.org
                Source: C:\Users\user\AppData\Roaming\cnWCiicEpxW.exeDNS query: name: api.ipify.org
                Source: C:\Users\user\AppData\Roaming\cnWCiicEpxW.exeDNS query: name: api.ipify.org
                Source: C:\Users\user\AppData\Roaming\cnWCiicEpxW.exeDNS query: name: api.ipify.org
                Source: C:\Users\user\AppData\Roaming\cnWCiicEpxW.exeDNS query: name: api.ipify.org
                Source: Joe Sandbox ViewJA3 fingerprint: 3b5074b1b5d032e5620f69f9f700ff0e
                Source: Joe Sandbox ViewIP Address: 199.79.62.12 199.79.62.12
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:80.0) Gecko/20100101 Firefox/80.0Host: api.ipify.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:80.0) Gecko/20100101 Firefox/80.0Host: api.ipify.orgConnection: Keep-Alive
                Source: global trafficTCP traffic: 192.168.2.6:49721 -> 199.79.62.12:587
                Source: global trafficTCP traffic: 192.168.2.6:49721 -> 199.79.62.12:587
                Source: unknownNetwork traffic detected: HTTP traffic on port 49713 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49738
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49713
                Source: unknownNetwork traffic detected: HTTP traffic on port 49738 -> 443
                Source: SHIPMENT DOCUMENTS.exe, 00000014.00000002.522417697.0000000002EF1000.00000004.00000800.00020000.00000000.sdmp, cnWCiicEpxW.exe, 0000001B.00000002.525674867.0000000003111000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://127.0.0.1:HTTP/1.1
                Source: cnWCiicEpxW.exe, 0000001B.00000002.525674867.0000000003111000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://DynDns.comDynDNSnamejidpasswordPsi/Psi
                Source: SHIPMENT DOCUMENTS.exe, 00000014.00000003.398696766.0000000007129000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ac.economia.gob.mx/cps.html0
                Source: SHIPMENT DOCUMENTS.exe, 00000014.00000003.398696766.0000000007129000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ac.economia.gob.mx/last.crl0G
                Source: SHIPMENT DOCUMENTS.exe, 00000014.00000003.408437609.00000000070C4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://acedicom.edicomgroup.com/doc0
                Source: SHIPMENT DOCUMENTS.exe, 00000014.00000003.398941782.00000000065B9000.00000004.00000800.00020000.00000000.sdmp, SHIPMENT DOCUMENTS.exe, 00000014.00000003.403651123.00000000065E4000.00000004.00000800.00020000.00000000.sdmp, SHIPMENT DOCUMENTS.exe, 00000014.00000003.407915366.00000000065B9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://acraiz.icpbrasil.gov.br/DPCacraiz.pdf0?
                Source: SHIPMENT DOCUMENTS.exe, 00000014.00000003.398941782.00000000065B9000.00000004.00000800.00020000.00000000.sdmp, SHIPMENT DOCUMENTS.exe, 00000014.00000003.403651123.00000000065E4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://acraiz.icpbrasil.gov.br/LCRacraizv1.crl0
                Source: SHIPMENT DOCUMENTS.exe, 00000014.00000003.398941782.00000000065B9000.00000004.00000800.00020000.00000000.sdmp, SHIPMENT DOCUMENTS.exe, 00000014.00000003.407915366.00000000065B9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://acraiz.icpbrasil.gov.br/LCRacraizv2.crl0
                Source: SHIPMENT DOCUMENTS.exe, 00000014.00000003.393081850.00000000010F2000.00000004.00000020.00020000.00000000.sdmp, SHIPMENT DOCUMENTS.exe, 00000014.00000002.518974908.00000000010F2000.00000004.00000020.00020000.00000000.sdmp, SHIPMENT DOCUMENTS.exe, 00000014.00000002.516536811.000000000107D000.00000004.00000020.00020000.00000000.sdmp, SHIPMENT DOCUMENTS.exe, 00000014.00000003.393347400.0000000006586000.00000004.00000800.00020000.00000000.sdmp, SHIPMENT DOCUMENTS.exe, 00000014.00000002.533736666.00000000031E6000.00000004.00000800.00020000.00000000.sdmp, cnWCiicEpxW.exe, 0000001B.00000002.520315185.00000000013A0000.00000004.00000020.00020000.00000000.sdmp, cnWCiicEpxW.exe, 0000001B.00000002.534582730.00000000033F5000.00000004.00000800.00020000.00000000.sdmp, cnWCiicEpxW.exe, 0000001B.00000002.520153626.0000000001396000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://apps.identrust.com/roots/dstrootcax3.p7c0
                Source: cnWCiicEpxW.exe, 0000001B.00000002.525674867.0000000003111000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://bvQtmz.com
                Source: SHIPMENT DOCUMENTS.exe, 00000014.00000003.400439346.00000000065EF000.00000004.00000800.00020000.00000000.sdmp, SHIPMENT DOCUMENTS.exe, 00000014.00000003.403696848.00000000065EF000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ca.disig.sk/ca/crl/ca_disig.crl0
                Source: SHIPMENT DOCUMENTS.exe, 00000014.00000003.400439346.00000000065EF000.00000004.00000800.00020000.00000000.sdmp, SHIPMENT DOCUMENTS.exe, 00000014.00000003.401332216.00000000065F2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ca.mtin.es/mtin/DPCyPoliticas0
                Source: SHIPMENT DOCUMENTS.exe, 00000014.00000003.400439346.00000000065EF000.00000004.00000800.00020000.00000000.sdmp, SHIPMENT DOCUMENTS.exe, 00000014.00000003.401332216.00000000065F2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ca.mtin.es/mtin/DPCyPoliticas0g
                Source: SHIPMENT DOCUMENTS.exe, 00000014.00000003.400439346.00000000065EF000.00000004.00000800.00020000.00000000.sdmp, SHIPMENT DOCUMENTS.exe, 00000014.00000003.401332216.00000000065F2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ca.mtin.es/mtin/crl/MTINAutoridadRaiz03
                Source: SHIPMENT DOCUMENTS.exe, 00000014.00000003.400439346.00000000065EF000.00000004.00000800.00020000.00000000.sdmp, SHIPMENT DOCUMENTS.exe, 00000014.00000003.401332216.00000000065F2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ca.mtin.es/mtin/ocsp0
                Source: SHIPMENT DOCUMENTS.exe, 00000014.00000003.400439346.00000000065EF000.00000004.00000800.00020000.00000000.sdmp, SHIPMENT DOCUMENTS.exe, 00000014.00000003.401332216.00000000065F2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ca2.mtin.es/mtin/crl/MTINAutoridadRaiz0
                Source: SHIPMENT DOCUMENTS.exe, 00000014.00000003.400439346.00000000065EF000.00000004.00000800.00020000.00000000.sdmp, SHIPMENT DOCUMENTS.exe, 00000014.00000003.401332216.00000000065F2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://certificates.starfieldtech.com/repository/1604
                Source: SHIPMENT DOCUMENTS.exe, 00000014.00000003.400439346.00000000065EF000.00000004.00000800.00020000.00000000.sdmp, SHIPMENT DOCUMENTS.exe, 00000014.00000003.401332216.00000000065F2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://certs.oati.net/repository/OATICA2.crl0
                Source: SHIPMENT DOCUMENTS.exe, 00000014.00000003.400439346.00000000065EF000.00000004.00000800.00020000.00000000.sdmp, SHIPMENT DOCUMENTS.exe, 00000014.00000003.401332216.00000000065F2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://certs.oati.net/repository/OATICA2.crt0
                Source: SHIPMENT DOCUMENTS.exe, 00000014.00000003.400439346.00000000065EF000.00000004.00000800.00020000.00000000.sdmp, SHIPMENT DOCUMENTS.exe, 00000014.00000003.401332216.00000000065F2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://certs.oaticerts.com/repository/OATICA2.crl
                Source: SHIPMENT DOCUMENTS.exe, 00000014.00000003.400439346.00000000065EF000.00000004.00000800.00020000.00000000.sdmp, SHIPMENT DOCUMENTS.exe, 00000014.00000003.401332216.00000000065F2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://certs.oaticerts.com/repository/OATICA2.crt08
                Source: SHIPMENT DOCUMENTS.exe, 00000014.00000003.398696766.0000000007129000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://cps.chambersign.org/cps/chambersignroot.html0
                Source: SHIPMENT DOCUMENTS.exe, 00000014.00000003.398941782.00000000065B9000.00000004.00000800.00020000.00000000.sdmp, SHIPMENT DOCUMENTS.exe, 00000014.00000003.403651123.00000000065E4000.00000004.00000800.00020000.00000000.sdmp, SHIPMENT DOCUMENTS.exe, 00000014.00000002.546353573.00000000065ED000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://cps.chambersign.org/cps/chambersroot.html0
                Source: SHIPMENT DOCUMENTS.exe, 00000014.00000003.392950428.00000000010D7000.00000004.00000020.00020000.00000000.sdmp, SHIPMENT DOCUMENTS.exe, 00000014.00000002.516536811.000000000107D000.00000004.00000020.00020000.00000000.sdmp, SHIPMENT DOCUMENTS.exe, 00000014.00000003.393347400.0000000006586000.00000004.00000800.00020000.00000000.sdmp, SHIPMENT DOCUMENTS.exe, 00000014.00000002.533736666.00000000031E6000.00000004.00000800.00020000.00000000.sdmp, cnWCiicEpxW.exe, 0000001B.00000002.520315185.00000000013A0000.00000004.00000020.00020000.00000000.sdmp, cnWCiicEpxW.exe, 0000001B.00000002.534582730.00000000033F5000.00000004.00000800.00020000.00000000.sdmp, cnWCiicEpxW.exe, 0000001B.00000002.519279531.000000000135D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://cps.letsencrypt.org0
                Source: SHIPMENT DOCUMENTS.exe, 00000014.00000003.393081850.00000000010F2000.00000004.00000020.00020000.00000000.sdmp, SHIPMENT DOCUMENTS.exe, 00000014.00000002.518974908.00000000010F2000.00000004.00000020.00020000.00000000.sdmp, SHIPMENT DOCUMENTS.exe, 00000014.00000002.516536811.000000000107D000.00000004.00000020.00020000.00000000.sdmp, SHIPMENT DOCUMENTS.exe, 00000014.00000003.393347400.0000000006586000.00000004.00000800.00020000.00000000.sdmp, SHIPMENT DOCUMENTS.exe, 00000014.00000002.533736666.00000000031E6000.00000004.00000800.00020000.00000000.sdmp, cnWCiicEpxW.exe, 0000001B.00000002.520315185.00000000013A0000.00000004.00000020.00020000.00000000.sdmp, cnWCiicEpxW.exe, 0000001B.00000002.534582730.00000000033F5000.00000004.00000800.00020000.00000000.sdmp, cnWCiicEpxW.exe, 0000001B.00000002.520153626.0000000001396000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://cps.root-x1.letsencrypt.org0
                Source: SHIPMENT DOCUMENTS.exe, 00000014.00000003.400439346.00000000065EF000.00000004.00000800.00020000.00000000.sdmp, SHIPMENT DOCUMENTS.exe, 00000014.00000003.401332216.00000000065F2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://cps.siths.se/sithsrootcav1.html0
                Source: SHIPMENT DOCUMENTS.exe, 00000014.00000003.398450527.0000000007136000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl.certigna.fr/certignarootca.crl01
                Source: SHIPMENT DOCUMENTS.exe, 00000014.00000003.398696766.0000000007129000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl.chambersign.org/chambersignroot.crl0
                Source: SHIPMENT DOCUMENTS.exe, 00000014.00000003.398941782.00000000065B9000.00000004.00000800.00020000.00000000.sdmp, SHIPMENT DOCUMENTS.exe, 00000014.00000003.403651123.00000000065E4000.00000004.00000800.00020000.00000000.sdmp, SHIPMENT DOCUMENTS.exe, 00000014.00000002.546353573.00000000065ED000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl.chambersign.org/chambersroot.crl0
                Source: SHIPMENT DOCUMENTS.exe, 00000014.00000003.398836058.00000000065AD000.00000004.00000800.00020000.00000000.sdmp, SHIPMENT DOCUMENTS.exe, 00000014.00000003.407868660.00000000065AE000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl.comodoca.com/AAACertificateServices.crl06
                Source: SHIPMENT DOCUMENTS.exe, 00000014.00000003.398941782.00000000065B9000.00000004.00000800.00020000.00000000.sdmp, SHIPMENT DOCUMENTS.exe, 00000014.00000003.407915366.00000000065B9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl.defence.gov.au/pki0
                Source: SHIPMENT DOCUMENTS.exe, 00000014.00000003.398450527.0000000007136000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl.dhimyotis.com/certignarootca.crl0
                Source: SHIPMENT DOCUMENTS.exe, 00000014.00000003.392950428.00000000010D7000.00000004.00000020.00020000.00000000.sdmp, SHIPMENT DOCUMENTS.exe, 00000014.00000002.518569851.00000000010E0000.00000004.00000020.00020000.00000000.sdmp, SHIPMENT DOCUMENTS.exe, 00000014.00000003.398941782.00000000065B9000.00000004.00000800.00020000.00000000.sdmp, SHIPMENT DOCUMENTS.exe, 00000014.00000003.403853962.00000000065DA000.00000004.00000800.00020000.00000000.sdmp, SHIPMENT DOCUMENTS.exe, 00000014.00000003.387644774.00000000010D8000.00000004.00000020.00020000.00000000.sdmp, cnWCiicEpxW.exe, 0000001B.00000003.494475191.00000000013BE000.00000004.00000020.00020000.00000000.sdmp, cnWCiicEpxW.exe, 0000001B.00000003.503345787.00000000013CD000.00000004.00000020.00020000.00000000.sdmp, cnWCiicEpxW.exe, 0000001B.00000002.521128082.00000000013CF000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.globalsign.net/root-r2.crl0
                Source: SHIPMENT DOCUMENTS.exe, 00000014.00000003.393081850.00000000010F2000.00000004.00000020.00020000.00000000.sdmp, SHIPMENT DOCUMENTS.exe, 00000014.00000002.518974908.00000000010F2000.00000004.00000020.00020000.00000000.sdmp, SHIPMENT DOCUMENTS.exe, 00000014.00000002.516536811.000000000107D000.00000004.00000020.00020000.00000000.sdmp, SHIPMENT DOCUMENTS.exe, 00000014.00000003.393347400.0000000006586000.00000004.00000800.00020000.00000000.sdmp, SHIPMENT DOCUMENTS.exe, 00000014.00000002.533736666.00000000031E6000.00000004.00000800.00020000.00000000.sdmp, cnWCiicEpxW.exe, 0000001B.00000002.520315185.00000000013A0000.00000004.00000020.00020000.00000000.sdmp, cnWCiicEpxW.exe, 0000001B.00000002.534582730.00000000033F5000.00000004.00000800.00020000.00000000.sdmp, cnWCiicEpxW.exe, 0000001B.00000002.520153626.0000000001396000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.identrust.com/DSTROOTCAX3CRL.crl0
                Source: SHIPMENT DOCUMENTS.exe, 00000014.00000002.546472929.0000000006603000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl.microsoft.
                Source: SHIPMENT DOCUMENTS.exe, 00000014.00000003.400439346.00000000065EF000.00000004.00000800.00020000.00000000.sdmp, SHIPMENT DOCUMENTS.exe, 00000014.00000003.401332216.00000000065F2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl.oces.trust2408.com/oces.crl0
                Source: SHIPMENT DOCUMENTS.exe, 00000014.00000003.408437609.00000000070C4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl.pki.wellsfargo.com/wsprca.crl0
                Source: SHIPMENT DOCUMENTS.exe, 00000014.00000003.398941782.00000000065B9000.00000004.00000800.00020000.00000000.sdmp, SHIPMENT DOCUMENTS.exe, 00000014.00000003.403853962.00000000065DA000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl.securetrust.com/SGCA.crl0
                Source: SHIPMENT DOCUMENTS.exe, 00000014.00000003.398941782.00000000065B9000.00000004.00000800.00020000.00000000.sdmp, SHIPMENT DOCUMENTS.exe, 00000014.00000003.403853962.00000000065DA000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl.securetrust.com/STCA.crl0
                Source: SHIPMENT DOCUMENTS.exe, 00000014.00000003.400439346.00000000065EF000.00000004.00000800.00020000.00000000.sdmp, SHIPMENT DOCUMENTS.exe, 00000014.00000003.401332216.00000000065F2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl.ssc.lt/root-a/cacrl.crl0
                Source: SHIPMENT DOCUMENTS.exe, 00000014.00000003.401258901.0000000007125000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl.ssc.lt/root-b/cacrl.crl0
                Source: SHIPMENT DOCUMENTS.exe, 00000014.00000003.398450527.0000000007136000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl.ssc.lt/root-c/cacrl.crl0
                Source: SHIPMENT DOCUMENTS.exe, 00000014.00000003.408011972.00000000065C1000.00000004.00000800.00020000.00000000.sdmp, SHIPMENT DOCUMENTS.exe, 00000014.00000003.398941782.00000000065B9000.00000004.00000800.00020000.00000000.sdmp, SHIPMENT DOCUMENTS.exe, 00000014.00000003.407915366.00000000065B9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl.xrampsecurity.com/XGCA.crl0
                Source: SHIPMENT DOCUMENTS.exe, 00000014.00000003.398941782.00000000065B9000.00000004.00000800.00020000.00000000.sdmp, SHIPMENT DOCUMENTS.exe, 00000014.00000003.407915366.00000000065B9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl1.comsign.co.il/crl/comsignglobalrootca.crl0
                Source: SHIPMENT DOCUMENTS.exe, 00000014.00000003.403139297.0000000006616000.00000004.00000800.00020000.00000000.sdmp, SHIPMENT DOCUMENTS.exe, 00000014.00000003.396165041.000000000660E000.00000004.00000800.00020000.00000000.sdmp, SHIPMENT DOCUMENTS.exe, 00000014.00000003.400776216.000000000660B000.00000004.00000800.00020000.00000000.sdmp, SHIPMENT DOCUMENTS.exe, 00000014.00000003.408642824.0000000006614000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ctldl.windowsupdate.com/
                Source: SHIPMENT DOCUMENTS.exe, 00000014.00000003.400776216.000000000660B000.00000004.00000800.00020000.00000000.sdmp, SHIPMENT DOCUMENTS.exe, 00000014.00000003.408642824.0000000006614000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ctldl.windowsupdate.com/0
                Source: SHIPMENT DOCUMENTS.exe, 00000014.00000003.396165041.000000000660E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ctldl.windowsupdate.com/C
                Source: SHIPMENT DOCUMENTS.exe, 00000014.00000002.516536811.000000000107D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en
                Source: SHIPMENT DOCUMENTS.exe, 00000014.00000003.398769792.000000000715E000.00000004.00000800.00020000.00000000.sdmp, SHIPMENT DOCUMENTS.exe, 00000014.00000003.398611848.000000000715D000.00000004.00000800.00020000.00000000.sdmp, SHIPMENT DOCUMENTS.exe, 00000014.00000003.398941782.00000000065B9000.00000004.00000800.00020000.00000000.sdmp, SHIPMENT DOCUMENTS.exe, 00000014.00000003.407915366.00000000065B9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/CABD2A79A1076A31F21D253635CB0
                Source: 77EC63BDA74BD0D0E0426DC8F80085060.20.drString found in binary or memory: http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootstl.cab
                Source: SHIPMENT DOCUMENTS.exe, 00000014.00000002.544794129.0000000006540000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootstl.cabm
                Source: SHIPMENT DOCUMENTS.exe, 00000014.00000003.398941782.00000000065B9000.00000004.00000800.00020000.00000000.sdmp, SHIPMENT DOCUMENTS.exe, 00000014.00000003.403651123.00000000065E4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://eca.hinet.net/repository/CRL2/CA.crl0
                Source: SHIPMENT DOCUMENTS.exe, 00000014.00000003.398941782.00000000065B9000.00000004.00000800.00020000.00000000.sdmp, SHIPMENT DOCUMENTS.exe, 00000014.00000003.403651123.00000000065E4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://eca.hinet.net/repository/Certs/IssuedToThisCA.p7b05
                Source: SHIPMENT DOCUMENTS.exe, 00000014.00000003.398941782.00000000065B9000.00000004.00000800.00020000.00000000.sdmp, SHIPMENT DOCUMENTS.exe, 00000014.00000003.403651123.00000000065E4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://fedir.comsign.co.il/cacert/ComSignAdvancedSecurityCA.crt0
                Source: SHIPMENT DOCUMENTS.exe, 00000014.00000003.398941782.00000000065B9000.00000004.00000800.00020000.00000000.sdmp, SHIPMENT DOCUMENTS.exe, 00000014.00000003.403651123.00000000065E4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://fedir.comsign.co.il/crl/ComSignAdvancedSecurityCA.crl0
                Source: SHIPMENT DOCUMENTS.exe, 00000014.00000003.408437609.00000000070C4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://fedir.comsign.co.il/crl/ComSignCA.crl0
                Source: SHIPMENT DOCUMENTS.exe, 00000014.00000003.398941782.00000000065B9000.00000004.00000800.00020000.00000000.sdmp, SHIPMENT DOCUMENTS.exe, 00000014.00000003.407915366.00000000065B9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://fedir.comsign.co.il/crl/comsignglobalrootca.crl0;
                Source: SHIPMENT DOCUMENTS.exe, 00000000.00000002.315590285.0000000006E62000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://fontfabrik.com
                Source: SHIPMENT DOCUMENTS.exe, 00000014.00000003.398941782.00000000065B9000.00000004.00000800.00020000.00000000.sdmp, SHIPMENT DOCUMENTS.exe, 00000014.00000003.403942163.00000000065CD000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://http.fpki.gov/fcpca/caCertsIssuedByfcpca.p7c0
                Source: SHIPMENT DOCUMENTS.exe, 00000014.00000002.533736666.00000000031E6000.00000004.00000800.00020000.00000000.sdmp, cnWCiicEpxW.exe, 0000001B.00000002.534528527.00000000033EF000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://mail.southernboilers.org
                Source: SHIPMENT DOCUMENTS.exe, 00000014.00000003.398941782.00000000065B9000.00000004.00000800.00020000.00000000.sdmp, SHIPMENT DOCUMENTS.exe, 00000014.00000003.403942163.00000000065CD000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ocsp.accv.es0
                Source: SHIPMENT DOCUMENTS.exe, 00000014.00000003.398941782.00000000065B9000.00000004.00000800.00020000.00000000.sdmp, SHIPMENT DOCUMENTS.exe, 00000014.00000003.403651123.00000000065E4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ocsp.eca.hinet.net/OCSP/ocspG2sha20
                Source: SHIPMENT DOCUMENTS.exe, 00000014.00000003.403880249.00000000065E1000.00000004.00000800.00020000.00000000.sdmp, SHIPMENT DOCUMENTS.exe, 00000014.00000003.398941782.00000000065B9000.00000004.00000800.00020000.00000000.sdmp, SHIPMENT DOCUMENTS.exe, 00000014.00000003.406958224.00000000065E3000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ocsp.ncdc.gov.sa0
                Source: SHIPMENT DOCUMENTS.exe, 00000014.00000003.398941782.00000000065B9000.00000004.00000800.00020000.00000000.sdmp, SHIPMENT DOCUMENTS.exe, 00000014.00000003.403942163.00000000065CD000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ocsp.pki.gva.es0
                Source: SHIPMENT DOCUMENTS.exe, 00000014.00000003.407487472.00000000070CC000.00000004.00000800.00020000.00000000.sdmp, SHIPMENT DOCUMENTS.exe, 00000014.00000003.398696766.0000000007129000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ocsp.suscerte.gob.ve0
                Source: SHIPMENT DOCUMENTS.exe, 00000014.00000003.401023380.000000000662C000.00000004.00000800.00020000.00000000.sdmp, SHIPMENT DOCUMENTS.exe, 00000014.00000003.403450297.0000000006634000.00000004.00000800.00020000.00000000.sdmp, SHIPMENT DOCUMENTS.exe, 00000014.00000003.408697131.0000000006630000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://pki.digidentity.eu/validatie0
                Source: SHIPMENT DOCUMENTS.exe, 00000014.00000003.398450527.0000000007136000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://pki.registradores.org/normativa/index.htm0
                Source: SHIPMENT DOCUMENTS.exe, 00000014.00000003.400439346.00000000065EF000.00000004.00000800.00020000.00000000.sdmp, SHIPMENT DOCUMENTS.exe, 00000014.00000003.408538851.0000000006603000.00000004.00000800.00020000.00000000.sdmp, SHIPMENT DOCUMENTS.exe, 00000014.00000003.401332216.00000000065F2000.00000004.00000800.00020000.00000000.sdmp, SHIPMENT DOCUMENTS.exe, 00000014.00000003.398941782.00000000065B9000.00000004.00000800.00020000.00000000.sdmp, SHIPMENT DOCUMENTS.exe, 00000014.00000003.403651123.00000000065E4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://policy.camerfirma.com0
                Source: SHIPMENT DOCUMENTS.exe, 00000014.00000003.398941782.00000000065B9000.00000004.00000800.00020000.00000000.sdmp, SHIPMENT DOCUMENTS.exe, 00000014.00000003.403942163.00000000065CD000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://postsignum.ttc.cz/crl/psrootqca2.crl0
                Source: SHIPMENT DOCUMENTS.exe, 00000014.00000003.392950428.00000000010D7000.00000004.00000020.00020000.00000000.sdmp, SHIPMENT DOCUMENTS.exe, 00000014.00000002.516536811.000000000107D000.00000004.00000020.00020000.00000000.sdmp, SHIPMENT DOCUMENTS.exe, 00000014.00000003.393347400.0000000006586000.00000004.00000800.00020000.00000000.sdmp, SHIPMENT DOCUMENTS.exe, 00000014.00000002.533736666.00000000031E6000.00000004.00000800.00020000.00000000.sdmp, cnWCiicEpxW.exe, 0000001B.00000002.520315185.00000000013A0000.00000004.00000020.00020000.00000000.sdmp, cnWCiicEpxW.exe, 0000001B.00000002.534582730.00000000033F5000.00000004.00000800.00020000.00000000.sdmp, cnWCiicEpxW.exe, 0000001B.00000002.519279531.000000000135D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://r3.i.lencr.org/0
                Source: SHIPMENT DOCUMENTS.exe, 00000014.00000003.392950428.00000000010D7000.00000004.00000020.00020000.00000000.sdmp, SHIPMENT DOCUMENTS.exe, 00000014.00000002.516536811.000000000107D000.00000004.00000020.00020000.00000000.sdmp, SHIPMENT DOCUMENTS.exe, 00000014.00000003.393347400.0000000006586000.00000004.00000800.00020000.00000000.sdmp, SHIPMENT DOCUMENTS.exe, 00000014.00000002.533736666.00000000031E6000.00000004.00000800.00020000.00000000.sdmp, cnWCiicEpxW.exe, 0000001B.00000002.520315185.00000000013A0000.00000004.00000020.00020000.00000000.sdmp, cnWCiicEpxW.exe, 0000001B.00000002.534582730.00000000033F5000.00000004.00000800.00020000.00000000.sdmp, cnWCiicEpxW.exe, 0000001B.00000002.519279531.000000000135D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://r3.o.lencr.org0
                Source: SHIPMENT DOCUMENTS.exe, 00000014.00000003.400439346.00000000065EF000.00000004.00000800.00020000.00000000.sdmp, SHIPMENT DOCUMENTS.exe, 00000014.00000003.407487472.00000000070CC000.00000004.00000800.00020000.00000000.sdmp, SHIPMENT DOCUMENTS.exe, 00000014.00000003.401332216.00000000065F2000.00000004.00000800.00020000.00000000.sdmp, SHIPMENT DOCUMENTS.exe, 00000014.00000003.398941782.00000000065B9000.00000004.00000800.00020000.00000000.sdmp, SHIPMENT DOCUMENTS.exe, 00000014.00000003.403942163.00000000065CD000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://repository.swisssign.com/0
                Source: SHIPMENT DOCUMENTS.exe, 00000000.00000002.305232047.0000000002CA1000.00000004.00000800.00020000.00000000.sdmp, SHIPMENT DOCUMENTS.exe, 00000014.00000002.522417697.0000000002EF1000.00000004.00000800.00020000.00000000.sdmp, cnWCiicEpxW.exe, 00000015.00000002.415707967.0000000002B71000.00000004.00000800.00020000.00000000.sdmp, cnWCiicEpxW.exe, 0000001B.00000002.525674867.0000000003111000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
                Source: SHIPMENT DOCUMENTS.exe, 00000014.00000003.407487472.00000000070CC000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://sertifikati.ca.posta.rs/crl/PostaCARoot.crl0
                Source: SHIPMENT DOCUMENTS.exe, 00000014.00000003.398941782.00000000065B9000.00000004.00000800.00020000.00000000.sdmp, SHIPMENT DOCUMENTS.exe, 00000014.00000003.403942163.00000000065CD000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://trustcenter-crl.certificat2.com/Keynectis/KEYNECTIS_ROOT_CA.crl0
                Source: SHIPMENT DOCUMENTS.exe, 00000014.00000003.403880249.00000000065E1000.00000004.00000800.00020000.00000000.sdmp, SHIPMENT DOCUMENTS.exe, 00000014.00000003.398941782.00000000065B9000.00000004.00000800.00020000.00000000.sdmp, SHIPMENT DOCUMENTS.exe, 00000014.00000003.406958224.00000000065E3000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://web.ncdc.gov.sa/crl/nrcacomb1.crl0
                Source: SHIPMENT DOCUMENTS.exe, 00000014.00000003.403880249.00000000065E1000.00000004.00000800.00020000.00000000.sdmp, SHIPMENT DOCUMENTS.exe, 00000014.00000003.398941782.00000000065B9000.00000004.00000800.00020000.00000000.sdmp, SHIPMENT DOCUMENTS.exe, 00000014.00000003.406958224.00000000065E3000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://web.ncdc.gov.sa/crl/nrcaparta1.crl
                Source: SHIPMENT DOCUMENTS.exe, 00000014.00000003.407487472.00000000070CC000.00000004.00000800.00020000.00000000.sdmp, SHIPMENT DOCUMENTS.exe, 00000014.00000003.398941782.00000000065B9000.00000004.00000800.00020000.00000000.sdmp, SHIPMENT DOCUMENTS.exe, 00000014.00000003.403651123.00000000065E4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.acabogacia.org/doc0
                Source: SHIPMENT DOCUMENTS.exe, 00000014.00000003.403651123.00000000065E4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.acabogacia.org0
                Source: SHIPMENT DOCUMENTS.exe, 00000014.00000003.398941782.00000000065B9000.00000004.00000800.00020000.00000000.sdmp, SHIPMENT DOCUMENTS.exe, 00000014.00000003.403942163.00000000065CD000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.accv.es/fileadmin/Archivos/certificados/raizaccv1.crt0
                Source: SHIPMENT DOCUMENTS.exe, 00000014.00000003.398941782.00000000065B9000.00000004.00000800.00020000.00000000.sdmp, SHIPMENT DOCUMENTS.exe, 00000014.00000003.403942163.00000000065CD000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.accv.es/fileadmin/Archivos/certificados/raizaccv1_der.crl0
                Source: SHIPMENT DOCUMENTS.exe, 00000014.00000003.398941782.00000000065B9000.00000004.00000800.00020000.00000000.sdmp, SHIPMENT DOCUMENTS.exe, 00000014.00000003.403942163.00000000065CD000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.accv.es/legislacion_c.htm0U
                Source: SHIPMENT DOCUMENTS.exe, 00000014.00000003.398941782.00000000065B9000.00000004.00000800.00020000.00000000.sdmp, SHIPMENT DOCUMENTS.exe, 00000014.00000003.403942163.00000000065CD000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.accv.es00
                Source: SHIPMENT DOCUMENTS.exe, 00000014.00000003.398941782.00000000065B9000.00000004.00000800.00020000.00000000.sdmp, SHIPMENT DOCUMENTS.exe, 00000014.00000003.403651123.00000000065E4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.agesic.gub.uy/acrn/acrn.crl0)
                Source: SHIPMENT DOCUMENTS.exe, 00000014.00000003.398941782.00000000065B9000.00000004.00000800.00020000.00000000.sdmp, SHIPMENT DOCUMENTS.exe, 00000014.00000003.403651123.00000000065E4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.agesic.gub.uy/acrn/cps_acrn.pdf0
                Source: SHIPMENT DOCUMENTS.exe, 00000014.00000003.407868660.00000000065AE000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.ancert.com/cps0
                Source: SHIPMENT DOCUMENTS.exe, 00000014.00000003.400439346.00000000065EF000.00000004.00000800.00020000.00000000.sdmp, SHIPMENT DOCUMENTS.exe, 00000014.00000003.401332216.00000000065F2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.anf.es
                Source: SHIPMENT DOCUMENTS.exe, 00000014.00000003.398836058.00000000065AD000.00000004.00000800.00020000.00000000.sdmp, SHIPMENT DOCUMENTS.exe, 00000014.00000003.407868660.00000000065AE000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.anf.es/AC/RC/ocsp0c
                Source: SHIPMENT DOCUMENTS.exe, 00000014.00000003.400439346.00000000065EF000.00000004.00000800.00020000.00000000.sdmp, SHIPMENT DOCUMENTS.exe, 00000014.00000003.401332216.00000000065F2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.anf.es/es/address-direccion.html
                Source: SHIPMENT DOCUMENTS.exe, 00000000.00000002.315590285.0000000006E62000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0
                Source: SHIPMENT DOCUMENTS.exe, 00000014.00000003.407487472.00000000070CC000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.ca.posta.rs/dokumentacija0h
                Source: SHIPMENT DOCUMENTS.exe, 00000000.00000002.315590285.0000000006E62000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.carterandcone.coml
                Source: SHIPMENT DOCUMENTS.exe, 00000014.00000003.408437609.00000000070C4000.00000004.00000800.00020000.00000000.sdmp, SHIPMENT DOCUMENTS.exe, 00000014.00000003.398941782.00000000065B9000.00000004.00000800.00020000.00000000.sdmp, SHIPMENT DOCUMENTS.exe, 00000014.00000003.407915366.00000000065B9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.cert.fnmt.es/dpcs/0
                Source: SHIPMENT DOCUMENTS.exe, 00000014.00000003.400776216.000000000660B000.00000004.00000800.00020000.00000000.sdmp, SHIPMENT DOCUMENTS.exe, 00000014.00000003.408594188.000000000660D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.certeurope.fr/reference/pc-root2.pdf0
                Source: SHIPMENT DOCUMENTS.exe, 00000014.00000003.400776216.000000000660B000.00000004.00000800.00020000.00000000.sdmp, SHIPMENT DOCUMENTS.exe, 00000014.00000003.408594188.000000000660D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.certeurope.fr/reference/root2.crl0
                Source: SHIPMENT DOCUMENTS.exe, 00000014.00000003.398836058.00000000065AD000.00000004.00000800.00020000.00000000.sdmp, SHIPMENT DOCUMENTS.exe, 00000014.00000003.407868660.00000000065AE000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.certicamara.com/dpc/0Z
                Source: SHIPMENT DOCUMENTS.exe, 00000014.00000003.400439346.00000000065EF000.00000004.00000800.00020000.00000000.sdmp, SHIPMENT DOCUMENTS.exe, 00000014.00000003.401332216.00000000065F2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.certplus.com/CRL/class1.crl0
                Source: SHIPMENT DOCUMENTS.exe, 00000014.00000003.398941782.00000000065B9000.00000004.00000800.00020000.00000000.sdmp, SHIPMENT DOCUMENTS.exe, 00000014.00000003.403651123.00000000065E4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.certplus.com/CRL/class2.crl0
                Source: SHIPMENT DOCUMENTS.exe, 00000014.00000003.407487472.00000000070CC000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.certplus.com/CRL/class3.crl0
                Source: SHIPMENT DOCUMENTS.exe, 00000014.00000003.398450527.0000000007136000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.certplus.com/CRL/class3P.crl0
                Source: SHIPMENT DOCUMENTS.exe, 00000014.00000003.401023380.000000000662C000.00000004.00000800.00020000.00000000.sdmp, SHIPMENT DOCUMENTS.exe, 00000014.00000003.408697131.0000000006630000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.certplus.com/CRL/class3TS.crl0
                Source: SHIPMENT DOCUMENTS.exe, 00000014.00000003.398941782.00000000065B9000.00000004.00000800.00020000.00000000.sdmp, SHIPMENT DOCUMENTS.exe, 00000014.00000003.403651123.00000000065E4000.00000004.00000800.00020000.00000000.sdmp, SHIPMENT DOCUMENTS.exe, 00000014.00000003.398696766.0000000007129000.00000004.00000800.00020000.00000000.sdmp, SHIPMENT DOCUMENTS.exe, 00000014.00000002.546353573.00000000065ED000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.chambersign.org1
                Source: SHIPMENT DOCUMENTS.exe, 00000014.00000003.398941782.00000000065B9000.00000004.00000800.00020000.00000000.sdmp, SHIPMENT DOCUMENTS.exe, 00000014.00000003.403651123.00000000065E4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.comsign.co.il/cps0
                Source: SHIPMENT DOCUMENTS.exe, 00000014.00000003.402966476.000000000660E000.00000004.00000800.00020000.00000000.sdmp, SHIPMENT DOCUMENTS.exe, 00000014.00000003.400776216.000000000660B000.00000004.00000800.00020000.00000000.sdmp, SHIPMENT DOCUMENTS.exe, 00000014.00000003.408594188.000000000660D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.correo.com.uy/correocert/cps.pdf0
                Source: SHIPMENT DOCUMENTS.exe, 00000014.00000003.407487472.00000000070CC000.00000004.00000800.00020000.00000000.sdmp, SHIPMENT DOCUMENTS.exe, 00000014.00000003.398696766.0000000007129000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.datev.de/zertifikat-policy-bt0
                Source: SHIPMENT DOCUMENTS.exe, 00000014.00000003.400439346.00000000065EF000.00000004.00000800.00020000.00000000.sdmp, SHIPMENT DOCUMENTS.exe, 00000014.00000003.401332216.00000000065F2000.00000004.00000800.00020000.00000000.sdmp, SHIPMENT DOCUMENTS.exe, 00000014.00000003.398941782.00000000065B9000.00000004.00000800.00020000.00000000.sdmp, SHIPMENT DOCUMENTS.exe, 00000014.00000003.408391129.00000000065D8000.00000004.00000800.00020000.00000000.sdmp, SHIPMENT DOCUMENTS.exe, 00000014.00000003.403942163.00000000065CD000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.datev.de/zertifikat-policy-int0
                Source: SHIPMENT DOCUMENTS.exe, 00000014.00000003.398450527.0000000007136000.00000004.00000800.00020000.00000000.sdmp, SHIPMENT DOCUMENTS.exe, 00000014.00000003.398941782.00000000065B9000.00000004.00000800.00020000.00000000.sdmp, SHIPMENT DOCUMENTS.exe, 00000014.00000003.407915366.00000000065B9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.datev.de/zertifikat-policy-std0
                Source: SHIPMENT DOCUMENTS.exe, 00000014.00000003.403880249.00000000065E1000.00000004.00000800.00020000.00000000.sdmp, SHIPMENT DOCUMENTS.exe, 00000014.00000003.398941782.00000000065B9000.00000004.00000800.00020000.00000000.sdmp, SHIPMENT DOCUMENTS.exe, 00000014.00000003.406958224.00000000065E3000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.defence.gov.au/pki0
                Source: SHIPMENT DOCUMENTS.exe, 00000014.00000003.400439346.00000000065EF000.00000004.00000800.00020000.00000000.sdmp, SHIPMENT DOCUMENTS.exe, 00000014.00000003.403696848.00000000065EF000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.disig.sk/ca/crl/ca_disig.crl0
                Source: SHIPMENT DOCUMENTS.exe, 00000014.00000003.400439346.00000000065EF000.00000004.00000800.00020000.00000000.sdmp, SHIPMENT DOCUMENTS.exe, 00000014.00000003.403696848.00000000065EF000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.disig.sk/ca0f
                Source: SHIPMENT DOCUMENTS.exe, 00000014.00000003.398941782.00000000065B9000.00000004.00000800.00020000.00000000.sdmp, SHIPMENT DOCUMENTS.exe, 00000014.00000003.407915366.00000000065B9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.dnie.es/dpc0
                Source: SHIPMENT DOCUMENTS.exe, 00000014.00000003.398450527.0000000007136000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.e-me.lv/repository0
                Source: SHIPMENT DOCUMENTS.exe, 00000014.00000003.398450527.0000000007136000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.e-szigno.hu/RootCA.crl
                Source: SHIPMENT DOCUMENTS.exe, 00000014.00000003.398450527.0000000007136000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.e-szigno.hu/RootCA.crt0
                Source: SHIPMENT DOCUMENTS.exe, 00000014.00000003.398450527.0000000007136000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.e-szigno.hu/SZSZ/0
                Source: SHIPMENT DOCUMENTS.exe, 00000014.00000003.398450527.0000000007136000.00000004.00000800.00020000.00000000.sdmp, SHIPMENT DOCUMENTS.exe, 00000014.00000003.398941782.00000000065B9000.00000004.00000800.00020000.00000000.sdmp, SHIPMENT DOCUMENTS.exe, 00000014.00000003.403651123.00000000065E4000.00000004.00000800.00020000.00000000.sdmp, SHIPMENT DOCUMENTS.exe, 00000014.00000003.407915366.00000000065B9000.00000004.00000800.00020000.00000000.sdmp, SHIPMENT DOCUMENTS.exe, 00000014.00000002.546037308.00000000065B9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.e-trust.be/CPS/QNcerts
                Source: SHIPMENT DOCUMENTS.exe, 00000014.00000003.398696766.0000000007129000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.ecee.gov.pt/dpc0
                Source: SHIPMENT DOCUMENTS.exe, 00000014.00000003.398836058.00000000065AD000.00000004.00000800.00020000.00000000.sdmp, SHIPMENT DOCUMENTS.exe, 00000014.00000003.407868660.00000000065AE000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.echoworx.com/ca/root2/cps.pdf0
                Source: SHIPMENT DOCUMENTS.exe, 00000014.00000003.398836058.00000000065AD000.00000004.00000800.00020000.00000000.sdmp, SHIPMENT DOCUMENTS.exe, 00000014.00000003.407868660.00000000065AE000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.eme.lv/repository0
                Source: SHIPMENT DOCUMENTS.exe, 00000014.00000003.398941782.00000000065B9000.00000004.00000800.00020000.00000000.sdmp, SHIPMENT DOCUMENTS.exe, 00000014.00000003.407915366.00000000065B9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.firmaprofesional.com/cps0
                Source: SHIPMENT DOCUMENTS.exe, 00000000.00000002.315590285.0000000006E62000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com
                Source: SHIPMENT DOCUMENTS.exe, 00000000.00000002.315590285.0000000006E62000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers
                Source: SHIPMENT DOCUMENTS.exe, 00000000.00000002.315590285.0000000006E62000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/?
                Source: SHIPMENT DOCUMENTS.exe, 00000000.00000002.315590285.0000000006E62000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/cabarga.htmlN
                Source: SHIPMENT DOCUMENTS.exe, 00000000.00000002.315590285.0000000006E62000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/frere-jones.html
                Source: SHIPMENT DOCUMENTS.exe, 00000000.00000002.315590285.0000000006E62000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers8
                Source: SHIPMENT DOCUMENTS.exe, 00000000.00000002.315590285.0000000006E62000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers?
                Source: SHIPMENT DOCUMENTS.exe, 00000000.00000002.315590285.0000000006E62000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designersG
                Source: SHIPMENT DOCUMENTS.exe, 00000000.00000002.315590285.0000000006E62000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fonts.com
                Source: SHIPMENT DOCUMENTS.exe, 00000000.00000002.315590285.0000000006E62000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn
                Source: SHIPMENT DOCUMENTS.exe, 00000000.00000002.315590285.0000000006E62000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn/bThe
                Source: SHIPMENT DOCUMENTS.exe, 00000000.00000002.315590285.0000000006E62000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn/cThe
                Source: SHIPMENT DOCUMENTS.exe, 00000000.00000002.315590285.0000000006E62000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.galapagosdesign.com/DPlease
                Source: SHIPMENT DOCUMENTS.exe, 00000000.00000002.315590285.0000000006E62000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.galapagosdesign.com/staff/dennis.htm
                Source: SHIPMENT DOCUMENTS.exe, 00000014.00000003.398696766.0000000007129000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.globaltrust.info0
                Source: SHIPMENT DOCUMENTS.exe, 00000014.00000003.398696766.0000000007129000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.globaltrust.info0=
                Source: SHIPMENT DOCUMENTS.exe, 00000000.00000002.315590285.0000000006E62000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.goodfont.co.kr
                Source: SHIPMENT DOCUMENTS.exe, 00000014.00000003.401258901.0000000007125000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.ica.co.il/repository/cps/PersonalID_Practice_Statement.pdf0
                Source: SHIPMENT DOCUMENTS.exe, 00000014.00000003.398450527.0000000007136000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.informatik.admin.ch/PKI/links/CPS_2_16_756_1_17_3_1_0.pdf0
                Source: SHIPMENT DOCUMENTS.exe, 00000000.00000002.315590285.0000000006E62000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/
                Source: SHIPMENT DOCUMENTS.exe, 00000014.00000003.400439346.00000000065EF000.00000004.00000800.00020000.00000000.sdmp, SHIPMENT DOCUMENTS.exe, 00000014.00000003.401332216.00000000065F2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.oaticerts.com/repository.
                Source: SHIPMENT DOCUMENTS.exe, 00000014.00000003.398941782.00000000065B9000.00000004.00000800.00020000.00000000.sdmp, SHIPMENT DOCUMENTS.exe, 00000014.00000003.403942163.00000000065CD000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.pki.admin.ch/cps/CPS_2_16_756_1_17_3_1_0.pdf09
                Source: SHIPMENT DOCUMENTS.exe, 00000014.00000003.398836058.00000000065AD000.00000004.00000800.00020000.00000000.sdmp, SHIPMENT DOCUMENTS.exe, 00000014.00000003.407868660.00000000065AE000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.pki.admin.ch/cps/CPS_2_16_756_1_17_3_21_1.pdf0:
                Source: SHIPMENT DOCUMENTS.exe, 00000014.00000003.403712232.00000000065F1000.00000004.00000800.00020000.00000000.sdmp, SHIPMENT DOCUMENTS.exe, 00000014.00000002.546377934.00000000065F0000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.pki.admin.ch/polic
                Source: SHIPMENT DOCUMENTS.exe, 00000014.00000003.400439346.00000000065EF000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.pki.admin.ch/policy/CPS_2_16_756_1_17_3_21_1.pdf0
                Source: SHIPMENT DOCUMENTS.exe, 00000014.00000003.398941782.00000000065B9000.00000004.00000800.00020000.00000000.sdmp, SHIPMENT DOCUMENTS.exe, 00000014.00000003.403942163.00000000065CD000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.pki.gva.es/cps0
                Source: SHIPMENT DOCUMENTS.exe, 00000014.00000003.398941782.00000000065B9000.00000004.00000800.00020000.00000000.sdmp, SHIPMENT DOCUMENTS.exe, 00000014.00000003.403942163.00000000065CD000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.pki.gva.es/cps0%
                Source: SHIPMENT DOCUMENTS.exe, 00000014.00000003.400439346.00000000065EF000.00000004.00000800.00020000.00000000.sdmp, SHIPMENT DOCUMENTS.exe, 00000014.00000003.401332216.00000000065F2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.pkioverheid.nl/policies/root-policy-G20
                Source: SHIPMENT DOCUMENTS.exe, 00000014.00000003.398941782.00000000065B9000.00000004.00000800.00020000.00000000.sdmp, SHIPMENT DOCUMENTS.exe, 00000014.00000003.403853962.00000000065DA000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.pkioverheid.nl/policies/root-policy0
                Source: SHIPMENT DOCUMENTS.exe, 00000014.00000003.398941782.00000000065B9000.00000004.00000800.00020000.00000000.sdmp, SHIPMENT DOCUMENTS.exe, 00000014.00000003.403942163.00000000065CD000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.postsignum.cz/crl/psrootqca2.crl02
                Source: SHIPMENT DOCUMENTS.exe, 00000014.00000003.407487472.00000000070CC000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.quovadis.bm0
                Source: SHIPMENT DOCUMENTS.exe, 00000014.00000003.398450527.0000000007136000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.quovadisglobal.com/cps0
                Source: SHIPMENT DOCUMENTS.exe, 00000014.00000003.398941782.00000000065B9000.00000004.00000800.00020000.00000000.sdmp, SHIPMENT DOCUMENTS.exe, 00000014.00000003.403942163.00000000065CD000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.rcsc.lt/repository0
                Source: SHIPMENT DOCUMENTS.exe, 00000000.00000002.315590285.0000000006E62000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sajatypeworks.com
                Source: SHIPMENT DOCUMENTS.exe, 00000000.00000002.315590285.0000000006E62000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sakkal.com
                Source: SHIPMENT DOCUMENTS.exe, 00000000.00000002.315590285.0000000006E62000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sandoll.co.kr
                Source: SHIPMENT DOCUMENTS.exe, 00000014.00000003.401258901.0000000007125000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sk.ee/cps/0
                Source: SHIPMENT DOCUMENTS.exe, 00000014.00000003.401258901.0000000007125000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sk.ee/juur/crl/0
                Source: SHIPMENT DOCUMENTS.exe, 00000014.00000003.400439346.00000000065EF000.00000004.00000800.00020000.00000000.sdmp, SHIPMENT DOCUMENTS.exe, 00000014.00000003.401258901.0000000007125000.00000004.00000800.00020000.00000000.sdmp, SHIPMENT DOCUMENTS.exe, 00000014.00000003.401332216.00000000065F2000.00000004.00000800.00020000.00000000.sdmp, SHIPMENT DOCUMENTS.exe, 00000014.00000003.398450527.0000000007136000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.ssc.lt/cps03
                Source: SHIPMENT DOCUMENTS.exe, 00000014.00000003.407487472.00000000070CC000.00000004.00000800.00020000.00000000.sdmp, SHIPMENT DOCUMENTS.exe, 00000014.00000003.398696766.0000000007129000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.suscerte.gob.ve/dpc0
                Source: SHIPMENT DOCUMENTS.exe, 00000014.00000003.407487472.00000000070CC000.00000004.00000800.00020000.00000000.sdmp, SHIPMENT DOCUMENTS.exe, 00000014.00000003.398696766.0000000007129000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.suscerte.gob.ve/lcr0#
                Source: SHIPMENT DOCUMENTS.exe, 00000000.00000002.315590285.0000000006E62000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.tiro.com
                Source: SHIPMENT DOCUMENTS.exe, 00000014.00000003.398941782.00000000065B9000.00000004.00000800.00020000.00000000.sdmp, SHIPMENT DOCUMENTS.exe, 00000014.00000003.403651123.00000000065E4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.trustcenter.de/crl/v2/tc_class_3_ca_II.crl
                Source: SHIPMENT DOCUMENTS.exe, 00000014.00000003.401258901.0000000007125000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.trustdst.com/certificates/policy/ACES-index.html0
                Source: SHIPMENT DOCUMENTS.exe, 00000000.00000002.315590285.0000000006E62000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.typography.netD
                Source: SHIPMENT DOCUMENTS.exe, 00000014.00000003.398941782.00000000065B9000.00000004.00000800.00020000.00000000.sdmp, SHIPMENT DOCUMENTS.exe, 00000014.00000003.403651123.00000000065E4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.uce.gub.uy/acrn/acrn.crl0
                Source: SHIPMENT DOCUMENTS.exe, 00000014.00000003.398941782.00000000065B9000.00000004.00000800.00020000.00000000.sdmp, SHIPMENT DOCUMENTS.exe, 00000014.00000003.403651123.00000000065E4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.uce.gub.uy/informacion-tecnica/politicas/cp_acrn.pdf0G
                Source: SHIPMENT DOCUMENTS.exe, 00000000.00000002.315590285.0000000006E62000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.urwpp.deDPlease
                Source: SHIPMENT DOCUMENTS.exe, 00000000.00000002.315590285.0000000006E62000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.zhongyicts.com.cn
                Source: SHIPMENT DOCUMENTS.exe, 00000014.00000003.398941782.00000000065B9000.00000004.00000800.00020000.00000000.sdmp, SHIPMENT DOCUMENTS.exe, 00000014.00000003.403942163.00000000065CD000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www2.postsignum.cz/crl/psrootqca2.crl01
                Source: SHIPMENT DOCUMENTS.exe, 00000014.00000002.517701606.00000000010AE000.00000004.00000020.00020000.00000000.sdmp, SHIPMENT DOCUMENTS.exe, 00000014.00000002.516536811.000000000107D000.00000004.00000020.00020000.00000000.sdmp, SHIPMENT DOCUMENTS.exe, 00000014.00000003.393347400.0000000006586000.00000004.00000800.00020000.00000000.sdmp, SHIPMENT DOCUMENTS.exe, 00000014.00000002.533736666.00000000031E6000.00000004.00000800.00020000.00000000.sdmp, cnWCiicEpxW.exe, 0000001B.00000002.520315185.00000000013A0000.00000004.00000020.00020000.00000000.sdmp, cnWCiicEpxW.exe, 0000001B.00000002.522042764.00000000013E6000.00000004.00000020.00020000.00000000.sdmp, cnWCiicEpxW.exe, 0000001B.00000003.503605398.00000000013E6000.00000004.00000020.00020000.00000000.sdmp, cnWCiicEpxW.exe, 0000001B.00000002.534582730.00000000033F5000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://x1.c.lencr.org/0
                Source: SHIPMENT DOCUMENTS.exe, 00000014.00000002.517701606.00000000010AE000.00000004.00000020.00020000.00000000.sdmp, SHIPMENT DOCUMENTS.exe, 00000014.00000002.516536811.000000000107D000.00000004.00000020.00020000.00000000.sdmp, SHIPMENT DOCUMENTS.exe, 00000014.00000003.393347400.0000000006586000.00000004.00000800.00020000.00000000.sdmp, SHIPMENT DOCUMENTS.exe, 00000014.00000002.533736666.00000000031E6000.00000004.00000800.00020000.00000000.sdmp, cnWCiicEpxW.exe, 0000001B.00000002.520315185.00000000013A0000.00000004.00000020.00020000.00000000.sdmp, cnWCiicEpxW.exe, 0000001B.00000002.522042764.00000000013E6000.00000004.00000020.00020000.00000000.sdmp, cnWCiicEpxW.exe, 0000001B.00000003.503605398.00000000013E6000.00000004.00000020.00020000.00000000.sdmp, cnWCiicEpxW.exe, 0000001B.00000002.534582730.00000000033F5000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://x1.i.lencr.org/0
                Source: cnWCiicEpxW.exe, 0000001B.00000002.528419495.0000000003164000.00000004.00000800.00020000.00000000.sdmp, cnWCiicEpxW.exe, 0000001B.00000002.534484751.00000000033EB000.00000004.00000800.00020000.00000000.sdmp, cnWCiicEpxW.exe, 0000001B.00000002.534582730.00000000033F5000.00000004.00000800.00020000.00000000.sdmp, cnWCiicEpxW.exe, 0000001B.00000002.533917798.00000000033AA000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://9psarY6l5Bj.org
                Source: SHIPMENT DOCUMENTS.exe, 00000014.00000002.522417697.0000000002EF1000.00000004.00000800.00020000.00000000.sdmp, cnWCiicEpxW.exe, 0000001B.00000002.525674867.0000000003111000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.ipify.org
                Source: SHIPMENT DOCUMENTS.exe, 00000014.00000002.522417697.0000000002EF1000.00000004.00000800.00020000.00000000.sdmp, cnWCiicEpxW.exe, 0000001B.00000002.525674867.0000000003111000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.ipify.org/
                Source: cnWCiicEpxW.exe, 0000001B.00000002.525674867.0000000003111000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.ipify.orgmail.southernboilers.orginfo
                Source: SHIPMENT DOCUMENTS.exe, 00000014.00000003.398836058.00000000065AD000.00000004.00000800.00020000.00000000.sdmp, SHIPMENT DOCUMENTS.exe, 00000014.00000003.407868660.00000000065AE000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://crl.anf.es/AC/ANFServerCA.crl0
                Source: SHIPMENT DOCUMENTS.exe, 00000014.00000003.398941782.00000000065B9000.00000004.00000800.00020000.00000000.sdmp, SHIPMENT DOCUMENTS.exe, 00000014.00000003.403651123.00000000065E4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://eca.hinet.net/repository0
                Source: SHIPMENT DOCUMENTS.exe, 00000014.00000003.407487472.00000000070CC000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://ocsp.quovadisoffshore.com0
                Source: SHIPMENT DOCUMENTS.exe, 00000014.00000003.398450527.0000000007136000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://rca.e-szigno.hu/ocsp0-
                Source: SHIPMENT DOCUMENTS.exe, 00000014.00000003.398450527.0000000007136000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://repository.luxtrust.lu0
                Source: SHIPMENT DOCUMENTS.exe, 00000014.00000003.400439346.00000000065EF000.00000004.00000800.00020000.00000000.sdmp, SHIPMENT DOCUMENTS.exe, 00000014.00000003.401332216.00000000065F2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://web.certicamara.com/marco-legal0Z
                Source: SHIPMENT DOCUMENTS.exe, 00000014.00000003.398836058.00000000065AD000.00000004.00000800.00020000.00000000.sdmp, SHIPMENT DOCUMENTS.exe, 00000014.00000003.407868660.00000000065AE000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.anf.es/AC/ACTAS/789230
                Source: SHIPMENT DOCUMENTS.exe, 00000014.00000003.398836058.00000000065AD000.00000004.00000800.00020000.00000000.sdmp, SHIPMENT DOCUMENTS.exe, 00000014.00000003.407868660.00000000065AE000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.anf.es/AC/ANFServerCA.crl0
                Source: SHIPMENT DOCUMENTS.exe, 00000014.00000003.398836058.00000000065AD000.00000004.00000800.00020000.00000000.sdmp, SHIPMENT DOCUMENTS.exe, 00000014.00000003.407868660.00000000065AE000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.anf.es/address/)1(0&
                Source: SHIPMENT DOCUMENTS.exe, 00000014.00000003.398450527.0000000007136000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.catcert.net/verarrel
                Source: SHIPMENT DOCUMENTS.exe, 00000014.00000003.398450527.0000000007136000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.catcert.net/verarrel05
                Source: SHIPMENT DOCUMENTS.exe, 00000014.00000003.398450527.0000000007136000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.netlock.hu/docs/
                Source: SHIPMENT DOCUMENTS.exe, 00000014.00000003.407915366.00000000065B9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.netlock.net/docs
                Source: SHIPMENT DOCUMENTS.exe, 00000014.00000002.522417697.0000000002EF1000.00000004.00000800.00020000.00000000.sdmp, cnWCiicEpxW.exe, 0000001B.00000002.525674867.0000000003111000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.ziphttps://www
                Source: SHIPMENT DOCUMENTS.exe, 00000014.00000003.398450527.0000000007136000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://wwww.certigna.fr/autorites/0m
                Source: unknownDNS traffic detected: queries for: api.ipify.org
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:80.0) Gecko/20100101 Firefox/80.0Host: api.ipify.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:80.0) Gecko/20100101 Firefox/80.0Host: api.ipify.orgConnection: Keep-Alive
                Source: unknownHTTPS traffic detected: 52.20.78.240:443 -> 192.168.2.6:49713 version: TLS 1.2
                Source: unknownHTTPS traffic detected: 3.232.242.170:443 -> 192.168.2.6:49738 version: TLS 1.2

