Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
SHIPMENT DOCUMENTS.exe

Overview

General Information

Sample Name:SHIPMENT DOCUMENTS.exe
Analysis ID:756110
MD5:12dc06d3034a17be7a70a4aa45edce8d
SHA1:9b68ae25498a12f19360dc0dc023af61ca9bfa9d
SHA256:91826efe412b5c829801d1c52fbb43225cf1f0fc4cba201453ad877341c64b90
Tags:AgentTeslaexe
Infos:

Detection

AgentTesla
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
Malicious sample detected (through community Yara rule)
Yara detected AgentTesla
Yara detected AntiVM3
Sigma detected: Scheduled temp file as task from temp location
Multi AV Scanner detection for dropped file
Tries to steal Mail credentials (via file / registry access)
Initial sample is a PE file and has a suspicious name
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to harvest and steal ftp login credentials
.NET source code references suspicious native API functions
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Machine Learning detection for sample
May check the online IP address of the machine
.NET source code contains potential unpacker
Injects a PE file into a foreign processes
.NET source code contains method to dynamically call methods (often used by packers)
.NET source code contains very large array initializations
Machine Learning detection for dropped file
Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)
Uses schtasks.exe or at.exe to add and modify task schedules
Tries to harvest and steal browser information (history, passwords, etc)
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Uses 32bit PE files
Queries the volume information (name, serial number etc) of a device
Yara signature match
Antivirus or Machine Learning detection for unpacked file
May sleep (evasive loops) to hinder dynamic analysis
Uses code obfuscation techniques (call, push, ret)
Detected potential crypto function
Sample execution stops while process was sleeping (likely an evasion)
Yara detected Credential Stealer
JA3 SSL client fingerprint seen in connection with other malware
IP address seen in connection with other malware
Contains long sleeps (>= 3 min)
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Sample file is different than original file name gathered from version info
Drops PE files
Uses a known web browser user agent for HTTP communication
Detected TCP or UDP traffic on non-standard ports
Uses SMTP (mail sending)
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Monitors certain registry keys / values for changes (often done to protect autostart functionality)
Creates a process in suspended mode (likely to inject code)

Classification

  • System is w10x64
  • SHIPMENT DOCUMENTS.exe (PID: 3192 cmdline: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exe MD5: 12DC06D3034A17BE7A70A4AA45EDCE8D)
    • schtasks.exe (PID: 5900 cmdline: C:\Windows\System32\schtasks.exe" /Create /TN "Updates\cnWCiicEpxW" /XML "C:\Users\user\AppData\Local\Temp\tmp2A80.tmp MD5: 15FF7D8324231381BAD48A052F85DF04)
      • conhost.exe (PID: 1632 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
  • cnWCiicEpxW.exe (PID: 4444 cmdline: C:\Users\user\AppData\Roaming\cnWCiicEpxW.exe MD5: 12DC06D3034A17BE7A70A4AA45EDCE8D)
    • schtasks.exe (PID: 5740 cmdline: C:\Windows\System32\schtasks.exe" /Create /TN "Updates\cnWCiicEpxW" /XML "C:\Users\user\AppData\Local\Temp\tmpC7C9.tmp MD5: 15FF7D8324231381BAD48A052F85DF04)
      • conhost.exe (PID: 4512 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
    • cnWCiicEpxW.exe (PID: 3132 cmdline: {path} MD5: 12DC06D3034A17BE7A70A4AA45EDCE8D)
  • cleanup
{"Exfil Mode": "SMTP", "Host": "mail.southernboilers.org", "Username": "info@southernboilers.org", "Password": "Sksmoke2018#"}
SourceRuleDescriptionAuthorStrings
00000014.00000000.301553016.0000000000402000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
    00000014.00000000.301553016.0000000000402000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_AgentTesla_2Yara detected AgentTeslaJoe Security
      00000014.00000000.301553016.0000000000402000.00000040.00000400.00020000.00000000.sdmpWindows_Trojan_AgentTesla_d3ac2b2funknownunknown
      • 0x31ccf:$a13: get_DnsResolver
      • 0x303d4:$a20: get_LastAccessed
      • 0x326dc:$a27: set_InternalServerPort
      • 0x32a11:$a30: set_GuidMasterKey
      • 0x304e6:$a33: get_Clipboard
      • 0x304f4:$a34: get_Keyboard
      • 0x318ba:$a35: get_ShiftKeyDown
      • 0x318cb:$a36: get_AltKeyDown
      • 0x30501:$a37: get_Password
      • 0x31015:$a38: get_PasswordHash
      • 0x32110:$a39: get_DefaultCredentials
      0000001B.00000002.528419495.0000000003164000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
        0000001B.00000002.525674867.0000000003111000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
          Click to see the 16 entries
          SourceRuleDescriptionAuthorStrings
          20.0.SHIPMENT DOCUMENTS.exe.400000.0.unpackJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
            20.0.SHIPMENT DOCUMENTS.exe.400000.0.unpackJoeSecurity_AgentTesla_2Yara detected AgentTeslaJoe Security
              20.0.SHIPMENT DOCUMENTS.exe.400000.0.unpackMALWARE_Win_AgentTeslaV3AgentTeslaV3 infostealer payloadditekSHen
              • 0x349c0:$s10: logins
              • 0x34440:$s11: credential
              • 0x306e6:$g1: get_Clipboard
              • 0x306f4:$g2: get_Keyboard
              • 0x30701:$g3: get_Password
              • 0x31aaa:$g4: get_CtrlKeyDown
              • 0x31aba:$g5: get_ShiftKeyDown
              • 0x31acb:$g6: get_AltKeyDown
              20.0.SHIPMENT DOCUMENTS.exe.400000.0.unpackWindows_Trojan_AgentTesla_d3ac2b2funknownunknown
              • 0x31ecf:$a13: get_DnsResolver
              • 0x305d4:$a20: get_LastAccessed
              • 0x328dc:$a27: set_InternalServerPort
              • 0x32c11:$a30: set_GuidMasterKey
              • 0x306e6:$a33: get_Clipboard
              • 0x306f4:$a34: get_Keyboard
              • 0x31aba:$a35: get_ShiftKeyDown
              • 0x31acb:$a36: get_AltKeyDown
              • 0x30701:$a37: get_Password
              • 0x31215:$a38: get_PasswordHash
              • 0x32310:$a39: get_DefaultCredentials
              0.2.SHIPMENT DOCUMENTS.exe.3d715a0.1.unpackJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
                Click to see the 15 entries