                System Summary

                barindex
                Source: 20.0.SHIPMENT DOCUMENTS.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: AgentTeslaV3 infostealer payload Author: ditekSHen
                Source: 20.0.SHIPMENT DOCUMENTS.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f Author: unknown
                Source: 0.2.SHIPMENT DOCUMENTS.exe.3d715a0.1.unpack, type: UNPACKEDPEMatched rule: AgentTeslaV3 infostealer payload Author: ditekSHen
                Source: 0.2.SHIPMENT DOCUMENTS.exe.3d715a0.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f Author: unknown
                Source: 21.2.cnWCiicEpxW.exe.2c8ba40.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables containing artifcats associated with disabling Widnows Defender Author: ditekSHen
                Source: 0.2.SHIPMENT DOCUMENTS.exe.2dbba3c.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables containing artifcats associated with disabling Widnows Defender Author: ditekSHen
                Source: 0.2.SHIPMENT DOCUMENTS.exe.3d715a0.1.raw.unpack, type: UNPACKEDPEMatched rule: AgentTeslaV3 infostealer payload Author: ditekSHen
                Source: 0.2.SHIPMENT DOCUMENTS.exe.3d715a0.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f Author: unknown
                Source: 0.2.SHIPMENT DOCUMENTS.exe.3ea28e8.2.raw.unpack, type: UNPACKEDPEMatched rule: AgenetTesla Type 2 Keylogger payload Author: ditekSHen
                Source: 0.2.SHIPMENT DOCUMENTS.exe.3ea28e8.2.raw.unpack, type: UNPACKEDPEMatched rule: AgentTeslaV3 infostealer payload Author: ditekSHen
                Source: 0.2.SHIPMENT DOCUMENTS.exe.3ea28e8.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects zgRAT Author: ditekSHen
                Source: 0.2.SHIPMENT DOCUMENTS.exe.3ea28e8.2.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f Author: unknown
                Source: 00000014.00000000.301553016.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f Author: unknown
                Source: 00000000.00000002.309368123.0000000003DCC000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f Author: unknown
                Source: 00000000.00000002.308207563.0000000003CA9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f Author: unknown
                Source: Process Memory Space: SHIPMENT DOCUMENTS.exe PID: 3192, type: MEMORYSTRMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f Author: unknown
                Source: Process Memory Space: SHIPMENT DOCUMENTS.exe PID: 3244, type: MEMORYSTRMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f Author: unknown
                Source: initial sampleStatic PE information: Filename: SHIPMENT DOCUMENTS.exe
                Source: 20.0.SHIPMENT DOCUMENTS.exe.400000.0.unpack, u003cPrivateImplementationDetailsu003eu007bA3AE4E87u002d6B17u002d43BFu002dA428u002d978DE49F0210u007d/F3538611u002d2A69u002d4BECu002d82C0u002d433C1F04D64D.csLarge array initialization: .cctor: array initializer size 10983
                Source: SHIPMENT DOCUMENTS.exeStatic PE information: EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
                Source: 20.0.SHIPMENT DOCUMENTS.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload
                Source: 20.0.SHIPMENT DOCUMENTS.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f reference_sample = 65463161760af7ab85f5c475a0f7b1581234a1e714a2c5a555783bdd203f85f4, os = windows, severity = x86, creation_date = 2021-03-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.AgentTesla, fingerprint = cbbb56fe6cd7277ae9595a10e05e2ce535a4e6bf205810be0bbce3a883b6f8bc, id = d3ac2b2f-14fc-4851-8a57-41032e386aeb, last_modified = 2022-06-20
                Source: 0.2.SHIPMENT DOCUMENTS.exe.3d715a0.1.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload
                Source: 0.2.SHIPMENT DOCUMENTS.exe.3d715a0.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f reference_sample = 65463161760af7ab85f5c475a0f7b1581234a1e714a2c5a555783bdd203f85f4, os = windows, severity = x86, creation_date = 2021-03-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.AgentTesla, fingerprint = cbbb56fe6cd7277ae9595a10e05e2ce535a4e6bf205810be0bbce3a883b6f8bc, id = d3ac2b2f-14fc-4851-8a57-41032e386aeb, last_modified = 2022-06-20
                Source: 21.2.cnWCiicEpxW.exe.2c8ba40.0.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_DisableWinDefender author = ditekSHen, description = Detects executables containing artifcats associated with disabling Widnows Defender
                Source: 0.2.SHIPMENT DOCUMENTS.exe.2dbba3c.0.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_DisableWinDefender author = ditekSHen, description = Detects executables containing artifcats associated with disabling Widnows Defender
                Source: 0.2.SHIPMENT DOCUMENTS.exe.3d715a0.1.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload
                Source: 0.2.SHIPMENT DOCUMENTS.exe.3d715a0.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f reference_sample = 65463161760af7ab85f5c475a0f7b1581234a1e714a2c5a555783bdd203f85f4, os = windows, severity = x86, creation_date = 2021-03-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.AgentTesla, fingerprint = cbbb56fe6cd7277ae9595a10e05e2ce535a4e6bf205810be0bbce3a883b6f8bc, id = d3ac2b2f-14fc-4851-8a57-41032e386aeb, last_modified = 2022-06-20
                Source: 0.2.SHIPMENT DOCUMENTS.exe.3ea28e8.2.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV2 author = ditekSHen, description = AgenetTesla Type 2 Keylogger payload
                Source: 0.2.SHIPMENT DOCUMENTS.exe.3ea28e8.2.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload
                Source: 0.2.SHIPMENT DOCUMENTS.exe.3ea28e8.2.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_zgRAT author = ditekSHen, description = Detects zgRAT
                Source: 0.2.SHIPMENT DOCUMENTS.exe.3ea28e8.2.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f reference_sample = 65463161760af7ab85f5c475a0f7b1581234a1e714a2c5a555783bdd203f85f4, os = windows, severity = x86, creation_date = 2021-03-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.AgentTesla, fingerprint = cbbb56fe6cd7277ae9595a10e05e2ce535a4e6bf205810be0bbce3a883b6f8bc, id = d3ac2b2f-14fc-4851-8a57-41032e386aeb, last_modified = 2022-06-20
                Source: 00000014.00000000.301553016.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f reference_sample = 65463161760af7ab85f5c475a0f7b1581234a1e714a2c5a555783bdd203f85f4, os = windows, severity = x86, creation_date = 2021-03-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.AgentTesla, fingerprint = cbbb56fe6cd7277ae9595a10e05e2ce535a4e6bf205810be0bbce3a883b6f8bc, id = d3ac2b2f-14fc-4851-8a57-41032e386aeb, last_modified = 2022-06-20
                Source: 00000000.00000002.309368123.0000000003DCC000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f reference_sample = 65463161760af7ab85f5c475a0f7b1581234a1e714a2c5a555783bdd203f85f4, os = windows, severity = x86, creation_date = 2021-03-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.AgentTesla, fingerprint = cbbb56fe6cd7277ae9595a10e05e2ce535a4e6bf205810be0bbce3a883b6f8bc, id = d3ac2b2f-14fc-4851-8a57-41032e386aeb, last_modified = 2022-06-20
                Source: 00000000.00000002.308207563.0000000003CA9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f reference_sample = 65463161760af7ab85f5c475a0f7b1581234a1e714a2c5a555783bdd203f85f4, os = windows, severity = x86, creation_date = 2021-03-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.AgentTesla, fingerprint = cbbb56fe6cd7277ae9595a10e05e2ce535a4e6bf205810be0bbce3a883b6f8bc, id = d3ac2b2f-14fc-4851-8a57-41032e386aeb, last_modified = 2022-06-20
                Source: Process Memory Space: SHIPMENT DOCUMENTS.exe PID: 3192, type: MEMORYSTRMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f reference_sample = 65463161760af7ab85f5c475a0f7b1581234a1e714a2c5a555783bdd203f85f4, os = windows, severity = x86, creation_date = 2021-03-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.AgentTesla, fingerprint = cbbb56fe6cd7277ae9595a10e05e2ce535a4e6bf205810be0bbce3a883b6f8bc, id = d3ac2b2f-14fc-4851-8a57-41032e386aeb, last_modified = 2022-06-20
                Source: Process Memory Space: SHIPMENT DOCUMENTS.exe PID: 3244, type: MEMORYSTRMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f reference_sample = 65463161760af7ab85f5c475a0f7b1581234a1e714a2c5a555783bdd203f85f4, os = windows, severity = x86, creation_date = 2021-03-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.AgentTesla, fingerprint = cbbb56fe6cd7277ae9595a10e05e2ce535a4e6bf205810be0bbce3a883b6f8bc, id = d3ac2b2f-14fc-4851-8a57-41032e386aeb, last_modified = 2022-06-20
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeCode function: 0_2_02B7C64C0_2_02B7C64C
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeCode function: 0_2_02B7E8D80_2_02B7E8D8
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeCode function: 0_2_02B7E8C80_2_02B7E8C8
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeCode function: 20_2_02CFFC1820_2_02CFFC18
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeCode function: 20_2_02CF6D4320_2_02CF6D43
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeCode function: 20_2_05FFC5F820_2_05FFC5F8
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeCode function: 20_2_05FFA13020_2_05FFA130
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeCode function: 20_2_05FFD35820_2_05FFD358
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeCode function: 20_2_05FF093020_2_05FF0930
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeCode function: 20_2_05FF004020_2_05FF0040
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeCode function: 20_2_05FF2A4020_2_05FF2A40
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeCode function: 20_2_06B7D4E820_2_06B7D4E8
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeCode function: 20_2_06B7884020_2_06B78840
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeCode function: 20_2_06B727F620_2_06B727F6
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeCode function: 20_2_06B723C020_2_06B723C0
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeCode function: 20_2_06B7373020_2_06B73730
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeCode function: 20_2_06B7249F20_2_06B7249F
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeCode function: 20_2_06B7D48420_2_06B7D484
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeCode function: 20_2_06B724E720_2_06B724E7
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeCode function: 20_2_06B730D020_2_06B730D0
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeCode function: 20_2_06B7254920_2_06B72549
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeCode function: 20_2_06B75EB820_2_06B75EB8
                Source: SHIPMENT DOCUMENTS.exe, 00000000.00000002.305232047.0000000002CA1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameCassa.dll< vs SHIPMENT DOCUMENTS.exe
                Source: SHIPMENT DOCUMENTS.exe, 00000000.00000002.305232047.0000000002CA1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilename8346f821-5c18-4573-9308-3a6383bed95e.exe4 vs SHIPMENT DOCUMENTS.exe
                Source: SHIPMENT DOCUMENTS.exe, 00000000.00000002.309368123.0000000003DCC000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameMajorRevision.exe< vs SHIPMENT DOCUMENTS.exe
                Source: SHIPMENT DOCUMENTS.exe, 00000000.00000002.309368123.0000000003DCC000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenamewv6MCeq.exeH vs SHIPMENT DOCUMENTS.exe
                Source: SHIPMENT DOCUMENTS.exe, 00000000.00000000.246208925.00000000009EE000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenamewv6MCeq.exeH vs SHIPMENT DOCUMENTS.exe
                Source: SHIPMENT DOCUMENTS.exe, 00000000.00000002.325190197.00000000077C0000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameMajorRevision.exe< vs SHIPMENT DOCUMENTS.exe
                Source: SHIPMENT DOCUMENTS.exe, 00000000.00000002.308207563.0000000003CA9000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilename8346f821-5c18-4573-9308-3a6383bed95e.exe4 vs SHIPMENT DOCUMENTS.exe
                Source: SHIPMENT DOCUMENTS.exe, 00000014.00000000.301859609.0000000000438000.00000040.00000400.00020000.00000000.sdmpBinary or memory string: OriginalFilename8346f821-5c18-4573-9308-3a6383bed95e.exe4 vs SHIPMENT DOCUMENTS.exe
                Source: SHIPMENT DOCUMENTS.exe, 00000014.00000002.512831125.0000000000F38000.00000004.00000010.00020000.00000000.sdmpBinary or memory string: OriginalFilenameUNKNOWN_FILET vs SHIPMENT DOCUMENTS.exe
                Source: SHIPMENT DOCUMENTS.exeBinary or memory string: OriginalFilenamewv6MCeq.exeH vs SHIPMENT DOCUMENTS.exe
                Source: SHIPMENT DOCUMENTS.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                Source: cnWCiicEpxW.exe.0.drStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                Source: SHIPMENT DOCUMENTS.exeVirustotal: Detection: 36%
                Source: SHIPMENT DOCUMENTS.exeReversingLabs: Detection: 32%
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeFile read: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeJump to behavior
                Source: SHIPMENT DOCUMENTS.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                Source: unknownProcess created: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exe C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exe
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeProcess created: C:\Windows\SysWOW64\schtasks.exe C:\Windows\System32\schtasks.exe" /Create /TN "Updates\cnWCiicEpxW" /XML "C:\Users\user\AppData\Local\Temp\tmp2A80.tmp
                Source: C:\Windows\SysWOW64\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeProcess created: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exe {path}
                Source: unknownProcess created: C:\Users\user\AppData\Roaming\cnWCiicEpxW.exe C:\Users\user\AppData\Roaming\cnWCiicEpxW.exe
                Source: C:\Users\user\AppData\Roaming\cnWCiicEpxW.exeProcess created: C:\Windows\SysWOW64\schtasks.exe C:\Windows\System32\schtasks.exe" /Create /TN "Updates\cnWCiicEpxW" /XML "C:\Users\user\AppData\Local\Temp\tmpC7C9.tmp
                Source: C:\Windows\SysWOW64\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                Source: C:\Users\user\AppData\Roaming\cnWCiicEpxW.exeProcess created: C:\Users\user\AppData\Roaming\cnWCiicEpxW.exe {path}
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeProcess created: C:\Windows\SysWOW64\schtasks.exe C:\Windows\System32\schtasks.exe" /Create /TN "Updates\cnWCiicEpxW" /XML "C:\Users\user\AppData\Local\Temp\tmp2A80.tmpJump to behavior
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeProcess created: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exe {path}Jump to behavior
                Source: C:\Users\user\AppData\Roaming\cnWCiicEpxW.exeProcess created: C:\Windows\SysWOW64\schtasks.exe C:\Windows\System32\schtasks.exe" /Create /TN "Updates\cnWCiicEpxW" /XML "C:\Users\user\AppData\Local\Temp\tmpC7C9.tmpJump to behavior
                Source: C:\Users\user\AppData\Roaming\cnWCiicEpxW.exeProcess created: C:\Users\user\AppData\Roaming\cnWCiicEpxW.exe {path}Jump to behavior
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{95E15D0A-66E6-93D9-C53C-76E6219D3341}\InProcServer32Jump to behavior
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                Source: C:\Users\user\AppData\Roaming\cnWCiicEpxW.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                Source: C:\Users\user\AppData\Roaming\cnWCiicEpxW.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeFile created: C:\Users\user\AppData\Roaming\cnWCiicEpxW.exeJump to behavior
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeFile created: C:\Users\user\AppData\Local\Temp\tmp2A80.tmpJump to behavior
                Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@12/7@6/3
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
                Source: SHIPMENT DOCUMENTS.exe, 00000014.00000002.533082657.0000000003197000.00000004.00000800.00020000.00000000.sdmp, cnWCiicEpxW.exe, 0000001B.00000002.533894309.00000000033A5000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: CREATE TABLE password_notes (id INTEGER PRIMARY KEY AUTOINCREMENT, parent_id INTEGER NOT NULL REFERENCES logins ON UPDATE CASCADE ON DELETE CASCADE DEFERRABLE INITIALLY DEFERRED, key VARCHAR NOT NULL, value BLOB, date_created INTEGER NOT NULL, confidential INTEGER, UNIQUE (parent_id, key));
                Source: SHIPMENT DOCUMENTS.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 49.80%
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dllJump to behavior
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\cnWCiicEpxW.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\cnWCiicEpxW.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dllJump to behavior
                Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:4512:120:WilError_01
                Source: C:\Users\user\AppData\Roaming\cnWCiicEpxW.exeMutant created: \Sessions\1\BaseNamedObjects\SjgFZewpp
                Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:1632:120:WilError_01
                Source: SHIPMENT DOCUMENTS.exe, u8Kw867S61naurO56Y/I7QTkd9Ynf3eywmg2Z.csCryptographic APIs: 'CreateDecryptor'
                Source: SHIPMENT DOCUMENTS.exe, u8Kw867S61naurO56Y/I7QTkd9Ynf3eywmg2Z.csCryptographic APIs: 'CreateDecryptor'
                Source: cnWCiicEpxW.exe.0.dr, u8Kw867S61naurO56Y/I7QTkd9Ynf3eywmg2Z.csCryptographic APIs: 'CreateDecryptor'
                Source: cnWCiicEpxW.exe.0.dr, u8Kw867S61naurO56Y/I7QTkd9Ynf3eywmg2Z.csCryptographic APIs: 'CreateDecryptor'
                Source: 0.0.SHIPMENT DOCUMENTS.exe.910000.0.unpack, u8Kw867S61naurO56Y/I7QTkd9Ynf3eywmg2Z.csCryptographic APIs: 'CreateDecryptor'
                Source: 0.0.SHIPMENT DOCUMENTS.exe.910000.0.unpack, u8Kw867S61naurO56Y/I7QTkd9Ynf3eywmg2Z.csCryptographic APIs: 'CreateDecryptor'
                Source: 20.0.SHIPMENT DOCUMENTS.exe.400000.0.unpack, A/f2.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
                Source: 20.0.SHIPMENT DOCUMENTS.exe.400000.0.unpack, A/f2.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                Source: C:\Users\user\AppData\Roaming\cnWCiicEpxW.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                Source: C:\Users\user\AppData\Roaming\cnWCiicEpxW.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                Source: C:\Users\user\AppData\Roaming\cnWCiicEpxW.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                Source: C:\Users\user\AppData\Roaming\cnWCiicEpxW.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                Source: Window RecorderWindow detected: More than 3 window changes detected
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dllJump to behavior
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676Jump to behavior
                Source: SHIPMENT DOCUMENTS.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
                Source: SHIPMENT DOCUMENTS.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                Source: SHIPMENT DOCUMENTS.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                Source: Binary string: wv6MCeq.pdb source: SHIPMENT DOCUMENTS.exe, cnWCiicEpxW.exe.0.dr

                Data Obfuscation

                barindex
                Source: SHIPMENT DOCUMENTS.exe, u8Kw867S61naurO56Y/BiGykUAwkcHjngJunl.cs.Net Code: NLQjT5EheN System.Reflection.Assembly System.AppDomain::Load(System.Byte[])
                Source: cnWCiicEpxW.exe.0.dr, u8Kw867S61naurO56Y/BiGykUAwkcHjngJunl.cs.Net Code: NLQjT5EheN System.Reflection.Assembly System.AppDomain::Load(System.Byte[])
                Source: 0.0.SHIPMENT DOCUMENTS.exe.910000.0.unpack, u8Kw867S61naurO56Y/BiGykUAwkcHjngJunl.cs.Net Code: NLQjT5EheN System.Reflection.Assembly System.AppDomain::Load(System.Byte[])
                Source: SHIPMENT DOCUMENTS.exe, u8Kw867S61naurO56Y/I7QTkd9Ynf3eywmg2Z.cs.Net Code: stackVariable1.GetMethod("GetDelegateForFunctionPointer", V_0)
                Source: cnWCiicEpxW.exe.0.dr, u8Kw867S61naurO56Y/I7QTkd9Ynf3eywmg2Z.cs.Net Code: stackVariable1.GetMethod("GetDelegateForFunctionPointer", V_0)
                Source: 0.0.SHIPMENT DOCUMENTS.exe.910000.0.unpack, u8Kw867S61naurO56Y/I7QTkd9Ynf3eywmg2Z.cs.Net Code: stackVariable1.GetMethod("GetDelegateForFunctionPointer", V_0)
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeCode function: 20_2_05FF9308 push FFFFFF8Eh; iretd 20_2_05FF930C
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeCode function: 20_2_06B73730 push es; iretd 20_2_06B744B0
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeCode function: 20_2_06B73730 push es; iretd 20_2_06B74548
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeCode function: 20_2_06B73730 push es; iretd 20_2_06B745E0
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeCode function: 20_2_06B73730 push es; retf B740h20_2_06B746F4
                Source: initial sampleStatic PE information: section name: .text entropy: 7.505864996836325
                Source: initial sampleStatic PE information: section name: .text entropy: 7.505864996836325
                Source: SHIPMENT DOCUMENTS.exe, u8Kw867S61naurO56Y/I7QTkd9Ynf3eywmg2Z.csHigh entropy of concatenated method names: '.cctor', 'QyVAiFQXUMZNF', 'nrlBdwomul', 'qZYBsin8PU', 'KAFBokh5nO', 'RQABMSq4Rp', 'n1wBxskWtA', 'EayBA3cOvR', 'EQLB1FRk1a', 'sBZB4RFpgY'
                Source: SHIPMENT DOCUMENTS.exe, u8Kw867S61naurO56Y/fRes4fpy4RpLUhyAi8.csHigh entropy of concatenated method names: '.ctor', 'Dispose', 'aoajPGGDsy', 'hp7gJ2SG99', 'YlXgNqNV92', 'ShJgZNmYte', 'V5FguwXIpP', 'AccgWWdBto', 'dlPg9Onwjy', 'Y9cgoPBKT4'
                Source: SHIPMENT DOCUMENTS.exe, u8Kw867S61naurO56Y/nUXdDFvBAxd7UyEdwu.csHigh entropy of concatenated method names: '.ctor', 'Dispose', 'wvHvP3hj8P', 'JUEgs0GjTP', 'rsGgCmkLkM', 'kUIgtAyTSy', 'jLVgUPfcNM', 'v5AgMtdIqt', 'Y5Ig20u0b5', 'a8NgiMIdRN'
                Source: SHIPMENT DOCUMENTS.exe, u8Kw867S61naurO56Y/hg860IXTVynHirxdTO.csHigh entropy of concatenated method names: '.ctor', 'Dispose', 'yHPv7bBIPH', 'kUIgtAyTSy', 'jLVgUPfcNM', 'JUEgs0GjTP', 'rsGgCmkLkM', 'v5AgMtdIqt', 'Y5Ig20u0b5', 'a8NgiMIdRN'
                Source: SHIPMENT DOCUMENTS.exe, u8Kw867S61naurO56Y/poopYPE0sHxymQfoHf.csHigh entropy of concatenated method names: '.ctor', 'Dispose', 'EQDWadX3F4', 'hp7gJ2SG99', 'YlXgNqNV92', 'e5UOtnnHAr', 'JAlOUgsCnU', 'TovOiJRdNK', 'SSMODoqyQS', 'ui2Okw6Hdb'
                Source: SHIPMENT DOCUMENTS.exe, u8Kw867S61naurO56Y/M1Lgw25sFV1h7SPnbi.csHigh entropy of concatenated method names: '.ctor', 'Dispose', 'm0WIhK8QiV', 'kUIgtAyTSy', 'jLVgUPfcNM', 'QZTlW8PLsG', 'wsll9k5vYj', 'CikllggbKD', 'uDJlpDhb9w', 'XqKlgSM0Ku'
                Source: SHIPMENT DOCUMENTS.exe, u8Kw867S61naurO56Y/F8m8MfBnBsxD9J6mrM.csHigh entropy of concatenated method names: '.ctor', 'Dispose', 'iWYI1I0E2F', 'JUEgs0GjTP', 'rsGgCmkLkM', 'obeO4qj1Pw', 'OXDOTEmSDM', 'b0klvedo5x', 'OJylGKIGJr', 'UDGOs8fXXR'
                Source: SHIPMENT DOCUMENTS.exe, u8Kw867S61naurO56Y/yhxL5gnBtYUFRLosDJ.csHigh entropy of concatenated method names: '.ctor', 'Dispose', 'nsVW18YwIQ', 'JUEgs0GjTP', 'rsGgCmkLkM', 'v5AgMtdIqt', 'Y5Ig20u0b5', 'a8NgiMIdRN', 'kKggDyvo6l', 't66gICG2nM'
                Source: SHIPMENT DOCUMENTS.exe, u8Kw867S61naurO56Y/VAZPILaYygsjOwTXV7.csHigh entropy of concatenated method names: '.ctor', 'Dispose', 'qb2qk6j6e', 'WTNKhKJWKf', 'uAeKxSM7G6', 'DfnKSsXgLT', 'oFEKm7CYOT', 'bExKas7caH', 'qFmKA4iXNn', 'pwvKF8fvEX'
                Source: SHIPMENT DOCUMENTS.exe, u8Kw867S61naurO56Y/BiGykUAwkcHjngJunl.csHigh entropy of concatenated method names: '.ctor', 'PFcjjPniVb', 'GKAjvqIFPE', 'zPKjWLXew4', 'nrRjIH62AE', 'c3JjBXCu0A', 'S4rjeqyZLl', 'A9ajbrB7yW', 'Dispose', 'I66jgx55If'
                Source: cnWCiicEpxW.exe.0.dr, u8Kw867S61naurO56Y/I7QTkd9Ynf3eywmg2Z.csHigh entropy of concatenated method names: '.cctor', 'QyVAiFQXUMZNF', 'nrlBdwomul', 'qZYBsin8PU', 'KAFBokh5nO', 'RQABMSq4Rp', 'n1wBxskWtA', 'EayBA3cOvR', 'EQLB1FRk1a', 'sBZB4RFpgY'
                Source: cnWCiicEpxW.exe.0.dr, u8Kw867S61naurO56Y/fRes4fpy4RpLUhyAi8.csHigh entropy of concatenated method names: '.ctor', 'Dispose', 'aoajPGGDsy', 'hp7gJ2SG99', 'YlXgNqNV92', 'ShJgZNmYte', 'V5FguwXIpP', 'AccgWWdBto', 'dlPg9Onwjy', 'Y9cgoPBKT4'
                Source: cnWCiicEpxW.exe.0.dr, u8Kw867S61naurO56Y/nUXdDFvBAxd7UyEdwu.csHigh entropy of concatenated method names: '.ctor', 'Dispose', 'wvHvP3hj8P', 'JUEgs0GjTP', 'rsGgCmkLkM', 'kUIgtAyTSy', 'jLVgUPfcNM', 'v5AgMtdIqt', 'Y5Ig20u0b5', 'a8NgiMIdRN'
                Source: cnWCiicEpxW.exe.0.dr, u8Kw867S61naurO56Y/hg860IXTVynHirxdTO.csHigh entropy of concatenated method names: '.ctor', 'Dispose', 'yHPv7bBIPH', 'kUIgtAyTSy', 'jLVgUPfcNM', 'JUEgs0GjTP', 'rsGgCmkLkM', 'v5AgMtdIqt', 'Y5Ig20u0b5', 'a8NgiMIdRN'
                Source: cnWCiicEpxW.exe.0.dr, u8Kw867S61naurO56Y/poopYPE0sHxymQfoHf.csHigh entropy of concatenated method names: '.ctor', 'Dispose', 'EQDWadX3F4', 'hp7gJ2SG99', 'YlXgNqNV92', 'e5UOtnnHAr', 'JAlOUgsCnU', 'TovOiJRdNK', 'SSMODoqyQS', 'ui2Okw6Hdb'
                Source: cnWCiicEpxW.exe.0.dr, u8Kw867S61naurO56Y/M1Lgw25sFV1h7SPnbi.csHigh entropy of concatenated method names: '.ctor', 'Dispose', 'm0WIhK8QiV', 'kUIgtAyTSy', 'jLVgUPfcNM', 'QZTlW8PLsG', 'wsll9k5vYj', 'CikllggbKD', 'uDJlpDhb9w', 'XqKlgSM0Ku'
                Source: cnWCiicEpxW.exe.0.dr, u8Kw867S61naurO56Y/yhxL5gnBtYUFRLosDJ.csHigh entropy of concatenated method names: '.ctor', 'Dispose', 'nsVW18YwIQ', 'JUEgs0GjTP', 'rsGgCmkLkM', 'v5AgMtdIqt', 'Y5Ig20u0b5', 'a8NgiMIdRN', 'kKggDyvo6l', 't66gICG2nM'
                Source: cnWCiicEpxW.exe.0.dr, u8Kw867S61naurO56Y/F8m8MfBnBsxD9J6mrM.csHigh entropy of concatenated method names: '.ctor', 'Dispose', 'iWYI1I0E2F', 'JUEgs0GjTP', 'rsGgCmkLkM', 'obeO4qj1Pw', 'OXDOTEmSDM', 'b0klvedo5x', 'OJylGKIGJr', 'UDGOs8fXXR'
                Source: cnWCiicEpxW.exe.0.dr, u8Kw867S61naurO56Y/VAZPILaYygsjOwTXV7.csHigh entropy of concatenated method names: '.ctor', 'Dispose', 'qb2qk6j6e', 'WTNKhKJWKf', 'uAeKxSM7G6', 'DfnKSsXgLT', 'oFEKm7CYOT', 'bExKas7caH', 'qFmKA4iXNn', 'pwvKF8fvEX'
                Source: cnWCiicEpxW.exe.0.dr, u8Kw867S61naurO56Y/BiGykUAwkcHjngJunl.csHigh entropy of concatenated method names: '.ctor', 'PFcjjPniVb', 'GKAjvqIFPE', 'zPKjWLXew4', 'nrRjIH62AE', 'c3JjBXCu0A', 'S4rjeqyZLl', 'A9ajbrB7yW', 'Dispose', 'I66jgx55If'
                Source: 0.0.SHIPMENT DOCUMENTS.exe.910000.0.unpack, u8Kw867S61naurO56Y/I7QTkd9Ynf3eywmg2Z.csHigh entropy of concatenated method names: '.cctor', 'QyVAiFQXUMZNF', 'nrlBdwomul', 'qZYBsin8PU', 'KAFBokh5nO', 'RQABMSq4Rp', 'n1wBxskWtA', 'EayBA3cOvR', 'EQLB1FRk1a', 'sBZB4RFpgY'
                Source: 0.0.SHIPMENT DOCUMENTS.exe.910000.0.unpack, u8Kw867S61naurO56Y/fRes4fpy4RpLUhyAi8.csHigh entropy of concatenated method names: '.ctor', 'Dispose', 'aoajPGGDsy', 'hp7gJ2SG99', 'YlXgNqNV92', 'ShJgZNmYte', 'V5FguwXIpP', 'AccgWWdBto', 'dlPg9Onwjy', 'Y9cgoPBKT4'
                Source: 0.0.SHIPMENT DOCUMENTS.exe.910000.0.unpack, u8Kw867S61naurO56Y/nUXdDFvBAxd7UyEdwu.csHigh entropy of concatenated method names: '.ctor', 'Dispose', 'wvHvP3hj8P', 'JUEgs0GjTP', 'rsGgCmkLkM', 'kUIgtAyTSy', 'jLVgUPfcNM', 'v5AgMtdIqt', 'Y5Ig20u0b5', 'a8NgiMIdRN'
                Source: 0.0.SHIPMENT DOCUMENTS.exe.910000.0.unpack, u8Kw867S61naurO56Y/hg860IXTVynHirxdTO.csHigh entropy of concatenated method names: '.ctor', 'Dispose', 'yHPv7bBIPH', 'kUIgtAyTSy', 'jLVgUPfcNM', 'JUEgs0GjTP', 'rsGgCmkLkM', 'v5AgMtdIqt', 'Y5Ig20u0b5', 'a8NgiMIdRN'
                Source: 0.0.SHIPMENT DOCUMENTS.exe.910000.0.unpack, u8Kw867S61naurO56Y/poopYPE0sHxymQfoHf.csHigh entropy of concatenated method names: '.ctor', 'Dispose', 'EQDWadX3F4', 'hp7gJ2SG99', 'YlXgNqNV92', 'e5UOtnnHAr', 'JAlOUgsCnU', 'TovOiJRdNK', 'SSMODoqyQS', 'ui2Okw6Hdb'
                Source: 0.0.SHIPMENT DOCUMENTS.exe.910000.0.unpack, u8Kw867S61naurO56Y/M1Lgw25sFV1h7SPnbi.csHigh entropy of concatenated method names: '.ctor', 'Dispose', 'm0WIhK8QiV', 'kUIgtAyTSy', 'jLVgUPfcNM', 'QZTlW8PLsG', 'wsll9k5vYj', 'CikllggbKD', 'uDJlpDhb9w', 'XqKlgSM0Ku'
                Source: 0.0.SHIPMENT DOCUMENTS.exe.910000.0.unpack, u8Kw867S61naurO56Y/yhxL5gnBtYUFRLosDJ.csHigh entropy of concatenated method names: '.ctor', 'Dispose', 'nsVW18YwIQ', 'JUEgs0GjTP', 'rsGgCmkLkM', 'v5AgMtdIqt', 'Y5Ig20u0b5', 'a8NgiMIdRN', 'kKggDyvo6l', 't66gICG2nM'
                Source: 0.0.SHIPMENT DOCUMENTS.exe.910000.0.unpack, u8Kw867S61naurO56Y/F8m8MfBnBsxD9J6mrM.csHigh entropy of concatenated method names: '.ctor', 'Dispose', 'iWYI1I0E2F', 'JUEgs0GjTP', 'rsGgCmkLkM', 'obeO4qj1Pw', 'OXDOTEmSDM', 'b0klvedo5x', 'OJylGKIGJr', 'UDGOs8fXXR'
                Source: 0.0.SHIPMENT DOCUMENTS.exe.910000.0.unpack, u8Kw867S61naurO56Y/VAZPILaYygsjOwTXV7.csHigh entropy of concatenated method names: '.ctor', 'Dispose', 'qb2qk6j6e', 'WTNKhKJWKf', 'uAeKxSM7G6', 'DfnKSsXgLT', 'oFEKm7CYOT', 'bExKas7caH', 'qFmKA4iXNn', 'pwvKF8fvEX'
                Source: 0.0.SHIPMENT DOCUMENTS.exe.910000.0.unpack, u8Kw867S61naurO56Y/BiGykUAwkcHjngJunl.csHigh entropy of concatenated method names: '.ctor', 'PFcjjPniVb', 'GKAjvqIFPE', 'zPKjWLXew4', 'nrRjIH62AE', 'c3JjBXCu0A', 'S4rjeqyZLl', 'A9ajbrB7yW', 'Dispose', 'I66jgx55If'
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeFile created: C:\Users\user\AppData\Roaming\cnWCiicEpxW.exeJump to dropped file

                Boot Survival

                barindex
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeProcess created: C:\Windows\SysWOW64\schtasks.exe C:\Windows\System32\schtasks.exe" /Create /TN "Updates\cnWCiicEpxW" /XML "C:\Users\user\AppData\Local\Temp\tmp2A80.tmp
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeRegistry key monitored for changes: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRootJump to behavior
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeRegistry key monitored for changes: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\AutoUpdateJump to behavior
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeRegistry key monitored for changes: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRootJump to behavior
                Source: C:\Users\user\AppData\Roaming\cnWCiicEpxW.exeRegistry key monitored for changes: HKEY_CURRENT_USER_ClassesJump to behavior
                Source: C:\Users\user\AppData\Roaming\cnWCiicEpxW.exeRegistry key monitored for changes: HKEY_CURRENT_USER_ClassesJump to behavior
                Source: C:\Users\user\AppData\Roaming\cnWCiicEpxW.exeRegistry key monitored for changes: HKEY_CURRENT_USER_ClassesJump to behavior
                Source: C:\Users\user\AppData\Roaming\cnWCiicEpxW.exeRegistry key monitored for changes: HKEY_CURRENT_USER_ClassesJump to behavior
                Source: C:\Users\user\AppData\Roaming\cnWCiicEpxW.exeRegistry key monitored for changes: HKEY_CURRENT_USER_ClassesJump to behavior
                Source: C:\Users\user\AppData\Roaming\cnWCiicEpxW.exeRegistry key monitored for changes: HKEY_CURRENT_USER_ClassesJump to behavior
                Source: C:\Users\user\AppData\Roaming\cnWCiicEpxW.exeRegistry key monitored for changes: HKEY_CURRENT_USER_ClassesJump to behavior
                Source: C:\Users\user\AppData\Roaming\cnWCiicEpxW.exeRegistry key monitored for changes: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRootJump to behavior
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\cnWCiicEpxW.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\cnWCiicEpxW.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\cnWCiicEpxW.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\cnWCiicEpxW.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\cnWCiicEpxW.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\cnWCiicEpxW.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\cnWCiicEpxW.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\cnWCiicEpxW.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\cnWCiicEpxW.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\cnWCiicEpxW.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\cnWCiicEpxW.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\cnWCiicEpxW.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\cnWCiicEpxW.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\cnWCiicEpxW.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\cnWCiicEpxW.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\cnWCiicEpxW.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\cnWCiicEpxW.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\cnWCiicEpxW.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\cnWCiicEpxW.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\cnWCiicEpxW.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\cnWCiicEpxW.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\cnWCiicEpxW.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\cnWCiicEpxW.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\cnWCiicEpxW.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\cnWCiicEpxW.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\cnWCiicEpxW.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\cnWCiicEpxW.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\cnWCiicEpxW.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\cnWCiicEpxW.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\cnWCiicEpxW.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\cnWCiicEpxW.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\cnWCiicEpxW.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\cnWCiicEpxW.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\cnWCiicEpxW.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\cnWCiicEpxW.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\cnWCiicEpxW.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\cnWCiicEpxW.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\cnWCiicEpxW.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\cnWCiicEpxW.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\cnWCiicEpxW.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\cnWCiicEpxW.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\cnWCiicEpxW.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\cnWCiicEpxW.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\cnWCiicEpxW.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\cnWCiicEpxW.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\cnWCiicEpxW.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\cnWCiicEpxW.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\cnWCiicEpxW.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\cnWCiicEpxW.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\cnWCiicEpxW.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\cnWCiicEpxW.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\cnWCiicEpxW.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\cnWCiicEpxW.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\cnWCiicEpxW.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\cnWCiicEpxW.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\cnWCiicEpxW.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\cnWCiicEpxW.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\cnWCiicEpxW.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\cnWCiicEpxW.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\cnWCiicEpxW.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\cnWCiicEpxW.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\cnWCiicEpxW.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\cnWCiicEpxW.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\cnWCiicEpxW.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\cnWCiicEpxW.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\cnWCiicEpxW.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\cnWCiicEpxW.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\cnWCiicEpxW.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\cnWCiicEpxW.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\cnWCiicEpxW.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\cnWCiicEpxW.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\cnWCiicEpxW.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\cnWCiicEpxW.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\cnWCiicEpxW.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\cnWCiicEpxW.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\cnWCiicEpxW.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\cnWCiicEpxW.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\cnWCiicEpxW.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\cnWCiicEpxW.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\cnWCiicEpxW.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\cnWCiicEpxW.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\cnWCiicEpxW.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\cnWCiicEpxW.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\cnWCiicEpxW.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\cnWCiicEpxW.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\cnWCiicEpxW.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\cnWCiicEpxW.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\cnWCiicEpxW.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\cnWCiicEpxW.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\cnWCiicEpxW.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\cnWCiicEpxW.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

                Malware Analysis System Evasion

                barindex
                Source: Yara matchFile source: Process Memory Space: SHIPMENT DOCUMENTS.exe PID: 3192, type: MEMORYSTR
                Source: SHIPMENT DOCUMENTS.exe, 00000000.00000002.305232047.0000000002CA1000.00000004.00000800.00020000.00000000.sdmp, cnWCiicEpxW.exe, 00000015.00000002.415707967.0000000002B71000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: WINE_GET_UNIX_FILE_NAME
                Source: SHIPMENT DOCUMENTS.exe, 00000000.00000002.305232047.0000000002CA1000.00000004.00000800.00020000.00000000.sdmp, cnWCiicEpxW.exe, 00000015.00000002.415707967.0000000002B71000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: SBIEDLL.DLL
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_NetworkAdapterConfiguration
                Source: C:\Users\user\AppData\Roaming\cnWCiicEpxW.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_NetworkAdapterConfiguration
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
                Source: C:\Users\user\AppData\Roaming\cnWCiicEpxW.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exe TID: 3180Thread sleep time: -922337203685477s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exe TID: 2356Thread sleep count: 9568 > 30Jump to behavior
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exe TID: 5876Thread sleep time: -12912720851596678s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exe TID: 5876Thread sleep time: -100000s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exe TID: 5876Thread sleep time: -99887s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exe TID: 5876Thread sleep time: -99759s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exe TID: 5876Thread sleep time: -99635s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exe TID: 5876Thread sleep time: -99515s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exe TID: 5876Thread sleep time: -99406s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exe TID: 5876Thread sleep time: -99296s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exe TID: 5876Thread sleep time: -99186s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exe TID: 5876Thread sleep time: -99077s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exe TID: 5876Thread sleep time: -98968s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exe TID: 5876Thread sleep time: -98859s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exe TID: 5876Thread sleep time: -98747s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exe TID: 5876Thread sleep time: -98624s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exe TID: 5876Thread sleep time: -98510s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exe TID: 5876Thread sleep time: -98380s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exe TID: 5876Thread sleep time: -98203s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exe TID: 5876Thread sleep time: -97732s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exe TID: 5876Thread sleep time: -97608s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exe TID: 5876Thread sleep time: -97484s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exe TID: 5876Thread sleep time: -97364s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exe TID: 5876Thread sleep time: -97203s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exe TID: 5876Thread sleep time: -97062s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exe TID: 5876Thread sleep time: -96922s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exe TID: 5876Thread sleep time: -96578s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exe TID: 5876Thread sleep time: -96452s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exe TID: 5876Thread sleep time: -96310s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exe TID: 5876Thread sleep time: -96109s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exe TID: 5876Thread sleep time: -95968s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exe TID: 5876Thread sleep time: -95832s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exe TID: 5876Thread sleep time: -95715s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exe TID: 5876Thread sleep time: -95562s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exe TID: 5876Thread sleep time: -94406s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exe TID: 5876Thread sleep time: -93250s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exe TID: 5876Thread sleep time: -93062s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exe TID: 5876Thread sleep time: -91250s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exe TID: 5876Thread sleep time: -91000s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exe TID: 5876Thread sleep time: -90843s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exe TID: 5876Thread sleep time: -90684s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exe TID: 5876Thread sleep time: -90562s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exe TID: 5876Thread sleep time: -90452s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exe TID: 5876Thread sleep time: -90343s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exe TID: 5876Thread sleep time: -90202s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exe TID: 5876Thread sleep time: -90078s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exe TID: 5876Thread sleep time: -89945s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exe TID: 5876Thread sleep time: -89827s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exe TID: 5876Thread sleep time: -89703s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exe TID: 5876Thread sleep time: -89589s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exe TID: 5876Thread sleep time: -89466s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exe TID: 5876Thread sleep time: -89356s >= -30000sJump to behavior
                Source: C:\Users\user\AppData\Roaming\cnWCiicEpxW.exe TID: 2968Thread sleep time: -922337203685477s >= -30000sJump to behavior
                Source: C:\Users\user\AppData\Roaming\cnWCiicEpxW.exe TID: 5972Thread sleep time: -922337203685477s >= -30000sJump to behavior
                Source: C:\Users\user\AppData\Roaming\cnWCiicEpxW.exe TID: 6080Thread sleep time: -12912720851596678s >= -30000sJump to behavior
                Source: C:\Users\user\AppData\Roaming\cnWCiicEpxW.exe TID: 6080Thread sleep time: -100000s >= -30000sJump to behavior
                Source: C:\Users\user\AppData\Roaming\cnWCiicEpxW.exe TID: 3536Thread sleep count: 9400 > 30Jump to behavior
                Source: C:\Users\user\AppData\Roaming\cnWCiicEpxW.exe TID: 6080Thread sleep time: -99859s >= -30000sJump to behavior
                Source: C:\Users\user\AppData\Roaming\cnWCiicEpxW.exe TID: 6080Thread sleep time: -99703s >= -30000sJump to behavior
                Source: C:\Users\user\AppData\Roaming\cnWCiicEpxW.exe TID: 6080Thread sleep time: -99588s >= -30000sJump to behavior
                Source: C:\Users\user\AppData\Roaming\cnWCiicEpxW.exe TID: 6080Thread sleep time: -99485s >= -30000sJump to behavior
                Source: C:\Users\user\AppData\Roaming\cnWCiicEpxW.exe TID: 6080Thread sleep time: -99344s >= -30000sJump to behavior
                Source: C:\Users\user\AppData\Roaming\cnWCiicEpxW.exe TID: 6080Thread sleep time: -99234s >= -30000sJump to behavior
                Source: C:\Users\user\AppData\Roaming\cnWCiicEpxW.exe TID: 6080Thread sleep time: -99105s >= -30000sJump to behavior
                Source: C:\Users\user\AppData\Roaming\cnWCiicEpxW.exe TID: 6080Thread sleep time: -98981s >= -30000sJump to behavior
                Source: C:\Users\user\AppData\Roaming\cnWCiicEpxW.exe TID: 6080Thread sleep time: -98793s >= -30000sJump to behavior
                Source: C:\Users\user\AppData\Roaming\cnWCiicEpxW.exe TID: 6080Thread sleep time: -98670s >= -30000sJump to behavior
                Source: C:\Users\user\AppData\Roaming\cnWCiicEpxW.exe TID: 6080Thread sleep time: -98562s >= -30000sJump to behavior
                Source: C:\Users\user\AppData\Roaming\cnWCiicEpxW.exe TID: 6080Thread sleep time: -98452s >= -30000sJump to behavior
                Source: C:\Users\user\AppData\Roaming\cnWCiicEpxW.exe TID: 6080Thread sleep time: -98328s >= -30000sJump to behavior
                Source: C:\Users\user\AppData\Roaming\cnWCiicEpxW.exe TID: 6080Thread sleep time: -98198s >= -30000sJump to behavior
                Source: C:\Users\user\AppData\Roaming\cnWCiicEpxW.exe TID: 6080Thread sleep time: -98004s >= -30000sJump to behavior
                Source: C:\Users\user\AppData\Roaming\cnWCiicEpxW.exe TID: 6080Thread sleep time: -97860s >= -30000sJump to behavior
                Source: C:\Users\user\AppData\Roaming\cnWCiicEpxW.exe TID: 6080Thread sleep time: -97718s >= -30000sJump to behavior
                Source: C:\Users\user\AppData\Roaming\cnWCiicEpxW.exe TID: 6080Thread sleep time: -97609s >= -30000sJump to behavior
                Source: C:\Users\user\AppData\Roaming\cnWCiicEpxW.exe TID: 6080Thread sleep time: -97500s >= -30000sJump to behavior
                Source: C:\Users\user\AppData\Roaming\cnWCiicEpxW.exe TID: 6080Thread sleep time: -97390s >= -30000sJump to behavior
                Source: C:\Users\user\AppData\Roaming\cnWCiicEpxW.exe TID: 6080Thread sleep time: -97281s >= -30000sJump to behavior
                Source: C:\Users\user\AppData\Roaming\cnWCiicEpxW.exe TID: 6080Thread sleep time: -97172s >= -30000sJump to behavior
                Source: C:\Users\user\AppData\Roaming\cnWCiicEpxW.exe TID: 6080Thread sleep time: -97058s >= -30000sJump to behavior
                Source: C:\Users\user\AppData\Roaming\cnWCiicEpxW.exe TID: 6080Thread sleep time: -96920s >= -30000sJump to behavior
                Source: C:\Users\user\AppData\Roaming\cnWCiicEpxW.exe TID: 6080Thread sleep time: -96808s >= -30000sJump to behavior
                Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                Source: C:\Users\user\AppData\Roaming\cnWCiicEpxW.exeLast function: Thread delayed
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Users\user\AppData\Roaming\cnWCiicEpxW.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Users\user\AppData\Roaming\cnWCiicEpxW.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Users\user\AppData\Roaming\cnWCiicEpxW.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeWindow / User API: threadDelayed 9568Jump to behavior
                Source: C:\Users\user\AppData\Roaming\cnWCiicEpxW.exeWindow / User API: threadDelayed 9400Jump to behavior
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                Source: C:\Users\user\AppData\Roaming\cnWCiicEpxW.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                Source: C:\Users\user\AppData\Roaming\cnWCiicEpxW.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeProcess information queried: ProcessInformationJump to behavior
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeThread delayed: delay time: 100000Jump to behavior
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeThread delayed: delay time: 99887Jump to behavior
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeThread delayed: delay time: 99759Jump to behavior
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeThread delayed: delay time: 99635Jump to behavior
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeThread delayed: delay time: 99515Jump to behavior
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeThread delayed: delay time: 99406Jump to behavior
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeThread delayed: delay time: 99296Jump to behavior
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeThread delayed: delay time: 99186Jump to behavior
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeThread delayed: delay time: 99077Jump to behavior
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeThread delayed: delay time: 98968Jump to behavior
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeThread delayed: delay time: 98859Jump to behavior
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeThread delayed: delay time: 98747Jump to behavior
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeThread delayed: delay time: 98624Jump to behavior
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeThread delayed: delay time: 98510Jump to behavior
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeThread delayed: delay time: 98380Jump to behavior
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeThread delayed: delay time: 98203Jump to behavior
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeThread delayed: delay time: 97732Jump to behavior
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeThread delayed: delay time: 97608Jump to behavior
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeThread delayed: delay time: 97484Jump to behavior
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeThread delayed: delay time: 97364Jump to behavior
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeThread delayed: delay time: 97203Jump to behavior
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeThread delayed: delay time: 97062Jump to behavior
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeThread delayed: delay time: 96922Jump to behavior
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeThread delayed: delay time: 96578Jump to behavior
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeThread delayed: delay time: 96452Jump to behavior
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeThread delayed: delay time: 96310Jump to behavior
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeThread delayed: delay time: 96109Jump to behavior
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeThread delayed: delay time: 95968Jump to behavior
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeThread delayed: delay time: 95832Jump to behavior
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeThread delayed: delay time: 95715Jump to behavior
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeThread delayed: delay time: 95562Jump to behavior
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeThread delayed: delay time: 94406Jump to behavior
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeThread delayed: delay time: 93250Jump to behavior
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeThread delayed: delay time: 93062Jump to behavior
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeThread delayed: delay time: 91250Jump to behavior
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeThread delayed: delay time: 91000Jump to behavior
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeThread delayed: delay time: 90843Jump to behavior
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeThread delayed: delay time: 90684Jump to behavior
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeThread delayed: delay time: 90562Jump to behavior
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeThread delayed: delay time: 90452Jump to behavior
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeThread delayed: delay time: 90343Jump to behavior
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeThread delayed: delay time: 90202Jump to behavior
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeThread delayed: delay time: 90078Jump to behavior
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeThread delayed: delay time: 89945Jump to behavior
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeThread delayed: delay time: 89827Jump to behavior
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeThread delayed: delay time: 89703Jump to behavior
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeThread delayed: delay time: 89589Jump to behavior
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeThread delayed: delay time: 89466Jump to behavior
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeThread delayed: delay time: 89356Jump to behavior
                Source: C:\Users\user\AppData\Roaming\cnWCiicEpxW.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Users\user\AppData\Roaming\cnWCiicEpxW.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Users\user\AppData\Roaming\cnWCiicEpxW.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Users\user\AppData\Roaming\cnWCiicEpxW.exeThread delayed: delay time: 100000Jump to behavior
                Source: C:\Users\user\AppData\Roaming\cnWCiicEpxW.exeThread delayed: delay time: 99859Jump to behavior
                Source: C:\Users\user\AppData\Roaming\cnWCiicEpxW.exeThread delayed: delay time: 99703Jump to behavior
                Source: C:\Users\user\AppData\Roaming\cnWCiicEpxW.exeThread delayed: delay time: 99588Jump to behavior
                Source: C:\Users\user\AppData\Roaming\cnWCiicEpxW.exeThread delayed: delay time: 99485Jump to behavior
                Source: C:\Users\user\AppData\Roaming\cnWCiicEpxW.exeThread delayed: delay time: 99344Jump to behavior
                Source: C:\Users\user\AppData\Roaming\cnWCiicEpxW.exeThread delayed: delay time: 99234Jump to behavior
                Source: C:\Users\user\AppData\Roaming\cnWCiicEpxW.exeThread delayed: delay time: 99105Jump to behavior
                Source: C:\Users\user\AppData\Roaming\cnWCiicEpxW.exeThread delayed: delay time: 98981Jump to behavior
                Source: C:\Users\user\AppData\Roaming\cnWCiicEpxW.exeThread delayed: delay time: 98793Jump to behavior
                Source: C:\Users\user\AppData\Roaming\cnWCiicEpxW.exeThread delayed: delay time: 98670Jump to behavior
                Source: C:\Users\user\AppData\Roaming\cnWCiicEpxW.exeThread delayed: delay time: 98562Jump to behavior
                Source: C:\Users\user\AppData\Roaming\cnWCiicEpxW.exeThread delayed: delay time: 98452Jump to behavior
                Source: C:\Users\user\AppData\Roaming\cnWCiicEpxW.exeThread delayed: delay time: 98328Jump to behavior
                Source: C:\Users\user\AppData\Roaming\cnWCiicEpxW.exeThread delayed: delay time: 98198Jump to behavior
                Source: C:\Users\user\AppData\Roaming\cnWCiicEpxW.exeThread delayed: delay time: 98004Jump to behavior
                Source: C:\Users\user\AppData\Roaming\cnWCiicEpxW.exeThread delayed: delay time: 97860Jump to behavior
                Source: C:\Users\user\AppData\Roaming\cnWCiicEpxW.exeThread delayed: delay time: 97718Jump to behavior
                Source: C:\Users\user\AppData\Roaming\cnWCiicEpxW.exeThread delayed: delay time: 97609Jump to behavior
                Source: C:\Users\user\AppData\Roaming\cnWCiicEpxW.exeThread delayed: delay time: 97500Jump to behavior
                Source: C:\Users\user\AppData\Roaming\cnWCiicEpxW.exeThread delayed: delay time: 97390Jump to behavior
                Source: C:\Users\user\AppData\Roaming\cnWCiicEpxW.exeThread delayed: delay time: 97281Jump to behavior
                Source: C:\Users\user\AppData\Roaming\cnWCiicEpxW.exeThread delayed: delay time: 97172Jump to behavior
                Source: C:\Users\user\AppData\Roaming\cnWCiicEpxW.exeThread delayed: delay time: 97058Jump to behavior
                Source: C:\Users\user\AppData\Roaming\cnWCiicEpxW.exeThread delayed: delay time: 96920Jump to behavior
                Source: C:\Users\user\AppData\Roaming\cnWCiicEpxW.exeThread delayed: delay time: 96808Jump to behavior
                Source: cnWCiicEpxW.exe, 00000015.00000002.415707967.0000000002B71000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: VMware SVGA IIOData Source=localhost\sqlexpress;Initial Catalog=dbSMS;Integrated Security=True
                Source: cnWCiicEpxW.exe, 00000015.00000002.415707967.0000000002B71000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: vmware
                Source: cnWCiicEpxW.exe, 00000015.00000002.415707967.0000000002B71000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: C:\PROGRAM FILES\VMWARE\VMWARE TOOLS\
                Source: cnWCiicEpxW.exe, 00000015.00000002.415707967.0000000002B71000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: SOFTWARE\VMware, Inc.\VMware Tools
                Source: SHIPMENT DOCUMENTS.exe, 00000014.00000003.397543098.000000000660B000.00000004.00000800.00020000.00000000.sdmp, SHIPMENT DOCUMENTS.exe, 00000014.00000002.546575639.000000000660D000.00000004.00000800.00020000.00000000.sdmp, SHIPMENT DOCUMENTS.exe, 00000014.00000003.396165041.000000000660E000.00000004.00000800.00020000.00000000.sdmp, SHIPMENT DOCUMENTS.exe, 00000014.00000002.518569851.00000000010E0000.00000004.00000020.00020000.00000000.sdmp, SHIPMENT DOCUMENTS.exe, 00000014.00000003.400776216.000000000660B000.00000004.00000800.00020000.00000000.sdmp, SHIPMENT DOCUMENTS.exe, 00000014.00000003.396428303.0000000006606000.00000004.00000800.00020000.00000000.sdmp, SHIPMENT DOCUMENTS.exe, 00000014.00000003.408594188.000000000660D000.00000004.00000800.00020000.00000000.sdmp, SHIPMENT DOCUMENTS.exe, 00000014.00000003.397431025.000000000660B000.00000004.00000800.00020000.00000000.sdmp, SHIPMENT DOCUMENTS.exe, 00000014.00000003.397802691.000000000660B000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
                Source: cnWCiicEpxW.exe, 00000015.00000002.415707967.0000000002B71000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: VMWARE
                Source: cnWCiicEpxW.exe, 00000015.00000002.415707967.0000000002B71000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: InstallPath%C:\PROGRAM FILES\VMWARE\VMWARE TOOLS\
                Source: cnWCiicEpxW.exe, 00000015.00000002.415707967.0000000002B71000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: VMWARE"SOFTWARE\VMware, Inc.\VMware ToolsLHARDWARE\DEVICEMAP\Scsi\Scsi Port 1\Scsi Bus 0\Target Id 0\Logical Unit Id 0LHARDWARE\DEVICEMAP\Scsi\Scsi Port 2\Scsi Bus 0\Target Id 0\Logical Unit Id 0'SYSTEM\ControlSet001\Services\Disk\Enum
                Source: cnWCiicEpxW.exe, 00000015.00000002.415707967.0000000002B71000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: VMware SVGA II
                Source: cnWCiicEpxW.exe, 00000015.00000002.415707967.0000000002B71000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: vmwareNSYSTEM\ControlSet001\Control\Class\{4D36E968-E325-11CE-BFC1-08002BE10318}\0000
                Source: cnWCiicEpxW.exe, 0000001B.00000003.494475191.00000000013BE000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
                Source: SHIPMENT DOCUMENTS.exe, 00000014.00000003.393067640.00000000010F0000.00000004.00000020.00020000.00000000.sdmp, SHIPMENT DOCUMENTS.exe, 00000014.00000003.387644774.00000000010D8000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll__
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeProcess token adjusted: DebugJump to behavior
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeProcess token adjusted: DebugJump to behavior
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeMemory allocated: page read and write | page guardJump to behavior

                HIPS / PFW / Operating System Protection Evasion

                barindex
                Source: SHIPMENT DOCUMENTS.exe, u8Kw867S61naurO56Y/I7QTkd9Ynf3eywmg2Z.csReference to suspicious API methods: ('LU7BJiCwx1', 'GetProcAddress@kernel32'), ('I49BKhrl98', 'LoadLibrary@kernel32')
                Source: cnWCiicEpxW.exe.0.dr, u8Kw867S61naurO56Y/I7QTkd9Ynf3eywmg2Z.csReference to suspicious API methods: ('LU7BJiCwx1', 'GetProcAddress@kernel32'), ('I49BKhrl98', 'LoadLibrary@kernel32')
                Source: 0.0.SHIPMENT DOCUMENTS.exe.910000.0.unpack, u8Kw867S61naurO56Y/I7QTkd9Ynf3eywmg2Z.csReference to suspicious API methods: ('LU7BJiCwx1', 'GetProcAddress@kernel32'), ('I49BKhrl98', 'LoadLibrary@kernel32')
                Source: 20.0.SHIPMENT DOCUMENTS.exe.400000.0.unpack, A/C1.csReference to suspicious API methods: ('A', 'VirtualAllocExNuma@kernel32.dll')
                Source: 20.0.SHIPMENT DOCUMENTS.exe.400000.0.unpack, A/e2.csReference to suspicious API methods: ('A', 'MapVirtualKey@user32.dll')
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeMemory written: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exe base: 400000 value starts with: 4D5AJump to behavior
                Source: C:\Users\user\AppData\Roaming\cnWCiicEpxW.exeMemory written: C:\Users\user\AppData\Roaming\cnWCiicEpxW.exe base: 400000 value starts with: 4D5AJump to behavior
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeProcess created: C:\Windows\SysWOW64\schtasks.exe C:\Windows\System32\schtasks.exe" /Create /TN "Updates\cnWCiicEpxW" /XML "C:\Users\user\AppData\Local\Temp\tmp2A80.tmpJump to behavior
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeProcess created: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exe {path}Jump to behavior
                Source: C:\Users\user\AppData\Roaming\cnWCiicEpxW.exeProcess created: C:\Windows\SysWOW64\schtasks.exe C:\Windows\System32\schtasks.exe" /Create /TN "Updates\cnWCiicEpxW" /XML "C:\Users\user\AppData\Local\Temp\tmpC7C9.tmpJump to behavior
                Source: C:\Users\user\AppData\Roaming\cnWCiicEpxW.exeProcess created: C:\Users\user\AppData\Roaming\cnWCiicEpxW.exe {path}Jump to behavior
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exe VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\arial.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\ariali.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\arialbd.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\arialbi.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\ARIALN.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\ariblk.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\ARIALNI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\ARIALNB.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\ARIALNBI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\calibri.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\calibril.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\calibrii.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\calibrili.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\calibrib.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\calibriz.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\cambria.ttc VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\cambriai.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\cambriab.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\cambriaz.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\Candara.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\Candarai.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\Candarab.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\Candaraz.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\comic.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\comici.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\comicbd.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\comicz.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\consola.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\consolai.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\consolab.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\consolaz.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\constan.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\constani.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\constanb.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\constanz.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\corbel.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\corbeli.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\corbelb.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\corbelz.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\cour.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\couri.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\courbd.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\courbi.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\ebrima.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\ebrimabd.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\framd.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\FRADM.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\framdit.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\FRADMIT.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\FRAMDCN.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\FRADMCN.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\FRAHV.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\FRAHVIT.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\Gabriola.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\gadugi.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\gadugib.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\georgia.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\georgiai.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\georgiab.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\georgiaz.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\impact.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\Inkfree.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\javatext.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\LeelawUI.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\LeelUIsl.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\LeelaUIb.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\lucon.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\l_10646.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\malgun.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\malgunsl.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\malgunbd.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\himalaya.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\msjh.ttc VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\msjhl.ttc VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\msjhbd.ttc VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\ntailu.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\ntailub.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\phagspa.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\phagspab.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\taile.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\taileb.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\msyh.ttc VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\msyhl.ttc VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\msyhbd.ttc VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\msyi.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\mingliub.ttc VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\monbaiti.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\msgothic.ttc VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\mvboli.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\mmrtext.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\mmrtextb.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\Nirmala.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\NirmalaS.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\NirmalaB.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\pala.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\palai.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\palab.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\palabi.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\segoepr.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\segoeprb.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\segoesc.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\segoescb.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\segoeuii.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\seguisli.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\seguili.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\seguisbi.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\segoeuiz.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\seguibl.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\seguibli.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\seguiemj.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\seguihis.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\seguisym.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\simsun.ttc VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\simsunb.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\Sitka.ttc VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\SitkaI.ttc VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\SitkaB.ttc VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\SitkaZ.ttc VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\sylfaen.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\symbol.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\tahoma.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\tahomabd.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\timesi.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\timesbd.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\timesbi.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\trebuc.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\trebucit.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\trebucbd.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\trebucbi.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\verdana.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\verdanai.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\verdanab.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\verdanaz.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\webdings.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\wingding.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\YuGothR.ttc VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\YuGothM.ttc VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\YuGothL.ttc VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\YuGothB.ttc VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\holomdl2.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\CENTURY.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\LEELAWAD.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\LEELAWDB.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\MSUIGHUR.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\MSUIGHUB.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\WINGDNG2.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\WINGDNG3.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\TEMPSITC.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\PRISTINA.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\PAPYRUS.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\MISTRAL.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\LHANDW.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\ITCKRIST.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\JUICE___.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\FRSCRIPT.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\FREESCPT.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\BRADHITC.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\OUTLOOK.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\BKANT.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\ANTQUAI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\ANTQUAB.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\ANTQUABI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\GARA.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\GARAIT.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\GARABD.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\MTCORSVA.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\GOTHIC.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\GOTHICI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\GOTHICB.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\GOTHICBI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\ALGER.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\BASKVILL.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\BAUHS93.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\BELL.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\BELLI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\BELLB.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\BRLNSR.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\BRLNSDB.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\BRLNSB.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\BERNHC.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\BOD_PSTC.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\BRITANIC.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\BROADW.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\BRUSHSCI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\CALIFR.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\CALIFI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\CALIFB.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\CENTAUR.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\CHILLER.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\COLONNA.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\COOPBL.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\FTLTLT.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\HARLOWSI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\HARNGTON.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\HTOWERT.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\HTOWERTI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\JOKERMAN.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\KUNSTLER.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\LBRITE.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\LBRITED.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\LBRITEI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\LBRITEDI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\LCALLIG.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\LFAX.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\LFAXD.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\LFAXI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\LFAXDI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\MAGNETOB.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\MATURASC.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\MOD20.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\NIAGENG.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\NIAGSOL.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\OLDENGL.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\ONYX.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\PARCHM.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\PLAYBILL.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\POORICH.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\RAVIE.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\INFROMAN.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\SHOWG.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\SNAP____.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\STENCIL.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\VINERITC.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\VIVALDII.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\VLADIMIR.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\LATINWD.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\TCM_____.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\TCMI____.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\TCB_____.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\TCBI____.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\TCCM____.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\TCCB____.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\TCCEB.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\SCRIPTBL.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\ROCK.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\ROCKI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\ROCKB.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\ROCKEB.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\ROCKBI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\ROCC____.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\ROCCB___.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\RAGE.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\PERTILI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\PERTIBD.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\PER_____.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\PERI____.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\PERB____.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\PERBI___.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\PALSCRI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\OCRAEXT.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\MAIAN.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\LTYPE.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\LTYPEO.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\LTYPEB.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\LTYPEBO.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\LSANS.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\LSANSD.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\LSANSI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\LSANSDI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\IMPRISHA.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\HATTEN.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\GOUDYSTO.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\GOUDOS.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\GOUDOSI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\GOUDOSB.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\GLECB.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\GIL_____.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\GILI____.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\GILB____.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\GILBI___.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\GILC____.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\GLSNECB.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\GIGI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\FRABK.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\FRABKIT.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\FORTE.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\FELIXTI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\ERASMD.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\ERASLGHT.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\ERASDEMI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\ERASBD.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\ENGR.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\ELEPHNT.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\ELEPHNTI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\ITCEDSCR.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\CURLZ___.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\COPRGTL.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\COPRGTB.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\CENSCBK.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\SCHLBKI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\SCHLBKB.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\SCHLBKBI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\CASTELAR.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\CALIST.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\CALISTI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\CALISTB.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\CALISTBI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\BOOKOS.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\BOOKOSB.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\BOOKOSI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\BOOKOSBI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\BOD_R.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\BOD_I.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\BOD_B.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\BOD_BI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\BOD_CR.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\BOD_BLAR.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\BOD_CI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\BOD_CB.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\BOD_BLAI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\BOD_CBI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\ITCBLKAD.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\ARLRDBD.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\AGENCYR.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\AGENCYB.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\BSSYM7.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\REFSAN.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\REFSPCL.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\MTEXTRA.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\marlett.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\segoeuii.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\segoeuiz.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exe VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Management.dll VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Roaming\cnWCiicEpxW.exeQueries volume information: C:\Users\user\AppData\Roaming\cnWCiicEpxW.exe VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Roaming\cnWCiicEpxW.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Roaming\cnWCiicEpxW.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Roaming\cnWCiicEpxW.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Roaming\cnWCiicEpxW.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Roaming\cnWCiicEpxW.exeQueries volume information: C:\Users\user\AppData\Roaming\cnWCiicEpxW.exe VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Roaming\cnWCiicEpxW.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Roaming\cnWCiicEpxW.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Roaming\cnWCiicEpxW.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Roaming\cnWCiicEpxW.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Roaming\cnWCiicEpxW.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Roaming\cnWCiicEpxW.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Management.dll VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Roaming\cnWCiicEpxW.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Roaming\cnWCiicEpxW.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

                Stealing of Sensitive Information

                barindex
                Source: Yara matchFile source: 20.0.SHIPMENT DOCUMENTS.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.SHIPMENT DOCUMENTS.exe.3d715a0.1.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.SHIPMENT DOCUMENTS.exe.3d715a0.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.SHIPMENT DOCUMENTS.exe.3ea28e8.2.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000014.00000000.301553016.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000002.309368123.0000000003DCC000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000002.308207563.0000000003CA9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: SHIPMENT DOCUMENTS.exe PID: 3192, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: SHIPMENT DOCUMENTS.exe PID: 3244, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: cnWCiicEpxW.exe PID: 3132, type: MEMORYSTR
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeKey opened: HKEY_CURRENT_USER\Software\IncrediMail\IdentitiesJump to behavior
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676Jump to behavior
                Source: C:\Users\user\AppData\Roaming\cnWCiicEpxW.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
                Source: C:\Users\user\AppData\Roaming\cnWCiicEpxW.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Martin Prikryl\WinSCP 2\SessionsJump to behavior
                Source: C:\Users\user\AppData\Roaming\cnWCiicEpxW.exeFile opened: C:\Users\user\AppData\Roaming\FileZilla\recentservers.xmlJump to behavior
                Source: C:\Users\user\AppData\Roaming\cnWCiicEpxW.exeFile opened: C:\Users\user\AppData\Roaming\SmartFTP\Client 2.0\Favorites\Quick Connect\Jump to behavior
                Source: C:\Users\user\AppData\Roaming\cnWCiicEpxW.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
                Source: C:\Users\user\AppData\Roaming\cnWCiicEpxW.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.iniJump to behavior
                Source: Yara matchFile source: 0000001B.00000002.528419495.0000000003164000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000001B.00000002.525674867.0000000003111000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000014.00000002.522417697.0000000002EF1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000014.00000002.524431731.0000000002F44000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: SHIPMENT DOCUMENTS.exe PID: 3244, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: cnWCiicEpxW.exe PID: 3132, type: MEMORYSTR

                Remote Access Functionality

                barindex
                Source: Yara matchFile source: 20.0.SHIPMENT DOCUMENTS.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.SHIPMENT DOCUMENTS.exe.3d715a0.1.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.SHIPMENT DOCUMENTS.exe.3d715a0.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.SHIPMENT DOCUMENTS.exe.3ea28e8.2.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000014.00000000.301553016.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000002.309368123.0000000003DCC000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000002.308207563.0000000003CA9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: SHIPMENT DOCUMENTS.exe PID: 3192, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: SHIPMENT DOCUMENTS.exe PID: 3244, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: cnWCiicEpxW.exe PID: 3132, type: MEMORYSTR
                Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
                Valid Accounts211
                Windows Management Instrumentation
                1
                Scheduled Task/Job
                111
                Process Injection
                1
                Disable or Modify Tools
                2
                OS Credential Dumping
                1
                File and Directory Discovery
                Remote Services11
                Archive Collected Data
                Exfiltration Over Other Network Medium1
                Ingress Tool Transfer
                Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
                Default Accounts1
                Native API
                Boot or Logon Initialization Scripts1
                Scheduled Task/Job
                1
                Deobfuscate/Decode Files or Information
                1
                Credentials in Registry
                114
                System Information Discovery
                Remote Desktop Protocol2
                Data from Local System
                Exfiltration Over Bluetooth11
                Encrypted Channel
                Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
                Domain Accounts1
                Scheduled Task/Job
                Logon Script (Windows)Logon Script (Windows)2
                Obfuscated Files or Information
                Security Account Manager1
                Query Registry
                SMB/Windows Admin Shares1
                Email Collection
                Automated Exfiltration1
                Non-Standard Port
                Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
                Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)23
                Software Packing
                NTDS311
                Security Software Discovery
                Distributed Component Object ModelInput CaptureScheduled Transfer2
                Non-Application Layer Protocol
                SIM Card SwapCarrier Billing Fraud
                Cloud AccountsCronNetwork Logon ScriptNetwork Logon Script1
                Masquerading
                LSA Secrets1
                Process Discovery
                SSHKeyloggingData Transfer Size Limits23
                Application Layer Protocol
                Manipulate Device CommunicationManipulate App Store Rankings or Ratings
                Replication Through Removable MediaLaunchdRc.commonRc.common131
                Virtualization/Sandbox Evasion
                Cached Domain Credentials131
                Virtualization/Sandbox Evasion
                VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
                External Remote ServicesScheduled TaskStartup ItemsStartup Items111
                Process Injection
                DCSync1
                Application Window Discovery
                Windows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
                Drive-by CompromiseCommand and Scripting InterpreterScheduled Task/JobScheduled Task/JobIndicator Removal from ToolsProc Filesystem1
                Remote System Discovery
                Shared WebrootCredential API HookingExfiltration Over Symmetric Encrypted Non-C2 ProtocolApplication Layer ProtocolDowngrade to Insecure ProtocolsGenerate Fraudulent Advertising Revenue
                Exploit Public-Facing ApplicationPowerShellAt (Linux)At (Linux)Masquerading/etc/passwd and /etc/shadow1
                System Network Configuration Discovery
                Software Deployment ToolsData StagedExfiltration Over Asymmetric Encrypted Non-C2 ProtocolWeb ProtocolsRogue Cellular Base StationData Destruction
                Hide Legend

                Legend:

                • Process
                • Signature
                • Created File
                • DNS/IP Info
                • Is Dropped
                • Is Windows Process
                • Number of created Registry Values
                • Number of created Files
                • Visual Basic
                • Delphi
                • Java
                • .Net C# or VB.NET
                • C, C++ or other language
                • Is malicious
                • Internet
                behaviorgraph top1 signatures2 2 Behavior Graph ID: 756110 Sample: SHIPMENT DOCUMENTS.exe Startdate: 29/11/2022 Architecture: WINDOWS Score: 100 43 Malicious sample detected (through community Yara rule) 2->43 45 Sigma detected: Scheduled temp file as task from temp location 2->45 47 Multi AV Scanner detection for submitted file 2->47 49 13 other signatures 2->49 7 cnWCiicEpxW.exe 5 2->7         started        10 SHIPMENT DOCUMENTS.exe 6 2->10         started        process3 file4 51 Multi AV Scanner detection for dropped file 7->51 53 Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines) 7->53 55 May check the online IP address of the machine 7->55 59 2 other signatures 7->59 13 cnWCiicEpxW.exe 14 3 7->13         started        17 schtasks.exe 1 7->17         started        27 C:\Users\user\AppData\...\cnWCiicEpxW.exe, PE32 10->27 dropped 29 C:\Users\user\AppData\Local\...\tmp2A80.tmp, XML 10->29 dropped 31 C:\Users\user\...\SHIPMENT DOCUMENTS.exe.log, ASCII 10->31 dropped 57 Injects a PE file into a foreign processes 10->57 19 SHIPMENT DOCUMENTS.exe 15 3 10->19         started        21 schtasks.exe 1 10->21         started        signatures5 process6 dnsIp7 33 3.232.242.170, 443, 49738 AMAZON-AESUS United States 13->33 35 api.ipify.org 13->35 61 Tries to steal Mail credentials (via file / registry access) 13->61 63 Tries to harvest and steal ftp login credentials 13->63 65 Tries to harvest and steal browser information (history, passwords, etc) 13->65 23 conhost.exe 17->23         started        37 mail.southernboilers.org 199.79.62.12, 49721, 49743, 587 PUBLIC-DOMAIN-REGISTRYUS United States 19->37 39 api.ipify.org.herokudns.com 52.20.78.240, 443, 49713 AMAZON-AESUS United States 19->39 41 2 other IPs or domains 19->41 67 Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc) 19->67 25 conhost.exe 21->25         started        signatures8 process9

                This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                windows-stand
                SourceDetectionScannerLabelLink
                SHIPMENT DOCUMENTS.exe36%VirustotalBrowse
                SHIPMENT DOCUMENTS.exe32%ReversingLabsWin32.Trojan.Woreflint
                SHIPMENT DOCUMENTS.exe100%Joe Sandbox ML
                SourceDetectionScannerLabelLink
                C:\Users\user\AppData\Roaming\cnWCiicEpxW.exe100%Joe Sandbox ML
                C:\Users\user\AppData\Roaming\cnWCiicEpxW.exe32%ReversingLabsWin32.Trojan.Woreflint
                SourceDetectionScannerLabelLinkDownload
                20.0.SHIPMENT DOCUMENTS.exe.400000.0.unpack100%AviraTR/Spy.Gen8Download File
                SourceDetectionScannerLabelLink
                mail.southernboilers.org0%VirustotalBrowse
                SourceDetectionScannerLabelLink
                http://www.certplus.com/CRL/class3.crl00%URL Reputationsafe
                http://www.e-me.lv/repository00%URL Reputationsafe
                http://www.acabogacia.org/doc00%URL Reputationsafe
                http://crl.chambersign.org/chambersroot.crl00%URL Reputationsafe
                http://ocsp.suscerte.gob.ve00%URL Reputationsafe
                http://www.postsignum.cz/crl/psrootqca2.crl020%URL Reputationsafe
                http://crl.dhimyotis.com/certignarootca.crl00%URL Reputationsafe
                http://www.chambersign.org10%URL Reputationsafe
                http://www.pkioverheid.nl/policies/root-policy00%URL Reputationsafe
                http://www.suscerte.gob.ve/lcr0#0%URL Reputationsafe
                http://ca2.mtin.es/mtin/crl/MTINAutoridadRaiz00%URL Reputationsafe
                http://crl.ssc.lt/root-c/cacrl.crl00%URL Reputationsafe
                http://postsignum.ttc.cz/crl/psrootqca2.crl00%URL Reputationsafe
                http://www.trustcenter.de/crl/v2/tc_class_3_ca_II.crl0%URL Reputationsafe
                http://127.0.0.1:HTTP/1.10%Avira URL Cloudsafe
                http://ca.disig.sk/ca/crl/ca_disig.crl00%URL Reputationsafe
                http://crl1.comsign.co.il/crl/comsignglobalrootca.crl00%URL Reputationsafe
                http://www.certplus.com/CRL/class3P.crl00%URL Reputationsafe
                http://www.sajatypeworks.com0%URL Reputationsafe
                http://www.founder.com.cn/cn/cThe0%URL Reputationsafe
                http://www.suscerte.gob.ve/dpc00%URL Reputationsafe
                http://www.certplus.com/CRL/class2.crl00%URL Reputationsafe
                http://www.disig.sk/ca/crl/ca_disig.crl00%URL Reputationsafe
                http://www.defence.gov.au/pki00%URL Reputationsafe
                http://www.galapagosdesign.com/DPlease0%URL Reputationsafe
                http://www.sk.ee/cps/00%URL Reputationsafe
                http://www.urwpp.deDPlease0%URL Reputationsafe
                http://www.zhongyicts.com.cn0%URL Reputationsafe
                http://cps.root-x1.letsencrypt.org00%URL Reputationsafe
                http://policy.camerfirma.com00%URL Reputationsafe
                http://www.ssc.lt/cps030%URL Reputationsafe
                http://ocsp.pki.gva.es00%URL Reputationsafe
                http://acraiz.icpbrasil.gov.br/DPCacraiz.pdf0?0%URL Reputationsafe
                http://ca.mtin.es/mtin/ocsp00%URL Reputationsafe
                http://cps.letsencrypt.org00%URL Reputationsafe
                http://crl.ssc.lt/root-b/cacrl.crl00%URL Reputationsafe
                http://web.ncdc.gov.sa/crl/nrcacomb1.crl00%URL Reputationsafe
                http://www.uce.gub.uy/informacion-tecnica/politicas/cp_acrn.pdf0G0%URL Reputationsafe
                https://wwww.certigna.fr/autorites/0m0%URL Reputationsafe
                http://www.dnie.es/dpc00%URL Reputationsafe
                http://www.ica.co.il/repository/cps/PersonalID_Practice_Statement.pdf00%URL Reputationsafe
                https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.ziphttps://www0%URL Reputationsafe
                http://ca.mtin.es/mtin/DPCyPoliticas00%URL Reputationsafe
                http://www.globaltrust.info00%URL Reputationsafe
                http://www.certplus.com/CRL/class3TS.crl00%URL Reputationsafe
                http://crl.microsoft.0%URL Reputationsafe
                http://www.carterandcone.coml0%URL Reputationsafe
                http://ac.economia.gob.mx/last.crl0G0%URL Reputationsafe
                https://www.catcert.net/verarrel0%URL Reputationsafe
                http://www.disig.sk/ca0f0%URL Reputationsafe
                http://www.globaltrust.info0=0%Avira URL Cloudsafe
                http://www.sk.ee/juur/crl/00%URL Reputationsafe
                http://crl.chambersign.org/chambersignroot.crl00%URL Reputationsafe
                http://crl.xrampsecurity.com/XGCA.crl00%URL Reputationsafe
                http://certs.oati.net/repository/OATICA2.crl00%URL Reputationsafe
                http://crl.oces.trust2408.com/oces.crl00%URL Reputationsafe
                http://www.quovadis.bm00%URL Reputationsafe
                http://crl.ssc.lt/root-a/cacrl.crl00%URL Reputationsafe
                http://certs.oaticerts.com/repository/OATICA2.crl0%URL Reputationsafe
                http://www.trustdst.com/certificates/policy/ACES-index.html00%URL Reputationsafe
                http://certs.oati.net/repository/OATICA2.crt00%URL Reputationsafe
                https://9psarY6l5Bj.org0%Avira URL Cloudsafe
                http://mail.southernboilers.org0%Avira URL Cloudsafe
                http://bvQtmz.com0%Avira URL Cloudsafe
                http://www.accv.es000%URL Reputationsafe
                http://www.pkioverheid.nl/policies/root-policy-G200%URL Reputationsafe
                https://www.netlock.net/docs0%URL Reputationsafe
                http://www.e-trust.be/CPS/QNcerts0%URL Reputationsafe
                http://ocsp.ncdc.gov.sa00%URL Reputationsafe
                http://fedir.comsign.co.il/crl/ComSignCA.crl00%URL Reputationsafe
                http://trustcenter-crl.certificat2.com/Keynectis/KEYNECTIS_ROOT_CA.crl00%URL Reputationsafe
                http://web.ncdc.gov.sa/crl/nrcaparta1.crl0%URL Reputationsafe
                http://www.founder.com.cn/cn/bThe0%URL Reputationsafe
                NameIPActiveMaliciousAntivirus DetectionReputation
                mail.southernboilers.org
                199.79.62.12
                truefalseunknown
                api.ipify.org.herokudns.com
                52.20.78.240
                truefalse
                  unknown
                  windowsupdatebg.s.llnwi.net
                  178.79.242.0
                  truefalse
                    unknown
                    api.ipify.org
                    unknown
                    unknownfalse
                      high
                      NameSourceMaliciousAntivirus DetectionReputation
                      http://127.0.0.1:HTTP/1.1SHIPMENT DOCUMENTS.exe, 00000014.00000002.522417697.0000000002EF1000.00000004.00000800.00020000.00000000.sdmp, cnWCiicEpxW.exe, 0000001B.00000002.525674867.0000000003111000.00000004.00000800.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: safe
                      low
                      http://www.certplus.com/CRL/class3.crl0SHIPMENT DOCUMENTS.exe, 00000014.00000003.407487472.00000000070CC000.00000004.00000800.00020000.00000000.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      http://www.e-me.lv/repository0SHIPMENT DOCUMENTS.exe, 00000014.00000003.398450527.0000000007136000.00000004.00000800.00020000.00000000.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      http://www.acabogacia.org/doc0SHIPMENT DOCUMENTS.exe, 00000014.00000003.407487472.00000000070CC000.00000004.00000800.00020000.00000000.sdmp, SHIPMENT DOCUMENTS.exe, 00000014.00000003.398941782.00000000065B9000.00000004.00000800.00020000.00000000.sdmp, SHIPMENT DOCUMENTS.exe, 00000014.00000003.403651123.00000000065E4000.00000004.00000800.00020000.00000000.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      http://crl.chambersign.org/chambersroot.crl0SHIPMENT DOCUMENTS.exe, 00000014.00000003.398941782.00000000065B9000.00000004.00000800.00020000.00000000.sdmp, SHIPMENT DOCUMENTS.exe, 00000014.00000003.403651123.00000000065E4000.00000004.00000800.00020000.00000000.sdmp, SHIPMENT DOCUMENTS.exe, 00000014.00000002.546353573.00000000065ED000.00000004.00000800.00020000.00000000.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      http://ocsp.suscerte.gob.ve0SHIPMENT DOCUMENTS.exe, 00000014.00000003.407487472.00000000070CC000.00000004.00000800.00020000.00000000.sdmp, SHIPMENT DOCUMENTS.exe, 00000014.00000003.398696766.0000000007129000.00000004.00000800.00020000.00000000.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      http://www.postsignum.cz/crl/psrootqca2.crl02SHIPMENT DOCUMENTS.exe, 00000014.00000003.398941782.00000000065B9000.00000004.00000800.00020000.00000000.sdmp, SHIPMENT DOCUMENTS.exe, 00000014.00000003.403942163.00000000065CD000.00000004.00000800.00020000.00000000.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      http://mail.southernboilers.orgSHIPMENT DOCUMENTS.exe, 00000014.00000002.533736666.00000000031E6000.00000004.00000800.00020000.00000000.sdmp, cnWCiicEpxW.exe, 0000001B.00000002.534528527.00000000033EF000.00000004.00000800.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      http://crl.dhimyotis.com/certignarootca.crl0SHIPMENT DOCUMENTS.exe, 00000014.00000003.398450527.0000000007136000.00000004.00000800.00020000.00000000.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      http://sertifikati.ca.posta.rs/crl/PostaCARoot.crl0SHIPMENT DOCUMENTS.exe, 00000014.00000003.407487472.00000000070CC000.00000004.00000800.00020000.00000000.sdmpfalse
                        high
                        http://www.chambersign.org1SHIPMENT DOCUMENTS.exe, 00000014.00000003.398941782.00000000065B9000.00000004.00000800.00020000.00000000.sdmp, SHIPMENT DOCUMENTS.exe, 00000014.00000003.403651123.00000000065E4000.00000004.00000800.00020000.00000000.sdmp, SHIPMENT DOCUMENTS.exe, 00000014.00000003.398696766.0000000007129000.00000004.00000800.00020000.00000000.sdmp, SHIPMENT DOCUMENTS.exe, 00000014.00000002.546353573.00000000065ED000.00000004.00000800.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        http://www.pkioverheid.nl/policies/root-policy0SHIPMENT DOCUMENTS.exe, 00000014.00000003.398941782.00000000065B9000.00000004.00000800.00020000.00000000.sdmp, SHIPMENT DOCUMENTS.exe, 00000014.00000003.403853962.00000000065DA000.00000004.00000800.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        http://repository.swisssign.com/0SHIPMENT DOCUMENTS.exe, 00000014.00000003.400439346.00000000065EF000.00000004.00000800.00020000.00000000.sdmp, SHIPMENT DOCUMENTS.exe, 00000014.00000003.407487472.00000000070CC000.00000004.00000800.00020000.00000000.sdmp, SHIPMENT DOCUMENTS.exe, 00000014.00000003.401332216.00000000065F2000.00000004.00000800.00020000.00000000.sdmp, SHIPMENT DOCUMENTS.exe, 00000014.00000003.398941782.00000000065B9000.00000004.00000800.00020000.00000000.sdmp, SHIPMENT DOCUMENTS.exe, 00000014.00000003.403942163.00000000065CD000.00000004.00000800.00020000.00000000.sdmpfalse
                          high
                          http://www.fontbureau.com/designersSHIPMENT DOCUMENTS.exe, 00000000.00000002.315590285.0000000006E62000.00000004.00000800.00020000.00000000.sdmpfalse
                            high
                            http://www.pki.admin.ch/policSHIPMENT DOCUMENTS.exe, 00000014.00000003.403712232.00000000065F1000.00000004.00000800.00020000.00000000.sdmp, SHIPMENT DOCUMENTS.exe, 00000014.00000002.546377934.00000000065F0000.00000004.00000800.00020000.00000000.sdmpfalse
                              high
                              http://www.suscerte.gob.ve/lcr0#SHIPMENT DOCUMENTS.exe, 00000014.00000003.407487472.00000000070CC000.00000004.00000800.00020000.00000000.sdmp, SHIPMENT DOCUMENTS.exe, 00000014.00000003.398696766.0000000007129000.00000004.00000800.00020000.00000000.sdmpfalse
                              • URL Reputation: safe
                              unknown
                              http://ca2.mtin.es/mtin/crl/MTINAutoridadRaiz0SHIPMENT DOCUMENTS.exe, 00000014.00000003.400439346.00000000065EF000.00000004.00000800.00020000.00000000.sdmp, SHIPMENT DOCUMENTS.exe, 00000014.00000003.401332216.00000000065F2000.00000004.00000800.00020000.00000000.sdmpfalse
                              • URL Reputation: safe
                              unknown
                              http://crl.ssc.lt/root-c/cacrl.crl0SHIPMENT DOCUMENTS.exe, 00000014.00000003.398450527.0000000007136000.00000004.00000800.00020000.00000000.sdmpfalse
                              • URL Reputation: safe
                              unknown
                              http://postsignum.ttc.cz/crl/psrootqca2.crl0SHIPMENT DOCUMENTS.exe, 00000014.00000003.398941782.00000000065B9000.00000004.00000800.00020000.00000000.sdmp, SHIPMENT DOCUMENTS.exe, 00000014.00000003.403942163.00000000065CD000.00000004.00000800.00020000.00000000.sdmpfalse
                              • URL Reputation: safe
                              unknown
                              http://www.trustcenter.de/crl/v2/tc_class_3_ca_II.crlSHIPMENT DOCUMENTS.exe, 00000014.00000003.398941782.00000000065B9000.00000004.00000800.00020000.00000000.sdmp, SHIPMENT DOCUMENTS.exe, 00000014.00000003.403651123.00000000065E4000.00000004.00000800.00020000.00000000.sdmpfalse
                              • URL Reputation: safe
                              unknown
                              http://ca.disig.sk/ca/crl/ca_disig.crl0SHIPMENT DOCUMENTS.exe, 00000014.00000003.400439346.00000000065EF000.00000004.00000800.00020000.00000000.sdmp, SHIPMENT DOCUMENTS.exe, 00000014.00000003.403696848.00000000065EF000.00000004.00000800.00020000.00000000.sdmpfalse
                              • URL Reputation: safe
                              unknown
                              http://crl1.comsign.co.il/crl/comsignglobalrootca.crl0SHIPMENT DOCUMENTS.exe, 00000014.00000003.398941782.00000000065B9000.00000004.00000800.00020000.00000000.sdmp, SHIPMENT DOCUMENTS.exe, 00000014.00000003.407915366.00000000065B9000.00000004.00000800.00020000.00000000.sdmpfalse
                              • URL Reputation: safe
                              unknown
                              http://www.certplus.com/CRL/class3P.crl0SHIPMENT DOCUMENTS.exe, 00000014.00000003.398450527.0000000007136000.00000004.00000800.00020000.00000000.sdmpfalse
                              • URL Reputation: safe
                              unknown
                              http://www.sajatypeworks.comSHIPMENT DOCUMENTS.exe, 00000000.00000002.315590285.0000000006E62000.00000004.00000800.00020000.00000000.sdmpfalse
                              • URL Reputation: safe
                              unknown
                              http://www.founder.com.cn/cn/cTheSHIPMENT DOCUMENTS.exe, 00000000.00000002.315590285.0000000006E62000.00000004.00000800.00020000.00000000.sdmpfalse
                              • URL Reputation: safe
                              unknown
                              http://www.suscerte.gob.ve/dpc0SHIPMENT DOCUMENTS.exe, 00000014.00000003.407487472.00000000070CC000.00000004.00000800.00020000.00000000.sdmp, SHIPMENT DOCUMENTS.exe, 00000014.00000003.398696766.0000000007129000.00000004.00000800.00020000.00000000.sdmpfalse
                              • URL Reputation: safe
                              unknown
                              http://www.certeurope.fr/reference/root2.crl0SHIPMENT DOCUMENTS.exe, 00000014.00000003.400776216.000000000660B000.00000004.00000800.00020000.00000000.sdmp, SHIPMENT DOCUMENTS.exe, 00000014.00000003.408594188.000000000660D000.00000004.00000800.00020000.00000000.sdmpfalse
                                high
                                http://www.certplus.com/CRL/class2.crl0SHIPMENT DOCUMENTS.exe, 00000014.00000003.398941782.00000000065B9000.00000004.00000800.00020000.00000000.sdmp, SHIPMENT DOCUMENTS.exe, 00000014.00000003.403651123.00000000065E4000.00000004.00000800.00020000.00000000.sdmpfalse
                                • URL Reputation: safe
                                unknown
                                http://www.disig.sk/ca/crl/ca_disig.crl0SHIPMENT DOCUMENTS.exe, 00000014.00000003.400439346.00000000065EF000.00000004.00000800.00020000.00000000.sdmp, SHIPMENT DOCUMENTS.exe, 00000014.00000003.403696848.00000000065EF000.00000004.00000800.00020000.00000000.sdmpfalse
                                • URL Reputation: safe
                                unknown
                                http://eca.hinet.net/repository/Certs/IssuedToThisCA.p7b05SHIPMENT DOCUMENTS.exe, 00000014.00000003.398941782.00000000065B9000.00000004.00000800.00020000.00000000.sdmp, SHIPMENT DOCUMENTS.exe, 00000014.00000003.403651123.00000000065E4000.00000004.00000800.00020000.00000000.sdmpfalse
                                  high
                                  http://www.defence.gov.au/pki0SHIPMENT DOCUMENTS.exe, 00000014.00000003.403880249.00000000065E1000.00000004.00000800.00020000.00000000.sdmp, SHIPMENT DOCUMENTS.exe, 00000014.00000003.398941782.00000000065B9000.00000004.00000800.00020000.00000000.sdmp, SHIPMENT DOCUMENTS.exe, 00000014.00000003.406958224.00000000065E3000.00000004.00000800.00020000.00000000.sdmpfalse
                                  • URL Reputation: safe
                                  unknown
                                  http://www.galapagosdesign.com/DPleaseSHIPMENT DOCUMENTS.exe, 00000000.00000002.315590285.0000000006E62000.00000004.00000800.00020000.00000000.sdmpfalse
                                  • URL Reputation: safe
                                  unknown
                                  http://www.sk.ee/cps/0SHIPMENT DOCUMENTS.exe, 00000014.00000003.401258901.0000000007125000.00000004.00000800.00020000.00000000.sdmpfalse
                                  • URL Reputation: safe
                                  unknown
                                  http://www.globaltrust.info0=SHIPMENT DOCUMENTS.exe, 00000014.00000003.398696766.0000000007129000.00000004.00000800.00020000.00000000.sdmpfalse
                                  • Avira URL Cloud: safe
                                  low
                                  http://www.anf.esSHIPMENT DOCUMENTS.exe, 00000014.00000003.400439346.00000000065EF000.00000004.00000800.00020000.00000000.sdmp, SHIPMENT DOCUMENTS.exe, 00000014.00000003.401332216.00000000065F2000.00000004.00000800.00020000.00000000.sdmpfalse
                                    high
                                    http://www.pki.admin.ch/cps/CPS_2_16_756_1_17_3_1_0.pdf09SHIPMENT DOCUMENTS.exe, 00000014.00000003.398941782.00000000065B9000.00000004.00000800.00020000.00000000.sdmp, SHIPMENT DOCUMENTS.exe, 00000014.00000003.403942163.00000000065CD000.00000004.00000800.00020000.00000000.sdmpfalse
                                      high
                                      http://www.urwpp.deDPleaseSHIPMENT DOCUMENTS.exe, 00000000.00000002.315590285.0000000006E62000.00000004.00000800.00020000.00000000.sdmpfalse
                                      • URL Reputation: safe
                                      unknown
                                      http://www.zhongyicts.com.cnSHIPMENT DOCUMENTS.exe, 00000000.00000002.315590285.0000000006E62000.00000004.00000800.00020000.00000000.sdmpfalse
                                      • URL Reputation: safe
                                      unknown
                                      http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameSHIPMENT DOCUMENTS.exe, 00000000.00000002.305232047.0000000002CA1000.00000004.00000800.00020000.00000000.sdmp, SHIPMENT DOCUMENTS.exe, 00000014.00000002.522417697.0000000002EF1000.00000004.00000800.00020000.00000000.sdmp, cnWCiicEpxW.exe, 00000015.00000002.415707967.0000000002B71000.00000004.00000800.00020000.00000000.sdmp, cnWCiicEpxW.exe, 0000001B.00000002.525674867.0000000003111000.00000004.00000800.00020000.00000000.sdmpfalse
                                        high
                                        http://pki.registradores.org/normativa/index.htm0SHIPMENT DOCUMENTS.exe, 00000014.00000003.398450527.0000000007136000.00000004.00000800.00020000.00000000.sdmpfalse
                                          high
                                          http://cps.root-x1.letsencrypt.org0SHIPMENT DOCUMENTS.exe, 00000014.00000003.393081850.00000000010F2000.00000004.00000020.00020000.00000000.sdmp, SHIPMENT DOCUMENTS.exe, 00000014.00000002.518974908.00000000010F2000.00000004.00000020.00020000.00000000.sdmp, SHIPMENT DOCUMENTS.exe, 00000014.00000002.516536811.000000000107D000.00000004.00000020.00020000.00000000.sdmp, SHIPMENT DOCUMENTS.exe, 00000014.00000003.393347400.0000000006586000.00000004.00000800.00020000.00000000.sdmp, SHIPMENT DOCUMENTS.exe, 00000014.00000002.533736666.00000000031E6000.00000004.00000800.00020000.00000000.sdmp, cnWCiicEpxW.exe, 0000001B.00000002.520315185.00000000013A0000.00000004.00000020.00020000.00000000.sdmp, cnWCiicEpxW.exe, 0000001B.00000002.534582730.00000000033F5000.00000004.00000800.00020000.00000000.sdmp, cnWCiicEpxW.exe, 0000001B.00000002.520153626.0000000001396000.00000004.00000020.00020000.00000000.sdmpfalse
                                          • URL Reputation: safe
                                          unknown
                                          http://policy.camerfirma.com0SHIPMENT DOCUMENTS.exe, 00000014.00000003.400439346.00000000065EF000.00000004.00000800.00020000.00000000.sdmp, SHIPMENT DOCUMENTS.exe, 00000014.00000003.408538851.0000000006603000.00000004.00000800.00020000.00000000.sdmp, SHIPMENT DOCUMENTS.exe, 00000014.00000003.401332216.00000000065F2000.00000004.00000800.00020000.00000000.sdmp, SHIPMENT DOCUMENTS.exe, 00000014.00000003.398941782.00000000065B9000.00000004.00000800.00020000.00000000.sdmp, SHIPMENT DOCUMENTS.exe, 00000014.00000003.403651123.00000000065E4000.00000004.00000800.00020000.00000000.sdmpfalse
                                          • URL Reputation: safe
                                          unknown
                                          http://www.ssc.lt/cps03SHIPMENT DOCUMENTS.exe, 00000014.00000003.400439346.00000000065EF000.00000004.00000800.00020000.00000000.sdmp, SHIPMENT DOCUMENTS.exe, 00000014.00000003.401258901.0000000007125000.00000004.00000800.00020000.00000000.sdmp, SHIPMENT DOCUMENTS.exe, 00000014.00000003.401332216.00000000065F2000.00000004.00000800.00020000.00000000.sdmp, SHIPMENT DOCUMENTS.exe, 00000014.00000003.398450527.0000000007136000.00000004.00000800.00020000.00000000.sdmpfalse
                                          • URL Reputation: safe
                                          unknown
                                          http://ocsp.pki.gva.es0SHIPMENT DOCUMENTS.exe, 00000014.00000003.398941782.00000000065B9000.00000004.00000800.00020000.00000000.sdmp, SHIPMENT DOCUMENTS.exe, 00000014.00000003.403942163.00000000065CD000.00000004.00000800.00020000.00000000.sdmpfalse
                                          • URL Reputation: safe
                                          unknown
                                          http://www.anf.es/es/address-direccion.htmlSHIPMENT DOCUMENTS.exe, 00000014.00000003.400439346.00000000065EF000.00000004.00000800.00020000.00000000.sdmp, SHIPMENT DOCUMENTS.exe, 00000014.00000003.401332216.00000000065F2000.00000004.00000800.00020000.00000000.sdmpfalse
                                            high
                                            https://www.anf.es/address/)1(0&SHIPMENT DOCUMENTS.exe, 00000014.00000003.398836058.00000000065AD000.00000004.00000800.00020000.00000000.sdmp, SHIPMENT DOCUMENTS.exe, 00000014.00000003.407868660.00000000065AE000.00000004.00000800.00020000.00000000.sdmpfalse
                                              high
                                              http://acraiz.icpbrasil.gov.br/DPCacraiz.pdf0?SHIPMENT DOCUMENTS.exe, 00000014.00000003.398941782.00000000065B9000.00000004.00000800.00020000.00000000.sdmp, SHIPMENT DOCUMENTS.exe, 00000014.00000003.403651123.00000000065E4000.00000004.00000800.00020000.00000000.sdmp, SHIPMENT DOCUMENTS.exe, 00000014.00000003.407915366.00000000065B9000.00000004.00000800.00020000.00000000.sdmpfalse
                                              • URL Reputation: safe
                                              unknown
                                              http://bvQtmz.comcnWCiicEpxW.exe, 0000001B.00000002.525674867.0000000003111000.00000004.00000800.00020000.00000000.sdmpfalse
                                              • Avira URL Cloud: safe
                                              unknown
                                              http://ca.mtin.es/mtin/ocsp0SHIPMENT DOCUMENTS.exe, 00000014.00000003.400439346.00000000065EF000.00000004.00000800.00020000.00000000.sdmp, SHIPMENT DOCUMENTS.exe, 00000014.00000003.401332216.00000000065F2000.00000004.00000800.00020000.00000000.sdmpfalse
                                              • URL Reputation: safe
                                              unknown
                                              http://cps.letsencrypt.org0SHIPMENT DOCUMENTS.exe, 00000014.00000003.392950428.00000000010D7000.00000004.00000020.00020000.00000000.sdmp, SHIPMENT DOCUMENTS.exe, 00000014.00000002.516536811.000000000107D000.00000004.00000020.00020000.00000000.sdmp, SHIPMENT DOCUMENTS.exe, 00000014.00000003.393347400.0000000006586000.00000004.00000800.00020000.00000000.sdmp, SHIPMENT DOCUMENTS.exe, 00000014.00000002.533736666.00000000031E6000.00000004.00000800.00020000.00000000.sdmp, cnWCiicEpxW.exe, 0000001B.00000002.520315185.00000000013A0000.00000004.00000020.00020000.00000000.sdmp, cnWCiicEpxW.exe, 0000001B.00000002.534582730.00000000033F5000.00000004.00000800.00020000.00000000.sdmp, cnWCiicEpxW.exe, 0000001B.00000002.519279531.000000000135D000.00000004.00000020.00020000.00000000.sdmpfalse
                                              • URL Reputation: safe
                                              unknown
                                              http://crl.ssc.lt/root-b/cacrl.crl0SHIPMENT DOCUMENTS.exe, 00000014.00000003.401258901.0000000007125000.00000004.00000800.00020000.00000000.sdmpfalse
                                              • URL Reputation: safe
                                              unknown
                                              http://web.ncdc.gov.sa/crl/nrcacomb1.crl0SHIPMENT DOCUMENTS.exe, 00000014.00000003.403880249.00000000065E1000.00000004.00000800.00020000.00000000.sdmp, SHIPMENT DOCUMENTS.exe, 00000014.00000003.398941782.00000000065B9000.00000004.00000800.00020000.00000000.sdmp, SHIPMENT DOCUMENTS.exe, 00000014.00000003.406958224.00000000065E3000.00000004.00000800.00020000.00000000.sdmpfalse
                                              • URL Reputation: safe
                                              unknown
                                              http://www.certicamara.com/dpc/0ZSHIPMENT DOCUMENTS.exe, 00000014.00000003.398836058.00000000065AD000.00000004.00000800.00020000.00000000.sdmp, SHIPMENT DOCUMENTS.exe, 00000014.00000003.407868660.00000000065AE000.00000004.00000800.00020000.00000000.sdmpfalse
                                                high
                                                http://www.uce.gub.uy/informacion-tecnica/politicas/cp_acrn.pdf0GSHIPMENT DOCUMENTS.exe, 00000014.00000003.398941782.00000000065B9000.00000004.00000800.00020000.00000000.sdmp, SHIPMENT DOCUMENTS.exe, 00000014.00000003.403651123.00000000065E4000.00000004.00000800.00020000.00000000.sdmpfalse
                                                • URL Reputation: safe
                                                unknown
                                                http://crl.pki.wellsfargo.com/wsprca.crl0SHIPMENT DOCUMENTS.exe, 00000014.00000003.408437609.00000000070C4000.00000004.00000800.00020000.00000000.sdmpfalse
                                                  high
                                                  https://wwww.certigna.fr/autorites/0mSHIPMENT DOCUMENTS.exe, 00000014.00000003.398450527.0000000007136000.00000004.00000800.00020000.00000000.sdmpfalse
                                                  • URL Reputation: safe
                                                  unknown
                                                  http://www.dnie.es/dpc0SHIPMENT DOCUMENTS.exe, 00000014.00000003.398941782.00000000065B9000.00000004.00000800.00020000.00000000.sdmp, SHIPMENT DOCUMENTS.exe, 00000014.00000003.407915366.00000000065B9000.00000004.00000800.00020000.00000000.sdmpfalse
                                                  • URL Reputation: safe
                                                  unknown
                                                  http://www.ica.co.il/repository/cps/PersonalID_Practice_Statement.pdf0SHIPMENT DOCUMENTS.exe, 00000014.00000003.401258901.0000000007125000.00000004.00000800.00020000.00000000.sdmpfalse
                                                  • URL Reputation: safe
                                                  unknown
                                                  https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.ziphttps://wwwSHIPMENT DOCUMENTS.exe, 00000014.00000002.522417697.0000000002EF1000.00000004.00000800.00020000.00000000.sdmp, cnWCiicEpxW.exe, 0000001B.00000002.525674867.0000000003111000.00000004.00000800.00020000.00000000.sdmpfalse
                                                  • URL Reputation: safe
                                                  unknown
                                                  http://ca.mtin.es/mtin/DPCyPoliticas0SHIPMENT DOCUMENTS.exe, 00000014.00000003.400439346.00000000065EF000.00000004.00000800.00020000.00000000.sdmp, SHIPMENT DOCUMENTS.exe, 00000014.00000003.401332216.00000000065F2000.00000004.00000800.00020000.00000000.sdmpfalse
                                                  • URL Reputation: safe
                                                  unknown
                                                  https://www.anf.es/AC/ANFServerCA.crl0SHIPMENT DOCUMENTS.exe, 00000014.00000003.398836058.00000000065AD000.00000004.00000800.00020000.00000000.sdmp, SHIPMENT DOCUMENTS.exe, 00000014.00000003.407868660.00000000065AE000.00000004.00000800.00020000.00000000.sdmpfalse
                                                    high
                                                    http://www.globaltrust.info0SHIPMENT DOCUMENTS.exe, 00000014.00000003.398696766.0000000007129000.00000004.00000800.00020000.00000000.sdmpfalse
                                                    • URL Reputation: safe
                                                    unknown
                                                    http://certificates.starfieldtech.com/repository/1604SHIPMENT DOCUMENTS.exe, 00000014.00000003.400439346.00000000065EF000.00000004.00000800.00020000.00000000.sdmp, SHIPMENT DOCUMENTS.exe, 00000014.00000003.401332216.00000000065F2000.00000004.00000800.00020000.00000000.sdmpfalse
                                                      high
                                                      http://acedicom.edicomgroup.com/doc0SHIPMENT DOCUMENTS.exe, 00000014.00000003.408437609.00000000070C4000.00000004.00000800.00020000.00000000.sdmpfalse
                                                        high
                                                        http://www.certplus.com/CRL/class3TS.crl0SHIPMENT DOCUMENTS.exe, 00000014.00000003.401023380.000000000662C000.00000004.00000800.00020000.00000000.sdmp, SHIPMENT DOCUMENTS.exe, 00000014.00000003.408697131.0000000006630000.00000004.00000800.00020000.00000000.sdmpfalse
                                                        • URL Reputation: safe
                                                        unknown
                                                        http://crl.microsoft.SHIPMENT DOCUMENTS.exe, 00000014.00000002.546472929.0000000006603000.00000004.00000800.00020000.00000000.sdmpfalse
                                                        • URL Reputation: safe
                                                        unknown
                                                        https://crl.anf.es/AC/ANFServerCA.crl0SHIPMENT DOCUMENTS.exe, 00000014.00000003.398836058.00000000065AD000.00000004.00000800.00020000.00000000.sdmp, SHIPMENT DOCUMENTS.exe, 00000014.00000003.407868660.00000000065AE000.00000004.00000800.00020000.00000000.sdmpfalse
                                                          high
                                                          http://www.carterandcone.comlSHIPMENT DOCUMENTS.exe, 00000000.00000002.315590285.0000000006E62000.00000004.00000800.00020000.00000000.sdmpfalse
                                                          • URL Reputation: safe
                                                          unknown
                                                          http://www.certeurope.fr/reference/pc-root2.pdf0SHIPMENT DOCUMENTS.exe, 00000014.00000003.400776216.000000000660B000.00000004.00000800.00020000.00000000.sdmp, SHIPMENT DOCUMENTS.exe, 00000014.00000003.408594188.000000000660D000.00000004.00000800.00020000.00000000.sdmpfalse
                                                            high
                                                            https://9psarY6l5Bj.orgcnWCiicEpxW.exe, 0000001B.00000002.528419495.0000000003164000.00000004.00000800.00020000.00000000.sdmp, cnWCiicEpxW.exe, 0000001B.00000002.534484751.00000000033EB000.00000004.00000800.00020000.00000000.sdmp, cnWCiicEpxW.exe, 0000001B.00000002.534582730.00000000033F5000.00000004.00000800.00020000.00000000.sdmp, cnWCiicEpxW.exe, 0000001B.00000002.533917798.00000000033AA000.00000004.00000800.00020000.00000000.sdmpfalse
                                                            • Avira URL Cloud: safe
                                                            unknown
                                                            http://ac.economia.gob.mx/last.crl0GSHIPMENT DOCUMENTS.exe, 00000014.00000003.398696766.0000000007129000.00000004.00000800.00020000.00000000.sdmpfalse
                                                            • URL Reputation: safe
                                                            unknown
                                                            http://www.fontbureau.com/designers/frere-jones.htmlSHIPMENT DOCUMENTS.exe, 00000000.00000002.315590285.0000000006E62000.00000004.00000800.00020000.00000000.sdmpfalse
                                                              high
                                                              https://www.catcert.net/verarrelSHIPMENT DOCUMENTS.exe, 00000014.00000003.398450527.0000000007136000.00000004.00000800.00020000.00000000.sdmpfalse
                                                              • URL Reputation: safe
                                                              unknown
                                                              http://www.disig.sk/ca0fSHIPMENT DOCUMENTS.exe, 00000014.00000003.400439346.00000000065EF000.00000004.00000800.00020000.00000000.sdmp, SHIPMENT DOCUMENTS.exe, 00000014.00000003.403696848.00000000065EF000.00000004.00000800.00020000.00000000.sdmpfalse
                                                              • URL Reputation: safe
                                                              unknown
                                                              http://www.accv.es/fileadmin/Archivos/certificados/raizaccv1.crt0SHIPMENT DOCUMENTS.exe, 00000014.00000003.398941782.00000000065B9000.00000004.00000800.00020000.00000000.sdmp, SHIPMENT DOCUMENTS.exe, 00000014.00000003.403942163.00000000065CD000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                high
                                                                http://www.e-szigno.hu/RootCA.crlSHIPMENT DOCUMENTS.exe, 00000014.00000003.398450527.0000000007136000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                  high
                                                                  http://www.sk.ee/juur/crl/0SHIPMENT DOCUMENTS.exe, 00000014.00000003.401258901.0000000007125000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                  • URL Reputation: safe
                                                                  unknown
                                                                  http://crl.chambersign.org/chambersignroot.crl0SHIPMENT DOCUMENTS.exe, 00000014.00000003.398696766.0000000007129000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                  • URL Reputation: safe
                                                                  unknown
                                                                  http://crl.xrampsecurity.com/XGCA.crl0SHIPMENT DOCUMENTS.exe, 00000014.00000003.408011972.00000000065C1000.00000004.00000800.00020000.00000000.sdmp, SHIPMENT DOCUMENTS.exe, 00000014.00000003.398941782.00000000065B9000.00000004.00000800.00020000.00000000.sdmp, SHIPMENT DOCUMENTS.exe, 00000014.00000003.407915366.00000000065B9000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                  • URL Reputation: safe
                                                                  unknown
                                                                  http://certs.oati.net/repository/OATICA2.crl0SHIPMENT DOCUMENTS.exe, 00000014.00000003.400439346.00000000065EF000.00000004.00000800.00020000.00000000.sdmp, SHIPMENT DOCUMENTS.exe, 00000014.00000003.401332216.00000000065F2000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                  • URL Reputation: safe
                                                                  unknown
                                                                  http://crl.oces.trust2408.com/oces.crl0SHIPMENT DOCUMENTS.exe, 00000014.00000003.400439346.00000000065EF000.00000004.00000800.00020000.00000000.sdmp, SHIPMENT DOCUMENTS.exe, 00000014.00000003.401332216.00000000065F2000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                  • URL Reputation: safe
                                                                  unknown
                                                                  http://www.quovadis.bm0SHIPMENT DOCUMENTS.exe, 00000014.00000003.407487472.00000000070CC000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                  • URL Reputation: safe
                                                                  unknown
                                                                  https://eca.hinet.net/repository0SHIPMENT DOCUMENTS.exe, 00000014.00000003.398941782.00000000065B9000.00000004.00000800.00020000.00000000.sdmp, SHIPMENT DOCUMENTS.exe, 00000014.00000003.403651123.00000000065E4000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                    high
                                                                    http://crl.ssc.lt/root-a/cacrl.crl0SHIPMENT DOCUMENTS.exe, 00000014.00000003.400439346.00000000065EF000.00000004.00000800.00020000.00000000.sdmp, SHIPMENT DOCUMENTS.exe, 00000014.00000003.401332216.00000000065F2000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                    • URL Reputation: safe
                                                                    unknown
                                                                    http://certs.oaticerts.com/repository/OATICA2.crlSHIPMENT DOCUMENTS.exe, 00000014.00000003.400439346.00000000065EF000.00000004.00000800.00020000.00000000.sdmp, SHIPMENT DOCUMENTS.exe, 00000014.00000003.401332216.00000000065F2000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                    • URL Reputation: safe
                                                                    unknown
                                                                    http://www.trustdst.com/certificates/policy/ACES-index.html0SHIPMENT DOCUMENTS.exe, 00000014.00000003.401258901.0000000007125000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                    • URL Reputation: safe
                                                                    unknown
                                                                    http://certs.oati.net/repository/OATICA2.crt0SHIPMENT DOCUMENTS.exe, 00000014.00000003.400439346.00000000065EF000.00000004.00000800.00020000.00000000.sdmp, SHIPMENT DOCUMENTS.exe, 00000014.00000003.401332216.00000000065F2000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                    • URL Reputation: safe
                                                                    unknown
                                                                    http://www.accv.es00SHIPMENT DOCUMENTS.exe, 00000014.00000003.398941782.00000000065B9000.00000004.00000800.00020000.00000000.sdmp, SHIPMENT DOCUMENTS.exe, 00000014.00000003.403942163.00000000065CD000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                    • URL Reputation: safe
                                                                    unknown
                                                                    http://www.pkioverheid.nl/policies/root-policy-G20SHIPMENT DOCUMENTS.exe, 00000014.00000003.400439346.00000000065EF000.00000004.00000800.00020000.00000000.sdmp, SHIPMENT DOCUMENTS.exe, 00000014.00000003.401332216.00000000065F2000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                    • URL Reputation: safe
                                                                    unknown
                                                                    https://www.netlock.net/docsSHIPMENT DOCUMENTS.exe, 00000014.00000003.407915366.00000000065B9000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                    • URL Reputation: safe
                                                                    unknown
                                                                    http://www.pki.admin.ch/policy/CPS_2_16_756_1_17_3_21_1.pdf0SHIPMENT DOCUMENTS.exe, 00000014.00000003.400439346.00000000065EF000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                      high
                                                                      http://www.e-trust.be/CPS/QNcertsSHIPMENT DOCUMENTS.exe, 00000014.00000003.398450527.0000000007136000.00000004.00000800.00020000.00000000.sdmp, SHIPMENT DOCUMENTS.exe, 00000014.00000003.398941782.00000000065B9000.00000004.00000800.00020000.00000000.sdmp, SHIPMENT DOCUMENTS.exe, 00000014.00000003.403651123.00000000065E4000.00000004.00000800.00020000.00000000.sdmp, SHIPMENT DOCUMENTS.exe, 00000014.00000003.407915366.00000000065B9000.00000004.00000800.00020000.00000000.sdmp, SHIPMENT DOCUMENTS.exe, 00000014.00000002.546037308.00000000065B9000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                      • URL Reputation: safe
                                                                      unknown
                                                                      http://ocsp.ncdc.gov.sa0SHIPMENT DOCUMENTS.exe, 00000014.00000003.403880249.00000000065E1000.00000004.00000800.00020000.00000000.sdmp, SHIPMENT DOCUMENTS.exe, 00000014.00000003.398941782.00000000065B9000.00000004.00000800.00020000.00000000.sdmp, SHIPMENT DOCUMENTS.exe, 00000014.00000003.406958224.00000000065E3000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                      • URL Reputation: safe
                                                                      unknown
                                                                      http://www.fontbureau.com/designersGSHIPMENT DOCUMENTS.exe, 00000000.00000002.315590285.0000000006E62000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                        high
                                                                        http://fedir.comsign.co.il/crl/ComSignCA.crl0SHIPMENT DOCUMENTS.exe, 00000014.00000003.408437609.00000000070C4000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                        • URL Reputation: safe
                                                                        unknown
                                                                        http://www.fontbureau.com/designers/?SHIPMENT DOCUMENTS.exe, 00000000.00000002.315590285.0000000006E62000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                          high
                                                                          http://trustcenter-crl.certificat2.com/Keynectis/KEYNECTIS_ROOT_CA.crl0SHIPMENT DOCUMENTS.exe, 00000014.00000003.398941782.00000000065B9000.00000004.00000800.00020000.00000000.sdmp, SHIPMENT DOCUMENTS.exe, 00000014.00000003.403942163.00000000065CD000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                          • URL Reputation: safe
                                                                          unknown
                                                                          http://web.ncdc.gov.sa/crl/nrcaparta1.crlSHIPMENT DOCUMENTS.exe, 00000014.00000003.403880249.00000000065E1000.00000004.00000800.00020000.00000000.sdmp, SHIPMENT DOCUMENTS.exe, 00000014.00000003.398941782.00000000065B9000.00000004.00000800.00020000.00000000.sdmp, SHIPMENT DOCUMENTS.exe, 00000014.00000003.406958224.00000000065E3000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                          • URL Reputation: safe
                                                                          unknown
                                                                          http://www.datev.de/zertifikat-policy-int0SHIPMENT DOCUMENTS.exe, 00000014.00000003.400439346.00000000065EF000.00000004.00000800.00020000.00000000.sdmp, SHIPMENT DOCUMENTS.exe, 00000014.00000003.401332216.00000000065F2000.00000004.00000800.00020000.00000000.sdmp, SHIPMENT DOCUMENTS.exe, 00000014.00000003.398941782.00000000065B9000.00000004.00000800.00020000.00000000.sdmp, SHIPMENT DOCUMENTS.exe, 00000014.00000003.408391129.00000000065D8000.00000004.00000800.00020000.00000000.sdmp, SHIPMENT DOCUMENTS.exe, 00000014.00000003.403942163.00000000065CD000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                            high
                                                                            http://www.founder.com.cn/cn/bTheSHIPMENT DOCUMENTS.exe, 00000000.00000002.315590285.0000000006E62000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                            • URL Reputation: safe
                                                                            unknown
                                                                            • No. of IPs < 25%
                                                                            • 25% < No. of IPs < 50%
                                                                            • 50% < No. of IPs < 75%
                                                                            • 75% < No. of IPs
                                                                            IPDomainCountryFlagASNASN NameMalicious
                                                                            199.79.62.12
                                                                            mail.southernboilers.orgUnited States
                                                                            394695PUBLIC-DOMAIN-REGISTRYUSfalse
                                                                            3.232.242.170
                                                                            unknownUnited States
                                                                            14618AMAZON-AESUSfalse
                                                                            52.20.78.240
                                                                            api.ipify.org.herokudns.comUnited States
                                                                            14618AMAZON-AESUSfalse
                                                                            Joe Sandbox Version:36.0.0 Rainbow Opal
                                                                            Analysis ID:756110
                                                                            Start date and time:2022-11-29 16:42:18 +01:00
                                                                            Joe Sandbox Product:CloudBasic
                                                                            Overall analysis duration:0h 10m 46s
                                                                            Hypervisor based Inspection enabled:false
                                                                            Report type:full
                                                                            Sample file name:SHIPMENT DOCUMENTS.exe
                                                                            Cookbook file name:default.jbs
                                                                            Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 104, IE 11, Adobe Reader DC 19, Java 8 Update 211
                                                                            Number of analysed new started processes analysed:34
                                                                            Number of new started drivers analysed:0
                                                                            Number of existing processes analysed:0
                                                                            Number of existing drivers analysed:0
                                                                            Number of injected processes analysed:0
                                                                            Technologies:
                                                                            • HCA enabled
                                                                            • EGA enabled
                                                                            • HDC enabled
                                                                            • AMSI enabled
                                                                            Analysis Mode:default
                                                                            Analysis stop reason:Timeout
                                                                            Detection:MAL
                                                                            Classification:mal100.troj.spyw.evad.winEXE@12/7@6/3
                                                                            EGA Information:
                                                                            • Successful, ratio: 100%
                                                                            HDC Information:Failed
                                                                            HCA Information:
                                                                            • Successful, ratio: 100%
                                                                            • Number of executed functions: 122
                                                                            • Number of non-executed functions: 3
                                                                            Cookbook Comments:
                                                                            • Found application associated with file extension: .exe
                                                                            • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, BackgroundTransferHost.exe, HxTsr.exe, RuntimeBroker.exe, backgroundTaskHost.exe, SgrmBroker.exe, conhost.exe, svchost.exe
                                                                            • Excluded IPs from analysis (whitelisted): 178.79.242.0, 209.197.3.8, 20.82.154.241, 20.82.228.9, 104.214.104.116, 20.65.78.40
                                                                            • Excluded domains from analysis (whitelisted): www.bing.com, asf-ris-prod-scus-azsc.southcentralus.cloudapp.azure.com, fs.microsoft.com, eudb.ris.api.iris.microsoft.com, ris-prod.trafficmanager.net, ctldl.windowsupdate.com, cds.d2s7q6s2.hwcdn.net, asf-ris-prod-eus2-azsc.eastus2.cloudapp.azure.com, arc.msn.com, wu-bg-shim.trafficmanager.net, neus1c-displaycatalog.frontdoor.bigcatalog.commerce.microsoft.com, ris.api.iris.microsoft.com, rp-consumer-prod-displaycatalog-geomap.trafficmanager.net, login.live.com, store-images.s-microsoft.com, neus2c-displaycatalog.frontdoor.bigcatalog.commerce.microsoft.com, displaycatalog.mp.microsoft.com, img-prod-cms-rt-microsoft-com.akamaized.net, cdn.onenote.net, displaycatalog-rp.md.mp.microsoft.com.akadns.net, ris-prod-eudb.trafficmanager.net
                                                                            • Not all processes where analyzed, report is missing behavior information
                                                                            • Report creation exceeded maximum time and may have missing disassembly code information.
                                                                            • Report size exceeded maximum capacity and may have missing behavior information.
                                                                            • Report size getting too big, too many NtAllocateVirtualMemory calls found.
                                                                            • Report size getting too big, too many NtOpenKeyEx calls found.
                                                                            • Report size getting too big, too many NtProtectVirtualMemory calls found.
                                                                            • Report size getting too big, too many NtQueryValueKey calls found.
                                                                            TimeTypeDescription
                                                                            16:44:15API Interceptor377x Sleep call for process: SHIPMENT DOCUMENTS.exe modified
                                                                            16:44:29Task SchedulerRun new task: cnWCiicEpxW path: C:\Users\user\AppData\Roaming\cnWCiicEpxW.exe
                                                                            16:44:49API Interceptor54x Sleep call for process: cnWCiicEpxW.exe modified
                                                                            MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                                                            199.79.62.12ORDER.exeGet hashmaliciousBrowse
                                                                              INV and NOA.exeGet hashmaliciousBrowse
                                                                                CONTRACT #683793.exeGet hashmaliciousBrowse
                                                                                  INV and NOA.exeGet hashmaliciousBrowse
                                                                                    REMITTANCE COPY.exeGet hashmaliciousBrowse
                                                                                      SecuriteInfo.com.Win32.PWSX-gen.30630.28537.exeGet hashmaliciousBrowse
                                                                                        SHIPMENT DOCS.exeGet hashmaliciousBrowse
                                                                                          DRAFT DOCUMENTS.exeGet hashmaliciousBrowse
                                                                                            Remittance copy.exeGet hashmaliciousBrowse
                                                                                              payment copy.exeGet hashmaliciousBrowse
                                                                                                payment copy.exeGet hashmaliciousBrowse
                                                                                                  WIRE SWIFT COPY.exeGet hashmaliciousBrowse
                                                                                                    SecuriteInfo.com.Win32.PWSX-gen.4460.29629.exeGet hashmaliciousBrowse
                                                                                                      offer for fresh BASA Fish.exeGet hashmaliciousBrowse
                                                                                                        DRAFT DOCUMENTS.exeGet hashmaliciousBrowse
                                                                                                          SecuriteInfo.com.Win32.RATX-gen.25906.25697.exeGet hashmaliciousBrowse
                                                                                                            DISCOUNT PRICES.exeGet hashmaliciousBrowse
                                                                                                              QUOTATION.exeGet hashmaliciousBrowse
                                                                                                                PO#JB2210-0005.exeGet hashmaliciousBrowse
                                                                                                                  SecuriteInfo.com.Win32.CrypterX-gen.1235.19693.exeGet hashmaliciousBrowse
                                                                                                                    MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                                                                                                    mail.southernboilers.orgORDER.exeGet hashmaliciousBrowse
                                                                                                                    • 199.79.62.12
                                                                                                                    INV and NOA.exeGet hashmaliciousBrowse
                                                                                                                    • 199.79.62.12
                                                                                                                    CONTRACT #683793.exeGet hashmaliciousBrowse
                                                                                                                    • 199.79.62.12
                                                                                                                    INV and NOA.exeGet hashmaliciousBrowse
                                                                                                                    • 199.79.62.12
                                                                                                                    REMITTANCE COPY.exeGet hashmaliciousBrowse
                                                                                                                    • 199.79.62.12
                                                                                                                    SecuriteInfo.com.Win32.PWSX-gen.30630.28537.exeGet hashmaliciousBrowse
                                                                                                                    • 199.79.62.12
                                                                                                                    SHIPMENT DOCS.exeGet hashmaliciousBrowse
                                                                                                                    • 199.79.62.12
                                                                                                                    DRAFT DOCUMENTS.exeGet hashmaliciousBrowse
                                                                                                                    • 199.79.62.12
                                                                                                                    Remittance copy.exeGet hashmaliciousBrowse
                                                                                                                    • 199.79.62.12
                                                                                                                    payment copy.exeGet hashmaliciousBrowse
                                                                                                                    • 199.79.62.12
                                                                                                                    payment copy.exeGet hashmaliciousBrowse
                                                                                                                    • 199.79.62.12
                                                                                                                    WIRE SWIFT COPY.exeGet hashmaliciousBrowse
                                                                                                                    • 199.79.62.12
                                                                                                                    SecuriteInfo.com.Win32.PWSX-gen.4460.29629.exeGet hashmaliciousBrowse
                                                                                                                    • 199.79.62.12
                                                                                                                    offer for fresh BASA Fish.exeGet hashmaliciousBrowse
                                                                                                                    • 199.79.62.12
                                                                                                                    DRAFT DOCUMENTS.exeGet hashmaliciousBrowse
                                                                                                                    • 199.79.62.12
                                                                                                                    SecuriteInfo.com.Win32.RATX-gen.25906.25697.exeGet hashmaliciousBrowse
                                                                                                                    • 199.79.62.12
                                                                                                                    DISCOUNT PRICES.exeGet hashmaliciousBrowse
                                                                                                                    • 199.79.62.12
                                                                                                                    QUOTATION.exeGet hashmaliciousBrowse
                                                                                                                    • 199.79.62.12
                                                                                                                    PO#JB2210-0005.exeGet hashmaliciousBrowse
                                                                                                                    • 199.79.62.12
                                                                                                                    SecuriteInfo.com.Win32.CrypterX-gen.1235.19693.exeGet hashmaliciousBrowse
                                                                                                                    • 199.79.62.12
                                                                                                                    MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                                                                                                    PUBLIC-DOMAIN-REGISTRYUSORDER.exeGet hashmaliciousBrowse
                                                                                                                    • 199.79.62.12
                                                                                                                    Quotation.exeGet hashmaliciousBrowse
                                                                                                                    • 111.118.212.38
                                                                                                                    HBL & MBL.exeGet hashmaliciousBrowse
                                                                                                                    • 162.215.240.200
                                                                                                                    KWIR000714988.exeGet hashmaliciousBrowse
                                                                                                                    • 111.118.212.38
                                                                                                                    INV and NOA.exeGet hashmaliciousBrowse
                                                                                                                    • 199.79.62.12
                                                                                                                    ORDERFT-PO-0276-22 & PO pdf.exeGet hashmaliciousBrowse
                                                                                                                    • 208.91.199.223
                                                                                                                    payment receipt.exeGet hashmaliciousBrowse
                                                                                                                    • 162.215.240.200
                                                                                                                    CONTRACT #683793.exeGet hashmaliciousBrowse
                                                                                                                    • 199.79.62.12
                                                                                                                    SecuriteInfo.com.MSIL.GenKryptik.FYGA.tr.13096.12566.exeGet hashmaliciousBrowse
                                                                                                                    • 111.118.212.38
                                                                                                                    INV and NOA.exeGet hashmaliciousBrowse
                                                                                                                    • 199.79.62.12
                                                                                                                    SecuriteInfo.com.Win32.PWSX-gen.27054.5093.exeGet hashmaliciousBrowse
                                                                                                                    • 111.118.212.38
                                                                                                                    INV & Packing List.exeGet hashmaliciousBrowse
                                                                                                                    • 111.118.212.38
                                                                                                                    REMITTANCE COPY.exeGet hashmaliciousBrowse
                                                                                                                    • 199.79.62.12
                                                                                                                    LPO-17-006AD.jsGet hashmaliciousBrowse
                                                                                                                    • 208.91.199.225
                                                                                                                    PO N#U00b0CF004303.jsGet hashmaliciousBrowse
                                                                                                                    • 208.91.199.225
                                                                                                                    PI#102087.exeGet hashmaliciousBrowse
                                                                                                                    • 111.118.212.38
                                                                                                                    SecuriteInfo.com.Win32.PWSX-gen.30630.28537.exeGet hashmaliciousBrowse
                                                                                                                    • 199.79.62.12
                                                                                                                    PO#RFQ-HL51L07.exeGet hashmaliciousBrowse
                                                                                                                    • 111.118.212.38
                                                                                                                    Bank TT copy.exeGet hashmaliciousBrowse
                                                                                                                    • 208.91.199.89
                                                                                                                    Q-105038 MR-47237 EL HOSS.exeGet hashmaliciousBrowse
                                                                                                                    • 111.118.212.38
                                                                                                                    MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                                                                                                    3b5074b1b5d032e5620f69f9f700ff0efile.exeGet hashmaliciousBrowse
                                                                                                                    • 3.232.242.170
                                                                                                                    • 52.20.78.240
                                                                                                                    SkyNet.1448.exeGet hashmaliciousBrowse
                                                                                                                    • 3.232.242.170
                                                                                                                    • 52.20.78.240
                                                                                                                    SkyNet.1448.exeGet hashmaliciousBrowse
                                                                                                                    • 3.232.242.170
                                                                                                                    • 52.20.78.240
                                                                                                                    solicitud de presupuesto 29-11-2022.exeGet hashmaliciousBrowse
                                                                                                                    • 3.232.242.170
                                                                                                                    • 52.20.78.240
                                                                                                                    library.dllGet hashmaliciousBrowse
                                                                                                                    • 3.232.242.170
                                                                                                                    • 52.20.78.240
                                                                                                                    MACHINE SPECIFICATIONS.exeGet hashmaliciousBrowse
                                                                                                                    • 3.232.242.170
                                                                                                                    • 52.20.78.240
                                                                                                                    SecuriteInfo.com.Win32.CrypterX-gen.24912.15475.exeGet hashmaliciousBrowse
                                                                                                                    • 3.232.242.170
                                                                                                                    • 52.20.78.240
                                                                                                                    MEPS-42.exeGet hashmaliciousBrowse
                                                                                                                    • 3.232.242.170
                                                                                                                    • 52.20.78.240
                                                                                                                    11-29-22.exeGet hashmaliciousBrowse
                                                                                                                    • 3.232.242.170
                                                                                                                    • 52.20.78.240
                                                                                                                    ORDER.exeGet hashmaliciousBrowse
                                                                                                                    • 3.232.242.170
                                                                                                                    • 52.20.78.240
                                                                                                                    SecuriteInfo.com.Win32.CrypterX-gen.414.24926.exeGet hashmaliciousBrowse
                                                                                                                    • 3.232.242.170
                                                                                                                    • 52.20.78.240
                                                                                                                    Quotation.exeGet hashmaliciousBrowse
                                                                                                                    • 3.232.242.170
                                                                                                                    • 52.20.78.240
                                                                                                                    Ziraat-bankasiSwiftMessaji2911202245344.exeGet hashmaliciousBrowse
                                                                                                                    • 3.232.242.170
                                                                                                                    • 52.20.78.240
                                                                                                                    Cg7vRuVKhI.exeGet hashmaliciousBrowse
                                                                                                                    • 3.232.242.170
                                                                                                                    • 52.20.78.240
                                                                                                                    SecuriteInfo.com.Win32.PWSX-gen.7918.18477.exeGet hashmaliciousBrowse
                                                                                                                    • 3.232.242.170
                                                                                                                    • 52.20.78.240
                                                                                                                    SecuriteInfo.com.Win32.CrypterX-gen.12789.377.exeGet hashmaliciousBrowse
                                                                                                                    • 3.232.242.170
                                                                                                                    • 52.20.78.240
                                                                                                                    Wzf4gWTOC2.exeGet hashmaliciousBrowse
                                                                                                                    • 3.232.242.170
                                                                                                                    • 52.20.78.240
                                                                                                                    AWB DHL 7214306201 Shipment.pdf (432).exeGet hashmaliciousBrowse
                                                                                                                    • 3.232.242.170
                                                                                                                    • 52.20.78.240
                                                                                                                    WxuqCcSnq2.exeGet hashmaliciousBrowse
                                                                                                                    • 3.232.242.170
                                                                                                                    • 52.20.78.240
                                                                                                                    SecuriteInfo.com.W32.MSIL_Kryptik.ILD.gen.Eldorado.12870.1146.exeGet hashmaliciousBrowse
                                                                                                                    • 3.232.242.170
                                                                                                                    • 52.20.78.240
                                                                                                                    No context
                                                                                                                    Process:C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exe
                                                                                                                    File Type:Microsoft Cabinet archive data, Windows 2000/XP setup, 62919 bytes, 1 file, at 0x2c +A "authroot.stl", number 1, 6 datablocks, 0x1 compression
                                                                                                                    Category:dropped
                                                                                                                    Size (bytes):62919
                                                                                                                    Entropy (8bit):7.995280921994772
                                                                                                                    Encrypted:true
                                                                                                                    SSDEEP:1536:d+OfVxHl7Wyf11lYom3xQcRVOtPHwQV4rP6Ji7:d+OxHxJlZcuPt4b6q
                                                                                                                    MD5:3DCF580A93972319E82CAFBC047D34D5
                                                                                                                    SHA1:8528D2A1363E5DE77DC3B1142850E51EAD0F4B6B
                                                                                                                    SHA-256:40810E31F1B69075C727E6D557F9614D5880112895FF6F4DF1767E87AE5640D1
                                                                                                                    SHA-512:98384BE7218340F95DAE88D1CB865F23A0B4E12855BEB6E74A3752274C9B4C601E493864DB777BCA677A370D0A9DBFFD68D94898A82014537F3A801CCE839C42
                                                                                                                    Malicious:false
                                                                                                                    Reputation:moderate, very likely benign file
                                                                                                                    Preview:MSCF............,...................I.......Q.........GU.\ .authroot.stl..O..5..CK..<Tk...c_.d....A.K...+.d.-;%.BJII!.QIR..$t)Kd.-QQ*...g......^..~|N=...y....{. .4{...W....b.i...j.I.......1:..b\.0.....Ait.2t......w.%.&.",tL_...4.8L[G..;.57....AT.k.......V..K......(....mzS...G....r.".=H.?>.........x&...S%....X.M^..j...A..x.9`.9...A../.s..#.4#.....Id.w..B....s.8..(...dj....=L.)..s.d.]NxQX8....stV#.K.'7.tH..9u~.2..!..2./.....!..9C../...mP $..../y.....@p.6.}.`...5. 0r.w...@(.. .Q....)g.........m..z*.8rR..).].T9r<.L....0..`.........c.....;-.g..;.wk.)......i..c5.....{v.u...AS..=.....&.:.........+..P.N..9..EAQ.V.$s.......B.`.Mfe..8.......$...y-.q9J........W...2.Q8...O.......i..@\^.=X..dG$.M..#=....m.h..{9.'...-.v..Z...!....z.....N....i..^..,........d...%Xa~q.@D|0...Y.m...........&d.4..A..{t=...../.t.3._.....?-.....uroP?.d.Z..S..{...$.i....X..$.O..4..N.)....U.Z..P....X,.... ...Lg..35..W..s.!c...Ap.].P..8..M..W.......U..,...m.u..|=.m1..~..!..b...._.
                                                                                                                    Process:C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exe
                                                                                                                    File Type:data
                                                                                                                    Category:modified
                                                                                                                    Size (bytes):290
                                                                                                                    Entropy (8bit):2.9611813546708383
                                                                                                                    Encrypted:false
                                                                                                                    SSDEEP:6:kKAJNzlNiN+SkQlPlEGYRMY9z+4KlDA3RUe/:YDVkPlE99SNxAhUe/
                                                                                                                    MD5:37EE5D1705C30E983C3B068D6F6F6004
                                                                                                                    SHA1:94570FA7C66A5A4199A49647CBDFA69B85AACFFB
                                                                                                                    SHA-256:38E5CB69BAED0165FBE956D68D52E0B226806006A8952DE0D8C602B25D024684
                                                                                                                    SHA-512:36023F34ACF3BD9779273502DBCC0535C9F9B6D1AE4F7CD9706CA6B00631C79CFECAB44F276C773DF644045A7B6F18A0D7FE604AC6D5DF8D0ADF2152E84188B6
                                                                                                                    Malicious:false
                                                                                                                    Preview:p...... ........q..%Y...(....................................................... ..................................h.t.t.p.:././.c.t.l.d.l...w.i.n.d.o.w.s.u.p.d.a.t.e...c.o.m./.m.s.d.o.w.n.l.o.a.d./.u.p.d.a.t.e./.v.3./.s.t.a.t.i.c./.t.r.u.s.t.e.d.r./.e.n./.a.u.t.h.r.o.o.t.s.t.l...c.a.b...
                                                                                                                    Process:C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exe
                                                                                                                    File Type:ASCII text, with CRLF line terminators
                                                                                                                    Category:dropped
                                                                                                                    Size (bytes):1216
                                                                                                                    Entropy (8bit):5.355304211458859
                                                                                                                    Encrypted:false
                                                                                                                    SSDEEP:24:MLUE4K5E4Ks2E1qE4x84qXKDE4KhK3VZ9pKhPKIE4oKFKHKoZAE4Kzr7FE4j:MIHK5HKXE1qHxviYHKhQnoPtHoxHhAHY
                                                                                                                    MD5:69206D3AF7D6EFD08F4B4726998856D3
                                                                                                                    SHA1:E778D4BF781F7712163CF5E2F5E7C15953E484CF
                                                                                                                    SHA-256:A937AD22F9C3E667A062BA0E116672960CD93522F6997C77C00370755929BA87
                                                                                                                    SHA-512:CD270C3DF75E548C9B0727F13F44F45262BD474336E89AAEBE56FABFE8076CD4638F88D3C0837B67C2EB3C54055679B07E4212FB3FEDBF88C015EB5DBBCD7FF8
                                                                                                                    Malicious:true
                                                                                                                    Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\4f0a7eefa3cd3e0ba98b5ebddbbc72e6\System.ni.dll",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..2,"Microsoft.VisualBasic, Version=10.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\f1d8480152e0da9a60ad49c6d16a3b6d\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\8d67d92724ba494b6c7fd089d6f25b48\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a
                                                                                                                    Process:C:\Users\user\AppData\Roaming\cnWCiicEpxW.exe
                                                                                                                    File Type:ASCII text, with CRLF line terminators
                                                                                                                    Category:dropped
                                                                                                                    Size (bytes):1216
                                                                                                                    Entropy (8bit):5.355304211458859
                                                                                                                    Encrypted:false
                                                                                                                    SSDEEP:24:MLUE4K5E4Ks2E1qE4x84qXKDE4KhK3VZ9pKhPKIE4oKFKHKoZAE4Kzr7FE4j:MIHK5HKXE1qHxviYHKhQnoPtHoxHhAHY
                                                                                                                    MD5:69206D3AF7D6EFD08F4B4726998856D3
                                                                                                                    SHA1:E778D4BF781F7712163CF5E2F5E7C15953E484CF
                                                                                                                    SHA-256:A937AD22F9C3E667A062BA0E116672960CD93522F6997C77C00370755929BA87
                                                                                                                    SHA-512:CD270C3DF75E548C9B0727F13F44F45262BD474336E89AAEBE56FABFE8076CD4638F88D3C0837B67C2EB3C54055679B07E4212FB3FEDBF88C015EB5DBBCD7FF8
                                                                                                                    Malicious:false
                                                                                                                    Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\4f0a7eefa3cd3e0ba98b5ebddbbc72e6\System.ni.dll",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..2,"Microsoft.VisualBasic, Version=10.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\f1d8480152e0da9a60ad49c6d16a3b6d\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\8d67d92724ba494b6c7fd089d6f25b48\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a
                                                                                                                    Process:C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exe
                                                                                                                    File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                                                                                                    Category:dropped
                                                                                                                    Size (bytes):1656
                                                                                                                    Entropy (8bit):5.156182356770437
                                                                                                                    Encrypted:false
                                                                                                                    SSDEEP:24:2dH4+SEqC/S7h2ulNMFp2O/rlMhEMjnGpwjpIgUYODOLD9RJh7h8gKB3sUtn:cbha7JlNQV/rydbz9I3YODOLNdq3T
                                                                                                                    MD5:D452BE05EEC71DF72B608581ADB5DCC8
                                                                                                                    SHA1:36F9E125299B3DC5751091A6F91B9183E587229F
                                                                                                                    SHA-256:5646F4B081F4451AA51F15E1F1803831B170AD7251DB920F06E75269658C0466
                                                                                                                    SHA-512:41CE620A09EF983B7C42579864BF781B1543B71F11A184C3D0127AD099EE0EE6B0D523B441C6CB2E5E4A56966836E8730A591D3D830F54B57F0F580B5798D774
                                                                                                                    Malicious:true
                                                                                                                    Preview:<?xml version="1.0" encoding="UTF-16"?>..<Task version="1.2" xmlns="http://schemas.microsoft.com/windows/2004/02/mit/task">.. <RegistrationInfo>.. <Date>2014-10-25T14:27:44.8929027</Date>.. <Author>computer\user</Author>.. </RegistrationInfo>.. <Triggers>.. <LogonTrigger>.. <Enabled>true</Enabled>.. <UserId>computer\user</UserId>.. </LogonTrigger>.. <RegistrationTrigger>.. <Enabled>false</Enabled>.. </RegistrationTrigger>.. </Triggers>.. <Principals>.. <Principal id="Author">.. <UserId>computer\user</UserId>.. <LogonType>InteractiveToken</LogonType>.. <RunLevel>LeastPrivilege</RunLevel>.. </Principal>.. </Principals>.. <Settings>.. <MultipleInstancesPolicy>StopExisting</MultipleInstancesPolicy>.. <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>.. <StopIfGoingOnBatteries>true</StopIfGoingOnBatteries>.. <AllowHardTerminate>false</AllowHardTerminate>.. <StartWhenAvail
                                                                                                                    Process:C:\Users\user\AppData\Roaming\cnWCiicEpxW.exe
                                                                                                                    File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                                                                                                    Category:dropped
                                                                                                                    Size (bytes):1656
                                                                                                                    Entropy (8bit):5.156182356770437
                                                                                                                    Encrypted:false
                                                                                                                    SSDEEP:24:2dH4+SEqC/S7h2ulNMFp2O/rlMhEMjnGpwjpIgUYODOLD9RJh7h8gKB3sUtn:cbha7JlNQV/rydbz9I3YODOLNdq3T
                                                                                                                    MD5:D452BE05EEC71DF72B608581ADB5DCC8
                                                                                                                    SHA1:36F9E125299B3DC5751091A6F91B9183E587229F
                                                                                                                    SHA-256:5646F4B081F4451AA51F15E1F1803831B170AD7251DB920F06E75269658C0466
                                                                                                                    SHA-512:41CE620A09EF983B7C42579864BF781B1543B71F11A184C3D0127AD099EE0EE6B0D523B441C6CB2E5E4A56966836E8730A591D3D830F54B57F0F580B5798D774
                                                                                                                    Malicious:false
                                                                                                                    Preview:<?xml version="1.0" encoding="UTF-16"?>..<Task version="1.2" xmlns="http://schemas.microsoft.com/windows/2004/02/mit/task">.. <RegistrationInfo>.. <Date>2014-10-25T14:27:44.8929027</Date>.. <Author>computer\user</Author>.. </RegistrationInfo>.. <Triggers>.. <LogonTrigger>.. <Enabled>true</Enabled>.. <UserId>computer\user</UserId>.. </LogonTrigger>.. <RegistrationTrigger>.. <Enabled>false</Enabled>.. </RegistrationTrigger>.. </Triggers>.. <Principals>.. <Principal id="Author">.. <UserId>computer\user</UserId>.. <LogonType>InteractiveToken</LogonType>.. <RunLevel>LeastPrivilege</RunLevel>.. </Principal>.. </Principals>.. <Settings>.. <MultipleInstancesPolicy>StopExisting</MultipleInstancesPolicy>.. <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>.. <StopIfGoingOnBatteries>true</StopIfGoingOnBatteries>.. <AllowHardTerminate>false</AllowHardTerminate>.. <StartWhenAvail
                                                                                                                    Process:C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exe
                                                                                                                    File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                    Category:dropped
                                                                                                                    Size (bytes):896000
                                                                                                                    Entropy (8bit):7.5003924727258
                                                                                                                    Encrypted:false
                                                                                                                    SSDEEP:12288:xcn1uQarFr5cE8LHWzVDLIKnnaYz4gIc+zuWl9wzV9av/SEdRMA/LyVu6gt0IPP:xYDvL6+Kn7ZciImV9an9/L1t0In
                                                                                                                    MD5:12DC06D3034A17BE7A70A4AA45EDCE8D
                                                                                                                    SHA1:9B68AE25498A12F19360DC0DC023AF61CA9BFA9D
                                                                                                                    SHA-256:91826EFE412B5C829801D1C52FBB43225CF1F0FC4CBA201453AD877341C64B90
                                                                                                                    SHA-512:49E50AFDE47577D004322820A4F37DE2DF21968751D863F312D4653934187C4F42E4AC8EEAA43F67CB73EF10A35F14E3CDEC4F710116ACAF52114007EFD6C4A1
                                                                                                                    Malicious:true
                                                                                                                    Antivirus:
                                                                                                                    • Antivirus: Joe Sandbox ML, Detection: 100%
                                                                                                                    • Antivirus: ReversingLabs, Detection: 32%
                                                                                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...Iz.c..............P.................. ........@.. ....................... ............@.....................................K...................................R................................................ ............... ..H............text........ ...................... ..`.rsrc...............................@..@.reloc..............................@..B........................H.......X..............................................................Z(....8.....(....8....*.&~.......*...~....*.b(....8......(....8.....*...&~.......*...~....*..0..~.......8?.......E........8....s.........8I...s.........8....s.........8....(....8....*s......... .....9....& ....8....s.........8.......0..$.......8....8....8.....~....o......8......*.0..$.......8......*8....8.....~....o......8.....0..$.......8....8....8......*.~....o......8.....0...........~....o......8....8.
                                                                                                                    File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                    Entropy (8bit):7.5003924727258
                                                                                                                    TrID:
                                                                                                                    • Win32 Executable (generic) Net Framework (10011505/4) 49.80%
                                                                                                                    • Win32 Executable (generic) a (10002005/4) 49.75%
                                                                                                                    • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                                                                                                                    • Windows Screen Saver (13104/52) 0.07%
                                                                                                                    • Generic Win/DOS Executable (2004/3) 0.01%
                                                                                                                    File name:SHIPMENT DOCUMENTS.exe
                                                                                                                    File size:896000
                                                                                                                    MD5:12dc06d3034a17be7a70a4aa45edce8d
                                                                                                                    SHA1:9b68ae25498a12f19360dc0dc023af61ca9bfa9d
                                                                                                                    SHA256:91826efe412b5c829801d1c52fbb43225cf1f0fc4cba201453ad877341c64b90
                                                                                                                    SHA512:49e50afde47577d004322820a4f37de2df21968751d863f312d4653934187c4f42e4ac8eeaa43f67cb73ef10a35f14e3cdec4f710116acaf52114007efd6c4a1
                                                                                                                    SSDEEP:12288:xcn1uQarFr5cE8LHWzVDLIKnnaYz4gIc+zuWl9wzV9av/SEdRMA/LyVu6gt0IPP:xYDvL6+Kn7ZciImV9an9/L1t0In
                                                                                                                    TLSH:CA158D5232728873F5CF0135949535CC6EBCA543A6A6E2076FB7368056027BFFAACE41
                                                                                                                    File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...Iz.c..............P.................. ........@.. ....................... ............@................................
                                                                                                                    Icon Hash:00828e8e8686b000
                                                                                                                    Entrypoint:0x4dc0ee
                                                                                                                    Entrypoint Section:.text
                                                                                                                    Digitally signed:false
                                                                                                                    Imagebase:0x400000
                                                                                                                    Subsystem:windows gui
                                                                                                                    Image File Characteristics:EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
                                                                                                                    DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                                                                                                                    Time Stamp:0x63857A49 [Tue Nov 29 03:19:37 2022 UTC]
                                                                                                                    TLS Callbacks:
                                                                                                                    CLR (.Net) Version:
                                                                                                                    OS Version Major:4
                                                                                                                    OS Version Minor:0
                                                                                                                    File Version Major:4
                                                                                                                    File Version Minor:0
                                                                                                                    Subsystem Version Major:4
                                                                                                                    Subsystem Version Minor:0
                                                                                                                    Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
                                                                                                                    Instruction
                                                                                                                    jmp dword ptr [00402000h]
                                                                                                                    add byte ptr [eax], al
                                                                                                                    add byte ptr [eax], al
                                                                                                                    add byte ptr [eax], al
                                                                                                                    add byte ptr [eax], al
                                                                                                                    add byte ptr [eax], al
                                                                                                                    add byte ptr [eax], al
                                                                                                                    add byte ptr [eax], al
                                                                                                                    add byte ptr [eax], al
                                                                                                                    add byte ptr [eax], al
                                                                                                                    add byte ptr [eax], al
                                                                                                                    add byte ptr [eax], al
                                                                                                                    add byte ptr [eax], al
                                                                                                                    add byte ptr [eax], al
                                                                                                                    add byte ptr [eax], al
                                                                                                                    add byte ptr [eax], al
                                                                                                                    add byte ptr [eax], al
                                                                                                                    add byte ptr [eax], al
                                                                                                                    add byte ptr [eax], al
                                                                                                                    add byte ptr [eax], al
                                                                                                                    add byte ptr [eax], al
                                                                                                                    add byte ptr [eax], al
                                                                                                                    add byte ptr [eax], al
                                                                                                                    add byte ptr [eax], al
                                                                                                                    add byte ptr [eax], al
                                                                                                                    add byte ptr [eax], al
                                                                                                                    add byte ptr [eax], al
                                                                                                                    add byte ptr [eax], al
                                                                                                                    add byte ptr [eax], al
                                                                                                                    add byte ptr [eax], al
                                                                                                                    add byte ptr [eax], al
                                                                                                                    add byte ptr [eax], al
                                                                                                                    add byte ptr [eax], al
                                                                                                                    add byte ptr [eax], al
                                                                                                                    add byte ptr [eax], al
                                                                                                                    add byte ptr [eax], al
                                                                                                                    add byte ptr [eax], al
                                                                                                                    add byte ptr [eax], al
                                                                                                                    add byte ptr [eax], al
                                                                                                                    add byte ptr [eax], al
                                                                                                                    add byte ptr [eax], al
                                                                                                                    add byte ptr [eax], al
                                                                                                                    add byte ptr [eax], al
                                                                                                                    add byte ptr [eax], al
                                                                                                                    add byte ptr [eax], al
                                                                                                                    add byte ptr [eax], al
                                                                                                                    add byte ptr [eax], al
                                                                                                                    add byte ptr [eax], al
                                                                                                                    add byte ptr [eax], al
                                                                                                                    add byte ptr [eax], al
                                                                                                                    add byte ptr [eax], al
                                                                                                                    add byte ptr [eax], al
                                                                                                                    add byte ptr [eax], al
                                                                                                                    add byte ptr [eax], al
                                                                                                                    add byte ptr [eax], al
                                                                                                                    add byte ptr [eax], al
                                                                                                                    add byte ptr [eax], al
                                                                                                                    add byte ptr [eax], al
                                                                                                                    add byte ptr [eax], al
                                                                                                                    add byte ptr [eax], al
                                                                                                                    add byte ptr [eax], al
                                                                                                                    add byte ptr [eax], al
                                                                                                                    add byte ptr [eax], al
                                                                                                                    add byte ptr [eax], al
                                                                                                                    add byte ptr [eax], al
                                                                                                                    add byte ptr [eax], al
                                                                                                                    add byte ptr [eax], al
                                                                                                                    add byte ptr [eax], al
                                                                                                                    add byte ptr [eax], al
                                                                                                                    add byte ptr [eax], al
                                                                                                                    add byte ptr [eax], al
                                                                                                                    add byte ptr [eax], al
                                                                                                                    add byte ptr [eax], al
                                                                                                                    add byte ptr [eax], al
                                                                                                                    add byte ptr [eax], al
                                                                                                                    add byte ptr [eax], al
                                                                                                                    add byte ptr [eax], al
                                                                                                                    add byte ptr [eax], al
                                                                                                                    add byte ptr [eax], al
                                                                                                                    add byte ptr [eax], al
                                                                                                                    add byte ptr [eax], al
                                                                                                                    add byte ptr [eax], al
                                                                                                                    add byte ptr [eax], al
                                                                                                                    add byte ptr [eax], al
                                                                                                                    add byte ptr [eax], al
                                                                                                                    add byte ptr [eax], al
                                                                                                                    add byte ptr [eax], al
                                                                                                                    add byte ptr [eax], al
                                                                                                                    add byte ptr [eax], al
                                                                                                                    add byte ptr [eax], al
                                                                                                                    add byte ptr [eax], al
                                                                                                                    add byte ptr [eax], al
                                                                                                                    add byte ptr [eax], al
                                                                                                                    add byte ptr [eax], al
                                                                                                                    add byte ptr [eax], al
                                                                                                                    add byte ptr [eax], al
                                                                                                                    add byte ptr [eax], al
                                                                                                                    add byte ptr [eax], al
                                                                                                                    NameVirtual AddressVirtual Size Is in Section
                                                                                                                    IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                                                                                    IMAGE_DIRECTORY_ENTRY_IMPORT0xdc0a00x4b.text
                                                                                                                    IMAGE_DIRECTORY_ENTRY_RESOURCE0xde0000x5c8.rsrc
                                                                                                                    IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                                                                                    IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                                                                                    IMAGE_DIRECTORY_ENTRY_BASERELOC0xe00000xc.reloc
                                                                                                                    IMAGE_DIRECTORY_ENTRY_DEBUG0xdc0520x1c.text
                                                                                                                    IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                                                                                    IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                                                                                    IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                                                                                    IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                                                                                    IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                                                                                    IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                                                                                                                    IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                                                                                    IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                                                                                                                    IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                                                                                    NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                                                                                    .text0x20000xda0f40xda200False0.7780544860315186data7.505864996836325IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                                                                                    .rsrc0xde0000x5c80x600False0.4303385416666667data4.156459778607487IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                                                                    .reloc0xe00000xc0x200False0.044921875data0.10191042566270775IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                                                                                                    NameRVASizeTypeLanguageCountry
                                                                                                                    RT_VERSION0xde0a00x33cdata
                                                                                                                    RT_MANIFEST0xde3dc0x1eaXML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
                                                                                                                    DLLImport
                                                                                                                    mscoree.dll_CorExeMain
                                                                                                                    TimestampSource PortDest PortSource IPDest IP
                                                                                                                    Nov 29, 2022 16:43:51.102545977 CET49713443192.168.2.652.20.78.240
                                                                                                                    Nov 29, 2022 16:43:51.102605104 CET4434971352.20.78.240192.168.2.6
                                                                                                                    Nov 29, 2022 16:43:51.102689981 CET49713443192.168.2.652.20.78.240
                                                                                                                    Nov 29, 2022 16:43:51.206545115 CET49713443192.168.2.652.20.78.240
                                                                                                                    Nov 29, 2022 16:43:51.206588984 CET4434971352.20.78.240192.168.2.6
                                                                                                                    Nov 29, 2022 16:43:51.515335083 CET4434971352.20.78.240192.168.2.6
                                                                                                                    Nov 29, 2022 16:43:51.515436888 CET49713443192.168.2.652.20.78.240
                                                                                                                    Nov 29, 2022 16:43:51.518362045 CET49713443192.168.2.652.20.78.240
                                                                                                                    Nov 29, 2022 16:43:51.518392086 CET4434971352.20.78.240192.168.2.6
                                                                                                                    Nov 29, 2022 16:43:51.518759966 CET4434971352.20.78.240192.168.2.6
                                                                                                                    Nov 29, 2022 16:43:51.679316998 CET49713443192.168.2.652.20.78.240
                                                                                                                    Nov 29, 2022 16:43:52.707773924 CET49713443192.168.2.652.20.78.240
                                                                                                                    Nov 29, 2022 16:43:52.707817078 CET4434971352.20.78.240192.168.2.6
                                                                                                                    Nov 29, 2022 16:44:00.619170904 CET49713443192.168.2.652.20.78.240
                                                                                                                    Nov 29, 2022 16:44:00.619304895 CET4434971352.20.78.240192.168.2.6
                                                                                                                    Nov 29, 2022 16:44:00.619389057 CET49713443192.168.2.652.20.78.240
                                                                                                                    Nov 29, 2022 16:44:20.968451977 CET49721587192.168.2.6199.79.62.12
                                                                                                                    Nov 29, 2022 16:44:21.135443926 CET58749721199.79.62.12192.168.2.6
                                                                                                                    Nov 29, 2022 16:44:21.135611057 CET49721587192.168.2.6199.79.62.12
                                                                                                                    Nov 29, 2022 16:44:21.397145033 CET58749721199.79.62.12192.168.2.6
                                                                                                                    Nov 29, 2022 16:44:21.397443056 CET49721587192.168.2.6199.79.62.12
                                                                                                                    Nov 29, 2022 16:44:21.564626932 CET58749721199.79.62.12192.168.2.6
                                                                                                                    Nov 29, 2022 16:44:21.565397024 CET49721587192.168.2.6199.79.62.12
                                                                                                                    Nov 29, 2022 16:44:21.735054016 CET58749721199.79.62.12192.168.2.6
                                                                                                                    Nov 29, 2022 16:44:21.735600948 CET49721587192.168.2.6199.79.62.12
                                                                                                                    Nov 29, 2022 16:44:21.908711910 CET58749721199.79.62.12192.168.2.6
                                                                                                                    Nov 29, 2022 16:44:21.908756018 CET58749721199.79.62.12192.168.2.6
                                                                                                                    Nov 29, 2022 16:44:21.908780098 CET58749721199.79.62.12192.168.2.6
                                                                                                                    Nov 29, 2022 16:44:21.908802986 CET58749721199.79.62.12192.168.2.6
                                                                                                                    Nov 29, 2022 16:44:21.908874989 CET49721587192.168.2.6199.79.62.12
                                                                                                                    Nov 29, 2022 16:44:21.910600901 CET58749721199.79.62.12192.168.2.6
                                                                                                                    Nov 29, 2022 16:44:21.950762033 CET49721587192.168.2.6199.79.62.12
                                                                                                                    Nov 29, 2022 16:44:22.117940903 CET58749721199.79.62.12192.168.2.6
                                                                                                                    Nov 29, 2022 16:44:22.270884991 CET49721587192.168.2.6199.79.62.12
                                                                                                                    Nov 29, 2022 16:44:29.999057055 CET49721587192.168.2.6199.79.62.12
                                                                                                                    Nov 29, 2022 16:44:30.165992975 CET58749721199.79.62.12192.168.2.6
                                                                                                                    Nov 29, 2022 16:44:30.167831898 CET49721587192.168.2.6199.79.62.12
                                                                                                                    Nov 29, 2022 16:44:30.335340977 CET58749721199.79.62.12192.168.2.6
                                                                                                                    Nov 29, 2022 16:44:30.361396074 CET49721587192.168.2.6199.79.62.12
                                                                                                                    Nov 29, 2022 16:44:30.568722963 CET58749721199.79.62.12192.168.2.6
                                                                                                                    Nov 29, 2022 16:44:30.607850075 CET58749721199.79.62.12192.168.2.6
                                                                                                                    Nov 29, 2022 16:44:30.616848946 CET49721587192.168.2.6199.79.62.12
                                                                                                                    Nov 29, 2022 16:44:30.783982038 CET58749721199.79.62.12192.168.2.6
                                                                                                                    Nov 29, 2022 16:44:30.784010887 CET58749721199.79.62.12192.168.2.6
                                                                                                                    Nov 29, 2022 16:44:30.784365892 CET49721587192.168.2.6199.79.62.12
                                                                                                                    Nov 29, 2022 16:44:30.982860088 CET58749721199.79.62.12192.168.2.6
                                                                                                                    Nov 29, 2022 16:44:30.986498117 CET49721587192.168.2.6199.79.62.12
                                                                                                                    Nov 29, 2022 16:44:31.154088974 CET58749721199.79.62.12192.168.2.6
                                                                                                                    Nov 29, 2022 16:44:31.157778978 CET49721587192.168.2.6199.79.62.12
                                                                                                                    Nov 29, 2022 16:44:31.158020020 CET49721587192.168.2.6199.79.62.12
                                                                                                                    Nov 29, 2022 16:44:31.159809113 CET49721587192.168.2.6199.79.62.12
                                                                                                                    Nov 29, 2022 16:44:31.159926891 CET49721587192.168.2.6199.79.62.12
                                                                                                                    Nov 29, 2022 16:44:31.324496031 CET58749721199.79.62.12192.168.2.6
                                                                                                                    Nov 29, 2022 16:44:31.324537992 CET58749721199.79.62.12192.168.2.6
                                                                                                                    Nov 29, 2022 16:44:31.326929092 CET58749721199.79.62.12192.168.2.6
                                                                                                                    Nov 29, 2022 16:44:31.326965094 CET58749721199.79.62.12192.168.2.6
                                                                                                                    Nov 29, 2022 16:44:31.327480078 CET58749721199.79.62.12192.168.2.6
                                                                                                                    Nov 29, 2022 16:44:31.459182024 CET49721587192.168.2.6199.79.62.12
                                                                                                                    Nov 29, 2022 16:44:42.362598896 CET49738443192.168.2.63.232.242.170
                                                                                                                    Nov 29, 2022 16:44:42.362658024 CET443497383.232.242.170192.168.2.6
                                                                                                                    Nov 29, 2022 16:44:42.362791061 CET49738443192.168.2.63.232.242.170
                                                                                                                    Nov 29, 2022 16:44:42.394437075 CET49738443192.168.2.63.232.242.170
                                                                                                                    Nov 29, 2022 16:44:42.394474030 CET443497383.232.242.170192.168.2.6
                                                                                                                    Nov 29, 2022 16:44:42.694560051 CET443497383.232.242.170192.168.2.6
                                                                                                                    Nov 29, 2022 16:44:42.694652081 CET49738443192.168.2.63.232.242.170
                                                                                                                    Nov 29, 2022 16:44:42.708673954 CET49738443192.168.2.63.232.242.170
                                                                                                                    Nov 29, 2022 16:44:42.708719969 CET443497383.232.242.170192.168.2.6
                                                                                                                    Nov 29, 2022 16:44:42.709182978 CET443497383.232.242.170192.168.2.6
                                                                                                                    Nov 29, 2022 16:44:42.788177967 CET49738443192.168.2.63.232.242.170
                                                                                                                    Nov 29, 2022 16:44:43.747045040 CET49738443192.168.2.63.232.242.170
                                                                                                                    Nov 29, 2022 16:44:43.747087955 CET443497383.232.242.170192.168.2.6
                                                                                                                    Nov 29, 2022 16:44:43.893496990 CET443497383.232.242.170192.168.2.6
                                                                                                                    Nov 29, 2022 16:44:43.893613100 CET443497383.232.242.170192.168.2.6
                                                                                                                    Nov 29, 2022 16:44:43.895062923 CET49738443192.168.2.63.232.242.170
                                                                                                                    Nov 29, 2022 16:44:43.912725925 CET49738443192.168.2.63.232.242.170
                                                                                                                    Nov 29, 2022 16:45:10.773142099 CET49743587192.168.2.6199.79.62.12
                                                                                                                    Nov 29, 2022 16:45:10.940119028 CET58749743199.79.62.12192.168.2.6
                                                                                                                    Nov 29, 2022 16:45:10.940232038 CET49743587192.168.2.6199.79.62.12
                                                                                                                    Nov 29, 2022 16:45:11.515913010 CET58749743199.79.62.12192.168.2.6
                                                                                                                    Nov 29, 2022 16:45:11.549631119 CET49743587192.168.2.6199.79.62.12
                                                                                                                    Nov 29, 2022 16:45:11.717298031 CET58749743199.79.62.12192.168.2.6
                                                                                                                    Nov 29, 2022 16:45:11.721335888 CET49743587192.168.2.6199.79.62.12
                                                                                                                    Nov 29, 2022 16:45:11.889170885 CET58749743199.79.62.12192.168.2.6
                                                                                                                    Nov 29, 2022 16:45:11.893830061 CET49743587192.168.2.6199.79.62.12
                                                                                                                    Nov 29, 2022 16:45:12.065943956 CET58749743199.79.62.12192.168.2.6
                                                                                                                    Nov 29, 2022 16:45:12.066029072 CET58749743199.79.62.12192.168.2.6
                                                                                                                    Nov 29, 2022 16:45:12.066091061 CET58749743199.79.62.12192.168.2.6
                                                                                                                    Nov 29, 2022 16:45:12.066140890 CET58749743199.79.62.12192.168.2.6
                                                                                                                    Nov 29, 2022 16:45:12.066225052 CET49743587192.168.2.6199.79.62.12
                                                                                                                    Nov 29, 2022 16:45:12.066225052 CET49743587192.168.2.6199.79.62.12
                                                                                                                    Nov 29, 2022 16:45:12.067401886 CET58749743199.79.62.12192.168.2.6
                                                                                                                    Nov 29, 2022 16:45:12.089962959 CET49743587192.168.2.6199.79.62.12
                                                                                                                    Nov 29, 2022 16:45:12.257469893 CET58749743199.79.62.12192.168.2.6
                                                                                                                    Nov 29, 2022 16:45:12.366664886 CET49743587192.168.2.6199.79.62.12
                                                                                                                    Nov 29, 2022 16:45:12.534174919 CET58749743199.79.62.12192.168.2.6
                                                                                                                    Nov 29, 2022 16:45:12.539052010 CET49743587192.168.2.6199.79.62.12
                                                                                                                    Nov 29, 2022 16:45:12.706226110 CET58749743199.79.62.12192.168.2.6
                                                                                                                    Nov 29, 2022 16:45:12.706975937 CET49743587192.168.2.6199.79.62.12
                                                                                                                    Nov 29, 2022 16:45:12.914741039 CET58749743199.79.62.12192.168.2.6
                                                                                                                    Nov 29, 2022 16:45:12.955040932 CET58749743199.79.62.12192.168.2.6
                                                                                                                    Nov 29, 2022 16:45:12.985424995 CET49743587192.168.2.6199.79.62.12
                                                                                                                    Nov 29, 2022 16:45:13.152090073 CET58749743199.79.62.12192.168.2.6
                                                                                                                    Nov 29, 2022 16:45:13.152129889 CET58749743199.79.62.12192.168.2.6
                                                                                                                    Nov 29, 2022 16:45:13.153331041 CET49743587192.168.2.6199.79.62.12
                                                                                                                    Nov 29, 2022 16:45:13.342997074 CET58749743199.79.62.12192.168.2.6
                                                                                                                    Nov 29, 2022 16:45:13.346018076 CET49743587192.168.2.6199.79.62.12
                                                                                                                    Nov 29, 2022 16:45:13.513304949 CET58749743199.79.62.12192.168.2.6
                                                                                                                    Nov 29, 2022 16:45:13.528157949 CET49743587192.168.2.6199.79.62.12
                                                                                                                    Nov 29, 2022 16:45:13.528275013 CET49743587192.168.2.6199.79.62.12
                                                                                                                    Nov 29, 2022 16:45:13.528346062 CET49743587192.168.2.6199.79.62.12
                                                                                                                    Nov 29, 2022 16:45:13.528419018 CET49743587192.168.2.6199.79.62.12
                                                                                                                    Nov 29, 2022 16:45:13.695103884 CET58749743199.79.62.12192.168.2.6
                                                                                                                    Nov 29, 2022 16:45:13.695188999 CET58749743199.79.62.12192.168.2.6
                                                                                                                    Nov 29, 2022 16:45:13.695662975 CET58749743199.79.62.12192.168.2.6
                                                                                                                    Nov 29, 2022 16:45:13.775168896 CET49743587192.168.2.6199.79.62.12
                                                                                                                    TimestampSource PortDest PortSource IPDest IP
                                                                                                                    Nov 29, 2022 16:43:50.994033098 CET5859553192.168.2.68.8.8.8
                                                                                                                    Nov 29, 2022 16:43:51.012947083 CET53585958.8.8.8192.168.2.6
                                                                                                                    Nov 29, 2022 16:43:51.037520885 CET5633153192.168.2.68.8.8.8
                                                                                                                    Nov 29, 2022 16:43:51.056447029 CET53563318.8.8.8192.168.2.6
                                                                                                                    Nov 29, 2022 16:44:20.796726942 CET5950453192.168.2.68.8.8.8
                                                                                                                    Nov 29, 2022 16:44:20.967142105 CET53595048.8.8.8192.168.2.6
                                                                                                                    Nov 29, 2022 16:44:42.209783077 CET6322953192.168.2.68.8.8.8
                                                                                                                    Nov 29, 2022 16:44:42.226728916 CET53632298.8.8.8192.168.2.6
                                                                                                                    Nov 29, 2022 16:44:42.301785946 CET6253853192.168.2.68.8.8.8
                                                                                                                    Nov 29, 2022 16:44:42.320725918 CET53625388.8.8.8192.168.2.6
                                                                                                                    Nov 29, 2022 16:45:10.583590984 CET5490353192.168.2.68.8.8.8
                                                                                                                    Nov 29, 2022 16:45:10.742371082 CET53549038.8.8.8192.168.2.6
                                                                                                                    TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                                                                                    Nov 29, 2022 16:43:50.994033098 CET192.168.2.68.8.8.80x4c8dStandard query (0)api.ipify.orgA (IP address)IN (0x0001)false
                                                                                                                    Nov 29, 2022 16:43:51.037520885 CET192.168.2.68.8.8.80x6b43Standard query (0)api.ipify.orgA (IP address)IN (0x0001)false
                                                                                                                    Nov 29, 2022 16:44:20.796726942 CET192.168.2.68.8.8.80xde78Standard query (0)mail.southernboilers.orgA (IP address)IN (0x0001)false
                                                                                                                    Nov 29, 2022 16:44:42.209783077 CET192.168.2.68.8.8.80x8455Standard query (0)api.ipify.orgA (IP address)IN (0x0001)false
                                                                                                                    Nov 29, 2022 16:44:42.301785946 CET192.168.2.68.8.8.80x5a80Standard query (0)api.ipify.orgA (IP address)IN (0x0001)false
                                                                                                                    Nov 29, 2022 16:45:10.583590984 CET192.168.2.68.8.8.80x4af5Standard query (0)mail.southernboilers.orgA (IP address)IN (0x0001)false
                                                                                                                    TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                                                                                    Nov 29, 2022 16:43:51.012947083 CET8.8.8.8192.168.2.60x4c8dNo error (0)api.ipify.orgapi.ipify.org.herokudns.comCNAME (Canonical name)IN (0x0001)false
                                                                                                                    Nov 29, 2022 16:43:51.012947083 CET8.8.8.8192.168.2.60x4c8dNo error (0)api.ipify.org.herokudns.com52.20.78.240A (IP address)IN (0x0001)false
                                                                                                                    Nov 29, 2022 16:43:51.012947083 CET8.8.8.8192.168.2.60x4c8dNo error (0)api.ipify.org.herokudns.com3.220.57.224A (IP address)IN (0x0001)false
                                                                                                                    Nov 29, 2022 16:43:51.012947083 CET8.8.8.8192.168.2.60x4c8dNo error (0)api.ipify.org.herokudns.com3.232.242.170A (IP address)IN (0x0001)false
                                                                                                                    Nov 29, 2022 16:43:51.012947083 CET8.8.8.8192.168.2.60x4c8dNo error (0)api.ipify.org.herokudns.com54.91.59.199A (IP address)IN (0x0001)false
                                                                                                                    Nov 29, 2022 16:43:51.056447029 CET8.8.8.8192.168.2.60x6b43No error (0)api.ipify.orgapi.ipify.org.herokudns.comCNAME (Canonical name)IN (0x0001)false
                                                                                                                    Nov 29, 2022 16:43:51.056447029 CET8.8.8.8192.168.2.60x6b43No error (0)api.ipify.org.herokudns.com3.220.57.224A (IP address)IN (0x0001)false
                                                                                                                    Nov 29, 2022 16:43:51.056447029 CET8.8.8.8192.168.2.60x6b43No error (0)api.ipify.org.herokudns.com54.91.59.199A (IP address)IN (0x0001)false
                                                                                                                    Nov 29, 2022 16:43:51.056447029 CET8.8.8.8192.168.2.60x6b43No error (0)api.ipify.org.herokudns.com52.20.78.240A (IP address)IN (0x0001)false
                                                                                                                    Nov 29, 2022 16:43:51.056447029 CET8.8.8.8192.168.2.60x6b43No error (0)api.ipify.org.herokudns.com3.232.242.170A (IP address)IN (0x0001)false
                                                                                                                    Nov 29, 2022 16:44:01.656429052 CET8.8.8.8192.168.2.60xb330No error (0)windowsupdatebg.s.llnwi.net178.79.242.0A (IP address)IN (0x0001)false
                                                                                                                    Nov 29, 2022 16:44:01.656429052 CET8.8.8.8192.168.2.60xb330No error (0)windowsupdatebg.s.llnwi.net95.140.236.0A (IP address)IN (0x0001)false
                                                                                                                    Nov 29, 2022 16:44:20.967142105 CET8.8.8.8192.168.2.60xde78No error (0)mail.southernboilers.org199.79.62.12A (IP address)IN (0x0001)false
                                                                                                                    Nov 29, 2022 16:44:23.143907070 CET8.8.8.8192.168.2.60x7b4eNo error (0)windowsupdatebg.s.llnwi.net178.79.242.0A (IP address)IN (0x0001)false
                                                                                                                    Nov 29, 2022 16:44:23.143907070 CET8.8.8.8192.168.2.60x7b4eNo error (0)windowsupdatebg.s.llnwi.net178.79.242.128A (IP address)IN (0x0001)false
                                                                                                                    Nov 29, 2022 16:44:42.226728916 CET8.8.8.8192.168.2.60x8455No error (0)api.ipify.orgapi.ipify.org.herokudns.comCNAME (Canonical name)IN (0x0001)false
                                                                                                                    Nov 29, 2022 16:44:42.226728916 CET8.8.8.8192.168.2.60x8455No error (0)api.ipify.org.herokudns.com3.232.242.170A (IP address)IN (0x0001)false
                                                                                                                    Nov 29, 2022 16:44:42.226728916 CET8.8.8.8192.168.2.60x8455No error (0)api.ipify.org.herokudns.com54.91.59.199A (IP address)IN (0x0001)false
                                                                                                                    Nov 29, 2022 16:44:42.226728916 CET8.8.8.8192.168.2.60x8455No error (0)api.ipify.org.herokudns.com52.20.78.240A (IP address)IN (0x0001)false
                                                                                                                    Nov 29, 2022 16:44:42.226728916 CET8.8.8.8192.168.2.60x8455No error (0)api.ipify.org.herokudns.com3.220.57.224A (IP address)IN (0x0001)false
                                                                                                                    Nov 29, 2022 16:44:42.320725918 CET8.8.8.8192.168.2.60x5a80No error (0)api.ipify.orgapi.ipify.org.herokudns.comCNAME (Canonical name)IN (0x0001)false
                                                                                                                    Nov 29, 2022 16:44:42.320725918 CET8.8.8.8192.168.2.60x5a80No error (0)api.ipify.org.herokudns.com3.232.242.170A (IP address)IN (0x0001)false
                                                                                                                    Nov 29, 2022 16:44:42.320725918 CET8.8.8.8192.168.2.60x5a80No error (0)api.ipify.org.herokudns.com54.91.59.199A (IP address)IN (0x0001)false
                                                                                                                    Nov 29, 2022 16:44:42.320725918 CET8.8.8.8192.168.2.60x5a80No error (0)api.ipify.org.herokudns.com52.20.78.240A (IP address)IN (0x0001)false
                                                                                                                    Nov 29, 2022 16:44:42.320725918 CET8.8.8.8192.168.2.60x5a80No error (0)api.ipify.org.herokudns.com3.220.57.224A (IP address)IN (0x0001)false
                                                                                                                    Nov 29, 2022 16:45:10.742371082 CET8.8.8.8192.168.2.60x4af5No error (0)mail.southernboilers.org199.79.62.12A (IP address)IN (0x0001)false
                                                                                                                    • api.ipify.org
                                                                                                                    Session IDSource IPSource PortDestination IPDestination PortProcess
                                                                                                                    0192.168.2.64971352.20.78.240443C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exe
                                                                                                                    TimestampkBytes transferredDirectionData
                                                                                                                    2022-11-29 15:43:52 UTC0OUTGET / HTTP/1.1
                                                                                                                    User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:80.0) Gecko/20100101 Firefox/80.0
                                                                                                                    Host: api.ipify.org
                                                                                                                    Connection: Keep-Alive


                                                                                                                    Session IDSource IPSource PortDestination IPDestination PortProcess
                                                                                                                    1192.168.2.6497383.232.242.170443C:\Users\user\AppData\Roaming\cnWCiicEpxW.exe
                                                                                                                    TimestampkBytes transferredDirectionData
                                                                                                                    2022-11-29 15:44:43 UTC0OUTGET / HTTP/1.1
                                                                                                                    User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:80.0) Gecko/20100101 Firefox/80.0
                                                                                                                    Host: api.ipify.org
                                                                                                                    Connection: Keep-Alive
                                                                                                                    2022-11-29 15:44:43 UTC0INHTTP/1.1 200 OK
                                                                                                                    Server: Cowboy
                                                                                                                    Connection: close
                                                                                                                    Content-Type: text/plain
                                                                                                                    Vary: Origin
                                                                                                                    Date: Tue, 29 Nov 2022 15:44:43 GMT
                                                                                                                    Content-Length: 14
                                                                                                                    Via: 1.1 vegur
                                                                                                                    2022-11-29 15:44:43 UTC0INData Raw: 31 30 32 2e 31 32 39 2e 31 34 33 2e 34 39
                                                                                                                    Data Ascii: 102.129.143.49


                                                                                                                    TimestampSource PortDest PortSource IPDest IPCommands
                                                                                                                    Nov 29, 2022 16:44:21.397145033 CET58749721199.79.62.12192.168.2.6220-md-33.webhostbox.net ESMTP Exim 4.95 #2 Tue, 29 Nov 2022 15:44:21 +0000
                                                                                                                    220-We do not authorize the use of this system to transport unsolicited,
                                                                                                                    220 and/or bulk e-mail.
                                                                                                                    Nov 29, 2022 16:44:21.397443056 CET49721587192.168.2.6199.79.62.12EHLO 942247
                                                                                                                    Nov 29, 2022 16:44:21.564626932 CET58749721199.79.62.12192.168.2.6250-md-33.webhostbox.net Hello 942247 [102.129.143.49]
                                                                                                                    250-SIZE 52428800
                                                                                                                    250-8BITMIME
                                                                                                                    250-PIPELINING
                                                                                                                    250-PIPE_CONNECT
                                                                                                                    250-AUTH PLAIN LOGIN
                                                                                                                    250-STARTTLS
                                                                                                                    250 HELP
                                                                                                                    Nov 29, 2022 16:44:21.565397024 CET49721587192.168.2.6199.79.62.12STARTTLS
                                                                                                                    Nov 29, 2022 16:44:21.735054016 CET58749721199.79.62.12192.168.2.6220 TLS go ahead
                                                                                                                    Nov 29, 2022 16:45:11.515913010 CET58749743199.79.62.12192.168.2.6220-md-33.webhostbox.net ESMTP Exim 4.95 #2 Tue, 29 Nov 2022 15:45:11 +0000
                                                                                                                    220-We do not authorize the use of this system to transport unsolicited,
                                                                                                                    220 and/or bulk e-mail.
                                                                                                                    Nov 29, 2022 16:45:11.549631119 CET49743587192.168.2.6199.79.62.12EHLO 942247
                                                                                                                    Nov 29, 2022 16:45:11.717298031 CET58749743199.79.62.12192.168.2.6250-md-33.webhostbox.net Hello 942247 [102.129.143.49]
                                                                                                                    250-SIZE 52428800
                                                                                                                    250-8BITMIME
                                                                                                                    250-PIPELINING
                                                                                                                    250-PIPE_CONNECT
                                                                                                                    250-AUTH PLAIN LOGIN
                                                                                                                    250-STARTTLS
                                                                                                                    250 HELP
                                                                                                                    Nov 29, 2022 16:45:11.721335888 CET49743587192.168.2.6199.79.62.12STARTTLS
                                                                                                                    Nov 29, 2022 16:45:11.889170885 CET58749743199.79.62.12192.168.2.6220 TLS go ahead

                                                                                                                    Click to jump to process

                                                                                                                    Click to jump to process

                                                                                                                    Click to dive into process behavior distribution

                                                                                                                    Click to jump to process

                                                                                                                    Target ID:0
                                                                                                                    Start time:16:44:02
                                                                                                                    Start date:29/11/2022
                                                                                                                    Path:C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exe
                                                                                                                    Wow64 process (32bit):true
                                                                                                                    Commandline:C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exe
                                                                                                                    Imagebase:0x910000
                                                                                                                    File size:896000 bytes
                                                                                                                    MD5 hash:12DC06D3034A17BE7A70A4AA45EDCE8D
                                                                                                                    Has elevated privileges:true
                                                                                                                    Has administrator privileges:true
                                                                                                                    Programmed in:.Net C# or VB.NET
                                                                                                                    Yara matches:
                                                                                                                    • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000000.00000002.309368123.0000000003DCC000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                                                    • Rule: JoeSecurity_AgentTesla_2, Description: Yara detected AgentTesla, Source: 00000000.00000002.309368123.0000000003DCC000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                                                    • Rule: Windows_Trojan_AgentTesla_d3ac2b2f, Description: unknown, Source: 00000000.00000002.309368123.0000000003DCC000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                                                                                                                    • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000000.00000002.308207563.0000000003CA9000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                                                    • Rule: JoeSecurity_AgentTesla_2, Description: Yara detected AgentTesla, Source: 00000000.00000002.308207563.0000000003CA9000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                                                    • Rule: Windows_Trojan_AgentTesla_d3ac2b2f, Description: unknown, Source: 00000000.00000002.308207563.0000000003CA9000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                                                                                                                    Reputation:low

                                                                                                                    Target ID:16
                                                                                                                    Start time:16:44:26
                                                                                                                    Start date:29/11/2022
                                                                                                                    Path:C:\Windows\SysWOW64\schtasks.exe
                                                                                                                    Wow64 process (32bit):true
                                                                                                                    Commandline:C:\Windows\System32\schtasks.exe" /Create /TN "Updates\cnWCiicEpxW" /XML "C:\Users\user\AppData\Local\Temp\tmp2A80.tmp
                                                                                                                    Imagebase:0xac0000
                                                                                                                    File size:185856 bytes
                                                                                                                    MD5 hash:15FF7D8324231381BAD48A052F85DF04
                                                                                                                    Has elevated privileges:true
                                                                                                                    Has administrator privileges:true
                                                                                                                    Programmed in:C, C++ or other language
                                                                                                                    Reputation:high

                                                                                                                    Target ID:17
                                                                                                                    Start time:16:44:26
                                                                                                                    Start date:29/11/2022
                                                                                                                    Path:C:\Windows\System32\conhost.exe
                                                                                                                    Wow64 process (32bit):false
                                                                                                                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                                    Imagebase:0x7ff6da640000
                                                                                                                    File size:625664 bytes
                                                                                                                    MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                                                                                                    Has elevated privileges:true
                                                                                                                    Has administrator privileges:true
                                                                                                                    Programmed in:C, C++ or other language
                                                                                                                    Reputation:high

                                                                                                                    Target ID:20
                                                                                                                    Start time:16:44:28
                                                                                                                    Start date:29/11/2022
                                                                                                                    Path:C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exe
                                                                                                                    Wow64 process (32bit):true
                                                                                                                    Commandline:{path}
                                                                                                                    Imagebase:0xab0000
                                                                                                                    File size:896000 bytes
                                                                                                                    MD5 hash:12DC06D3034A17BE7A70A4AA45EDCE8D
                                                                                                                    Has elevated privileges:true
                                                                                                                    Has administrator privileges:true
                                                                                                                    Programmed in:.Net C# or VB.NET
                                                                                                                    Yara matches:
                                                                                                                    • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000014.00000000.301553016.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                                                                                    • Rule: JoeSecurity_AgentTesla_2, Description: Yara detected AgentTesla, Source: 00000014.00000000.301553016.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                                                                                    • Rule: Windows_Trojan_AgentTesla_d3ac2b2f, Description: unknown, Source: 00000014.00000000.301553016.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: unknown
                                                                                                                    • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000014.00000002.522417697.0000000002EF1000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                                                    • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000014.00000002.524431731.0000000002F44000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                                                    Reputation:low

                                                                                                                    Target ID:21
                                                                                                                    Start time:16:44:29
                                                                                                                    Start date:29/11/2022
                                                                                                                    Path:C:\Users\user\AppData\Roaming\cnWCiicEpxW.exe
                                                                                                                    Wow64 process (32bit):true
                                                                                                                    Commandline:C:\Users\user\AppData\Roaming\cnWCiicEpxW.exe
                                                                                                                    Imagebase:0x6a0000
                                                                                                                    File size:896000 bytes
                                                                                                                    MD5 hash:12DC06D3034A17BE7A70A4AA45EDCE8D
                                                                                                                    Has elevated privileges:false
                                                                                                                    Has administrator privileges:false
                                                                                                                    Programmed in:.Net C# or VB.NET
                                                                                                                    Antivirus matches:
                                                                                                                    • Detection: 100%, Joe Sandbox ML
                                                                                                                    • Detection: 32%, ReversingLabs
                                                                                                                    Reputation:low

                                                                                                                    Target ID:25
                                                                                                                    Start time:16:45:10
                                                                                                                    Start date:29/11/2022
                                                                                                                    Path:C:\Windows\SysWOW64\schtasks.exe
                                                                                                                    Wow64 process (32bit):true
                                                                                                                    Commandline:C:\Windows\System32\schtasks.exe" /Create /TN "Updates\cnWCiicEpxW" /XML "C:\Users\user\AppData\Local\Temp\tmpC7C9.tmp
                                                                                                                    Imagebase:0xac0000
                                                                                                                    File size:185856 bytes
                                                                                                                    MD5 hash:15FF7D8324231381BAD48A052F85DF04
                                                                                                                    Has elevated privileges:false
                                                                                                                    Has administrator privileges:false
                                                                                                                    Programmed in:C, C++ or other language
                                                                                                                    Reputation:high

                                                                                                                    Target ID:26
                                                                                                                    Start time:16:45:10
                                                                                                                    Start date:29/11/2022
                                                                                                                    Path:C:\Windows\System32\conhost.exe
                                                                                                                    Wow64 process (32bit):false
                                                                                                                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                                    Imagebase:0x7ff6da640000
                                                                                                                    File size:625664 bytes
                                                                                                                    MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                                                                                                    Has elevated privileges:false
                                                                                                                    Has administrator privileges:false
                                                                                                                    Programmed in:C, C++ or other language
                                                                                                                    Reputation:high

                                                                                                                    Target ID:27
                                                                                                                    Start time:16:45:12
                                                                                                                    Start date:29/11/2022
                                                                                                                    Path:C:\Users\user\AppData\Roaming\cnWCiicEpxW.exe
                                                                                                                    Wow64 process (32bit):true
                                                                                                                    Commandline:{path}
                                                                                                                    Imagebase:0xb20000
                                                                                                                    File size:896000 bytes
                                                                                                                    MD5 hash:12DC06D3034A17BE7A70A4AA45EDCE8D
                                                                                                                    Has elevated privileges:false
                                                                                                                    Has administrator privileges:false
                                                                                                                    Programmed in:.Net C# or VB.NET
                                                                                                                    Yara matches:
                                                                                                                    • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 0000001B.00000002.528419495.0000000003164000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                                                    • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 0000001B.00000002.525674867.0000000003111000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                                                    Reputation:low

                                                                                                                    Reset < >

                                                                                                                      Execution Graph

                                                                                                                      Execution Coverage:11%
                                                                                                                      Dynamic/Decrypted Code Coverage:100%
                                                                                                                      Signature Coverage:0%
                                                                                                                      Total number of Nodes:167
                                                                                                                      Total number of Limit Nodes:12
                                                                                                                      execution_graph 23033 52ac538 23035 2b79701 2 API calls 23033->23035 23034 52ac56b 23035->23034 23036 52abbf8 23037 52abc22 23036->23037 23038 2b79727 2 API calls 23036->23038 23039 2b79701 2 API calls 23036->23039 23040 2b79738 2 API calls 23036->23040 23038->23037 23039->23037 23040->23037 22833 2b7bb30 22834 2b7bb96 22833->22834 22838 2b7bcf0 22834->22838 22841 2b7bce0 22834->22841 22835 2b7bc45 22845 2b7a544 22838->22845 22842 2b7bcf0 22841->22842 22843 2b7a544 DuplicateHandle 22842->22843 22844 2b7bd1e 22843->22844 22844->22835 22846 2b7bd58 DuplicateHandle 22845->22846 22847 2b7bd1e 22846->22847 22847->22835 22848 52a6040 22849 52a6064 22848->22849 22853 52a66a3 22849->22853 22863 52a66b0 22849->22863 22850 52a611a 22854 52a66b0 22853->22854 22855 52a66b0 DrawTextExW 22854->22855 22859 52a67a2 22854->22859 22856 52a6817 22855->22856 22857 52a66b0 DrawTextExW 22856->22857 22858 52a682a 22857->22858 22860 52a6982 22858->22860 22873 52a71eb 22858->22873 22879 52a71f0 22858->22879 22859->22850 22860->22850 22867 52a66c2 22863->22867 22869 52a67a2 22863->22869 22864 52a66b0 DrawTextExW 22865 52a6817 22864->22865 22866 52a66b0 DrawTextExW 22865->22866 22868 52a682a 22866->22868 22867->22864 22867->22869 22870 52a6982 22868->22870 22871 52a71eb DrawTextExW 22868->22871 22872 52a71f0 DrawTextExW 22868->22872 22869->22850 22870->22850 22871->22870 22872->22870 22874 52a71f0 22873->22874 22876 52a7260 22874->22876 22885 52a76b8 22874->22885 22890 52a76c8 22874->22890 22875 52a728d 22875->22860 22876->22860 22880 52a722b 22879->22880 22882 52a7260 22880->22882 22883 52a76b8 DrawTextExW 22880->22883 22884 52a76c8 DrawTextExW 22880->22884 22881 52a728d 22881->22860 22882->22860 22883->22881 22884->22881 22887 52a76c8 22885->22887 22886 52a7849 22886->22875 22887->22886 22895 52acee8 22887->22895 22901 52acef8 22887->22901 22892 52a76f8 22890->22892 22891 52a7849 22891->22875 22892->22891 22893 52acee8 DrawTextExW 22892->22893 22894 52acef8 DrawTextExW 22892->22894 22893->22891 22894->22891 22897 52acf19 22895->22897 22896 52acf2e 22896->22886 22897->22896 22907 52ae4e0 22897->22907 22913 52ae4f0 22897->22913 22898 52acf99 22903 52acf19 22901->22903 22902 52acf2e 22902->22886 22903->22902 22905 52ae4e0 DrawTextExW 22903->22905 22906 52ae4f0 DrawTextExW 22903->22906 22904 52acf99 22905->22904 22906->22904 22908 52ae4f0 22907->22908 22909 52ae529 22908->22909 22919 52aeff8 22908->22919 22922 52aefe8 22908->22922 22909->22898 22910 52ae63c 22910->22898 22915 52ae511 22913->22915 22914 52ae529 22914->22898 22915->22914 22917 52aefe8 DrawTextExW 22915->22917 22918 52aeff8 DrawTextExW 22915->22918 22916 52ae63c 22916->22898 22917->22916 22918->22916 22926 52adaec 22919->22926 22923 52aeff8 22922->22923 22924 52adaec DrawTextExW 22923->22924 22925 52af015 22924->22925 22925->22910 22927 52af030 DrawTextExW 22926->22927 22929 52af015 22927->22929 22929->22910 22930 2b76958 22931 2b7696f 22930->22931 22934 2b758ec 22931->22934 22933 2b76984 22935 2b758f7 22934->22935 22938 2b7591c 22935->22938 22937 2b76a5d 22937->22933 22939 2b75927 22938->22939 22942 2b7594c 22939->22942 22941 2b76b3a 22941->22937 22943 2b75957 22942->22943 22946 2b7597c 22943->22946 22945 2b76c2a 22945->22941 22947 2b75987 22946->22947 22949 2b7733e 22947->22949 22955 2b79727 22947->22955 22959 2b79701 22947->22959 22963 2b79738 22947->22963 22948 2b7737c 22948->22945 22949->22948 22966 2b7b866 22949->22966 22971 2b7b868 22949->22971 22956 2b79738 22955->22956 22976 2b79830 22956->22976 22957 2b79747 22957->22949 22961 2b79727 2 API calls 22959->22961 22962 2b79738 2 API calls 22959->22962 22960 2b79716 22960->22949 22961->22960 22962->22960 22965 2b79830 2 API calls 22963->22965 22964 2b79747 22964->22949 22965->22964 22967 2b7b889 22966->22967 22968 2b7b8ad 22967->22968 22996 2b7ba18 22967->22996 23000 2b7ba08 22967->23000 22968->22948 22973 2b7b889 22971->22973 22972 2b7b8ad 22972->22948 22973->22972 22974 2b7ba18 2 API calls 22973->22974 22975 2b7ba08 2 API calls 22973->22975 22974->22972 22975->22972 22977 2b79843 22976->22977 22978 2b7985b 22977->22978 22984 2b79ab8 22977->22984 22988 2b79aa8 22977->22988 22978->22957 22979 2b79853 22979->22978 22980 2b79a58 GetModuleHandleW 22979->22980 22981 2b79a85 22980->22981 22981->22957 22985 2b79acc 22984->22985 22986 2b79af1 22985->22986 22992 2b792f0 22985->22992 22986->22979 22990 2b79ab8 22988->22990 22989 2b79af1 22989->22979 22990->22989 22991 2b792f0 LoadLibraryExW 22990->22991 22991->22989 22993 2b79c98 LoadLibraryExW 22992->22993 22995 2b79d11 22993->22995 22995->22986 22997 2b7ba25 22996->22997 22998 2b7ba5f 22997->22998 23004 2b7a4bc 22997->23004 22998->22968 23001 2b7ba18 23000->23001 23002 2b7ba5f 23001->23002 23003 2b7a4bc 2 API calls 23001->23003 23002->22968 23003->23002 23005 2b7a4c7 23004->23005 23007 2b7c350 23005->23007 23008 2b7a5a4 23005->23008 23007->23007 23009 2b7a5af 23008->23009 23010 2b7597c 2 API calls 23009->23010 23011 2b7c7bf 23010->23011 23015 2b7e548 23011->23015 23021 2b7e518 23011->23021 23012 2b7c7f8 23012->23007 23017 2b7e5c6 23015->23017 23018 2b7e579 23015->23018 23016 2b7e585 23016->23012 23017->23012 23018->23016 23026 2b7e881 23018->23026 23030 2b7e890 23018->23030 23023 2b7e51d 23021->23023 23022 2b7e585 23022->23012 23023->23022 23024 2b7e881 2 API calls 23023->23024 23025 2b7e890 2 API calls 23023->23025 23024->23022 23025->23022 23027 2b7e890 23026->23027 23028 2b79830 LoadLibraryExW GetModuleHandleW 23027->23028 23029 2b7e899 23028->23029 23029->23017 23031 2b79830 LoadLibraryExW GetModuleHandleW 23030->23031 23032 2b7e899 23031->23032 23032->23017

                                                                                                                      Control-flow Graph

                                                                                                                      APIs
                                                                                                                      • GetModuleHandleW.KERNELBASE(00000000), ref: 02B79A76
                                                                                                                      Memory Dump Source
                                                                                                                      • Source File: 00000000.00000002.305179190.0000000002B70000.00000040.00000800.00020000.00000000.sdmp, Offset: 02B70000, based on PE: false
                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                      • Snapshot File: hcaresult_0_2_2b70000_SHIPMENT DOCUMENTS.jbxd
                                                                                                                      Similarity
                                                                                                                      • API ID: HandleModule
                                                                                                                      • String ID:
                                                                                                                      • API String ID: 4139908857-0
                                                                                                                      • Opcode ID: dd78594917d377e43e508979af9837c3390e03f1b98587ed3a0a855e85d9eb67
                                                                                                                      • Instruction ID: 86a6a487fcb6be6d69379c0ffcfdc8f7250bc84cfa12e699c5109eb20ebfa3a7
                                                                                                                      • Opcode Fuzzy Hash: dd78594917d377e43e508979af9837c3390e03f1b98587ed3a0a855e85d9eb67
                                                                                                                      • Instruction Fuzzy Hash: 66712370A00B058FD724DF6AD445B9ABBF1FF88244F008A6ED5AAD7A40DB34E8458F91
                                                                                                                      Uniqueness

                                                                                                                      Uniqueness Score: -1.00%

                                                                                                                      Control-flow Graph

                                                                                                                      • Executed
                                                                                                                      • Not Executed
                                                                                                                      control_flow_graph 95 52af028-52af07c 97 52af07e-52af084 95->97 98 52af087-52af096 95->98 97->98 99 52af09b-52af0d4 DrawTextExW 98->99 100 52af098 98->100 101 52af0dd-52af0fa 99->101 102 52af0d6-52af0dc 99->102 100->99 102->101
                                                                                                                      APIs
                                                                                                                      • DrawTextExW.USER32(?,?,?,?,?,?,?,?,?,?,?,?,?,052AF015,?,?), ref: 052AF0C7
                                                                                                                      Memory Dump Source
                                                                                                                      • Source File: 00000000.00000002.314032983.00000000052A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 052A0000, based on PE: false
                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                      • Snapshot File: hcaresult_0_2_52a0000_SHIPMENT DOCUMENTS.jbxd
                                                                                                                      Similarity
                                                                                                                      • API ID: DrawText
                                                                                                                      • String ID:
                                                                                                                      • API String ID: 2175133113-0
                                                                                                                      • Opcode ID: 1b8db2861136fda57de89ab27a62c1ad1375722431c201de9a87149e54946377
                                                                                                                      • Instruction ID: 8551326c1f00019eabf3af74d4f24eef10791bc3bdd41b6c6961a95e1f2e9f0e
                                                                                                                      • Opcode Fuzzy Hash: 1b8db2861136fda57de89ab27a62c1ad1375722431c201de9a87149e54946377
                                                                                                                      • Instruction Fuzzy Hash: 6731E2B69012099FCB10CF9AD884ADEBBF4FF48324F14842AE819A7310D775A944CFA1
                                                                                                                      Uniqueness

                                                                                                                      Uniqueness Score: -1.00%

                                                                                                                      Control-flow Graph

                                                                                                                      • Executed
                                                                                                                      • Not Executed
                                                                                                                      control_flow_graph 105 52adaec-52af07c 107 52af07e-52af084 105->107 108 52af087-52af096 105->108 107->108 109 52af09b-52af0d4 DrawTextExW 108->109 110 52af098 108->110 111 52af0dd-52af0fa 109->111 112 52af0d6-52af0dc 109->112 110->109 112->111
                                                                                                                      APIs
                                                                                                                      • DrawTextExW.USER32(?,?,?,?,?,?,?,?,?,?,?,?,?,052AF015,?,?), ref: 052AF0C7
                                                                                                                      Memory Dump Source
                                                                                                                      • Source File: 00000000.00000002.314032983.00000000052A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 052A0000, based on PE: false
                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                      • Snapshot File: hcaresult_0_2_52a0000_SHIPMENT DOCUMENTS.jbxd
                                                                                                                      Similarity
                                                                                                                      • API ID: DrawText
                                                                                                                      • String ID:
                                                                                                                      • API String ID: 2175133113-0
                                                                                                                      • Opcode ID: 88f216e9f5ef718c7d054dec12f4546eb619665b83354f696cbc5202189d3c91
                                                                                                                      • Instruction ID: baf5b6418975cdbf3341187b33e01d04db0cc2fbd8d98c1911f98dedca726ef9
                                                                                                                      • Opcode Fuzzy Hash: 88f216e9f5ef718c7d054dec12f4546eb619665b83354f696cbc5202189d3c91
                                                                                                                      • Instruction Fuzzy Hash: 9531E2B69112099FCB10CF9AD984A9EBBF4FF48324F14842AE819A7310D775A945CFA1
                                                                                                                      Uniqueness

                                                                                                                      Uniqueness Score: -1.00%

                                                                                                                      Control-flow Graph

                                                                                                                      • Executed
                                                                                                                      • Not Executed
                                                                                                                      control_flow_graph 115 2b7a544-2b7bdec DuplicateHandle 117 2b7bdf5-2b7be12 115->117 118 2b7bdee-2b7bdf4 115->118 118->117
                                                                                                                      APIs
                                                                                                                      • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?,?,?,?,02B7BD1E,?,?,?,?,?), ref: 02B7BDDF
                                                                                                                      Memory Dump Source
                                                                                                                      • Source File: 00000000.00000002.305179190.0000000002B70000.00000040.00000800.00020000.00000000.sdmp, Offset: 02B70000, based on PE: false
                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                      • Snapshot File: hcaresult_0_2_2b70000_SHIPMENT DOCUMENTS.jbxd
                                                                                                                      Similarity
                                                                                                                      • API ID: DuplicateHandle
                                                                                                                      • String ID:
                                                                                                                      • API String ID: 3793708945-0
                                                                                                                      • Opcode ID: f747a456347fc46f772bb1a4d537846cd15acd7ce4ff8b6bd0e3e14b69b0ce3f
                                                                                                                      • Instruction ID: c1b53fdb7c0798d0f0d8197b991e5d154951c3bea96f25fda2a3c6d6730cabef
                                                                                                                      • Opcode Fuzzy Hash: f747a456347fc46f772bb1a4d537846cd15acd7ce4ff8b6bd0e3e14b69b0ce3f
                                                                                                                      • Instruction Fuzzy Hash: 0D21E6B59002499FDB10CF99D984ADEFBF4FB48324F14845AE925B3310D374A954CFA1
                                                                                                                      Uniqueness

                                                                                                                      Uniqueness Score: -1.00%

                                                                                                                      Control-flow Graph

                                                                                                                      • Executed
                                                                                                                      • Not Executed
                                                                                                                      control_flow_graph 121 2b7bd50-2b7bd53 122 2b7bd58-2b7bdec DuplicateHandle 121->122 123 2b7bdf5-2b7be12 122->123 124 2b7bdee-2b7bdf4 122->124 124->123
                                                                                                                      APIs
                                                                                                                      • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?,?,?,?,02B7BD1E,?,?,?,?,?), ref: 02B7BDDF
                                                                                                                      Memory Dump Source
                                                                                                                      • Source File: 00000000.00000002.305179190.0000000002B70000.00000040.00000800.00020000.00000000.sdmp, Offset: 02B70000, based on PE: false
                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                      • Snapshot File: hcaresult_0_2_2b70000_SHIPMENT DOCUMENTS.jbxd
                                                                                                                      Similarity
                                                                                                                      • API ID: DuplicateHandle
                                                                                                                      • String ID:
                                                                                                                      • API String ID: 3793708945-0
                                                                                                                      • Opcode ID: 4092c76b9636a48c5aa3635d68fa88ab30b305f832766e6fe65880ef90558c58
                                                                                                                      • Instruction ID: e2005d588fc33102aea7eac1348770adb2cb984caefd05b27d5a1cbb0bbf131f
                                                                                                                      • Opcode Fuzzy Hash: 4092c76b9636a48c5aa3635d68fa88ab30b305f832766e6fe65880ef90558c58
                                                                                                                      • Instruction Fuzzy Hash: C62114B59002089FDB10CFAAD884BDEBBF8FB48324F14801AE915A3310D378A944CFA1
                                                                                                                      Uniqueness

                                                                                                                      Uniqueness Score: -1.00%

                                                                                                                      Control-flow Graph

                                                                                                                      • Executed
                                                                                                                      • Not Executed
                                                                                                                      control_flow_graph 127 2b792f0-2b79cd8 129 2b79ce0-2b79d0f LoadLibraryExW 127->129 130 2b79cda-2b79cdd 127->130 131 2b79d11-2b79d17 129->131 132 2b79d18-2b79d35 129->132 130->129 131->132
                                                                                                                      APIs
                                                                                                                      • LoadLibraryExW.KERNELBASE(00000000,00000000,?,?,?,?,00000000,?,02B79AF1,00000800,00000000,00000000), ref: 02B79D02
                                                                                                                      Memory Dump Source
                                                                                                                      • Source File: 00000000.00000002.305179190.0000000002B70000.00000040.00000800.00020000.00000000.sdmp, Offset: 02B70000, based on PE: false
                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                      • Snapshot File: hcaresult_0_2_2b70000_SHIPMENT DOCUMENTS.jbxd
                                                                                                                      Similarity
                                                                                                                      • API ID: LibraryLoad
                                                                                                                      • String ID:
                                                                                                                      • API String ID: 1029625771-0
                                                                                                                      • Opcode ID: 54b7cc369c448382bef33e202e5ef47bd51b72a9ace6560d76d7a0627030aa15
                                                                                                                      • Instruction ID: fcc9249171751ef8b04ba27f6813cb250b616b106841bbe0c371e3787eed9a6d
                                                                                                                      • Opcode Fuzzy Hash: 54b7cc369c448382bef33e202e5ef47bd51b72a9ace6560d76d7a0627030aa15
                                                                                                                      • Instruction Fuzzy Hash: EC1103B69006098FDB10CFAAD544ADEFBF4EB88324F15846ED425A7200C375A945CFA1
                                                                                                                      Uniqueness

                                                                                                                      Uniqueness Score: -1.00%

                                                                                                                      Control-flow Graph

                                                                                                                      • Executed
                                                                                                                      • Not Executed
                                                                                                                      control_flow_graph 135 2b79c90-2b79cd8 137 2b79ce0-2b79d0f LoadLibraryExW 135->137 138 2b79cda-2b79cdd 135->138 139 2b79d11-2b79d17 137->139 140 2b79d18-2b79d35 137->140 138->137 139->140
                                                                                                                      APIs
                                                                                                                      • LoadLibraryExW.KERNELBASE(00000000,00000000,?,?,?,?,00000000,?,02B79AF1,00000800,00000000,00000000), ref: 02B79D02
                                                                                                                      Memory Dump Source
                                                                                                                      • Source File: 00000000.00000002.305179190.0000000002B70000.00000040.00000800.00020000.00000000.sdmp, Offset: 02B70000, based on PE: false
                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                      • Snapshot File: hcaresult_0_2_2b70000_SHIPMENT DOCUMENTS.jbxd
                                                                                                                      Similarity
                                                                                                                      • API ID: LibraryLoad
                                                                                                                      • String ID:
                                                                                                                      • API String ID: 1029625771-0
                                                                                                                      • Opcode ID: 78fc5db4d8650fe265e3dd29840b19d2e3654b4ed6d4fccbce461f1b3e934e87
                                                                                                                      • Instruction ID: 930ef355611c6ea71d9033068234a8d30cbce6d349e381c4d936833d91384a89
                                                                                                                      • Opcode Fuzzy Hash: 78fc5db4d8650fe265e3dd29840b19d2e3654b4ed6d4fccbce461f1b3e934e87
                                                                                                                      • Instruction Fuzzy Hash: 871103B69002098FDB10CF9AD484ADEFBF4EB88324F15845AD425A7200C375A945CFA1
                                                                                                                      Uniqueness

                                                                                                                      Uniqueness Score: -1.00%

                                                                                                                      Control-flow Graph

                                                                                                                      • Executed
                                                                                                                      • Not Executed
                                                                                                                      control_flow_graph 143 2b79a10-2b79a50 144 2b79a52-2b79a55 143->144 145 2b79a58-2b79a83 GetModuleHandleW 143->145 144->145 146 2b79a85-2b79a8b 145->146 147 2b79a8c-2b79aa0 145->147 146->147
                                                                                                                      APIs
                                                                                                                      • GetModuleHandleW.KERNELBASE(00000000), ref: 02B79A76
                                                                                                                      Memory Dump Source
                                                                                                                      • Source File: 00000000.00000002.305179190.0000000002B70000.00000040.00000800.00020000.00000000.sdmp, Offset: 02B70000, based on PE: false
                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                      • Snapshot File: hcaresult_0_2_2b70000_SHIPMENT DOCUMENTS.jbxd
                                                                                                                      Similarity
                                                                                                                      • API ID: HandleModule
                                                                                                                      • String ID:
                                                                                                                      • API String ID: 4139908857-0
                                                                                                                      • Opcode ID: 660d23d6fd9f21570d1f86348ef6d5777345bd79a3b6b9b495a84ad335474875
                                                                                                                      • Instruction ID: aae5d168363ce06f5a717d4f79badc48d77b6458ddaef77c48b2a0cd02edc3a0
                                                                                                                      • Opcode Fuzzy Hash: 660d23d6fd9f21570d1f86348ef6d5777345bd79a3b6b9b495a84ad335474875
                                                                                                                      • Instruction Fuzzy Hash: 2E110FB6D016498FCB10CF9AC444BDEFBF4EB88224F14855AD429B7200C378A545CFA1
                                                                                                                      Uniqueness

                                                                                                                      Uniqueness Score: -1.00%

                                                                                                                      Memory Dump Source
                                                                                                                      • Source File: 00000000.00000002.305179190.0000000002B70000.00000040.00000800.00020000.00000000.sdmp, Offset: 02B70000, based on PE: false
                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                      • Snapshot File: hcaresult_0_2_2b70000_SHIPMENT DOCUMENTS.jbxd
                                                                                                                      Similarity
                                                                                                                      • API ID:
                                                                                                                      • String ID:
                                                                                                                      • API String ID:
                                                                                                                      • Opcode ID: 6bd858e274be0177a2e73d9176f3622ad75e3a767b326007bdfce244224088db
                                                                                                                      • Instruction ID: 1f329bd68eaa8570b206b520f9fc593b8abafd73320c83460ad9865f5c543a39
                                                                                                                      • Opcode Fuzzy Hash: 6bd858e274be0177a2e73d9176f3622ad75e3a767b326007bdfce244224088db
                                                                                                                      • Instruction Fuzzy Hash: 6112D5F1511746ABE730CF65F89E6DD3BA0B745328B90E208D2616FAD8D7B8114ACF84
                                                                                                                      Uniqueness

                                                                                                                      Uniqueness Score: -1.00%

                                                                                                                      Memory Dump Source
                                                                                                                      • Source File: 00000000.00000002.305179190.0000000002B70000.00000040.00000800.00020000.00000000.sdmp, Offset: 02B70000, based on PE: false
                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                      • Snapshot File: hcaresult_0_2_2b70000_SHIPMENT DOCUMENTS.jbxd
                                                                                                                      Similarity
                                                                                                                      • API ID:
                                                                                                                      • String ID:
                                                                                                                      • API String ID:
                                                                                                                      • Opcode ID: 5ef78f37ed9b836659dc26154bc873ea02f11f823de6cc9d04b28a5c9b65a986
                                                                                                                      • Instruction ID: c706739bc6b74f61f8bb045897fc214fbd984cae7184ef1ec841b6eb8b00c38e
                                                                                                                      • Opcode Fuzzy Hash: 5ef78f37ed9b836659dc26154bc873ea02f11f823de6cc9d04b28a5c9b65a986
                                                                                                                      • Instruction Fuzzy Hash: 1EA17D32E1021ADFCF15DFA5C8845DEBBB2FF85300B1581AAE915BB260EB31A945CF40
                                                                                                                      Uniqueness

                                                                                                                      Uniqueness Score: -1.00%

                                                                                                                      Memory Dump Source
                                                                                                                      • Source File: 00000000.00000002.305179190.0000000002B70000.00000040.00000800.00020000.00000000.sdmp, Offset: 02B70000, based on PE: false
                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                      • Snapshot File: hcaresult_0_2_2b70000_SHIPMENT DOCUMENTS.jbxd
                                                                                                                      Similarity
                                                                                                                      • API ID:
                                                                                                                      • String ID:
                                                                                                                      • API String ID:
                                                                                                                      • Opcode ID: 14f9482961de84485dce31b32ed66366cae62cb792b214ccaf3aa908bbc9438c
                                                                                                                      • Instruction ID: 5d7951eb6adabe49ac71c9f7acb4461104c5a0d9c82a8386eecb16d8113b3dc9
                                                                                                                      • Opcode Fuzzy Hash: 14f9482961de84485dce31b32ed66366cae62cb792b214ccaf3aa908bbc9438c
                                                                                                                      • Instruction Fuzzy Hash: 64C139B1911745ABD730CF25F88E6DD7BB1BB85328F50E208D1616BAD8D7B8144ACF84
                                                                                                                      Uniqueness

                                                                                                                      Uniqueness Score: -1.00%

                                                                                                                      Execution Graph

                                                                                                                      Execution Coverage:22.5%
                                                                                                                      Dynamic/Decrypted Code Coverage:100%
                                                                                                                      Signature Coverage:0%
                                                                                                                      Total number of Nodes:292
                                                                                                                      Total number of Limit Nodes:6
                                                                                                                      execution_graph 42748 2cf0448 42749 2cf0455 42748->42749 42752 2cf0868 42749->42752 42750 2cf045b 42755 2cf0858 42752->42755 42753 2cf0a57 VirtualAllocExNuma 42756 2cf0b23 42753->42756 42755->42752 42755->42753 42757 2cf08d6 42755->42757 42761 5ff66dc 42755->42761 42766 5ff66f8 42755->42766 42771 5ff66e9 42755->42771 42756->42750 42757->42750 42762 5ff66e3 42761->42762 42763 5ff6b6b 42762->42763 42776 5ff7508 42762->42776 42822 5ff74f8 42762->42822 42763->42755 42767 5ff6711 42766->42767 42768 5ff6b6b 42767->42768 42769 5ff7508 70 API calls 42767->42769 42770 5ff74f8 70 API calls 42767->42770 42768->42755 42769->42767 42770->42767 42772 5ff66e3 42771->42772 42772->42771 42773 5ff6b6b 42772->42773 42774 5ff7508 70 API calls 42772->42774 42775 5ff74f8 70 API calls 42772->42775 42773->42755 42774->42772 42775->42772 42778 5ff7510 42776->42778 42777 5ff75c8 42777->42762 42778->42777 42868 5ff890b 42778->42868 42872 5ff898f 42778->42872 42876 5ff868f 42778->42876 42880 5ff8113 42778->42880 42886 5ff7f18 42778->42886 42892 5ff819d 42778->42892 42898 5ff8a1f 42778->42898 42902 5ff871f 42778->42902 42906 5ff87a3 42778->42906 42910 5ff8227 42778->42910 42916 5ff82b1 42778->42916 42922 5ff8833 42778->42922 42926 5ff7f39 42778->42926 42932 5ff833b 42778->42932 42938 5ff83bc 42778->42938 42944 5ff843d 42778->42944 42950 5ff84be 42778->42950 42956 5ff853f 42778->42956 42962 5ff85c0 42778->42962 42968 5ff88c3 42778->42968 42972 5ff7fc3 42778->42972 42978 5ff8044 42778->42978 42984 5ff8947 42778->42984 42988 5ff864a 42778->42988 42992 5ff80ce 42778->42992 42998 5ff89d7 42778->42998 43002 5ff86d7 42778->43002 43006 5ff8158 42778->43006 43012 5ff81e2 42778->43012 43018 5ff8767 42778->43018 43022 5ff87eb 42778->43022 43026 5ff826c 42778->43026 43032 5ff82f6 42778->43032 43038 5ff83f8 42778->43038 43044 5ff84fa 42778->43044 43050 5ff887b 42778->43050 43054 5ff7f7e 42778->43054 43060 5ff7fff 42778->43060 43066 5ff8380 42778->43066 43072 5ff8482 42778->43072 43078 5ff8584 42778->43078 43084 5ff8605 42778->43084 43088 5ff8089 42778->43088 42822->42822 42824 5ff74fb 42822->42824 42823 5ff75c8 42823->42762 42824->42823 42825 5ff7fff 2 API calls 42824->42825 42826 5ff7f7e 2 API calls 42824->42826 42827 5ff887b KiUserExceptionDispatcher 42824->42827 42828 5ff84fa 2 API calls 42824->42828 42829 5ff83f8 2 API calls 42824->42829 42830 5ff82f6 2 API calls 42824->42830 42831 5ff826c 2 API calls 42824->42831 42832 5ff87eb KiUserExceptionDispatcher 42824->42832 42833 5ff8767 KiUserExceptionDispatcher 42824->42833 42834 5ff81e2 2 API calls 42824->42834 42835 5ff8158 2 API calls 42824->42835 42836 5ff86d7 KiUserExceptionDispatcher 42824->42836 42837 5ff89d7 KiUserExceptionDispatcher 42824->42837 42838 5ff80ce 2 API calls 42824->42838 42839 5ff864a KiUserExceptionDispatcher 42824->42839 42840 5ff8947 KiUserExceptionDispatcher 42824->42840 42841 5ff8044 2 API calls 42824->42841 42842 5ff7fc3 2 API calls 42824->42842 42843 5ff88c3 KiUserExceptionDispatcher 42824->42843 42844 5ff85c0 2 API calls 42824->42844 42845 5ff853f 2 API calls 42824->42845 42846 5ff84be 2 API calls 42824->42846 42847 5ff843d 2 API calls 42824->42847 42848 5ff83bc 2 API calls 42824->42848 42849 5ff833b 2 API calls 42824->42849 42850 5ff7f39 2 API calls 42824->42850 42851 5ff8833 KiUserExceptionDispatcher 42824->42851 42852 5ff82b1 2 API calls 42824->42852 42853 5ff8227 2 API calls 42824->42853 42854 5ff87a3 KiUserExceptionDispatcher 42824->42854 42855 5ff871f KiUserExceptionDispatcher 42824->42855 42856 5ff8a1f KiUserExceptionDispatcher 42824->42856 42857 5ff819d 2 API calls 42824->42857 42858 5ff7f18 2 API calls 42824->42858 42859 5ff8113 2 API calls 42824->42859 42860 5ff868f KiUserExceptionDispatcher 42824->42860 42861 5ff898f KiUserExceptionDispatcher 42824->42861 42862 5ff890b KiUserExceptionDispatcher 42824->42862 42863 5ff8089 2 API calls 42824->42863 42864 5ff8605 KiUserExceptionDispatcher 42824->42864 42865 5ff8584 2 API calls 42824->42865 42866 5ff8482 2 API calls 42824->42866 42867 5ff8380 2 API calls 42824->42867 42825->42824 42826->42824 42827->42824 42828->42824 42829->42824 42830->42824 42831->42824 42832->42824 42833->42824 42834->42824 42835->42824 42836->42824 42837->42824 42838->42824 42839->42824 42840->42824 42841->42824 42842->42824 42843->42824 42844->42824 42845->42824 42846->42824 42847->42824 42848->42824 42849->42824 42850->42824 42851->42824 42852->42824 42853->42824 42854->42824 42855->42824 42856->42824 42857->42824 42858->42824 42859->42824 42860->42824 42861->42824 42862->42824 42863->42824 42864->42824 42865->42824 42866->42824 42867->42824 42869 5ff891c KiUserExceptionDispatcher 42868->42869 42871 5ff8a62 42869->42871 42871->42778 42873 5ff89a0 KiUserExceptionDispatcher 42872->42873 42875 5ff8a62 42873->42875 42875->42778 42877 5ff86a0 KiUserExceptionDispatcher 42876->42877 42879 5ff8a62 42877->42879 42879->42778 42881 5ff8124 42880->42881 42882 5ff85e4 KiUserExceptionDispatcher 42881->42882 42883 5ff8603 KiUserExceptionDispatcher 42882->42883 42885 5ff8a62 42883->42885 42885->42778 42887 5ff7f1e 42886->42887 42888 5ff85e4 KiUserExceptionDispatcher 42887->42888 42889 5ff8603 KiUserExceptionDispatcher 42888->42889 42891 5ff8a62 42889->42891 42891->42778 42893 5ff81ae 42892->42893 42894 5ff85e4 KiUserExceptionDispatcher 42893->42894 42895 5ff8603 KiUserExceptionDispatcher 42894->42895 42897 5ff8a62 42895->42897 42897->42778 42899 5ff8a30 KiUserExceptionDispatcher 42898->42899 42901 5ff8a62 42899->42901 42901->42778 42903 5ff8730 KiUserExceptionDispatcher 42902->42903 42905 5ff8a62 42903->42905 42905->42778 42907 5ff87b4 KiUserExceptionDispatcher 42906->42907 42909 5ff8a62 42907->42909 42909->42778 42911 5ff8238 42910->42911 42912 5ff85e4 KiUserExceptionDispatcher 42911->42912 42913 5ff8603 KiUserExceptionDispatcher 42912->42913 42915 5ff8a62 42913->42915 42915->42778 42917 5ff82c2 42916->42917 42918 5ff85e4 KiUserExceptionDispatcher 42917->42918 42919 5ff8603 KiUserExceptionDispatcher 42918->42919 42921 5ff8a62 42919->42921 42921->42778 42923 5ff8844 KiUserExceptionDispatcher 42922->42923 42925 5ff8a62 42923->42925 42925->42778 42927 5ff7f4a 42926->42927 42928 5ff85e4 KiUserExceptionDispatcher 42927->42928 42929 5ff8603 KiUserExceptionDispatcher 42928->42929 42931 5ff8a62 42929->42931 42931->42778 42933 5ff834c 42932->42933 42934 5ff85e4 KiUserExceptionDispatcher 42933->42934 42935 5ff8603 KiUserExceptionDispatcher 42934->42935 42937 5ff8a62 42935->42937 42937->42778 42939 5ff83cd KiUserExceptionDispatcher 42938->42939 42941 5ff8603 KiUserExceptionDispatcher 42939->42941 42943 5ff8a62 42941->42943 42943->42778 42945 5ff844e KiUserExceptionDispatcher 42944->42945 42947 5ff8603 KiUserExceptionDispatcher 42945->42947 42949 5ff8a62 42947->42949 42949->42778 42951 5ff84cf KiUserExceptionDispatcher 42950->42951 42953 5ff8603 KiUserExceptionDispatcher 42951->42953 42955 5ff8a62 42953->42955 42955->42778 42957 5ff8550 KiUserExceptionDispatcher 42956->42957 42959 5ff8603 KiUserExceptionDispatcher 42957->42959 42961 5ff8a62 42959->42961 42961->42778 42963 5ff85d1 KiUserExceptionDispatcher 42962->42963 42965 5ff8603 KiUserExceptionDispatcher 42963->42965 42967 5ff8a62 42965->42967 42967->42778 42969 5ff88d4 KiUserExceptionDispatcher 42968->42969 42971 5ff8a62 42969->42971 42971->42778 42973 5ff7fd4 42972->42973 42974 5ff85e4 KiUserExceptionDispatcher 42973->42974 42975 5ff8603 KiUserExceptionDispatcher 42974->42975 42977 5ff8a62 42975->42977 42977->42778 42979 5ff8055 42978->42979 42980 5ff85e4 KiUserExceptionDispatcher 42979->42980 42981 5ff8603 KiUserExceptionDispatcher 42980->42981 42983 5ff8a62 42981->42983 42983->42778 42985 5ff8958 KiUserExceptionDispatcher 42984->42985 42987 5ff8a62 42985->42987 42987->42778 42989 5ff865b KiUserExceptionDispatcher 42988->42989 42991 5ff8a62 42989->42991 42991->42778 42993 5ff80df 42992->42993 42994 5ff85e4 KiUserExceptionDispatcher 42993->42994 42995 5ff8603 KiUserExceptionDispatcher 42994->42995 42997 5ff8a62 42995->42997 42997->42778 42999 5ff89e8 KiUserExceptionDispatcher 42998->42999 43001 5ff8a62 42999->43001 43001->42778 43003 5ff86e8 KiUserExceptionDispatcher 43002->43003 43005 5ff8a62 43003->43005 43005->42778 43007 5ff8169 43006->43007 43008 5ff85e4 KiUserExceptionDispatcher 43007->43008 43009 5ff8603 KiUserExceptionDispatcher 43008->43009 43011 5ff8a62 43009->43011 43011->42778 43013 5ff81f3 43012->43013 43014 5ff85e4 KiUserExceptionDispatcher 43013->43014 43015 5ff8603 KiUserExceptionDispatcher 43014->43015 43017 5ff8a62 43015->43017 43017->42778 43019 5ff8778 KiUserExceptionDispatcher 43018->43019 43021 5ff8a62 43019->43021 43021->42778 43023 5ff87fc KiUserExceptionDispatcher 43022->43023 43025 5ff8a62 43023->43025 43025->42778 43027 5ff827d 43026->43027 43028 5ff85e4 KiUserExceptionDispatcher 43027->43028 43029 5ff8603 KiUserExceptionDispatcher 43028->43029 43031 5ff8a62 43029->43031 43031->42778 43033 5ff8307 43032->43033 43034 5ff85e4 KiUserExceptionDispatcher 43033->43034 43035 5ff8603 KiUserExceptionDispatcher 43034->43035 43037 5ff8a62 43035->43037 43037->42778 43039 5ff8409 KiUserExceptionDispatcher 43038->43039 43041 5ff8603 KiUserExceptionDispatcher 43039->43041 43043 5ff8a62 43041->43043 43043->42778 43045 5ff850b KiUserExceptionDispatcher 43044->43045 43047 5ff8603 KiUserExceptionDispatcher 43045->43047 43049 5ff8a62 43047->43049 43049->42778 43051 5ff888c KiUserExceptionDispatcher 43050->43051 43053 5ff8a62 43051->43053 43053->42778 43055 5ff7f8f 43054->43055 43056 5ff85e4 KiUserExceptionDispatcher 43055->43056 43057 5ff8603 KiUserExceptionDispatcher 43056->43057 43059 5ff8a62 43057->43059 43059->42778 43061 5ff8010 43060->43061 43062 5ff85e4 KiUserExceptionDispatcher 43061->43062 43063 5ff8603 KiUserExceptionDispatcher 43062->43063 43065 5ff8a62 43063->43065 43065->42778 43067 5ff8391 43066->43067 43068 5ff85e4 KiUserExceptionDispatcher 43067->43068 43069 5ff8603 KiUserExceptionDispatcher 43068->43069 43071 5ff8a62 43069->43071 43071->42778 43073 5ff8493 KiUserExceptionDispatcher 43072->43073 43075 5ff8603 KiUserExceptionDispatcher 43073->43075 43077 5ff8a62 43075->43077 43077->42778 43079 5ff8595 KiUserExceptionDispatcher 43078->43079 43081 5ff8603 KiUserExceptionDispatcher 43079->43081 43083 5ff8a62 43081->43083 43083->42778 43085 5ff8616 KiUserExceptionDispatcher 43084->43085 43087 5ff8a62 43085->43087 43087->42778 43089 5ff809a 43088->43089 43090 5ff85e4 KiUserExceptionDispatcher 43089->43090 43091 5ff8603 KiUserExceptionDispatcher 43090->43091 43093 5ff8a62 43091->43093 43093->42778 43145 2cfbcb8 43146 2cfbcd6 43145->43146 43149 2cfa61c 43146->43149 43148 2cfbd0d 43151 2cfd7d8 LoadLibraryA 43149->43151 43152 2cfd8ba 43151->43152 43094 2cf0b60 43095 2cf0ba1 Sleep 43094->43095 43096 2cf0bd4 43095->43096 43097 2cf4d60 43098 2cf4d74 43097->43098 43101 2cf53b2 43098->43101 43099 2cf4d7d 43102 2cf53bb 43101->43102 43107 2cf5488 43101->43107 43112 2cf55ae 43101->43112 43117 2cf5594 43101->43117 43122 2cf5498 43101->43122 43102->43099 43109 2cf5498 43107->43109 43108 2cf55d3 43109->43108 43127 2cf5893 43109->43127 43132 2cf58a0 43109->43132 43113 2cf55d3 43112->43113 43114 2cf55c1 43112->43114 43115 2cf5893 2 API calls 43114->43115 43116 2cf58a0 2 API calls 43114->43116 43115->43113 43116->43113 43118 2cf5547 43117->43118 43119 2cf55d3 43118->43119 43120 2cf5893 2 API calls 43118->43120 43121 2cf58a0 2 API calls 43118->43121 43120->43119 43121->43119 43123 2cf54dc 43122->43123 43124 2cf55d3 43123->43124 43125 2cf5893 2 API calls 43123->43125 43126 2cf58a0 2 API calls 43123->43126 43125->43124 43126->43124 43128 2cf58ae 43127->43128 43137 2cf58e0 43128->43137 43141 2cf58f0 43128->43141 43129 2cf58be 43129->43108 43133 2cf58ae 43132->43133 43135 2cf58e0 RtlEncodePointer 43133->43135 43136 2cf58f0 RtlEncodePointer 43133->43136 43134 2cf58be 43134->43108 43135->43134 43136->43134 43138 2cf58ee 43137->43138 43139 2cf5954 RtlEncodePointer 43138->43139 43140 2cf597d 43138->43140 43139->43140 43140->43129 43142 2cf592a 43141->43142 43143 2cf5954 RtlEncodePointer 43142->43143 43144 2cf597d 43142->43144 43143->43144 43144->43129
                                                                                                                      Strings
                                                                                                                      Memory Dump Source
                                                                                                                      • Source File: 00000014.00000002.547421294.0000000006B70000.00000040.00000800.00020000.00000000.sdmp, Offset: 06B70000, based on PE: false
                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                      • Snapshot File: hcaresult_20_2_6b70000_SHIPMENT DOCUMENTS.jbxd
                                                                                                                      Similarity
                                                                                                                      • API ID:
                                                                                                                      • String ID: 8^Rl
                                                                                                                      • API String ID: 0-3195018829
                                                                                                                      • Opcode ID: 6e88c74d944e1b24eca613d6fc438bc3691342bb34a516980b52e897760469af
                                                                                                                      • Instruction ID: 0240e653423139f01a857dea09cdaff7250149bfbde8d627937d6b4f8cbebb08
                                                                                                                      • Opcode Fuzzy Hash: 6e88c74d944e1b24eca613d6fc438bc3691342bb34a516980b52e897760469af
                                                                                                                      • Instruction Fuzzy Hash: 4362BD70F042088FDB64DF68C894BAEBBA2EF85344F1580A9E51A9F395CB75DC41CB91
                                                                                                                      Uniqueness

                                                                                                                      Uniqueness Score: -1.00%

                                                                                                                      Strings
                                                                                                                      Memory Dump Source
                                                                                                                      • Source File: 00000014.00000002.547421294.0000000006B70000.00000040.00000800.00020000.00000000.sdmp, Offset: 06B70000, based on PE: false
                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                      • Snapshot File: hcaresult_20_2_6b70000_SHIPMENT DOCUMENTS.jbxd
                                                                                                                      Similarity
                                                                                                                      • API ID:
                                                                                                                      • String ID: 8^Rl
                                                                                                                      • API String ID: 0-3195018829
                                                                                                                      • Opcode ID: e95d959a10f8ecaf8b3b547c843f7f49cc665c5188d5a7ed852f78782b224653
                                                                                                                      • Instruction ID: 91391497132b15e9ef3e99cd61e60c00cc122f705da7407ef4cce1ca3cc17f8a
                                                                                                                      • Opcode Fuzzy Hash: e95d959a10f8ecaf8b3b547c843f7f49cc665c5188d5a7ed852f78782b224653
                                                                                                                      • Instruction Fuzzy Hash: E232AE70E042088BEB64DF68C894BADBBB2EF85344F15C0A9D41A9F385DB35DC85CB51
                                                                                                                      Uniqueness

                                                                                                                      Uniqueness Score: -1.00%

                                                                                                                      Memory Dump Source
                                                                                                                      • Source File: 00000014.00000002.547421294.0000000006B70000.00000040.00000800.00020000.00000000.sdmp, Offset: 06B70000, based on PE: false
                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                      • Snapshot File: hcaresult_20_2_6b70000_SHIPMENT DOCUMENTS.jbxd
                                                                                                                      Similarity
                                                                                                                      • API ID:
                                                                                                                      • String ID:
                                                                                                                      • API String ID:
                                                                                                                      • Opcode ID: 5ea40c5bee805de4363c17a6eccb0f99265c07f27e1f70fbd02bb1f3c3cd080d
                                                                                                                      • Instruction ID: 0d56b45d922f68fc9cee901ea81efe3fa4e6d3b65bd3f6c7f4cd29934b2cfdb0
                                                                                                                      • Opcode Fuzzy Hash: 5ea40c5bee805de4363c17a6eccb0f99265c07f27e1f70fbd02bb1f3c3cd080d
                                                                                                                      • Instruction Fuzzy Hash: D7C25974E002148FDBA4EB68C488B6DBBB2EF85305F1485A9E51ADB391DB35DC85CF81
                                                                                                                      Uniqueness

                                                                                                                      Uniqueness Score: -1.00%

                                                                                                                      Memory Dump Source
                                                                                                                      • Source File: 00000014.00000002.547421294.0000000006B70000.00000040.00000800.00020000.00000000.sdmp, Offset: 06B70000, based on PE: false
                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                      • Snapshot File: hcaresult_20_2_6b70000_SHIPMENT DOCUMENTS.jbxd
                                                                                                                      Similarity
                                                                                                                      • API ID:
                                                                                                                      • String ID:
                                                                                                                      • API String ID:
                                                                                                                      • Opcode ID: e95d4736fa43d39991754e2df3b29210e70c445e77d54f228b438c031fde27ea
                                                                                                                      • Instruction ID: 702bd336b3ff016561eab3c93bb68b24aecb640933ff71a8a41f0913709c167e
                                                                                                                      • Opcode Fuzzy Hash: e95d4736fa43d39991754e2df3b29210e70c445e77d54f228b438c031fde27ea
                                                                                                                      • Instruction Fuzzy Hash: 31924C70F006188FDBA4EB75C854BADB7F2AB85344F1484A9D51AAB380EF359D85CF81
                                                                                                                      Uniqueness

                                                                                                                      Uniqueness Score: -1.00%

                                                                                                                      APIs
                                                                                                                      • KiUserExceptionDispatcher.NTDLL ref: 05FF85E4
                                                                                                                      • KiUserExceptionDispatcher.NTDLL ref: 05FF8A46
                                                                                                                      Memory Dump Source
                                                                                                                      • Source File: 00000014.00000002.544287742.0000000005FF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05FF0000, based on PE: false
                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                      • Snapshot File: hcaresult_20_2_5ff0000_SHIPMENT DOCUMENTS.jbxd
                                                                                                                      Similarity
                                                                                                                      • API ID: DispatcherExceptionUser
                                                                                                                      • String ID:
                                                                                                                      • API String ID: 6842923-0
                                                                                                                      • Opcode ID: 14f7b41db7509912a577259198c6a808a5a81ff62be0bfe38afd989a9205b3dc
                                                                                                                      • Instruction ID: 643c5a835a7a217d3d4bdb77fcf3527df628f8d7543ad87f9f16577ac1568ef4
                                                                                                                      • Opcode Fuzzy Hash: 14f7b41db7509912a577259198c6a808a5a81ff62be0bfe38afd989a9205b3dc
                                                                                                                      • Instruction Fuzzy Hash: 8512CB3690225CCFCB64DF24D888A9CB7B6BF49346F1041E9E50A67750CB396E81CF62
                                                                                                                      Uniqueness

                                                                                                                      Uniqueness Score: -1.00%

                                                                                                                      APIs
                                                                                                                      • KiUserExceptionDispatcher.NTDLL ref: 05FF85E4
                                                                                                                      • KiUserExceptionDispatcher.NTDLL ref: 05FF8A46
                                                                                                                      Memory Dump Source
                                                                                                                      • Source File: 00000014.00000002.544287742.0000000005FF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05FF0000, based on PE: false
                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                      • Snapshot File: hcaresult_20_2_5ff0000_SHIPMENT DOCUMENTS.jbxd
                                                                                                                      Similarity
                                                                                                                      • API ID: DispatcherExceptionUser
                                                                                                                      • String ID:
                                                                                                                      • API String ID: 6842923-0
                                                                                                                      • Opcode ID: 78183366716ba58e81f1869b3e034e704d06313438028aed66a8b0d0e77cc6a4
                                                                                                                      • Instruction ID: 89e02dce4e4bb830f89519571f9016aa81e80e3d27073033c2ec2fbfc0b329f3
                                                                                                                      • Opcode Fuzzy Hash: 78183366716ba58e81f1869b3e034e704d06313438028aed66a8b0d0e77cc6a4
                                                                                                                      • Instruction Fuzzy Hash: 5D12CB3690225CCFCB64DF24D888A9CB7B6BF49346F1041E9E51A67750CB396E81CF62
                                                                                                                      Uniqueness

                                                                                                                      Uniqueness Score: -1.00%

                                                                                                                      APIs
                                                                                                                      • KiUserExceptionDispatcher.NTDLL ref: 05FF85E4
                                                                                                                      • KiUserExceptionDispatcher.NTDLL ref: 05FF8A46
                                                                                                                      Memory Dump Source
                                                                                                                      • Source File: 00000014.00000002.544287742.0000000005FF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05FF0000, based on PE: false
                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                      • Snapshot File: hcaresult_20_2_5ff0000_SHIPMENT DOCUMENTS.jbxd
                                                                                                                      Similarity
                                                                                                                      • API ID: DispatcherExceptionUser
                                                                                                                      • String ID:
                                                                                                                      • API String ID: 6842923-0
                                                                                                                      • Opcode ID: d00c7f1ee5ead065518c6474cf4fe6fd5d20bda8681e279274ecce3006cdcc77
                                                                                                                      • Instruction ID: c86d269be3513457dcdc211aa0e58d94ec97546f53b8f78866439ad0f0449a1a
                                                                                                                      • Opcode Fuzzy Hash: d00c7f1ee5ead065518c6474cf4fe6fd5d20bda8681e279274ecce3006cdcc77
                                                                                                                      • Instruction Fuzzy Hash: 2F02CA3690225CCFCB64DF24D888A9CB7B6BF49346F1041E9E50A67750DB396E81CF62
                                                                                                                      Uniqueness

                                                                                                                      Uniqueness Score: -1.00%

                                                                                                                      APIs
                                                                                                                      • KiUserExceptionDispatcher.NTDLL ref: 05FF85E4
                                                                                                                      • KiUserExceptionDispatcher.NTDLL ref: 05FF8A46
                                                                                                                      Memory Dump Source
                                                                                                                      • Source File: 00000014.00000002.544287742.0000000005FF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05FF0000, based on PE: false
                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                      • Snapshot File: hcaresult_20_2_5ff0000_SHIPMENT DOCUMENTS.jbxd
                                                                                                                      Similarity
                                                                                                                      • API ID: DispatcherExceptionUser
                                                                                                                      • String ID:
                                                                                                                      • API String ID: 6842923-0
                                                                                                                      • Opcode ID: 573db9e6f4720c9c3a1d5a030e13e9e6382fdbb20df2b32e71e8d81a6a93afbc
                                                                                                                      • Instruction ID: 777cce9d6e3ce6b31aaf45b255ef5c0795c6f068b3746fb5cd4c8ffa380df67a
                                                                                                                      • Opcode Fuzzy Hash: 573db9e6f4720c9c3a1d5a030e13e9e6382fdbb20df2b32e71e8d81a6a93afbc
                                                                                                                      • Instruction Fuzzy Hash: FF02CB3690225CCFCB64DF24D888A9CB7B6BF49346F1041D9E50A67750CB396E81CF62
                                                                                                                      Uniqueness

                                                                                                                      Uniqueness Score: -1.00%

                                                                                                                      APIs
                                                                                                                      • KiUserExceptionDispatcher.NTDLL ref: 05FF85E4
                                                                                                                      • KiUserExceptionDispatcher.NTDLL ref: 05FF8A46
                                                                                                                      Memory Dump Source
                                                                                                                      • Source File: 00000014.00000002.544287742.0000000005FF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05FF0000, based on PE: false
                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                      • Snapshot File: hcaresult_20_2_5ff0000_SHIPMENT DOCUMENTS.jbxd
                                                                                                                      Similarity
                                                                                                                      • API ID: DispatcherExceptionUser
                                                                                                                      • String ID:
                                                                                                                      • API String ID: 6842923-0
                                                                                                                      • Opcode ID: a2b798bef7b824c6e117c0709a469489f8683e1292bddb98bd3f63372f222bf8
                                                                                                                      • Instruction ID: 0995c7bc6be8e8419bdcd0212717e47002a4d0f4cd46924e9adb28a285db32e9
                                                                                                                      • Opcode Fuzzy Hash: a2b798bef7b824c6e117c0709a469489f8683e1292bddb98bd3f63372f222bf8
                                                                                                                      • Instruction Fuzzy Hash: 5102CB3690225CCFCB64DF24D888A9CB7B6BF49346F1041D9E50A67750DB396E81CF62
                                                                                                                      Uniqueness

                                                                                                                      Uniqueness Score: -1.00%

                                                                                                                      APIs
                                                                                                                      • KiUserExceptionDispatcher.NTDLL ref: 05FF85E4
                                                                                                                      • KiUserExceptionDispatcher.NTDLL ref: 05FF8A46
                                                                                                                      Memory Dump Source
                                                                                                                      • Source File: 00000014.00000002.544287742.0000000005FF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05FF0000, based on PE: false
                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                      • Snapshot File: hcaresult_20_2_5ff0000_SHIPMENT DOCUMENTS.jbxd
                                                                                                                      Similarity
                                                                                                                      • API ID: DispatcherExceptionUser
                                                                                                                      • String ID:
                                                                                                                      • API String ID: 6842923-0
                                                                                                                      • Opcode ID: 6b7bd6c5ef109d2ff7a2bb8e86ae2f015ffdb0f80a9d3105a33baf8e93da824f
                                                                                                                      • Instruction ID: c71293bc42e27dd1ecf7a7f1e25a73e3ea3f11a7deb55121d4dec3efac52171d
                                                                                                                      • Opcode Fuzzy Hash: 6b7bd6c5ef109d2ff7a2bb8e86ae2f015ffdb0f80a9d3105a33baf8e93da824f
                                                                                                                      • Instruction Fuzzy Hash: BD02CB3690625CCFCB64DF24D888A9CB7B6BF49346F1041D9E50A67750CB396E81CF62
                                                                                                                      Uniqueness

                                                                                                                      Uniqueness Score: -1.00%

                                                                                                                      APIs
                                                                                                                      • KiUserExceptionDispatcher.NTDLL ref: 05FF85E4
                                                                                                                      • KiUserExceptionDispatcher.NTDLL ref: 05FF8A46
                                                                                                                      Memory Dump Source
                                                                                                                      • Source File: 00000014.00000002.544287742.0000000005FF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05FF0000, based on PE: false
                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                      • Snapshot File: hcaresult_20_2_5ff0000_SHIPMENT DOCUMENTS.jbxd
                                                                                                                      Similarity
                                                                                                                      • API ID: DispatcherExceptionUser
                                                                                                                      • String ID:
                                                                                                                      • API String ID: 6842923-0
                                                                                                                      • Opcode ID: a57002981b67d709b4639b1da5da9afd59bceef81be8896be41e0b2a9d2c73f5
                                                                                                                      • Instruction ID: 5d9bfa9ca8179f9c8597ed026e377a1de956654e75c07bd914426aaaf846d996
                                                                                                                      • Opcode Fuzzy Hash: a57002981b67d709b4639b1da5da9afd59bceef81be8896be41e0b2a9d2c73f5
                                                                                                                      • Instruction Fuzzy Hash: EE02CB3690225CCFCB64DF24D888A9CB7B6BF49346F1041D9E50A67750CB396E81CF62
                                                                                                                      Uniqueness

                                                                                                                      Uniqueness Score: -1.00%

                                                                                                                      APIs
                                                                                                                      • KiUserExceptionDispatcher.NTDLL ref: 05FF85E4
                                                                                                                      • KiUserExceptionDispatcher.NTDLL ref: 05FF8A46
                                                                                                                      Memory Dump Source
                                                                                                                      • Source File: 00000014.00000002.544287742.0000000005FF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05FF0000, based on PE: false
                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                      • Snapshot File: hcaresult_20_2_5ff0000_SHIPMENT DOCUMENTS.jbxd
                                                                                                                      Similarity
                                                                                                                      • API ID: DispatcherExceptionUser
                                                                                                                      • String ID:
                                                                                                                      • API String ID: 6842923-0
                                                                                                                      • Opcode ID: fd9224f03fdaf955e97fbb6a1498fc748f2161860743fcc34d19bb29ec41f931
                                                                                                                      • Instruction ID: 47a9622a9d0f072306deadaf2609d99ce941360064fe91895406250bfb6a1269
                                                                                                                      • Opcode Fuzzy Hash: fd9224f03fdaf955e97fbb6a1498fc748f2161860743fcc34d19bb29ec41f931
                                                                                                                      • Instruction Fuzzy Hash: A0F1CB3690225CCFCB64DF24D888A9CB7B6BF49346F1041D9E50A67750CB396E81CF62
                                                                                                                      Uniqueness

                                                                                                                      Uniqueness Score: -1.00%

                                                                                                                      APIs
                                                                                                                      • KiUserExceptionDispatcher.NTDLL ref: 05FF85E4
                                                                                                                      • KiUserExceptionDispatcher.NTDLL ref: 05FF8A46
                                                                                                                      Memory Dump Source
                                                                                                                      • Source File: 00000014.00000002.544287742.0000000005FF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05FF0000, based on PE: false
                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                      • Snapshot File: hcaresult_20_2_5ff0000_SHIPMENT DOCUMENTS.jbxd
                                                                                                                      Similarity
                                                                                                                      • API ID: DispatcherExceptionUser
                                                                                                                      • String ID:
                                                                                                                      • API String ID: 6842923-0
                                                                                                                      • Opcode ID: 354e4b627313b56644bab17e3f98f26112fc412abed7695f3e7ce533032e008f
                                                                                                                      • Instruction ID: 75c7ca817aa47d6ae006fab32c1a92d2565423fa90c93eadb4d4cbfb88e89d9f
                                                                                                                      • Opcode Fuzzy Hash: 354e4b627313b56644bab17e3f98f26112fc412abed7695f3e7ce533032e008f
                                                                                                                      • Instruction Fuzzy Hash: 78F1CB3690225CCFCB64DF24D888A9CB7B6BF49346F1041D9E50AA7750CB396E81CF62
                                                                                                                      Uniqueness

                                                                                                                      Uniqueness Score: -1.00%

                                                                                                                      APIs
                                                                                                                      • KiUserExceptionDispatcher.NTDLL ref: 05FF85E4
                                                                                                                      • KiUserExceptionDispatcher.NTDLL ref: 05FF8A46
                                                                                                                      Memory Dump Source
                                                                                                                      • Source File: 00000014.00000002.544287742.0000000005FF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05FF0000, based on PE: false
                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                      • Snapshot File: hcaresult_20_2_5ff0000_SHIPMENT DOCUMENTS.jbxd
                                                                                                                      Similarity
                                                                                                                      • API ID: DispatcherExceptionUser
                                                                                                                      • String ID:
                                                                                                                      • API String ID: 6842923-0
                                                                                                                      • Opcode ID: 1bb326b8787ab2238ea46fe9e573787f47ca12e1aa1685d52339568c65dd86df
                                                                                                                      • Instruction ID: 3e88533e5b971087937f9c58be37f01dea24795ade93f59623fa7530b91bd44a
                                                                                                                      • Opcode Fuzzy Hash: 1bb326b8787ab2238ea46fe9e573787f47ca12e1aa1685d52339568c65dd86df
                                                                                                                      • Instruction Fuzzy Hash: 67F1DB3690225CCFCB64DF24D888A9CB7B6BF49346F1041D9E50A67750CB396E81CF62
                                                                                                                      Uniqueness

                                                                                                                      Uniqueness Score: -1.00%

                                                                                                                      APIs
                                                                                                                      • KiUserExceptionDispatcher.NTDLL ref: 05FF85E4
                                                                                                                      • KiUserExceptionDispatcher.NTDLL ref: 05FF8A46
                                                                                                                      Memory Dump Source
                                                                                                                      • Source File: 00000014.00000002.544287742.0000000005FF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05FF0000, based on PE: false
                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                      • Snapshot File: hcaresult_20_2_5ff0000_SHIPMENT DOCUMENTS.jbxd
                                                                                                                      Similarity
                                                                                                                      • API ID: DispatcherExceptionUser
                                                                                                                      • String ID:
                                                                                                                      • API String ID: 6842923-0
                                                                                                                      • Opcode ID: 44b2758df78589989d272bebcc8e84c94c98c164a6170a54ac19f0f4cdeb7125
                                                                                                                      • Instruction ID: 9e48253a2a79b48365429575bdc2eaa0a81cd775e184b9b59a06303edaa9c477
                                                                                                                      • Opcode Fuzzy Hash: 44b2758df78589989d272bebcc8e84c94c98c164a6170a54ac19f0f4cdeb7125
                                                                                                                      • Instruction Fuzzy Hash: 85F1DB3590225CCFCB64DF24D888A9CB7B6BF49346F1041D9E50A67750CB396E81CF62
                                                                                                                      Uniqueness

                                                                                                                      Uniqueness Score: -1.00%

                                                                                                                      APIs
                                                                                                                      • KiUserExceptionDispatcher.NTDLL ref: 05FF85E4
                                                                                                                      • KiUserExceptionDispatcher.NTDLL ref: 05FF8A46
                                                                                                                      Memory Dump Source
                                                                                                                      • Source File: 00000014.00000002.544287742.0000000005FF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05FF0000, based on PE: false
                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                      • Snapshot File: hcaresult_20_2_5ff0000_SHIPMENT DOCUMENTS.jbxd
                                                                                                                      Similarity
                                                                                                                      • API ID: DispatcherExceptionUser
                                                                                                                      • String ID:
                                                                                                                      • API String ID: 6842923-0
                                                                                                                      • Opcode ID: 7de52dbd342e753bf3529eeadf290744c616552ea8b2b972e88156e652468090
                                                                                                                      • Instruction ID: 912a79a7093c0999ee38dfea152370c18bb3169f7e2b9f9162c82cb0715eddff
                                                                                                                      • Opcode Fuzzy Hash: 7de52dbd342e753bf3529eeadf290744c616552ea8b2b972e88156e652468090
                                                                                                                      • Instruction Fuzzy Hash: 2CE1DB36902258CFCB64DF34D888A9CB7B6BF49346F1041D9E50AA7750DB396E81CF62
                                                                                                                      Uniqueness

                                                                                                                      Uniqueness Score: -1.00%

                                                                                                                      APIs
                                                                                                                      • KiUserExceptionDispatcher.NTDLL ref: 05FF85E4
                                                                                                                      • KiUserExceptionDispatcher.NTDLL ref: 05FF8A46
                                                                                                                      Memory Dump Source
                                                                                                                      • Source File: 00000014.00000002.544287742.0000000005FF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05FF0000, based on PE: false
                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                      • Snapshot File: hcaresult_20_2_5ff0000_SHIPMENT DOCUMENTS.jbxd
                                                                                                                      Similarity
                                                                                                                      • API ID: DispatcherExceptionUser
                                                                                                                      • String ID:
                                                                                                                      • API String ID: 6842923-0
                                                                                                                      • Opcode ID: 717be2baf4bec1f43e627190ec593a609352884d0a292ba86b0736082fbf1d26
                                                                                                                      • Instruction ID: ceb8254582c0b63d21f46d5fd16376a5c65aaced3421ff29e18f490cd6df2460
                                                                                                                      • Opcode Fuzzy Hash: 717be2baf4bec1f43e627190ec593a609352884d0a292ba86b0736082fbf1d26
                                                                                                                      • Instruction Fuzzy Hash: 29E1DB35902258CFCB64DF34D888A9CB7B6BF49346F1041D9E50AA7750DB396E81CF62
                                                                                                                      Uniqueness

                                                                                                                      Uniqueness Score: -1.00%

                                                                                                                      APIs
                                                                                                                      • KiUserExceptionDispatcher.NTDLL ref: 05FF85E4
                                                                                                                      • KiUserExceptionDispatcher.NTDLL ref: 05FF8A46
                                                                                                                      Memory Dump Source
                                                                                                                      • Source File: 00000014.00000002.544287742.0000000005FF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05FF0000, based on PE: false
                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                      • Snapshot File: hcaresult_20_2_5ff0000_SHIPMENT DOCUMENTS.jbxd
                                                                                                                      Similarity
                                                                                                                      • API ID: DispatcherExceptionUser
                                                                                                                      • String ID:
                                                                                                                      • API String ID: 6842923-0
                                                                                                                      • Opcode ID: e5f8de91256dfe2c484d5087123033d5f8b92ad34b5960003eb9e42e46f58922
                                                                                                                      • Instruction ID: 83bd243a59cb6a69597c3e95efd940ad7a4b9c994ba15fbaa765e3670621e4fb
                                                                                                                      • Opcode Fuzzy Hash: e5f8de91256dfe2c484d5087123033d5f8b92ad34b5960003eb9e42e46f58922
                                                                                                                      • Instruction Fuzzy Hash: B6E1EC35902258CFCB64DF34D888A9CBBB6BF49346F1041D9E50AA7750DB396E81CF62
                                                                                                                      Uniqueness

                                                                                                                      Uniqueness Score: -1.00%

                                                                                                                      APIs
                                                                                                                      • KiUserExceptionDispatcher.NTDLL ref: 05FF85E4
                                                                                                                      • KiUserExceptionDispatcher.NTDLL ref: 05FF8A46
                                                                                                                      Memory Dump Source
                                                                                                                      • Source File: 00000014.00000002.544287742.0000000005FF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05FF0000, based on PE: false
                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                      • Snapshot File: hcaresult_20_2_5ff0000_SHIPMENT DOCUMENTS.jbxd
                                                                                                                      Similarity
                                                                                                                      • API ID: DispatcherExceptionUser
                                                                                                                      • String ID:
                                                                                                                      • API String ID: 6842923-0
                                                                                                                      • Opcode ID: 97526a188d81538aa04f7aab6cbabd83ef8a21dbc75ae44ae76009279e704f14
                                                                                                                      • Instruction ID: d5c237b0b405d117900f8b3d60ecaf8beaf005f679833c70eb7314792701d5d8
                                                                                                                      • Opcode Fuzzy Hash: 97526a188d81538aa04f7aab6cbabd83ef8a21dbc75ae44ae76009279e704f14
                                                                                                                      • Instruction Fuzzy Hash: 7EE1DB35906258CFCB64DF34D888A9CB7B6BF49346F1041E9E50AA7750CB396E81CF62
                                                                                                                      Uniqueness

                                                                                                                      Uniqueness Score: -1.00%

                                                                                                                      APIs
                                                                                                                      • KiUserExceptionDispatcher.NTDLL ref: 05FF85E4
                                                                                                                      • KiUserExceptionDispatcher.NTDLL ref: 05FF8A46
                                                                                                                      Memory Dump Source
                                                                                                                      • Source File: 00000014.00000002.544287742.0000000005FF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05FF0000, based on PE: false
                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                      • Snapshot File: hcaresult_20_2_5ff0000_SHIPMENT DOCUMENTS.jbxd
                                                                                                                      Similarity
                                                                                                                      • API ID: DispatcherExceptionUser
                                                                                                                      • String ID:
                                                                                                                      • API String ID: 6842923-0
                                                                                                                      • Opcode ID: 863017a9a1346248e0ac9411cd90f3a3f5f79b52afaf2936d6b7a78eab06865f
                                                                                                                      • Instruction ID: 874f0e9fab414a3b8691c2182e7c1c2154205197fb186960634c00d8e9a0a3d5
                                                                                                                      • Opcode Fuzzy Hash: 863017a9a1346248e0ac9411cd90f3a3f5f79b52afaf2936d6b7a78eab06865f
                                                                                                                      • Instruction Fuzzy Hash: 11D1DA35906258CFCB64DF24D888A9CB7B6BF49346F1041E9E50AA7750CB396E81CF62
                                                                                                                      Uniqueness

                                                                                                                      Uniqueness Score: -1.00%

                                                                                                                      APIs
                                                                                                                      • KiUserExceptionDispatcher.NTDLL ref: 05FF85E4
                                                                                                                      • KiUserExceptionDispatcher.NTDLL ref: 05FF8A46
                                                                                                                      Memory Dump Source
                                                                                                                      • Source File: 00000014.00000002.544287742.0000000005FF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05FF0000, based on PE: false
                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                      • Snapshot File: hcaresult_20_2_5ff0000_SHIPMENT DOCUMENTS.jbxd
                                                                                                                      Similarity
                                                                                                                      • API ID: DispatcherExceptionUser
                                                                                                                      • String ID:
                                                                                                                      • API String ID: 6842923-0
                                                                                                                      • Opcode ID: dc0ce815c8b082ca3fff33e8346215d8fc94cc0ae614daa4013c3d674b90209f
                                                                                                                      • Instruction ID: a0c7ecb134f841b1fe6f2bf78a526593e502bb02a37a1f1f12201a29f3391aed
                                                                                                                      • Opcode Fuzzy Hash: dc0ce815c8b082ca3fff33e8346215d8fc94cc0ae614daa4013c3d674b90209f
                                                                                                                      • Instruction Fuzzy Hash: 01D1DB35906258CFCB64DF34D888A9CB7B6BF49346F1041E9E50AA7750DB396E81CF22
                                                                                                                      Uniqueness

                                                                                                                      Uniqueness Score: -1.00%

                                                                                                                      APIs
                                                                                                                      • KiUserExceptionDispatcher.NTDLL ref: 05FF85E4
                                                                                                                      • KiUserExceptionDispatcher.NTDLL ref: 05FF8A46
                                                                                                                      Memory Dump Source
                                                                                                                      • Source File: 00000014.00000002.544287742.0000000005FF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05FF0000, based on PE: false
                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                      • Snapshot File: hcaresult_20_2_5ff0000_SHIPMENT DOCUMENTS.jbxd
                                                                                                                      Similarity
                                                                                                                      • API ID: DispatcherExceptionUser
                                                                                                                      • String ID:
                                                                                                                      • API String ID: 6842923-0
                                                                                                                      • Opcode ID: d59f7fcaf316172ca53893f946378b59da7f4eabaacfcd96302aee443e64fdb0
                                                                                                                      • Instruction ID: fbd30c10c06d6c4a165a91afd5206c340540f213c2cb32079b1b0ab3f53dc3ca
                                                                                                                      • Opcode Fuzzy Hash: d59f7fcaf316172ca53893f946378b59da7f4eabaacfcd96302aee443e64fdb0
                                                                                                                      • Instruction Fuzzy Hash: 9FD1EC35906258CFCB64DF34D888A9CB7B6BF49346F1041D9E50AA7750CB396E81CF22
                                                                                                                      Uniqueness

                                                                                                                      Uniqueness Score: -1.00%

                                                                                                                      APIs
                                                                                                                      • KiUserExceptionDispatcher.NTDLL ref: 05FF85E4
                                                                                                                      • KiUserExceptionDispatcher.NTDLL ref: 05FF8A46
                                                                                                                      Memory Dump Source
                                                                                                                      • Source File: 00000014.00000002.544287742.0000000005FF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05FF0000, based on PE: false
                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                      • Snapshot File: hcaresult_20_2_5ff0000_SHIPMENT DOCUMENTS.jbxd
                                                                                                                      Similarity
                                                                                                                      • API ID: DispatcherExceptionUser
                                                                                                                      • String ID:
                                                                                                                      • API String ID: 6842923-0
                                                                                                                      • Opcode ID: c600f112d61a1b1e9b48b4ea1f33d53b29c74328f1d5eee893c88d0e3fb291a3
                                                                                                                      • Instruction ID: d96d5f9ab415bbd0be12e683e995e932823f1ae736fe5144f961110d630e9e0c
                                                                                                                      • Opcode Fuzzy Hash: c600f112d61a1b1e9b48b4ea1f33d53b29c74328f1d5eee893c88d0e3fb291a3
                                                                                                                      • Instruction Fuzzy Hash: 06C1DB35906258CFCB64DF34D888A9CB7B6BF49346F1041E9D50AA7750CB395E81CF62
                                                                                                                      Uniqueness

                                                                                                                      Uniqueness Score: -1.00%

                                                                                                                      APIs
                                                                                                                      • KiUserExceptionDispatcher.NTDLL ref: 05FF85E4
                                                                                                                      • KiUserExceptionDispatcher.NTDLL ref: 05FF8A46
                                                                                                                      Memory Dump Source
                                                                                                                      • Source File: 00000014.00000002.544287742.0000000005FF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05FF0000, based on PE: false
                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                      • Snapshot File: hcaresult_20_2_5ff0000_SHIPMENT DOCUMENTS.jbxd
                                                                                                                      Similarity
                                                                                                                      • API ID: DispatcherExceptionUser
                                                                                                                      • String ID:
                                                                                                                      • API String ID: 6842923-0
                                                                                                                      • Opcode ID: 87c89d60f5bb7a9482f31f5257779eb3485d472b41db454eb1b4d275294edb1f
                                                                                                                      • Instruction ID: d5877270795486da919ef60fc75e3e8c9d51b8338b18f44ef7ff86778ebd2bcf
                                                                                                                      • Opcode Fuzzy Hash: 87c89d60f5bb7a9482f31f5257779eb3485d472b41db454eb1b4d275294edb1f
                                                                                                                      • Instruction Fuzzy Hash: C1C1EA35906258CFCB64DF34D888A9CBBB6BF49346F1041D9D50AA7750CB396E81CF62
                                                                                                                      Uniqueness

                                                                                                                      Uniqueness Score: -1.00%

                                                                                                                      APIs
                                                                                                                      • KiUserExceptionDispatcher.NTDLL ref: 05FF85E4
                                                                                                                      • KiUserExceptionDispatcher.NTDLL ref: 05FF8A46
                                                                                                                      Memory Dump Source
                                                                                                                      • Source File: 00000014.00000002.544287742.0000000005FF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05FF0000, based on PE: false
                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                      • Snapshot File: hcaresult_20_2_5ff0000_SHIPMENT DOCUMENTS.jbxd
                                                                                                                      Similarity
                                                                                                                      • API ID: DispatcherExceptionUser
                                                                                                                      • String ID:
                                                                                                                      • API String ID: 6842923-0
                                                                                                                      • Opcode ID: 691e3e9957c427af407cb82eae7a58d23525b8ddc1e385269f093c5978a14695
                                                                                                                      • Instruction ID: 839956c4c80a77cde67ae807cf8c67b9362d1c590baa3b5da21c12b78fdc7f4f
                                                                                                                      • Opcode Fuzzy Hash: 691e3e9957c427af407cb82eae7a58d23525b8ddc1e385269f093c5978a14695
                                                                                                                      • Instruction Fuzzy Hash: 65C1DB35906258CFCB64DF34D888A9CB7B6BF49346F1041D9D50AA7750DB395E81CF12
                                                                                                                      Uniqueness

                                                                                                                      Uniqueness Score: -1.00%

                                                                                                                      APIs
                                                                                                                      • KiUserExceptionDispatcher.NTDLL ref: 05FF85E4
                                                                                                                      • KiUserExceptionDispatcher.NTDLL ref: 05FF8A46
                                                                                                                      Memory Dump Source
                                                                                                                      • Source File: 00000014.00000002.544287742.0000000005FF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05FF0000, based on PE: false
                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                      • Snapshot File: hcaresult_20_2_5ff0000_SHIPMENT DOCUMENTS.jbxd
                                                                                                                      Similarity
                                                                                                                      • API ID: DispatcherExceptionUser
                                                                                                                      • String ID:
                                                                                                                      • API String ID: 6842923-0
                                                                                                                      • Opcode ID: 03780ec2ec2c6afece947122a6ab2c6c88c519142367eb4c33e4fe232809bdc6
                                                                                                                      • Instruction ID: 10060fd9cc6de6419ef019ef4a5fec9e81d72cbdb32dab4ca6d8c1d09059e68a
                                                                                                                      • Opcode Fuzzy Hash: 03780ec2ec2c6afece947122a6ab2c6c88c519142367eb4c33e4fe232809bdc6
                                                                                                                      • Instruction Fuzzy Hash: 81B1EA36906258CFCB64DF34D888A9CBBB6BF49346F1041D9D50AA7750DB396E81CF22
                                                                                                                      Uniqueness

                                                                                                                      Uniqueness Score: -1.00%

                                                                                                                      APIs
                                                                                                                      • KiUserExceptionDispatcher.NTDLL ref: 05FF85E4
                                                                                                                      • KiUserExceptionDispatcher.NTDLL ref: 05FF8A46
                                                                                                                      Memory Dump Source
                                                                                                                      • Source File: 00000014.00000002.544287742.0000000005FF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05FF0000, based on PE: false
                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                      • Snapshot File: hcaresult_20_2_5ff0000_SHIPMENT DOCUMENTS.jbxd
                                                                                                                      Similarity
                                                                                                                      • API ID: DispatcherExceptionUser
                                                                                                                      • String ID:
                                                                                                                      • API String ID: 6842923-0
                                                                                                                      • Opcode ID: d1eb78b41ba5387f9830b55b1131944efaec104b9c0b615695a6c755f5fb65e4
                                                                                                                      • Instruction ID: 2b25408d6fb585e67d6a37b5e1ab39511001f4288d26af9491ae865b177cba66
                                                                                                                      • Opcode Fuzzy Hash: d1eb78b41ba5387f9830b55b1131944efaec104b9c0b615695a6c755f5fb65e4
                                                                                                                      • Instruction Fuzzy Hash: 20B1DA36906258CFCB64DF34D888A9CB7B6BF49346F1041D9D50AA7750CB396E81CF22
                                                                                                                      Uniqueness

                                                                                                                      Uniqueness Score: -1.00%

                                                                                                                      APIs
                                                                                                                      • KiUserExceptionDispatcher.NTDLL ref: 05FF85E4
                                                                                                                      • KiUserExceptionDispatcher.NTDLL ref: 05FF8A46
                                                                                                                      Memory Dump Source
                                                                                                                      • Source File: 00000014.00000002.544287742.0000000005FF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05FF0000, based on PE: false
                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                      • Snapshot File: hcaresult_20_2_5ff0000_SHIPMENT DOCUMENTS.jbxd
                                                                                                                      Similarity
                                                                                                                      • API ID: DispatcherExceptionUser
                                                                                                                      • String ID:
                                                                                                                      • API String ID: 6842923-0
                                                                                                                      • Opcode ID: 3a5c5ef58f3882288bc919766db62ad173e713901b628e48a595452a9269a11e
                                                                                                                      • Instruction ID: a09bf3fd8e93a211a077dea0a708ed6250a5dfb9b16d7a1486596f6368d3f433
                                                                                                                      • Opcode Fuzzy Hash: 3a5c5ef58f3882288bc919766db62ad173e713901b628e48a595452a9269a11e
                                                                                                                      • Instruction Fuzzy Hash: 0DB1EA36906258CFCB64DF34D888A9CB7B6BF49346F1041D9D50AA7750CB396E81CF62
                                                                                                                      Uniqueness

                                                                                                                      Uniqueness Score: -1.00%

                                                                                                                      APIs
                                                                                                                      • KiUserExceptionDispatcher.NTDLL ref: 05FF85E4
                                                                                                                      • KiUserExceptionDispatcher.NTDLL ref: 05FF8A46
                                                                                                                      Memory Dump Source
                                                                                                                      • Source File: 00000014.00000002.544287742.0000000005FF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05FF0000, based on PE: false
                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                      • Snapshot File: hcaresult_20_2_5ff0000_SHIPMENT DOCUMENTS.jbxd
                                                                                                                      Similarity
                                                                                                                      • API ID: DispatcherExceptionUser
                                                                                                                      • String ID:
                                                                                                                      • API String ID: 6842923-0
                                                                                                                      • Opcode ID: a3fe904fcd0a22477afd46db0b30070da798aebcda7de3a3e38b1f19beeb29df
                                                                                                                      • Instruction ID: cd5845dcffdcfe2b888c8c72e6be8761b9ea0f76a2e5f92aa2d15dc7147a2f4d
                                                                                                                      • Opcode Fuzzy Hash: a3fe904fcd0a22477afd46db0b30070da798aebcda7de3a3e38b1f19beeb29df
                                                                                                                      • Instruction Fuzzy Hash: 34A1DA36906258CFCB64DF34D888A9CB7B6BF49346F1041E9D50AA7750DB396E81CF22
                                                                                                                      Uniqueness

                                                                                                                      Uniqueness Score: -1.00%

                                                                                                                      APIs
                                                                                                                      • KiUserExceptionDispatcher.NTDLL ref: 05FF85E4
                                                                                                                      • KiUserExceptionDispatcher.NTDLL ref: 05FF8A46
                                                                                                                      Memory Dump Source
                                                                                                                      • Source File: 00000014.00000002.544287742.0000000005FF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05FF0000, based on PE: false
                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                      • Snapshot File: hcaresult_20_2_5ff0000_SHIPMENT DOCUMENTS.jbxd
                                                                                                                      Similarity
                                                                                                                      • API ID: DispatcherExceptionUser
                                                                                                                      • String ID:
                                                                                                                      • API String ID: 6842923-0
                                                                                                                      • Opcode ID: 80bfb5ac40e5fc5bd134e17a7604940b60dfe9f28e4bac498100641ed4549913
                                                                                                                      • Instruction ID: 9e6bb2d6750142c646bf152141714bb4a0b6285d1798c14d25692d2f881442fb
                                                                                                                      • Opcode Fuzzy Hash: 80bfb5ac40e5fc5bd134e17a7604940b60dfe9f28e4bac498100641ed4549913
                                                                                                                      • Instruction Fuzzy Hash: 0AA1E936906218CFCB64DF34D888A9CBBB6BF49346F1041D9D50AA7750CB396E81CF22
                                                                                                                      Uniqueness

                                                                                                                      Uniqueness Score: -1.00%

                                                                                                                      APIs
                                                                                                                      • KiUserExceptionDispatcher.NTDLL ref: 05FF85E4
                                                                                                                      • KiUserExceptionDispatcher.NTDLL ref: 05FF8A46
                                                                                                                      Memory Dump Source
                                                                                                                      • Source File: 00000014.00000002.544287742.0000000005FF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05FF0000, based on PE: false
                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                      • Snapshot File: hcaresult_20_2_5ff0000_SHIPMENT DOCUMENTS.jbxd
                                                                                                                      Similarity
                                                                                                                      • API ID: DispatcherExceptionUser
                                                                                                                      • String ID:
                                                                                                                      • API String ID: 6842923-0
                                                                                                                      • Opcode ID: d2f7676ec9d6aef8e85d4587b58fff5d264ee784c7ae4dfa167303562c3340c4
                                                                                                                      • Instruction ID: b79fbe863cb105f3fe16339bc769d546046c6333523bedc281d48ba04a14bf8d
                                                                                                                      • Opcode Fuzzy Hash: d2f7676ec9d6aef8e85d4587b58fff5d264ee784c7ae4dfa167303562c3340c4
                                                                                                                      • Instruction Fuzzy Hash: 6AA1D936906218CFCB64DF34D888A9DBBB6BF49345F1041D9D50AA7750DB396E81CF22
                                                                                                                      Uniqueness

                                                                                                                      Uniqueness Score: -1.00%

                                                                                                                      Strings
                                                                                                                      Memory Dump Source
                                                                                                                      • Source File: 00000014.00000002.547421294.0000000006B70000.00000040.00000800.00020000.00000000.sdmp, Offset: 06B70000, based on PE: false
                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                      • Snapshot File: hcaresult_20_2_6b70000_SHIPMENT DOCUMENTS.jbxd
                                                                                                                      Similarity
                                                                                                                      • API ID:
                                                                                                                      • String ID: D0Rl$xMl
                                                                                                                      • API String ID: 0-1095133220
                                                                                                                      • Opcode ID: 4ef6cf08b12cbff3388595a2698e2db91ad4b0aaaa459e7c604f54c4af480c92
                                                                                                                      • Instruction ID: 19efa68e4002e33413aa9d96f508af251483c52387d80a291be708919c247b63
                                                                                                                      • Opcode Fuzzy Hash: 4ef6cf08b12cbff3388595a2698e2db91ad4b0aaaa459e7c604f54c4af480c92
                                                                                                                      • Instruction Fuzzy Hash: FEA1EFB1B042158FDBA4AB7AC864A2E77A6EF84340F1644AAD512CB395DF35CC41CB91
                                                                                                                      Uniqueness

                                                                                                                      Uniqueness Score: -1.00%

                                                                                                                      Strings
                                                                                                                      Memory Dump Source
                                                                                                                      • Source File: 00000014.00000002.547421294.0000000006B70000.00000040.00000800.00020000.00000000.sdmp, Offset: 06B70000, based on PE: false
                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                      • Snapshot File: hcaresult_20_2_6b70000_SHIPMENT DOCUMENTS.jbxd
                                                                                                                      Similarity
                                                                                                                      • API ID:
                                                                                                                      • String ID: XcRl$XcRl
                                                                                                                      • API String ID: 0-108768882
                                                                                                                      • Opcode ID: 1d60a5fc2380718061a3828fb3ea1ee99b359748f1f436ff7967190c149f2725
                                                                                                                      • Instruction ID: 8defb6270bad9c13b7182288d9f062d3c25621c1d78c95482a5f12cb24448a62
                                                                                                                      • Opcode Fuzzy Hash: 1d60a5fc2380718061a3828fb3ea1ee99b359748f1f436ff7967190c149f2725
                                                                                                                      • Instruction Fuzzy Hash: 2D91CE70B001199FDB95EBA8C854BBE77A6EF88344F148468E62ADB390CF34DD41C796
                                                                                                                      Uniqueness

                                                                                                                      Uniqueness Score: -1.00%

                                                                                                                      APIs
                                                                                                                      • VirtualAllocExNuma.KERNELBASE(?,?,?,?,?,?), ref: 02CF0B0E
                                                                                                                      Memory Dump Source
                                                                                                                      • Source File: 00000014.00000002.520495341.0000000002CF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02CF0000, based on PE: false
                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                      • Snapshot File: hcaresult_20_2_2cf0000_SHIPMENT DOCUMENTS.jbxd
                                                                                                                      Similarity
                                                                                                                      • API ID: AllocNumaVirtual
                                                                                                                      • String ID:
                                                                                                                      • API String ID: 4233825816-0
                                                                                                                      • Opcode ID: 79d58044754b897593ba63c2c2639c9b0094996e7dbcbcecfdf1ba4a539c1eb7
                                                                                                                      • Instruction ID: d78fecb7551f2611c2e0043749b0d9e996cc74ce4b690c9a6bffa29cb1e70576
                                                                                                                      • Opcode Fuzzy Hash: 79d58044754b897593ba63c2c2639c9b0094996e7dbcbcecfdf1ba4a539c1eb7
                                                                                                                      • Instruction Fuzzy Hash: 5B91E370E042488FDF91CFA9C8907EDBFB0EF8A710F20446AD655E7296E7349945CB91
                                                                                                                      Uniqueness

                                                                                                                      Uniqueness Score: -1.00%

                                                                                                                      APIs
                                                                                                                      • KiUserExceptionDispatcher.NTDLL ref: 05FF8A46
                                                                                                                      Memory Dump Source
                                                                                                                      • Source File: 00000014.00000002.544287742.0000000005FF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05FF0000, based on PE: false
                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                      • Snapshot File: hcaresult_20_2_5ff0000_SHIPMENT DOCUMENTS.jbxd
                                                                                                                      Similarity
                                                                                                                      • API ID: DispatcherExceptionUser
                                                                                                                      • String ID:
                                                                                                                      • API String ID: 6842923-0
                                                                                                                      • Opcode ID: f203c20b7916ee92e05a63cc01cde7c1d5f68373ad22070819c3be1d35c1ef23
                                                                                                                      • Instruction ID: 6f68ddcab8b2af570ba0c72ea216985f35dd5b32d6db03b4d1634fa2a775df7b
                                                                                                                      • Opcode Fuzzy Hash: f203c20b7916ee92e05a63cc01cde7c1d5f68373ad22070819c3be1d35c1ef23
                                                                                                                      • Instruction Fuzzy Hash: CF91E936906218CFCB64DF34D888A9DBBB6BF49345F1041D9D50AA7750CB396E81CF22
                                                                                                                      Uniqueness

                                                                                                                      Uniqueness Score: -1.00%

                                                                                                                      APIs
                                                                                                                      • KiUserExceptionDispatcher.NTDLL ref: 05FF8A46
                                                                                                                      Memory Dump Source
                                                                                                                      • Source File: 00000014.00000002.544287742.0000000005FF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05FF0000, based on PE: false
                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                      • Snapshot File: hcaresult_20_2_5ff0000_SHIPMENT DOCUMENTS.jbxd
                                                                                                                      Similarity
                                                                                                                      • API ID: DispatcherExceptionUser
                                                                                                                      • String ID:
                                                                                                                      • API String ID: 6842923-0
                                                                                                                      • Opcode ID: 60b994b2d13c1d041417416637bae695f50815eef72fd8d53aade0e68291c6b3
                                                                                                                      • Instruction ID: ae9e609b454a77cb395e599b6b47220548280d23199d45b12addf66af698b4e2
                                                                                                                      • Opcode Fuzzy Hash: 60b994b2d13c1d041417416637bae695f50815eef72fd8d53aade0e68291c6b3
                                                                                                                      • Instruction Fuzzy Hash: 3D91CA36906228CFCB64DF34D888A9DBBB6BF49345F1041D9D50AA7750DB396E81CF12
                                                                                                                      Uniqueness

                                                                                                                      Uniqueness Score: -1.00%

                                                                                                                      APIs
                                                                                                                      • KiUserExceptionDispatcher.NTDLL ref: 05FF8A46
                                                                                                                      Memory Dump Source
                                                                                                                      • Source File: 00000014.00000002.544287742.0000000005FF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05FF0000, based on PE: false
                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                      • Snapshot File: hcaresult_20_2_5ff0000_SHIPMENT DOCUMENTS.jbxd
                                                                                                                      Similarity
                                                                                                                      • API ID: DispatcherExceptionUser
                                                                                                                      • String ID:
                                                                                                                      • API String ID: 6842923-0
                                                                                                                      • Opcode ID: a41bcda422e6f96e8bd5361f4cb2e0fe4fb421c14e9624025ac43efedac76ba1
                                                                                                                      • Instruction ID: c02d1cb451622b1c76082224c4167767bf5e3eeffda8c5860c3b4d3d54ad57a7
                                                                                                                      • Opcode Fuzzy Hash: a41bcda422e6f96e8bd5361f4cb2e0fe4fb421c14e9624025ac43efedac76ba1
                                                                                                                      • Instruction Fuzzy Hash: 7B81D936906228CFCB64DF34D888A9DBBB6BF49345F1041D9D50AA7750DB396E81CF22
                                                                                                                      Uniqueness

                                                                                                                      Uniqueness Score: -1.00%

                                                                                                                      APIs
                                                                                                                      • KiUserExceptionDispatcher.NTDLL ref: 05FF8A46
                                                                                                                      Memory Dump Source
                                                                                                                      • Source File: 00000014.00000002.544287742.0000000005FF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05FF0000, based on PE: false
                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                      • Snapshot File: hcaresult_20_2_5ff0000_SHIPMENT DOCUMENTS.jbxd
                                                                                                                      Similarity
                                                                                                                      • API ID: DispatcherExceptionUser
                                                                                                                      • String ID:
                                                                                                                      • API String ID: 6842923-0
                                                                                                                      • Opcode ID: 63a6dff28f564b6eef33d4c49eacc66c46a62e7b445e3fcdbfba37f46b2c53d2
                                                                                                                      • Instruction ID: 5ac405acb2a6517befccadc105d074127d621396ea31db53c0c396bd3f9fcbb9
                                                                                                                      • Opcode Fuzzy Hash: 63a6dff28f564b6eef33d4c49eacc66c46a62e7b445e3fcdbfba37f46b2c53d2
                                                                                                                      • Instruction Fuzzy Hash: E281D836906228CFCB65DF34D888A9DB7B6BF49345F1041DAD50AA7750CB396E81CF22
                                                                                                                      Uniqueness

                                                                                                                      Uniqueness Score: -1.00%

                                                                                                                      APIs
                                                                                                                      • KiUserExceptionDispatcher.NTDLL ref: 05FF8A46
                                                                                                                      Memory Dump Source
                                                                                                                      • Source File: 00000014.00000002.544287742.0000000005FF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05FF0000, based on PE: false
                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                      • Snapshot File: hcaresult_20_2_5ff0000_SHIPMENT DOCUMENTS.jbxd
                                                                                                                      Similarity
                                                                                                                      • API ID: DispatcherExceptionUser
                                                                                                                      • String ID:
                                                                                                                      • API String ID: 6842923-0
                                                                                                                      • Opcode ID: 78e9b537132274919d1339a3c156a78835723927446c69ee6390acc9a0b87814
                                                                                                                      • Instruction ID: b88a22964edf5e58f5777992ed26ab71e977fb3a1f7446f27cc051556fadd0e9
                                                                                                                      • Opcode Fuzzy Hash: 78e9b537132274919d1339a3c156a78835723927446c69ee6390acc9a0b87814
                                                                                                                      • Instruction Fuzzy Hash: 9171D936906228CFCB64DF34D888A9DB7B6BF49345F1041D9D50AA7750CB396E81CF62
                                                                                                                      Uniqueness

                                                                                                                      Uniqueness Score: -1.00%

                                                                                                                      APIs
                                                                                                                      • KiUserExceptionDispatcher.NTDLL ref: 05FF8A46
                                                                                                                      Memory Dump Source
                                                                                                                      • Source File: 00000014.00000002.544287742.0000000005FF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05FF0000, based on PE: false
                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                      • Snapshot File: hcaresult_20_2_5ff0000_SHIPMENT DOCUMENTS.jbxd
                                                                                                                      Similarity
                                                                                                                      • API ID: DispatcherExceptionUser
                                                                                                                      • String ID:
                                                                                                                      • API String ID: 6842923-0
                                                                                                                      • Opcode ID: 935c499293d43e1a1a20720a1d074eb1823acc46b0bb336bb29e6b3f1da1348f
                                                                                                                      • Instruction ID: 36588dab8151eecc0ad0c6b05a7a71d77468500734c4ca1cc8375953343d3aeb
                                                                                                                      • Opcode Fuzzy Hash: 935c499293d43e1a1a20720a1d074eb1823acc46b0bb336bb29e6b3f1da1348f
                                                                                                                      • Instruction Fuzzy Hash: F571D836906228CFCB64EF34D889A9DB7B6BF49345F1041D9D50AA7750CB396E81CF22
                                                                                                                      Uniqueness

                                                                                                                      Uniqueness Score: -1.00%

                                                                                                                      APIs
                                                                                                                      • KiUserExceptionDispatcher.NTDLL ref: 05FF8A46
                                                                                                                      Memory Dump Source
                                                                                                                      • Source File: 00000014.00000002.544287742.0000000005FF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05FF0000, based on PE: false
                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                      • Snapshot File: hcaresult_20_2_5ff0000_SHIPMENT DOCUMENTS.jbxd
                                                                                                                      Similarity
                                                                                                                      • API ID: DispatcherExceptionUser
                                                                                                                      • String ID:
                                                                                                                      • API String ID: 6842923-0
                                                                                                                      • Opcode ID: 7d17becb7078eb91180da439c62bd1f19a5e927150263a0fd741a843b853a90a
                                                                                                                      • Instruction ID: a2ff9feccc4f20d82ae4c4323a3cb4602ba55395e0cfb807eeef3562cfabafdd
                                                                                                                      • Opcode Fuzzy Hash: 7d17becb7078eb91180da439c62bd1f19a5e927150263a0fd741a843b853a90a
                                                                                                                      • Instruction Fuzzy Hash: E661D935902228CFCB64DF24D889A9DB7B6BF49345F1041D9D50AA7750CB396E81CF22
                                                                                                                      Uniqueness

                                                                                                                      Uniqueness Score: -1.00%

                                                                                                                      APIs
                                                                                                                      • KiUserExceptionDispatcher.NTDLL ref: 05FF8A46
                                                                                                                      Memory Dump Source
                                                                                                                      • Source File: 00000014.00000002.544287742.0000000005FF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05FF0000, based on PE: false
                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                      • Snapshot File: hcaresult_20_2_5ff0000_SHIPMENT DOCUMENTS.jbxd
                                                                                                                      Similarity
                                                                                                                      • API ID: DispatcherExceptionUser
                                                                                                                      • String ID:
                                                                                                                      • API String ID: 6842923-0
                                                                                                                      • Opcode ID: ad0662728edd606118e88e5c21b283367ab8cc797fe16906a27cfb4aa45b836e
                                                                                                                      • Instruction ID: 0ef42c47534b2e59fd3cd56c3ee5dc5bf5cf2a2c280cfb4bbd964ac839431eb6
                                                                                                                      • Opcode Fuzzy Hash: ad0662728edd606118e88e5c21b283367ab8cc797fe16906a27cfb4aa45b836e
                                                                                                                      • Instruction Fuzzy Hash: 9A61E93590222CCFCB64DF24D889A9DB7B6BF49345F1041DAD50AA7750CB396E81CF22
                                                                                                                      Uniqueness

                                                                                                                      Uniqueness Score: -1.00%

                                                                                                                      APIs
                                                                                                                      • KiUserExceptionDispatcher.NTDLL ref: 05FF8A46
                                                                                                                      Memory Dump Source
                                                                                                                      • Source File: 00000014.00000002.544287742.0000000005FF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05FF0000, based on PE: false
                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                      • Snapshot File: hcaresult_20_2_5ff0000_SHIPMENT DOCUMENTS.jbxd
                                                                                                                      Similarity
                                                                                                                      • API ID: DispatcherExceptionUser
                                                                                                                      • String ID:
                                                                                                                      • API String ID: 6842923-0
                                                                                                                      • Opcode ID: e3ce0ffc3ebceb125763428c12a9a49fc26704d40d62a211f477bca5d89b4c57
                                                                                                                      • Instruction ID: 49c9e410e08db4b4d24950e9ce746bb65ce95daa646d45fbb8f083fbd647ae64
                                                                                                                      • Opcode Fuzzy Hash: e3ce0ffc3ebceb125763428c12a9a49fc26704d40d62a211f477bca5d89b4c57
                                                                                                                      • Instruction Fuzzy Hash: 3151E83A90222CCFCB64DF24D888A9CB7B6BF45345F1041DAD50AA7750CB396E81CF62
                                                                                                                      Uniqueness

                                                                                                                      Uniqueness Score: -1.00%

                                                                                                                      APIs
                                                                                                                      • KiUserExceptionDispatcher.NTDLL ref: 05FF8A46
                                                                                                                      Memory Dump Source
                                                                                                                      • Source File: 00000014.00000002.544287742.0000000005FF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05FF0000, based on PE: false
                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                      • Snapshot File: hcaresult_20_2_5ff0000_SHIPMENT DOCUMENTS.jbxd
                                                                                                                      Similarity
                                                                                                                      • API ID: DispatcherExceptionUser
                                                                                                                      • String ID:
                                                                                                                      • API String ID: 6842923-0
                                                                                                                      • Opcode ID: 8107c3a347b64ef112d6e50a4a52aeb81c758350c95e85254d39d7a69ac9f25d
                                                                                                                      • Instruction ID: d97dd07e6a7030854655a867f413eedf035996c4ee4b7bfd6bae1b0c57a78207
                                                                                                                      • Opcode Fuzzy Hash: 8107c3a347b64ef112d6e50a4a52aeb81c758350c95e85254d39d7a69ac9f25d
                                                                                                                      • Instruction Fuzzy Hash: 3751D836902228CFCB64EF24D889A9DB7B6BF45345F1041DAD50AA7750CB396E81CF22
                                                                                                                      Uniqueness

                                                                                                                      Uniqueness Score: -1.00%

                                                                                                                      APIs
                                                                                                                      • KiUserExceptionDispatcher.NTDLL ref: 05FF8A46
                                                                                                                      Memory Dump Source
                                                                                                                      • Source File: 00000014.00000002.544287742.0000000005FF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05FF0000, based on PE: false
                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                      • Snapshot File: hcaresult_20_2_5ff0000_SHIPMENT DOCUMENTS.jbxd
                                                                                                                      Similarity
                                                                                                                      • API ID: DispatcherExceptionUser
                                                                                                                      • String ID:
                                                                                                                      • API String ID: 6842923-0
                                                                                                                      • Opcode ID: 2b196ecd4b8c87dfe0dcf2f8dd6b55a9425bc519a3f91cb8eb068508b2d18377
                                                                                                                      • Instruction ID: c80bbb4a991f369cbdd1568b24f579f37c364645a2da39a1cdab759028ff89ca
                                                                                                                      • Opcode Fuzzy Hash: 2b196ecd4b8c87dfe0dcf2f8dd6b55a9425bc519a3f91cb8eb068508b2d18377
                                                                                                                      • Instruction Fuzzy Hash: 5A51D736902228CFCB64DF24D889A9DB7B6BF45345F1041DAD54AA7750CB396E81CF22
                                                                                                                      Uniqueness

                                                                                                                      Uniqueness Score: -1.00%

                                                                                                                      APIs
                                                                                                                      • KiUserExceptionDispatcher.NTDLL ref: 05FF8A46
                                                                                                                      Memory Dump Source
                                                                                                                      • Source File: 00000014.00000002.544287742.0000000005FF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05FF0000, based on PE: false
                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                      • Snapshot File: hcaresult_20_2_5ff0000_SHIPMENT DOCUMENTS.jbxd
                                                                                                                      Similarity
                                                                                                                      • API ID: DispatcherExceptionUser
                                                                                                                      • String ID:
                                                                                                                      • API String ID: 6842923-0
                                                                                                                      • Opcode ID: e26b8f7f0ce97bdd8eb57710a78b6274973f31db1d59d549848697c7f71f2c1f
                                                                                                                      • Instruction ID: 05c4fdb3b2dce03f8b5460c719c987025a0c26179d511e78bf94d2e59bb15424
                                                                                                                      • Opcode Fuzzy Hash: e26b8f7f0ce97bdd8eb57710a78b6274973f31db1d59d549848697c7f71f2c1f
                                                                                                                      • Instruction Fuzzy Hash: D851F936902228CFCB64EF24D888A9CB7B6FF45345F1041DAD50AA7750CB396E81CF22
                                                                                                                      Uniqueness

                                                                                                                      Uniqueness Score: -1.00%

                                                                                                                      APIs
                                                                                                                      • KiUserExceptionDispatcher.NTDLL ref: 05FF8A46
                                                                                                                      Memory Dump Source
                                                                                                                      • Source File: 00000014.00000002.544287742.0000000005FF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05FF0000, based on PE: false
                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                      • Snapshot File: hcaresult_20_2_5ff0000_SHIPMENT DOCUMENTS.jbxd
                                                                                                                      Similarity
                                                                                                                      • API ID: DispatcherExceptionUser
                                                                                                                      • String ID:
                                                                                                                      • API String ID: 6842923-0
                                                                                                                      • Opcode ID: 8d89adbb59a7ddc6975b95a23f1e57e34267cccbcc5f9b96dd2b02895f2240fa
                                                                                                                      • Instruction ID: 3200b54ce7664bce9672f7cdb8ba601250ebcbff3a182cfed07c8c8dd3cace14
                                                                                                                      • Opcode Fuzzy Hash: 8d89adbb59a7ddc6975b95a23f1e57e34267cccbcc5f9b96dd2b02895f2240fa
                                                                                                                      • Instruction Fuzzy Hash: 4241F836A02228CFCB64EF24D888A9DB7B6FF45345F1041DAD54AA7750CB396E81CF52
                                                                                                                      Uniqueness

                                                                                                                      Uniqueness Score: -1.00%

                                                                                                                      APIs
                                                                                                                      • LoadLibraryA.KERNELBASE(?), ref: 02CFD8A2
                                                                                                                      Memory Dump Source
                                                                                                                      • Source File: 00000014.00000002.520495341.0000000002CF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02CF0000, based on PE: false
                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                      • Snapshot File: hcaresult_20_2_2cf0000_SHIPMENT DOCUMENTS.jbxd
                                                                                                                      Similarity
                                                                                                                      • API ID: LibraryLoad
                                                                                                                      • String ID:
                                                                                                                      • API String ID: 1029625771-0
                                                                                                                      • Opcode ID: 337df12e03d9497e45321bcfe81377d823f87e0bb1c3c4fa622b018edf9abfde
                                                                                                                      • Instruction ID: 4f5d01d6af344a5fbba066a6c41b6b3d89add660de89b54fed7bde736223e02d
                                                                                                                      • Opcode Fuzzy Hash: 337df12e03d9497e45321bcfe81377d823f87e0bb1c3c4fa622b018edf9abfde
                                                                                                                      • Instruction Fuzzy Hash: 684142B1D10249CFDB94CFA9C885B9EBBB1FF48714F148129E816A7380D7759845CF92
                                                                                                                      Uniqueness

                                                                                                                      Uniqueness Score: -1.00%

                                                                                                                      APIs
                                                                                                                      • LoadLibraryA.KERNELBASE(?), ref: 02CFD8A2
                                                                                                                      Memory Dump Source
                                                                                                                      • Source File: 00000014.00000002.520495341.0000000002CF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02CF0000, based on PE: false
                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                      • Snapshot File: hcaresult_20_2_2cf0000_SHIPMENT DOCUMENTS.jbxd
                                                                                                                      Similarity
                                                                                                                      • API ID: LibraryLoad
                                                                                                                      • String ID:
                                                                                                                      • API String ID: 1029625771-0
                                                                                                                      • Opcode ID: 73d35e547b2b98160e140f0581ef156d9e58f00fa3cf1269bf032398d3e688a3
                                                                                                                      • Instruction ID: eb27a1207bc3377ae692c1af01a0af88fa0433193bd4bbbcd1a53a0cc2262df9
                                                                                                                      • Opcode Fuzzy Hash: 73d35e547b2b98160e140f0581ef156d9e58f00fa3cf1269bf032398d3e688a3
                                                                                                                      • Instruction Fuzzy Hash: F03132B0D002498FDB94CFA9C885B9EBBF1FF48714F14812AE916AB380D7759845CF82
                                                                                                                      Uniqueness

                                                                                                                      Uniqueness Score: -1.00%

                                                                                                                      APIs
                                                                                                                      • KiUserExceptionDispatcher.NTDLL ref: 05FF8A46
                                                                                                                      Memory Dump Source
                                                                                                                      • Source File: 00000014.00000002.544287742.0000000005FF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05FF0000, based on PE: false
                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                      • Snapshot File: hcaresult_20_2_5ff0000_SHIPMENT DOCUMENTS.jbxd
                                                                                                                      Similarity
                                                                                                                      • API ID: DispatcherExceptionUser
                                                                                                                      • String ID:
                                                                                                                      • API String ID: 6842923-0
                                                                                                                      • Opcode ID: da6dde0cda4ad83002440980825d26a1b3912d6ce23a936b18f905ba06bd8f6b
                                                                                                                      • Instruction ID: 6bafd0aabb78b6707d7db5716ab3bfd7c02f17a779c8e42865062dd204e5316f
                                                                                                                      • Opcode Fuzzy Hash: da6dde0cda4ad83002440980825d26a1b3912d6ce23a936b18f905ba06bd8f6b
                                                                                                                      • Instruction Fuzzy Hash: C9410C35A02228CFCB64EF24D888A9DB7B6FF45345F1041DAE54AA7750CB396E81CF52
                                                                                                                      Uniqueness

                                                                                                                      Uniqueness Score: -1.00%

                                                                                                                      APIs
                                                                                                                      • KiUserExceptionDispatcher.NTDLL ref: 05FF8A46
                                                                                                                      Memory Dump Source
                                                                                                                      • Source File: 00000014.00000002.544287742.0000000005FF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05FF0000, based on PE: false
                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                      • Snapshot File: hcaresult_20_2_5ff0000_SHIPMENT DOCUMENTS.jbxd
                                                                                                                      Similarity
                                                                                                                      • API ID: DispatcherExceptionUser
                                                                                                                      • String ID:
                                                                                                                      • API String ID: 6842923-0
                                                                                                                      • Opcode ID: 2a7856b369e8f764b7787ad3391aa4bede3b22f3b6e6f4f7119888784aa233ad
                                                                                                                      • Instruction ID: 936ac3a9ad1a5af17b4f66d44ba7f8b3cd2ee49fd6ffa276cf0b90d4cd200661
                                                                                                                      • Opcode Fuzzy Hash: 2a7856b369e8f764b7787ad3391aa4bede3b22f3b6e6f4f7119888784aa233ad
                                                                                                                      • Instruction Fuzzy Hash: 4E413F35A02228CFCB64DF24D888A9DB7B6FF45345F1041DAD54AA7350CB396E81CF12
                                                                                                                      Uniqueness

                                                                                                                      Uniqueness Score: -1.00%

                                                                                                                      APIs
                                                                                                                      • KiUserExceptionDispatcher.NTDLL ref: 05FF8A46
                                                                                                                      Memory Dump Source
                                                                                                                      • Source File: 00000014.00000002.544287742.0000000005FF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05FF0000, based on PE: false
                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                      • Snapshot File: hcaresult_20_2_5ff0000_SHIPMENT DOCUMENTS.jbxd
                                                                                                                      Similarity
                                                                                                                      • API ID: DispatcherExceptionUser
                                                                                                                      • String ID:
                                                                                                                      • API String ID: 6842923-0
                                                                                                                      • Opcode ID: 631726784cb5e55491130b4c013a777186d15309ec4aec433fb2185a1f6d0048
                                                                                                                      • Instruction ID: 629a2ca6006beca344b1334eb10c19e55334b9be1ecb40027846d6522e781ccf
                                                                                                                      • Opcode Fuzzy Hash: 631726784cb5e55491130b4c013a777186d15309ec4aec433fb2185a1f6d0048
                                                                                                                      • Instruction Fuzzy Hash: 6D312D35A02228CFCB64EF24D888A9DB7B6FF49345F1041DAD54AA7350CB396E81CF52
                                                                                                                      Uniqueness

                                                                                                                      Uniqueness Score: -1.00%

                                                                                                                      APIs
                                                                                                                      • RtlEncodePointer.NTDLL(00000000), ref: 02CF596A
                                                                                                                      Memory Dump Source
                                                                                                                      • Source File: 00000014.00000002.520495341.0000000002CF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02CF0000, based on PE: false
                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                      • Snapshot File: hcaresult_20_2_2cf0000_SHIPMENT DOCUMENTS.jbxd
                                                                                                                      Similarity
                                                                                                                      • API ID: EncodePointer
                                                                                                                      • String ID:
                                                                                                                      • API String ID: 2118026453-0
                                                                                                                      • Opcode ID: ad530e60081aaf8b60dfa1473cea5cfcaf52a18423315f51e13090bc7f9ee937
                                                                                                                      • Instruction ID: 6e2065c15573a0bb70828414481fdb206d0bbb12914054d3382804c7e16de11d
                                                                                                                      • Opcode Fuzzy Hash: ad530e60081aaf8b60dfa1473cea5cfcaf52a18423315f51e13090bc7f9ee937
                                                                                                                      • Instruction Fuzzy Hash: D621CAB59003458FDB90DFA8D40879ABFF4FB49328F18842ECA05E3600C7389649CFA1
                                                                                                                      Uniqueness

                                                                                                                      Uniqueness Score: -1.00%

                                                                                                                      APIs
                                                                                                                      • VirtualAllocExNuma.KERNELBASE(?,?,?,?,?,?), ref: 02CF0B0E
                                                                                                                      Memory Dump Source
                                                                                                                      • Source File: 00000014.00000002.520495341.0000000002CF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02CF0000, based on PE: false
                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                      • Snapshot File: hcaresult_20_2_2cf0000_SHIPMENT DOCUMENTS.jbxd
                                                                                                                      Similarity
                                                                                                                      • API ID: AllocNumaVirtual
                                                                                                                      • String ID:
                                                                                                                      • API String ID: 4233825816-0
                                                                                                                      • Opcode ID: f19a28e2c150697d3477e6a2886ffc96f1eed576cc608dd9e6a435cac95232fe
                                                                                                                      • Instruction ID: 4c43660a682889d5c15e1526f475b1473a35fda085db0e205b0e70f1c1d45658
                                                                                                                      • Opcode Fuzzy Hash: f19a28e2c150697d3477e6a2886ffc96f1eed576cc608dd9e6a435cac95232fe
                                                                                                                      • Instruction Fuzzy Hash: 9B2100B69002099FCB50CF9AC884BDEBBF9FB88324F148419E529A7210D775A955CFA1
                                                                                                                      Uniqueness

                                                                                                                      Uniqueness Score: -1.00%

                                                                                                                      APIs
                                                                                                                      • RtlEncodePointer.NTDLL(00000000), ref: 02CF596A
                                                                                                                      Memory Dump Source
                                                                                                                      • Source File: 00000014.00000002.520495341.0000000002CF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02CF0000, based on PE: false
                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                      • Snapshot File: hcaresult_20_2_2cf0000_SHIPMENT DOCUMENTS.jbxd
                                                                                                                      Similarity
                                                                                                                      • API ID: EncodePointer
                                                                                                                      • String ID:
                                                                                                                      • API String ID: 2118026453-0
                                                                                                                      • Opcode ID: 3486ebbf3d362c32d32e36a58ebc65d529821ca70012ee3c4b201b806bf5da62
                                                                                                                      • Instruction ID: 30e5e38ca3f47a5231f875313dab163b46ed9aedb51b0ec2ad06e6cb89129936
                                                                                                                      • Opcode Fuzzy Hash: 3486ebbf3d362c32d32e36a58ebc65d529821ca70012ee3c4b201b806bf5da62
                                                                                                                      • Instruction Fuzzy Hash: 9F11A9B49013458FDB90DFA9D40879EBFF8FB89368F548029D905E3600C739AA49CFA1
                                                                                                                      Uniqueness

                                                                                                                      Uniqueness Score: -1.00%

                                                                                                                      Strings
                                                                                                                      Memory Dump Source
                                                                                                                      • Source File: 00000014.00000002.547421294.0000000006B70000.00000040.00000800.00020000.00000000.sdmp, Offset: 06B70000, based on PE: false
                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                      • Snapshot File: hcaresult_20_2_6b70000_SHIPMENT DOCUMENTS.jbxd
                                                                                                                      Similarity
                                                                                                                      • API ID:
                                                                                                                      • String ID: XcRl
                                                                                                                      • API String ID: 0-2850398093
                                                                                                                      • Opcode ID: 94e1f58ee84d43b36e5fed8189dcd6f93ea87d05bbdd2e2b88b767ae623ecd63
                                                                                                                      • Instruction ID: 4e81a34266cc0c8cf80185e8650c608db4e068b1f5376971ed9b36a1c6420b79
                                                                                                                      • Opcode Fuzzy Hash: 94e1f58ee84d43b36e5fed8189dcd6f93ea87d05bbdd2e2b88b767ae623ecd63
                                                                                                                      • Instruction Fuzzy Hash: 3A2132B1F002018FE7919F38D848BBABBA6EF85311F1580A9E529CB351EB30CD02CB55
                                                                                                                      Uniqueness

                                                                                                                      Uniqueness Score: -1.00%

                                                                                                                      APIs
                                                                                                                      Memory Dump Source
                                                                                                                      • Source File: 00000014.00000002.520495341.0000000002CF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02CF0000, based on PE: false
                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                      • Snapshot File: hcaresult_20_2_2cf0000_SHIPMENT DOCUMENTS.jbxd
                                                                                                                      Similarity
                                                                                                                      • API ID: Sleep
                                                                                                                      • String ID:
                                                                                                                      • API String ID: 3472027048-0
                                                                                                                      • Opcode ID: 3c4461d255634b2a5c32fd7e205482cb1f1683ca55d01101f0a8ac7a6fb672ab
                                                                                                                      • Instruction ID: 5bf787577924b5b01c1b78fe5d9e9bc5a50c39e85e87ff423dd4e1798ed7deec
                                                                                                                      • Opcode Fuzzy Hash: 3c4461d255634b2a5c32fd7e205482cb1f1683ca55d01101f0a8ac7a6fb672ab
                                                                                                                      • Instruction Fuzzy Hash: AC1122B59002498FCB50CF99C484BDEFBF4EB88328F148459D929A7300D779A945CFA1
                                                                                                                      Uniqueness

                                                                                                                      Uniqueness Score: -1.00%

                                                                                                                      APIs
                                                                                                                      Memory Dump Source
                                                                                                                      • Source File: 00000014.00000002.520495341.0000000002CF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02CF0000, based on PE: false
                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                      • Snapshot File: hcaresult_20_2_2cf0000_SHIPMENT DOCUMENTS.jbxd
                                                                                                                      Similarity
                                                                                                                      • API ID: Sleep
                                                                                                                      • String ID:
                                                                                                                      • API String ID: 3472027048-0
                                                                                                                      • Opcode ID: 6a77fe5097deafa687f37f6879c4bd6c169c2c7f03e6d92cca51ab4d18d98de0
                                                                                                                      • Instruction ID: 9555996ab2f52727f76150bca5dde6e67014c758fcbb7e4ee1533bdce5fc8ef9
                                                                                                                      • Opcode Fuzzy Hash: 6a77fe5097deafa687f37f6879c4bd6c169c2c7f03e6d92cca51ab4d18d98de0
                                                                                                                      • Instruction Fuzzy Hash: 6D11F2B59002498FCB50DF9AC884BDEFBF4EB88328F148459D529A7340D775A945CFA1
                                                                                                                      Uniqueness

                                                                                                                      Uniqueness Score: -1.00%

                                                                                                                      Memory Dump Source
                                                                                                                      • Source File: 00000014.00000002.519671530.000000000136D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0136D000, based on PE: false
                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                      • Snapshot File: hcaresult_20_2_136d000_SHIPMENT DOCUMENTS.jbxd
                                                                                                                      Similarity
                                                                                                                      • API ID:
                                                                                                                      • String ID:
                                                                                                                      • API String ID:
                                                                                                                      • Opcode ID: 5a374c3846cb62ee3636fb98e8a8913a4eca44fa9a768c17837334b0fbc44a19
                                                                                                                      • Instruction ID: 47f1cf6f55202d0b3a506b75d4663ad4a13a92fcb8f921d5d7f8d43293e8ccbc
                                                                                                                      • Opcode Fuzzy Hash: 5a374c3846cb62ee3636fb98e8a8913a4eca44fa9a768c17837334b0fbc44a19
                                                                                                                      • Instruction Fuzzy Hash: 3142C36258E3D15FD7034B788C626863FB19F13224B5E41EBD4C0CB6A3E26D891BC762
                                                                                                                      Uniqueness

                                                                                                                      Uniqueness Score: -1.00%

                                                                                                                      Memory Dump Source
                                                                                                                      • Source File: 00000014.00000002.547421294.0000000006B70000.00000040.00000800.00020000.00000000.sdmp, Offset: 06B70000, based on PE: false
                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                      • Snapshot File: hcaresult_20_2_6b70000_SHIPMENT DOCUMENTS.jbxd
                                                                                                                      Similarity
                                                                                                                      • API ID:
                                                                                                                      • String ID:
                                                                                                                      • API String ID:
                                                                                                                      • Opcode ID: 8f2c80a45fe42cc5a20f6bbc2279cae37a48870288f673eac16542948bd48fc7
                                                                                                                      • Instruction ID: c9655ccc00d2d649fbf9797611a679046e86279a7bd9d28d0d42e80122c5a07c
                                                                                                                      • Opcode Fuzzy Hash: 8f2c80a45fe42cc5a20f6bbc2279cae37a48870288f673eac16542948bd48fc7
                                                                                                                      • Instruction Fuzzy Hash: D7629D74B042088FCB94DBB8C458AADBBB2EF85304F1584A9D51ADB3A5DF35DC46CB81
                                                                                                                      Uniqueness

                                                                                                                      Uniqueness Score: -1.00%

                                                                                                                      Memory Dump Source
                                                                                                                      • Source File: 00000014.00000002.547421294.0000000006B70000.00000040.00000800.00020000.00000000.sdmp, Offset: 06B70000, based on PE: false
                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                      • Snapshot File: hcaresult_20_2_6b70000_SHIPMENT DOCUMENTS.jbxd
                                                                                                                      Similarity
                                                                                                                      • API ID:
                                                                                                                      • String ID:
                                                                                                                      • API String ID:
                                                                                                                      • Opcode ID: d2c19d9f3b3fcc912adc5a2f8dae9d899cafb578642c5db621abb976ce22786f
                                                                                                                      • Instruction ID: fdcce29a636276a142577ae1df698e9816be61b66e6d9e0a901b53e679efc760
                                                                                                                      • Opcode Fuzzy Hash: d2c19d9f3b3fcc912adc5a2f8dae9d899cafb578642c5db621abb976ce22786f
                                                                                                                      • Instruction Fuzzy Hash: 3332D070B042058FCB54EBB5C468AAE7BE2AF88344F158879D416DB781EF35DC46CB92
                                                                                                                      Uniqueness

                                                                                                                      Uniqueness Score: -1.00%

                                                                                                                      Memory Dump Source
                                                                                                                      • Source File: 00000014.00000002.547421294.0000000006B70000.00000040.00000800.00020000.00000000.sdmp, Offset: 06B70000, based on PE: false
                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                      • Snapshot File: hcaresult_20_2_6b70000_SHIPMENT DOCUMENTS.jbxd
                                                                                                                      Similarity
                                                                                                                      • API ID:
                                                                                                                      • String ID:
                                                                                                                      • API String ID:
                                                                                                                      • Opcode ID: 4619f17b42e795b48138e102348cbbd42cf760fda1e11afe3430dcd0cc2a289d
                                                                                                                      • Instruction ID: 76e1de2aed0ce52708b5c70f4f282e3267f5f05ce39a40c510cf51942936d1f4
                                                                                                                      • Opcode Fuzzy Hash: 4619f17b42e795b48138e102348cbbd42cf760fda1e11afe3430dcd0cc2a289d
                                                                                                                      • Instruction Fuzzy Hash: 5C22AD71B142048FCB54DBB9D889AADB7F2EB88308F158879E516DB350DF35DC428B91
                                                                                                                      Uniqueness

                                                                                                                      Uniqueness Score: -1.00%

                                                                                                                      Memory Dump Source
                                                                                                                      • Source File: 00000014.00000002.547421294.0000000006B70000.00000040.00000800.00020000.00000000.sdmp, Offset: 06B70000, based on PE: false
                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                      • Snapshot File: hcaresult_20_2_6b70000_SHIPMENT DOCUMENTS.jbxd
                                                                                                                      Similarity
                                                                                                                      • API ID:
                                                                                                                      • String ID:
                                                                                                                      • API String ID:
                                                                                                                      • Opcode ID: 4c31c8d27c2e3f24341df83fe66f169f5641274c4f45f98deef49cf9548787c4
                                                                                                                      • Instruction ID: 56793583c2998362363ba96cefa8f7dfacf7c22a08bb6f9c8f8cf1052cdcfcef
                                                                                                                      • Opcode Fuzzy Hash: 4c31c8d27c2e3f24341df83fe66f169f5641274c4f45f98deef49cf9548787c4
                                                                                                                      • Instruction Fuzzy Hash: 58127C74E052088FCB80DFB9D894A9DBBB2EF88304F6585B9D405EB355DB34AC46CB91
                                                                                                                      Uniqueness

                                                                                                                      Uniqueness Score: -1.00%

                                                                                                                      Memory Dump Source
                                                                                                                      • Source File: 00000014.00000002.547421294.0000000006B70000.00000040.00000800.00020000.00000000.sdmp, Offset: 06B70000, based on PE: false
                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                      • Snapshot File: hcaresult_20_2_6b70000_SHIPMENT DOCUMENTS.jbxd
                                                                                                                      Similarity
                                                                                                                      • API ID:
                                                                                                                      • String ID:
                                                                                                                      • API String ID:
                                                                                                                      • Opcode ID: c545eafd779122ecc42d8aafd1706f76a973b2785eb508215ffae75ca5f30654
                                                                                                                      • Instruction ID: d134a9a7bcf2a7539b4b7849ea43559c99ce7c7a196f6a2161ca174755499625
                                                                                                                      • Opcode Fuzzy Hash: c545eafd779122ecc42d8aafd1706f76a973b2785eb508215ffae75ca5f30654
                                                                                                                      • Instruction Fuzzy Hash: 34E19CB0E002098FDBA0DFA8D494BADBBF1EB45304F5598AAE525DB391DB34DC818F51
                                                                                                                      Uniqueness

                                                                                                                      Uniqueness Score: -1.00%

                                                                                                                      Memory Dump Source
                                                                                                                      • Source File: 00000014.00000002.547421294.0000000006B70000.00000040.00000800.00020000.00000000.sdmp, Offset: 06B70000, based on PE: false
                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                      • Snapshot File: hcaresult_20_2_6b70000_SHIPMENT DOCUMENTS.jbxd
                                                                                                                      Similarity
                                                                                                                      • API ID:
                                                                                                                      • String ID:
                                                                                                                      • API String ID:
                                                                                                                      • Opcode ID: 14a6b7c1291ab1bb629534f5a3a604b48d262695e61ec9f1018c6396c206f273
                                                                                                                      • Instruction ID: d0cd3291169654a604b06c88da2be03641c8acf75501a62b7d7ea7d07f2b51b6
                                                                                                                      • Opcode Fuzzy Hash: 14a6b7c1291ab1bb629534f5a3a604b48d262695e61ec9f1018c6396c206f273
                                                                                                                      • Instruction Fuzzy Hash: E9D1C474B093858FD792C7398C186AA3FA29F86341F1680F6E558DB393EA65CC0AC711
                                                                                                                      Uniqueness

                                                                                                                      Uniqueness Score: -1.00%

                                                                                                                      Memory Dump Source
                                                                                                                      • Source File: 00000014.00000002.547421294.0000000006B70000.00000040.00000800.00020000.00000000.sdmp, Offset: 06B70000, based on PE: false
                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                      • Snapshot File: hcaresult_20_2_6b70000_SHIPMENT DOCUMENTS.jbxd
                                                                                                                      Similarity
                                                                                                                      • API ID:
                                                                                                                      • String ID:
                                                                                                                      • API String ID:
                                                                                                                      • Opcode ID: ca3272910fc30ee81b0ba86a7b997f2db084fc6ff6b70df3f9adedcc443d4736
                                                                                                                      • Instruction ID: 75536d2b679e1c2bb02cd50be39750bdcab2073b1914a6e5db21598983f391e0
                                                                                                                      • Opcode Fuzzy Hash: ca3272910fc30ee81b0ba86a7b997f2db084fc6ff6b70df3f9adedcc443d4736
                                                                                                                      • Instruction Fuzzy Hash: 8BD1AF74B002188FCB80DFB9D858AAE7BF2AF88304F1585A9E515DB354DB34DC46CB91
                                                                                                                      Uniqueness

                                                                                                                      Uniqueness Score: -1.00%

                                                                                                                      Memory Dump Source
                                                                                                                      • Source File: 00000014.00000002.547421294.0000000006B70000.00000040.00000800.00020000.00000000.sdmp, Offset: 06B70000, based on PE: false
                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                      • Snapshot File: hcaresult_20_2_6b70000_SHIPMENT DOCUMENTS.jbxd
                                                                                                                      Similarity
                                                                                                                      • API ID:
                                                                                                                      • String ID:
                                                                                                                      • API String ID:
                                                                                                                      • Opcode ID: 4d87751e15a1f94e31a6f7bf691e90adc92004b47e7ca9d57143b7e5c092ee0f
                                                                                                                      • Instruction ID: 80ae8d5de39f243148c3aeea07d21e90dfab4926a1d8052f7306fa03394737ef
                                                                                                                      • Opcode Fuzzy Hash: 4d87751e15a1f94e31a6f7bf691e90adc92004b47e7ca9d57143b7e5c092ee0f
                                                                                                                      • Instruction Fuzzy Hash: C9C1C070B042158FCB54EB69C854ABEBBF6EF85300F1588AEE116CB391CA35DD46CB91
                                                                                                                      Uniqueness

                                                                                                                      Uniqueness Score: -1.00%

                                                                                                                      Memory Dump Source
                                                                                                                      • Source File: 00000014.00000002.519671530.000000000136D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0136D000, based on PE: false
                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                      • Snapshot File: hcaresult_20_2_136d000_SHIPMENT DOCUMENTS.jbxd
                                                                                                                      Similarity
                                                                                                                      • API ID:
                                                                                                                      • String ID:
                                                                                                                      • API String ID:
                                                                                                                      • Opcode ID: def4e0d011a97568ac959f0dba25e88aecae70a8b03b72030539c38b0c7a2917
                                                                                                                      • Instruction ID: 6a53ac5916362d451221ca7cac4966e5ee9cb0481e72e0b8f4083028b7d546e6
                                                                                                                      • Opcode Fuzzy Hash: def4e0d011a97568ac959f0dba25e88aecae70a8b03b72030539c38b0c7a2917
                                                                                                                      • Instruction Fuzzy Hash: B681F97658E3D06FD7038B648CA17863FB19F17214F1A81EBD484CF6E3D269891AC762
                                                                                                                      Uniqueness

                                                                                                                      Uniqueness Score: -1.00%

                                                                                                                      Memory Dump Source
                                                                                                                      • Source File: 00000014.00000002.547421294.0000000006B70000.00000040.00000800.00020000.00000000.sdmp, Offset: 06B70000, based on PE: false
                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                      • Snapshot File: hcaresult_20_2_6b70000_SHIPMENT DOCUMENTS.jbxd
                                                                                                                      Similarity
                                                                                                                      • API ID:
                                                                                                                      • String ID:
                                                                                                                      • API String ID:
                                                                                                                      • Opcode ID: 127bd8b02d2d3755ba539df325c4053d28f2635dcb50a41fc7cf57e6e916de59
                                                                                                                      • Instruction ID: 7c913f244e0810f30e07ae3814984c4a8a2d776b7a951d2bbe6fe8e1a44fb108
                                                                                                                      • Opcode Fuzzy Hash: 127bd8b02d2d3755ba539df325c4053d28f2635dcb50a41fc7cf57e6e916de59
                                                                                                                      • Instruction Fuzzy Hash: 03C1ADB0E102098FEBA0CFA8D494BADB7B1EB45314F6498AAE525DB391D734DC81CF41
                                                                                                                      Uniqueness

                                                                                                                      Uniqueness Score: -1.00%

                                                                                                                      Memory Dump Source
                                                                                                                      • Source File: 00000014.00000002.547421294.0000000006B70000.00000040.00000800.00020000.00000000.sdmp, Offset: 06B70000, based on PE: false
                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                      • Snapshot File: hcaresult_20_2_6b70000_SHIPMENT DOCUMENTS.jbxd
                                                                                                                      Similarity
                                                                                                                      • API ID:
                                                                                                                      • String ID:
                                                                                                                      • API String ID:
                                                                                                                      • Opcode ID: 3f123dd8104ab0a15969c6bb95c94ba756ae97afb3d26d1f8dc9f2848790acda
                                                                                                                      • Instruction ID: 0de942504f7b563c0eb632ad24af71a1698c502d51647e05739cfc57a835ca83
                                                                                                                      • Opcode Fuzzy Hash: 3f123dd8104ab0a15969c6bb95c94ba756ae97afb3d26d1f8dc9f2848790acda
                                                                                                                      • Instruction Fuzzy Hash: 4AB1E1B1A042499FCF15CFA8C844ADDBBB2FF89310F1581E6E915AB360D731E856CB91
                                                                                                                      Uniqueness

                                                                                                                      Uniqueness Score: -1.00%

                                                                                                                      Memory Dump Source
                                                                                                                      • Source File: 00000014.00000002.547421294.0000000006B70000.00000040.00000800.00020000.00000000.sdmp, Offset: 06B70000, based on PE: false
                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                      • Snapshot File: hcaresult_20_2_6b70000_SHIPMENT DOCUMENTS.jbxd
                                                                                                                      Similarity
                                                                                                                      • API ID:
                                                                                                                      • String ID:
                                                                                                                      • API String ID:
                                                                                                                      • Opcode ID: fd29553e7ff65131093c7b2e01b41347470b4f5e56d53daf42d0595c0065bf66
                                                                                                                      • Instruction ID: e59a8e24838134da5b5f10b74393e41ce0dc9fd36567826144c694bf84292d87
                                                                                                                      • Opcode Fuzzy Hash: fd29553e7ff65131093c7b2e01b41347470b4f5e56d53daf42d0595c0065bf66
                                                                                                                      • Instruction Fuzzy Hash: 39812470B093858FD742DB75D858AAA7BB2DF86300F1684F6E548DB692DB34CC0ACB11
                                                                                                                      Uniqueness

                                                                                                                      Uniqueness Score: -1.00%

                                                                                                                      Memory Dump Source
                                                                                                                      • Source File: 00000014.00000002.547421294.0000000006B70000.00000040.00000800.00020000.00000000.sdmp, Offset: 06B70000, based on PE: false
                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                      • Snapshot File: hcaresult_20_2_6b70000_SHIPMENT DOCUMENTS.jbxd
                                                                                                                      Similarity
                                                                                                                      • API ID:
                                                                                                                      • String ID:
                                                                                                                      • API String ID:
                                                                                                                      • Opcode ID: 374a7ea8ed744c451513cef35fbf70ca359b05ddac20a29ce4a280ba7b63b731
                                                                                                                      • Instruction ID: dcf5000666b79da7728c6e6651fa589a070eb3abe0d099fa624fae3e246c38e7
                                                                                                                      • Opcode Fuzzy Hash: 374a7ea8ed744c451513cef35fbf70ca359b05ddac20a29ce4a280ba7b63b731
                                                                                                                      • Instruction Fuzzy Hash: 32714C70B002148FDB54ABB5D469BAE76E7AFC8344F148838E556DB784EF34DC068B92
                                                                                                                      Uniqueness

                                                                                                                      Uniqueness Score: -1.00%

                                                                                                                      Memory Dump Source
                                                                                                                      • Source File: 00000014.00000002.547421294.0000000006B70000.00000040.00000800.00020000.00000000.sdmp, Offset: 06B70000, based on PE: false
                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                      • Snapshot File: hcaresult_20_2_6b70000_SHIPMENT DOCUMENTS.jbxd
                                                                                                                      Similarity
                                                                                                                      • API ID:
                                                                                                                      • String ID:
                                                                                                                      • API String ID:
                                                                                                                      • Opcode ID: b8ea63dcfcc4412e6cf5c932d07d9769b6c157dd999e9de48e665fb1fa778d2a
                                                                                                                      • Instruction ID: 1223ed63b47c371890205722185f671fc50c25bafa3e6c06bcf1bdd777ee40cd
                                                                                                                      • Opcode Fuzzy Hash: b8ea63dcfcc4412e6cf5c932d07d9769b6c157dd999e9de48e665fb1fa778d2a
                                                                                                                      • Instruction Fuzzy Hash: CB71E370B042099FCBC4EBB8D8509AE7BF2EF89205B1585B9C459DB394DF349D02CB92
                                                                                                                      Uniqueness

                                                                                                                      Uniqueness Score: -1.00%

                                                                                                                      Memory Dump Source
                                                                                                                      • Source File: 00000014.00000002.547421294.0000000006B70000.00000040.00000800.00020000.00000000.sdmp, Offset: 06B70000, based on PE: false
                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                      • Snapshot File: hcaresult_20_2_6b70000_SHIPMENT DOCUMENTS.jbxd
                                                                                                                      Similarity
                                                                                                                      • API ID:
                                                                                                                      • String ID:
                                                                                                                      • API String ID:
                                                                                                                      • Opcode ID: dcd5388ce71878823adbc8e54e8c90195213aa8caea0faa8b58dbf38b40dc631
                                                                                                                      • Instruction ID: 04f3335546ee0f01153331cbebd55461b059bacb2c212eb6702314e747bbd331
                                                                                                                      • Opcode Fuzzy Hash: dcd5388ce71878823adbc8e54e8c90195213aa8caea0faa8b58dbf38b40dc631
                                                                                                                      • Instruction Fuzzy Hash: 8D61BC30B406048FCB94EBB5D458AAE7AE2AFC4304B64887DD40ADB740EF359C46CB92
                                                                                                                      Uniqueness

                                                                                                                      Uniqueness Score: -1.00%

                                                                                                                      Memory Dump Source
                                                                                                                      • Source File: 00000014.00000002.547421294.0000000006B70000.00000040.00000800.00020000.00000000.sdmp, Offset: 06B70000, based on PE: false
                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                      • Snapshot File: hcaresult_20_2_6b70000_SHIPMENT DOCUMENTS.jbxd
                                                                                                                      Similarity
                                                                                                                      • API ID:
                                                                                                                      • String ID:
                                                                                                                      • API String ID:
                                                                                                                      • Opcode ID: 24dc21f9d813de6c5bf182e049fc06d69737f4cb5a517e7219ab51d73fce804b
                                                                                                                      • Instruction ID: ad4dcc45656aa2eefd6fd01957ac7441c61d3a89f8b17044bd1c00d4215d3835
                                                                                                                      • Opcode Fuzzy Hash: 24dc21f9d813de6c5bf182e049fc06d69737f4cb5a517e7219ab51d73fce804b
                                                                                                                      • Instruction Fuzzy Hash: C0618CB0E007498FDB55CFA5C54069EBBF2FF89304F209699E865AB241E770E946CF50
                                                                                                                      Uniqueness

                                                                                                                      Uniqueness Score: -1.00%

                                                                                                                      Memory Dump Source
                                                                                                                      • Source File: 00000014.00000002.547421294.0000000006B70000.00000040.00000800.00020000.00000000.sdmp, Offset: 06B70000, based on PE: false
                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                      • Snapshot File: hcaresult_20_2_6b70000_SHIPMENT DOCUMENTS.jbxd
                                                                                                                      Similarity
                                                                                                                      • API ID:
                                                                                                                      • String ID:
                                                                                                                      • API String ID:
                                                                                                                      • Opcode ID: 7e98afa3091897fcd94b9897d158e00a7e538143bc268c7d6740381e132236de
                                                                                                                      • Instruction ID: b76bc926d026181987711234b4de5558c8d810682d5f866ad09968794881a7cc
                                                                                                                      • Opcode Fuzzy Hash: 7e98afa3091897fcd94b9897d158e00a7e538143bc268c7d6740381e132236de
                                                                                                                      • Instruction Fuzzy Hash: 72514B70E002098FCB54EFB5D8586AEBBB2FF89204F1485AAD549DB340EF349985CF91
                                                                                                                      Uniqueness

                                                                                                                      Uniqueness Score: -1.00%

                                                                                                                      Memory Dump Source
                                                                                                                      • Source File: 00000014.00000002.547421294.0000000006B70000.00000040.00000800.00020000.00000000.sdmp, Offset: 06B70000, based on PE: false
                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                      • Snapshot File: hcaresult_20_2_6b70000_SHIPMENT DOCUMENTS.jbxd
                                                                                                                      Similarity
                                                                                                                      • API ID:
                                                                                                                      • String ID:
                                                                                                                      • API String ID:
                                                                                                                      • Opcode ID: 3907c2c77072a75fdddd966c5db01d50b1b7aae162e59fea088be1618f782b6f
                                                                                                                      • Instruction ID: 636711942d2a61ee48b5b95d7bda6963bb391a5234b3ed6419c95e305a46ab0f
                                                                                                                      • Opcode Fuzzy Hash: 3907c2c77072a75fdddd966c5db01d50b1b7aae162e59fea088be1618f782b6f
                                                                                                                      • Instruction Fuzzy Hash: 4C516AB1E007498FDB15CFA5C54069DBBF2FF89304F249699E855AB241E770E946CF10
                                                                                                                      Uniqueness

                                                                                                                      Uniqueness Score: -1.00%

                                                                                                                      Memory Dump Source
                                                                                                                      • Source File: 00000014.00000002.547421294.0000000006B70000.00000040.00000800.00020000.00000000.sdmp, Offset: 06B70000, based on PE: false
                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                      • Snapshot File: hcaresult_20_2_6b70000_SHIPMENT DOCUMENTS.jbxd
                                                                                                                      Similarity
                                                                                                                      • API ID:
                                                                                                                      • String ID:
                                                                                                                      • API String ID:
                                                                                                                      • Opcode ID: 34a47796691323932fd6b3968e76f736a2331553fcdb0cff4c01518b22818386
                                                                                                                      • Instruction ID: 772a02953c7e1d8472b513085b4a6de5271dc79f1d0e265d81598e145252c864
                                                                                                                      • Opcode Fuzzy Hash: 34a47796691323932fd6b3968e76f736a2331553fcdb0cff4c01518b22818386
                                                                                                                      • Instruction Fuzzy Hash: A2418370F402148FDBA49BB4D429B6E7BE6AF88744F144478E906DB784DF34CC028B92
                                                                                                                      Uniqueness

                                                                                                                      Uniqueness Score: -1.00%

                                                                                                                      Memory Dump Source
                                                                                                                      • Source File: 00000014.00000002.547421294.0000000006B70000.00000040.00000800.00020000.00000000.sdmp, Offset: 06B70000, based on PE: false
                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                      • Snapshot File: hcaresult_20_2_6b70000_SHIPMENT DOCUMENTS.jbxd
                                                                                                                      Similarity
                                                                                                                      • API ID:
                                                                                                                      • String ID:
                                                                                                                      • API String ID:
                                                                                                                      • Opcode ID: 67544c7ac0735711d1b01b0845ebe4e7c3c5a612109405f4681bfe173cfd7a78
                                                                                                                      • Instruction ID: 4fa2edb5b4418830f30e5eac31b15708dc0865a3939fa65693bc3b78bdb66db8
                                                                                                                      • Opcode Fuzzy Hash: 67544c7ac0735711d1b01b0845ebe4e7c3c5a612109405f4681bfe173cfd7a78
                                                                                                                      • Instruction Fuzzy Hash: 4341E435F002444FCB85ABB894596AE7BE3EF89344B144879D51ADB395DF34CC06CB82
                                                                                                                      Uniqueness

                                                                                                                      Uniqueness Score: -1.00%

                                                                                                                      Memory Dump Source
                                                                                                                      • Source File: 00000014.00000002.547421294.0000000006B70000.00000040.00000800.00020000.00000000.sdmp, Offset: 06B70000, based on PE: false
                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                      • Snapshot File: hcaresult_20_2_6b70000_SHIPMENT DOCUMENTS.jbxd
                                                                                                                      Similarity
                                                                                                                      • API ID:
                                                                                                                      • String ID:
                                                                                                                      • API String ID:
                                                                                                                      • Opcode ID: 027fc20e63b057cd10c04f0cf22647fe58dad2ee4b9cfd752ae775ca8824bf88
                                                                                                                      • Instruction ID: a106ea382ec332bc8d56ae2cf8fcf7cb4e7a2e437686e55b8e8e0d1e2b7587c5
                                                                                                                      • Opcode Fuzzy Hash: 027fc20e63b057cd10c04f0cf22647fe58dad2ee4b9cfd752ae775ca8824bf88
                                                                                                                      • Instruction Fuzzy Hash: 1F51C878E153189FCB80EFA6D4858CDB7B1FB88304B618A39D801AB718DB716D45CF91
                                                                                                                      Uniqueness

                                                                                                                      Uniqueness Score: -1.00%

                                                                                                                      Memory Dump Source
                                                                                                                      • Source File: 00000014.00000002.547421294.0000000006B70000.00000040.00000800.00020000.00000000.sdmp, Offset: 06B70000, based on PE: false
                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                      • Snapshot File: hcaresult_20_2_6b70000_SHIPMENT DOCUMENTS.jbxd
                                                                                                                      Similarity
                                                                                                                      • API ID:
                                                                                                                      • String ID:
                                                                                                                      • API String ID:
                                                                                                                      • Opcode ID: cbce61b309c40a74bac9f8b7eecac17ef9814f0919dc63e62f2298cdf129b572
                                                                                                                      • Instruction ID: 0e915f3b0c2a1b581d5d11f5bcf61d322749d5f4c16ed2f3d2a85d5ce162ecb1
                                                                                                                      • Opcode Fuzzy Hash: cbce61b309c40a74bac9f8b7eecac17ef9814f0919dc63e62f2298cdf129b572
                                                                                                                      • Instruction Fuzzy Hash: 4741BEB1A04209DFDF51CFA4C844A9EBBB2EF49310F0185E5E925AF2A1D330E912DB95
                                                                                                                      Uniqueness

                                                                                                                      Uniqueness Score: -1.00%

                                                                                                                      Memory Dump Source
                                                                                                                      • Source File: 00000014.00000002.547421294.0000000006B70000.00000040.00000800.00020000.00000000.sdmp, Offset: 06B70000, based on PE: false
                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                      • Snapshot File: hcaresult_20_2_6b70000_SHIPMENT DOCUMENTS.jbxd
                                                                                                                      Similarity
                                                                                                                      • API ID:
                                                                                                                      • String ID:
                                                                                                                      • API String ID:
                                                                                                                      • Opcode ID: 38c6494aade0528fcce765a3b8368483e750d1e438f71752f708ee613be80e7d
                                                                                                                      • Instruction ID: 1898b3a89062dc6b81d46ecfd35168f30e7ee1e6a5c99ddf37aad6bd5dea9ea6
                                                                                                                      • Opcode Fuzzy Hash: 38c6494aade0528fcce765a3b8368483e750d1e438f71752f708ee613be80e7d
                                                                                                                      • Instruction Fuzzy Hash: 224118707442198FCB15AF69E814ABA3BE2EF88351F1484AAF956CB391CB35CC12C750
                                                                                                                      Uniqueness

                                                                                                                      Uniqueness Score: -1.00%

                                                                                                                      Memory Dump Source
                                                                                                                      • Source File: 00000014.00000002.547421294.0000000006B70000.00000040.00000800.00020000.00000000.sdmp, Offset: 06B70000, based on PE: false
                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                      • Snapshot File: hcaresult_20_2_6b70000_SHIPMENT DOCUMENTS.jbxd
                                                                                                                      Similarity
                                                                                                                      • API ID:
                                                                                                                      • String ID:
                                                                                                                      • API String ID:
                                                                                                                      • Opcode ID: 6b4afa44854e1527fce89cf5facc639dd1b86bddb488d53654b0325e71d3d848
                                                                                                                      • Instruction ID: 80cda4e935002e9637d86089ab57b68a9e08b97853d7ec28287b960c9de574d2
                                                                                                                      • Opcode Fuzzy Hash: 6b4afa44854e1527fce89cf5facc639dd1b86bddb488d53654b0325e71d3d848
                                                                                                                      • Instruction Fuzzy Hash: 19417B70E0020ADFDB68DFA1C549AAEBBB2EF84304F20557AD426AB644DF709945CFD1
                                                                                                                      Uniqueness

                                                                                                                      Uniqueness Score: -1.00%

                                                                                                                      Memory Dump Source
                                                                                                                      • Source File: 00000014.00000002.547421294.0000000006B70000.00000040.00000800.00020000.00000000.sdmp, Offset: 06B70000, based on PE: false
                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                      • Snapshot File: hcaresult_20_2_6b70000_SHIPMENT DOCUMENTS.jbxd
                                                                                                                      Similarity
                                                                                                                      • API ID:
                                                                                                                      • String ID:
                                                                                                                      • API String ID:
                                                                                                                      • Opcode ID: 1165f51a49838fb58107ae3982b337fd0c795afdbe9294799578ca68b8017d2c
                                                                                                                      • Instruction ID: 5f3bcf619ad8444e253575ddc1478add440009b42d26c2e7c823686565f2a278
                                                                                                                      • Opcode Fuzzy Hash: 1165f51a49838fb58107ae3982b337fd0c795afdbe9294799578ca68b8017d2c
                                                                                                                      • Instruction Fuzzy Hash: BC317E70E0030ACFDB64DFA4C5546AEBBB6EF85344B208969D416EB344EF709905CB91
                                                                                                                      Uniqueness

                                                                                                                      Uniqueness Score: -1.00%

                                                                                                                      Memory Dump Source
                                                                                                                      • Source File: 00000014.00000002.547421294.0000000006B70000.00000040.00000800.00020000.00000000.sdmp, Offset: 06B70000, based on PE: false
                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                      • Snapshot File: hcaresult_20_2_6b70000_SHIPMENT DOCUMENTS.jbxd
                                                                                                                      Similarity
                                                                                                                      • API ID:
                                                                                                                      • String ID:
                                                                                                                      • API String ID:
                                                                                                                      • Opcode ID: 8fdb5c0249f24301a92724496c30119a8fb3a0be3760743b8c142f25e106639b
                                                                                                                      • Instruction ID: 0da752779038c0f26444d8a32ed3e054e450d33665432ed5c534c3d315802bc5
                                                                                                                      • Opcode Fuzzy Hash: 8fdb5c0249f24301a92724496c30119a8fb3a0be3760743b8c142f25e106639b
                                                                                                                      • Instruction Fuzzy Hash: D831B071B002049FCB94ABB4D058AAEBBE6AF88244B14887CD406EB344DF34DD05CFD2
                                                                                                                      Uniqueness

                                                                                                                      Uniqueness Score: -1.00%

                                                                                                                      Memory Dump Source
                                                                                                                      • Source File: 00000014.00000002.547421294.0000000006B70000.00000040.00000800.00020000.00000000.sdmp, Offset: 06B70000, based on PE: false
                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                      • Snapshot File: hcaresult_20_2_6b70000_SHIPMENT DOCUMENTS.jbxd
                                                                                                                      Similarity
                                                                                                                      • API ID:
                                                                                                                      • String ID:
                                                                                                                      • API String ID:
                                                                                                                      • Opcode ID: 1fa1e2836d78f18b136e64e12865b9452449c970e99c0ddbfd19c6f8e3b8e087
                                                                                                                      • Instruction ID: aed4616e731e4dd2f00a708910c6c642a80344c010186fd2b544e48e3f9b4606
                                                                                                                      • Opcode Fuzzy Hash: 1fa1e2836d78f18b136e64e12865b9452449c970e99c0ddbfd19c6f8e3b8e087
                                                                                                                      • Instruction Fuzzy Hash: AA31D071B002059FCB55AB74D058AAEBBE6EF88604B14887CD406EB344DF34CC05CBD2
                                                                                                                      Uniqueness

                                                                                                                      Uniqueness Score: -1.00%

                                                                                                                      Memory Dump Source
                                                                                                                      • Source File: 00000014.00000002.547421294.0000000006B70000.00000040.00000800.00020000.00000000.sdmp, Offset: 06B70000, based on PE: false
                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                      • Snapshot File: hcaresult_20_2_6b70000_SHIPMENT DOCUMENTS.jbxd
                                                                                                                      Similarity
                                                                                                                      • API ID:
                                                                                                                      • String ID:
                                                                                                                      • API String ID:
                                                                                                                      • Opcode ID: 7a97612deba10ebd351706d8dbc3c6227405d336900a5538ebba539032eb24bd
                                                                                                                      • Instruction ID: 21867f8eb2743b02ee4cb1b61435912462d4cda77d7dad2bbe16539aedd4d9ca
                                                                                                                      • Opcode Fuzzy Hash: 7a97612deba10ebd351706d8dbc3c6227405d336900a5538ebba539032eb24bd
                                                                                                                      • Instruction Fuzzy Hash: 00318970E0070ACFDB64DF74C545A9EBBB6EF89304B24896DD416AB244EB309906CB92
                                                                                                                      Uniqueness

                                                                                                                      Uniqueness Score: -1.00%

                                                                                                                      Memory Dump Source
                                                                                                                      • Source File: 00000014.00000002.547421294.0000000006B70000.00000040.00000800.00020000.00000000.sdmp, Offset: 06B70000, based on PE: false
                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                      • Snapshot File: hcaresult_20_2_6b70000_SHIPMENT DOCUMENTS.jbxd
                                                                                                                      Similarity
                                                                                                                      • API ID:
                                                                                                                      • String ID:
                                                                                                                      • API String ID:
                                                                                                                      • Opcode ID: ead79e5126e72773cf35eb599219bd50ac144a6341aa17cbbd3c8c5679a1fcba
                                                                                                                      • Instruction ID: 8cfb2623fe6b19446e7f3c65181e1d94d38517d89df11c99c9b7615f786d2869
                                                                                                                      • Opcode Fuzzy Hash: ead79e5126e72773cf35eb599219bd50ac144a6341aa17cbbd3c8c5679a1fcba
                                                                                                                      • Instruction Fuzzy Hash: 37316A71B102089FCB44DBB8C985BEDB7F6EF88714F648069E515AB390DB71AC418B91
                                                                                                                      Uniqueness

                                                                                                                      Uniqueness Score: -1.00%

                                                                                                                      Memory Dump Source
                                                                                                                      • Source File: 00000014.00000002.547421294.0000000006B70000.00000040.00000800.00020000.00000000.sdmp, Offset: 06B70000, based on PE: false
                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                      • Snapshot File: hcaresult_20_2_6b70000_SHIPMENT DOCUMENTS.jbxd
                                                                                                                      Similarity
                                                                                                                      • API ID:
                                                                                                                      • String ID:
                                                                                                                      • API String ID:
                                                                                                                      • Opcode ID: f579519ba884eea3763a80f7a7c5586246606dbdc12574e80cfdb969692ee442
                                                                                                                      • Instruction ID: 72ee8d2de5a422b5a34ac83d4a222159564a66cd650ba6d3e12ee2beb82f2a26
                                                                                                                      • Opcode Fuzzy Hash: f579519ba884eea3763a80f7a7c5586246606dbdc12574e80cfdb969692ee442
                                                                                                                      • Instruction Fuzzy Hash: 6D212431B482904FC71597395C586FA7FEACFD2205F1A80FAE149CB692CA65CC07C710
                                                                                                                      Uniqueness

                                                                                                                      Uniqueness Score: -1.00%

                                                                                                                      Memory Dump Source
                                                                                                                      • Source File: 00000014.00000002.547421294.0000000006B70000.00000040.00000800.00020000.00000000.sdmp, Offset: 06B70000, based on PE: false
                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                      • Snapshot File: hcaresult_20_2_6b70000_SHIPMENT DOCUMENTS.jbxd
                                                                                                                      Similarity
                                                                                                                      • API ID:
                                                                                                                      • String ID:
                                                                                                                      • API String ID:
                                                                                                                      • Opcode ID: b510d144cc8364ca41b356edc6514d6bf946278db9099e5c1f17c27eee0b8294
                                                                                                                      • Instruction ID: 6ce73f931638ee32ab0c676ad08acc8233c89a425a7b7eeb9da2e06227f89495
                                                                                                                      • Opcode Fuzzy Hash: b510d144cc8364ca41b356edc6514d6bf946278db9099e5c1f17c27eee0b8294
                                                                                                                      • Instruction Fuzzy Hash: FA31E471E052099FCB90DBA9D885ADEBBF2EB85314F15807AE514E7301EB35EC06CB91
                                                                                                                      Uniqueness

                                                                                                                      Uniqueness Score: -1.00%

                                                                                                                      Memory Dump Source
                                                                                                                      • Source File: 00000014.00000002.547421294.0000000006B70000.00000040.00000800.00020000.00000000.sdmp, Offset: 06B70000, based on PE: false
                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                      • Snapshot File: hcaresult_20_2_6b70000_SHIPMENT DOCUMENTS.jbxd
                                                                                                                      Similarity
                                                                                                                      • API ID:
                                                                                                                      • String ID:
                                                                                                                      • API String ID:
                                                                                                                      • Opcode ID: 7c3bf8cec246002257ae88c93fdeec33ccc6de03ed9d192b1a1ee1324c2c2ff1
                                                                                                                      • Instruction ID: 5d94807b392cafb6bc4f26e63941c6a81cd111fff05e6b163bd4e59f704352b2
                                                                                                                      • Opcode Fuzzy Hash: 7c3bf8cec246002257ae88c93fdeec33ccc6de03ed9d192b1a1ee1324c2c2ff1
                                                                                                                      • Instruction Fuzzy Hash: D721A274B042558FCB81EBB99C44AAE7FF2EF89204B1584BAD559DB341EB348C068B91
                                                                                                                      Uniqueness

                                                                                                                      Uniqueness Score: -1.00%

                                                                                                                      Memory Dump Source
                                                                                                                      • Source File: 00000014.00000002.547421294.0000000006B70000.00000040.00000800.00020000.00000000.sdmp, Offset: 06B70000, based on PE: false
                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                      • Snapshot File: hcaresult_20_2_6b70000_SHIPMENT DOCUMENTS.jbxd
                                                                                                                      Similarity
                                                                                                                      • API ID:
                                                                                                                      • String ID:
                                                                                                                      • API String ID:
                                                                                                                      • Opcode ID: 0eead5f82abc92d3839aa379932f443b4583abcd8323742e79cc88745b583139
                                                                                                                      • Instruction ID: 3833a40ecefee572ca0eaf491494565c29afb572864094f62ac6a0b1329d2a2b
                                                                                                                      • Opcode Fuzzy Hash: 0eead5f82abc92d3839aa379932f443b4583abcd8323742e79cc88745b583139
                                                                                                                      • Instruction Fuzzy Hash: 99219435E1071A8FCB10DFA5E88599EB7B2FF84304F508939E515AB610DB70A9468FD1
                                                                                                                      Uniqueness

                                                                                                                      Uniqueness Score: -1.00%

                                                                                                                      Memory Dump Source
                                                                                                                      • Source File: 00000014.00000002.519493447.000000000135D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0135D000, based on PE: false
                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                      • Snapshot File: hcaresult_20_2_135d000_SHIPMENT DOCUMENTS.jbxd
                                                                                                                      Similarity
                                                                                                                      • API ID:
                                                                                                                      • String ID:
                                                                                                                      • API String ID:
                                                                                                                      • Opcode ID: ff67e9867f41f5466d8031f5a0fe2857f4930f71c988910d70c2280c17399615
                                                                                                                      • Instruction ID: 03635fd519c51f97e83c3ba5b6a9d372034e8061af916c963cf5a00b9461828b
                                                                                                                      • Opcode Fuzzy Hash: ff67e9867f41f5466d8031f5a0fe2857f4930f71c988910d70c2280c17399615
                                                                                                                      • Instruction Fuzzy Hash: B22103B2504244DFDB45DF94D9C0F26BBA5FB8872CF248969ED064B206C336D856CAA2
                                                                                                                      Uniqueness

                                                                                                                      Uniqueness Score: -1.00%

                                                                                                                      Memory Dump Source
                                                                                                                      • Source File: 00000014.00000002.519671530.000000000136D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0136D000, based on PE: false
                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                      • Snapshot File: hcaresult_20_2_136d000_SHIPMENT DOCUMENTS.jbxd
                                                                                                                      Similarity
                                                                                                                      • API ID:
                                                                                                                      • String ID:
                                                                                                                      • API String ID:
                                                                                                                      • Opcode ID: a0e284fa3969b4e42aa9fd9e9b342d65582344c283c0e10ac875a10ac73da9bc
                                                                                                                      • Instruction ID: 147673e5baad817963a2ab54de4116dc51a44419a2ebc97ba1c7a37e053a7c19
                                                                                                                      • Opcode Fuzzy Hash: a0e284fa3969b4e42aa9fd9e9b342d65582344c283c0e10ac875a10ac73da9bc
                                                                                                                      • Instruction Fuzzy Hash: 46213779504244DFDB06CF24C5C4B26BB69FB84328F24C9BDD9095B74AC33AD84ACB62
                                                                                                                      Uniqueness

                                                                                                                      Uniqueness Score: -1.00%

                                                                                                                      Memory Dump Source
                                                                                                                      • Source File: 00000014.00000002.547421294.0000000006B70000.00000040.00000800.00020000.00000000.sdmp, Offset: 06B70000, based on PE: false
                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                      • Snapshot File: hcaresult_20_2_6b70000_SHIPMENT DOCUMENTS.jbxd
                                                                                                                      Similarity
                                                                                                                      • API ID:
                                                                                                                      • String ID:
                                                                                                                      • API String ID:
                                                                                                                      • Opcode ID: 0778b67c5b16245002b8e45ce1f1f6aaec5a44b30b4fe9df0e9c96fd34dc268f
                                                                                                                      • Instruction ID: b747fa423f711156a7032443881fbcf9218e6d6a361ab2412c346c6291822839
                                                                                                                      • Opcode Fuzzy Hash: 0778b67c5b16245002b8e45ce1f1f6aaec5a44b30b4fe9df0e9c96fd34dc268f
                                                                                                                      • Instruction Fuzzy Hash: 5B1157B26043058FD3469F29E8007967BF2EF8A320F1A80B6E555CB352CB34CC16C761
                                                                                                                      Uniqueness

                                                                                                                      Uniqueness Score: -1.00%

                                                                                                                      Memory Dump Source
                                                                                                                      • Source File: 00000014.00000002.547421294.0000000006B70000.00000040.00000800.00020000.00000000.sdmp, Offset: 06B70000, based on PE: false
                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                      • Snapshot File: hcaresult_20_2_6b70000_SHIPMENT DOCUMENTS.jbxd
                                                                                                                      Similarity
                                                                                                                      • API ID:
                                                                                                                      • String ID:
                                                                                                                      • API String ID:
                                                                                                                      • Opcode ID: cc0b190663cd64143a8c8b5241fbea35b23e936ec39e9f43c8857dbe67fb180c
                                                                                                                      • Instruction ID: 408df67bf4d714d7b655bd16fa6d73427b65dd760f329e9762defd97b6cb1222
                                                                                                                      • Opcode Fuzzy Hash: cc0b190663cd64143a8c8b5241fbea35b23e936ec39e9f43c8857dbe67fb180c
                                                                                                                      • Instruction Fuzzy Hash: 7C117F74B0E3814FD382973498546653FB29FD7204F1A84F6E594CB6A3DA26CC4AC722
                                                                                                                      Uniqueness

                                                                                                                      Uniqueness Score: -1.00%

                                                                                                                      Memory Dump Source
                                                                                                                      • Source File: 00000014.00000002.547421294.0000000006B70000.00000040.00000800.00020000.00000000.sdmp, Offset: 06B70000, based on PE: false
                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                      • Snapshot File: hcaresult_20_2_6b70000_SHIPMENT DOCUMENTS.jbxd
                                                                                                                      Similarity
                                                                                                                      • API ID:
                                                                                                                      • String ID:
                                                                                                                      • API String ID:
                                                                                                                      • Opcode ID: 3702b2a148202ed3341fa067c6d5bfdb95cd4a13432a8ea6b346b8b51ceaa161
                                                                                                                      • Instruction ID: d1d20c3c0f3843c184ad0e8ec8e7337fc9124254bed00ecc3cb8e31ac59354d8
                                                                                                                      • Opcode Fuzzy Hash: 3702b2a148202ed3341fa067c6d5bfdb95cd4a13432a8ea6b346b8b51ceaa161
                                                                                                                      • Instruction Fuzzy Hash: 3011D671A00205DBDF21CF68C845B5EBBB2EF85314F0586E5E5299F2A1D371F812CBA5
                                                                                                                      Uniqueness

                                                                                                                      Uniqueness Score: -1.00%

                                                                                                                      Memory Dump Source
                                                                                                                      • Source File: 00000014.00000002.519493447.000000000135D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0135D000, based on PE: false
                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                      • Snapshot File: hcaresult_20_2_135d000_SHIPMENT DOCUMENTS.jbxd
                                                                                                                      Similarity
                                                                                                                      • API ID:
                                                                                                                      • String ID:
                                                                                                                      • API String ID:
                                                                                                                      • Opcode ID: 17894ca1eab804f1555070659dd00dfff87542e61665d1c8f73af2d5ff09c7fa
                                                                                                                      • Instruction ID: 3438d22236adf839aa371ca01a50c3c4dfc6bb325ca9e4a85e5e2da1719279f9
                                                                                                                      • Opcode Fuzzy Hash: 17894ca1eab804f1555070659dd00dfff87542e61665d1c8f73af2d5ff09c7fa
                                                                                                                      • Instruction Fuzzy Hash: 8711D376404280CFDB16CF54D5C4B16BF71FB88728F2886A9DC050B61BC33AD45ACBA1
                                                                                                                      Uniqueness

                                                                                                                      Uniqueness Score: -1.00%

                                                                                                                      Memory Dump Source
                                                                                                                      • Source File: 00000014.00000002.547421294.0000000006B70000.00000040.00000800.00020000.00000000.sdmp, Offset: 06B70000, based on PE: false
                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                      • Snapshot File: hcaresult_20_2_6b70000_SHIPMENT DOCUMENTS.jbxd
                                                                                                                      Similarity
                                                                                                                      • API ID:
                                                                                                                      • String ID:
                                                                                                                      • API String ID:
                                                                                                                      • Opcode ID: 7e553061c173d18ed621d6167cb9f3a16d8a66466cd3f4394475a1312b76cc68
                                                                                                                      • Instruction ID: 7ca9b5c3d8721890876b5d69924bb7d8a4f5172f32a897c94dcbd7f6d1a29507
                                                                                                                      • Opcode Fuzzy Hash: 7e553061c173d18ed621d6167cb9f3a16d8a66466cd3f4394475a1312b76cc68
                                                                                                                      • Instruction Fuzzy Hash: 26112A74F101188F8BC0EBB9D88499E7BF1FF886107508579D52AE7344EB349D128B91
                                                                                                                      Uniqueness

                                                                                                                      Uniqueness Score: -1.00%

                                                                                                                      Memory Dump Source
                                                                                                                      • Source File: 00000014.00000002.547421294.0000000006B70000.00000040.00000800.00020000.00000000.sdmp, Offset: 06B70000, based on PE: false
                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                      • Snapshot File: hcaresult_20_2_6b70000_SHIPMENT DOCUMENTS.jbxd
                                                                                                                      Similarity
                                                                                                                      • API ID:
                                                                                                                      • String ID:
                                                                                                                      • API String ID:
                                                                                                                      • Opcode ID: a831b926ede8f6d3ee412f63e43482112b8bf5ff8e127b36da4bf2fc31027ae6
                                                                                                                      • Instruction ID: 7c4fd324d88655d4e794f5a10c317a278ff7d426101e2fcc5b06ace830f1048c
                                                                                                                      • Opcode Fuzzy Hash: a831b926ede8f6d3ee412f63e43482112b8bf5ff8e127b36da4bf2fc31027ae6
                                                                                                                      • Instruction Fuzzy Hash: 69112A74F101188F8B80EBB9D8849AE7BF2FB88210750857AD52AD7344EF349D128BD1
                                                                                                                      Uniqueness

                                                                                                                      Uniqueness Score: -1.00%

                                                                                                                      Memory Dump Source
                                                                                                                      • Source File: 00000014.00000002.547421294.0000000006B70000.00000040.00000800.00020000.00000000.sdmp, Offset: 06B70000, based on PE: false
                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                      • Snapshot File: hcaresult_20_2_6b70000_SHIPMENT DOCUMENTS.jbxd
                                                                                                                      Similarity
                                                                                                                      • API ID:
                                                                                                                      • String ID:
                                                                                                                      • API String ID:
                                                                                                                      • Opcode ID: 6eba7f92d82ac1e7693cef3913286d1b341a23c70ae18eef3addad1d150f4f9a
                                                                                                                      • Instruction ID: b91d1677a79a803cb040f1b009cbade94b0f161c57e364b2ae725f2bb38dd348
                                                                                                                      • Opcode Fuzzy Hash: 6eba7f92d82ac1e7693cef3913286d1b341a23c70ae18eef3addad1d150f4f9a
                                                                                                                      • Instruction Fuzzy Hash: 55112A74F101188F8B81EBB9D88999EBBF2EB882107908579D52AD7344EB349D128BD1
                                                                                                                      Uniqueness

                                                                                                                      Uniqueness Score: -1.00%

                                                                                                                      Memory Dump Source
                                                                                                                      • Source File: 00000014.00000002.547421294.0000000006B70000.00000040.00000800.00020000.00000000.sdmp, Offset: 06B70000, based on PE: false
                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                      • Snapshot File: hcaresult_20_2_6b70000_SHIPMENT DOCUMENTS.jbxd
                                                                                                                      Similarity
                                                                                                                      • API ID:
                                                                                                                      • String ID:
                                                                                                                      • API String ID:
                                                                                                                      • Opcode ID: 8c7524b41503c3b382d1af6974001d4a3f6331cb57174219293e3d7755fabc54
                                                                                                                      • Instruction ID: ec8e87e7b1ce4f52a2b0ced0e758c93ec4bdb9afa436390ab42427de9dafcfbb
                                                                                                                      • Opcode Fuzzy Hash: 8c7524b41503c3b382d1af6974001d4a3f6331cb57174219293e3d7755fabc54
                                                                                                                      • Instruction Fuzzy Hash: 59112134B001189F8B80EBBDD84999EBBF5FB88214750852AE50AD7344EF389D028B91
                                                                                                                      Uniqueness

                                                                                                                      Uniqueness Score: -1.00%

                                                                                                                      Memory Dump Source
                                                                                                                      • Source File: 00000014.00000002.547421294.0000000006B70000.00000040.00000800.00020000.00000000.sdmp, Offset: 06B70000, based on PE: false
                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                      • Snapshot File: hcaresult_20_2_6b70000_SHIPMENT DOCUMENTS.jbxd
                                                                                                                      Similarity
                                                                                                                      • API ID:
                                                                                                                      • String ID:
                                                                                                                      • API String ID:
                                                                                                                      • Opcode ID: a5817d9b5e77335919033dcaa00ddebfb048afb643c79973693756da33b7be16
                                                                                                                      • Instruction ID: 2faf5b8f0f5caa08f1b682b82b22fa732ce894abf2775cfcba2fc37435b6c217
                                                                                                                      • Opcode Fuzzy Hash: a5817d9b5e77335919033dcaa00ddebfb048afb643c79973693756da33b7be16
                                                                                                                      • Instruction Fuzzy Hash: 0F016DB1F001198FCBC0FBBA98456AEBBF6EBC4250B50413AC519E7304EB319D018BD2
                                                                                                                      Uniqueness

                                                                                                                      Uniqueness Score: -1.00%

                                                                                                                      Memory Dump Source
                                                                                                                      • Source File: 00000014.00000002.547421294.0000000006B70000.00000040.00000800.00020000.00000000.sdmp, Offset: 06B70000, based on PE: false
                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                      • Snapshot File: hcaresult_20_2_6b70000_SHIPMENT DOCUMENTS.jbxd
                                                                                                                      Similarity
                                                                                                                      • API ID:
                                                                                                                      • String ID:
                                                                                                                      • API String ID:
                                                                                                                      • Opcode ID: e038f8dc2b8e2c0001882fb7e9a98bb1251dec762826fec29a2c0ed234a0b70e
                                                                                                                      • Instruction ID: 363b37077bf17093007b2fcf9becb17d424367c731a7c638a3e0d592036871df
                                                                                                                      • Opcode Fuzzy Hash: e038f8dc2b8e2c0001882fb7e9a98bb1251dec762826fec29a2c0ed234a0b70e
                                                                                                                      • Instruction Fuzzy Hash: A8F0BE767001104FD7989B2EE854E6A3BAAEFC9B11B1640B9F509CB361CA61DC01CB40
                                                                                                                      Uniqueness

                                                                                                                      Uniqueness Score: -1.00%

                                                                                                                      Memory Dump Source
                                                                                                                      • Source File: 00000014.00000002.547421294.0000000006B70000.00000040.00000800.00020000.00000000.sdmp, Offset: 06B70000, based on PE: false
                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                      • Snapshot File: hcaresult_20_2_6b70000_SHIPMENT DOCUMENTS.jbxd
                                                                                                                      Similarity
                                                                                                                      • API ID:
                                                                                                                      • String ID:
                                                                                                                      • API String ID:
                                                                                                                      • Opcode ID: 62586b09ccd6fcedbb89b19e813f32afd6ae4f677a2f4276cfcd96edfbe751f1
                                                                                                                      • Instruction ID: cfb2bc9a1edb4551f6f8e81bb632bc2d6d79442c09e8af79f1b8b0535c2dbf81
                                                                                                                      • Opcode Fuzzy Hash: 62586b09ccd6fcedbb89b19e813f32afd6ae4f677a2f4276cfcd96edfbe751f1
                                                                                                                      • Instruction Fuzzy Hash: 8FF08C347402148FD788AF2AD85892E37EAFFC9B11B5580B9F60ACB361CE70DC018B90
                                                                                                                      Uniqueness

                                                                                                                      Uniqueness Score: -1.00%

                                                                                                                      Memory Dump Source
                                                                                                                      • Source File: 00000014.00000002.547421294.0000000006B70000.00000040.00000800.00020000.00000000.sdmp, Offset: 06B70000, based on PE: false
                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                      • Snapshot File: hcaresult_20_2_6b70000_SHIPMENT DOCUMENTS.jbxd
                                                                                                                      Similarity
                                                                                                                      • API ID:
                                                                                                                      • String ID:
                                                                                                                      • API String ID:
                                                                                                                      • Opcode ID: 6b9c606d67c2e7f1d475f1790cc6a89a359b0da344812631615ce0c80eea0105
                                                                                                                      • Instruction ID: a78f7ba33ef236722e9915d0ce43935abc7ee845f1b48bd8ba35b8f765358499
                                                                                                                      • Opcode Fuzzy Hash: 6b9c606d67c2e7f1d475f1790cc6a89a359b0da344812631615ce0c80eea0105
                                                                                                                      • Instruction Fuzzy Hash: C9E03975B100188B8FC0F7B8D84489D73F2ABC8610B1080A5D61AD7344EA249C128BA2
                                                                                                                      Uniqueness

                                                                                                                      Uniqueness Score: -1.00%

                                                                                                                      Memory Dump Source
                                                                                                                      • Source File: 00000014.00000002.547421294.0000000006B70000.00000040.00000800.00020000.00000000.sdmp, Offset: 06B70000, based on PE: false
                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                      • Snapshot File: hcaresult_20_2_6b70000_SHIPMENT DOCUMENTS.jbxd
                                                                                                                      Similarity
                                                                                                                      • API ID:
                                                                                                                      • String ID:
                                                                                                                      • API String ID:
                                                                                                                      • Opcode ID: 9aa380f14ea7cee1d75a9b957ba46d0c62282a8f6a321e383ee6862c3be7c053
                                                                                                                      • Instruction ID: 126fe864a09775531578679e15f56c5dbcf12d1b9625d4e464a5010f6a35b19d
                                                                                                                      • Opcode Fuzzy Hash: 9aa380f14ea7cee1d75a9b957ba46d0c62282a8f6a321e383ee6862c3be7c053
                                                                                                                      • Instruction Fuzzy Hash: DAE03935B100188F8FC0FBB8D88489D77F2ABC821170040A5D61AD7344EE249C128BA2
                                                                                                                      Uniqueness

                                                                                                                      Uniqueness Score: -1.00%

                                                                                                                      Memory Dump Source
                                                                                                                      • Source File: 00000014.00000002.547421294.0000000006B70000.00000040.00000800.00020000.00000000.sdmp, Offset: 06B70000, based on PE: false
                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                      • Snapshot File: hcaresult_20_2_6b70000_SHIPMENT DOCUMENTS.jbxd
                                                                                                                      Similarity
                                                                                                                      • API ID:
                                                                                                                      • String ID:
                                                                                                                      • API String ID:
                                                                                                                      • Opcode ID: 2ec47813f51dc72893ee8480caff357dc5e8269c463cc73fdafea405763aa2e0
                                                                                                                      • Instruction ID: 85f6a466faf6024543a91bb1aeb72b7ea6cef368450973e148e081f2830747e5
                                                                                                                      • Opcode Fuzzy Hash: 2ec47813f51dc72893ee8480caff357dc5e8269c463cc73fdafea405763aa2e0
                                                                                                                      • Instruction Fuzzy Hash: F5E0C935B500188F8FC4FBB9D84489D77E2AFC861571140B5D61AE7354EB249C228B92
                                                                                                                      Uniqueness

                                                                                                                      Uniqueness Score: -1.00%

                                                                                                                      Memory Dump Source
                                                                                                                      • Source File: 00000014.00000002.547421294.0000000006B70000.00000040.00000800.00020000.00000000.sdmp, Offset: 06B70000, based on PE: false
                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                      • Snapshot File: hcaresult_20_2_6b70000_SHIPMENT DOCUMENTS.jbxd
                                                                                                                      Similarity
                                                                                                                      • API ID:
                                                                                                                      • String ID:
                                                                                                                      • API String ID:
                                                                                                                      • Opcode ID: 17f49f08f4e05bdc41b64103dd3dd7b0dcea95187f06cfba1bc4c2e46175c667
                                                                                                                      • Instruction ID: bb44a78916bb45188537767577819f151b69a895e545424531f5abdb33ae22e4
                                                                                                                      • Opcode Fuzzy Hash: 17f49f08f4e05bdc41b64103dd3dd7b0dcea95187f06cfba1bc4c2e46175c667
                                                                                                                      • Instruction Fuzzy Hash: B3E0C039B501188F8F80EBB9E44949C77F1EF882157418165EA0AE7354EF389C128B51
                                                                                                                      Uniqueness

                                                                                                                      Uniqueness Score: -1.00%

                                                                                                                      Memory Dump Source
                                                                                                                      • Source File: 00000014.00000002.547421294.0000000006B70000.00000040.00000800.00020000.00000000.sdmp, Offset: 06B70000, based on PE: false
                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                      • Snapshot File: hcaresult_20_2_6b70000_SHIPMENT DOCUMENTS.jbxd
                                                                                                                      Similarity
                                                                                                                      • API ID:
                                                                                                                      • String ID:
                                                                                                                      • API String ID:
                                                                                                                      • Opcode ID: 8c72fcfc5ba5391cc6dd609dc2b5bcc487abbecb0268fbea71c320ceed750e84
                                                                                                                      • Instruction ID: 35c94f70ba6c2ac1dcfa40eeb495dd8855bfbeac601071361e5526ce3d44575f
                                                                                                                      • Opcode Fuzzy Hash: 8c72fcfc5ba5391cc6dd609dc2b5bcc487abbecb0268fbea71c320ceed750e84
                                                                                                                      • Instruction Fuzzy Hash: 87E06D76B000188F8FC0FBB8D8448DDB3F2AFC8210B0180B5D61AE7344EE349C128BA2
                                                                                                                      Uniqueness

                                                                                                                      Uniqueness Score: -1.00%

                                                                                                                      Memory Dump Source
                                                                                                                      • Source File: 00000014.00000002.547421294.0000000006B70000.00000040.00000800.00020000.00000000.sdmp, Offset: 06B70000, based on PE: false
                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                      • Snapshot File: hcaresult_20_2_6b70000_SHIPMENT DOCUMENTS.jbxd
                                                                                                                      Similarity
                                                                                                                      • API ID:
                                                                                                                      • String ID:
                                                                                                                      • API String ID:
                                                                                                                      • Opcode ID: 98f97b80f9878110f8ece15992f0a4f0439228ea9f5fb2546344468c08af7ef5
                                                                                                                      • Instruction ID: 9384c6d2e420f135cc3b814d7b1bc3a9293bafd9d125c783f20b57e6448afa2b
                                                                                                                      • Opcode Fuzzy Hash: 98f97b80f9878110f8ece15992f0a4f0439228ea9f5fb2546344468c08af7ef5
                                                                                                                      • Instruction Fuzzy Hash: 6BE03935B100188F8FC0F7B8D8498DD77E2ABC821074180A5D61AD3344EE249C128B92
                                                                                                                      Uniqueness

                                                                                                                      Uniqueness Score: -1.00%

                                                                                                                      Memory Dump Source
                                                                                                                      • Source File: 00000014.00000002.547421294.0000000006B70000.00000040.00000800.00020000.00000000.sdmp, Offset: 06B70000, based on PE: false
                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                      • Snapshot File: hcaresult_20_2_6b70000_SHIPMENT DOCUMENTS.jbxd
                                                                                                                      Similarity
                                                                                                                      • API ID:
                                                                                                                      • String ID:
                                                                                                                      • API String ID:
                                                                                                                      • Opcode ID: cf730ba933a55dd5d66233f761d0fd85ce2d9759c56e8d768528691a828253cd
                                                                                                                      • Instruction ID: 7f2f8f7768e91bf6b80b73fd0d2aaa4121d3d455367c26d9d3a05f5821190b8a
                                                                                                                      • Opcode Fuzzy Hash: cf730ba933a55dd5d66233f761d0fd85ce2d9759c56e8d768528691a828253cd
                                                                                                                      • Instruction Fuzzy Hash: 2FD0E279F08114CFDBA8DBB5E8881ACB7B6FBC8221B10847AE00A92244CF3118568F00
                                                                                                                      Uniqueness

                                                                                                                      Uniqueness Score: -1.00%

                                                                                                                      Memory Dump Source
                                                                                                                      • Source File: 00000014.00000002.547421294.0000000006B70000.00000040.00000800.00020000.00000000.sdmp, Offset: 06B70000, based on PE: false
                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                      • Snapshot File: hcaresult_20_2_6b70000_SHIPMENT DOCUMENTS.jbxd
                                                                                                                      Similarity
                                                                                                                      • API ID:
                                                                                                                      • String ID:
                                                                                                                      • API String ID:
                                                                                                                      • Opcode ID: 7ec9ec73e4731cd75a9c653da234ca9c7ab179742d14bfe0f1361b0be20711c1
                                                                                                                      • Instruction ID: 0079cf69311833a8e745710bdcb57a4c908b2ed560953fc3ee84a004d0c5424c
                                                                                                                      • Opcode Fuzzy Hash: 7ec9ec73e4731cd75a9c653da234ca9c7ab179742d14bfe0f1361b0be20711c1
                                                                                                                      • Instruction Fuzzy Hash: 97C08C36F00018CF4B00DA84A4808DCB3A0EF88138B108097D91952200C7312A268AC5
                                                                                                                      Uniqueness

                                                                                                                      Uniqueness Score: -1.00%

                                                                                                                      Memory Dump Source
                                                                                                                      • Source File: 00000014.00000002.547421294.0000000006B70000.00000040.00000800.00020000.00000000.sdmp, Offset: 06B70000, based on PE: false
                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                      • Snapshot File: hcaresult_20_2_6b70000_SHIPMENT DOCUMENTS.jbxd
                                                                                                                      Similarity
                                                                                                                      • API ID:
                                                                                                                      • String ID:
                                                                                                                      • API String ID:
                                                                                                                      • Opcode ID: 9af270f03c36100b8437fb2865b4a84c945f87d456fcc061044c98a4845d3083
                                                                                                                      • Instruction ID: 30089806c2cb1f8aca1e6360117c3f398d5be66b6db0b30be221adb6f10b96a2
                                                                                                                      • Opcode Fuzzy Hash: 9af270f03c36100b8437fb2865b4a84c945f87d456fcc061044c98a4845d3083
                                                                                                                      • Instruction Fuzzy Hash: 3BB0223280823C8B0BE8208CB0008AA338CB2020B030000A2EEBA8BA008A80EC0002C0
                                                                                                                      Uniqueness

                                                                                                                      Uniqueness Score: -1.00%