                Persistence and Installation Behavior

                barindex
                Source: Process startedAuthor: Joe Security: Data: Command: C:\Windows\System32\schtasks.exe" /Create /TN "Updates\cnWCiicEpxW" /XML "C:\Users\user\AppData\Local\Temp\tmp2A80.tmp, CommandLine: C:\Windows\System32\schtasks.exe" /Create /TN "Updates\cnWCiicEpxW" /XML "C:\Users\user\AppData\Local\Temp\tmp2A80.tmp, CommandLine|base64offset|contains: *j, Image: C:\Windows\SysWOW64\schtasks.exe, NewProcessName: C:\Windows\SysWOW64\schtasks.exe, OriginalFileName: C:\Windows\SysWOW64\schtasks.exe, ParentCommandLine: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exe, ParentImage: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exe, ParentProcessId: 3192, ParentProcessName: SHIPMENT DOCUMENTS.exe, ProcessCommandLine: C:\Windows\System32\schtasks.exe" /Create /TN "Updates\cnWCiicEpxW" /XML "C:\Users\user\AppData\Local\Temp\tmp2A80.tmp, ProcessId: 5900, ProcessName: schtasks.exe
                No Snort rule has matched

                Click to jump to signature section

                Show All Signature Results

                AV Detection

                barindex
                Source: SHIPMENT DOCUMENTS.exeVirustotal: Detection: 36%Perma Link
                Source: SHIPMENT DOCUMENTS.exeReversingLabs: Detection: 32%
                Source: C:\Users\user\AppData\Roaming\cnWCiicEpxW.exeReversingLabs: Detection: 32%
                Source: SHIPMENT DOCUMENTS.exeJoe Sandbox ML: detected
                Source: C:\Users\user\AppData\Roaming\cnWCiicEpxW.exeJoe Sandbox ML: detected
                Source: 20.0.SHIPMENT DOCUMENTS.exe.400000.0.unpackAvira: Label: TR/Spy.Gen8
                Source: 20.0.SHIPMENT DOCUMENTS.exe.400000.0.unpackMalware Configuration Extractor: Agenttesla {"Exfil Mode": "SMTP", "Host": "mail.southernboilers.org", "Username": "info@southernboilers.org", "Password": "Sksmoke2018#"}
                Source: SHIPMENT DOCUMENTS.exeStatic PE information: EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
                Source: unknownHTTPS traffic detected: 52.20.78.240:443 -> 192.168.2.6:49713 version: TLS 1.2
                Source: unknownHTTPS traffic detected: 3.232.242.170:443 -> 192.168.2.6:49738 version: TLS 1.2
                Source: SHIPMENT DOCUMENTS.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                Source: Binary string: wv6MCeq.pdb source: SHIPMENT DOCUMENTS.exe, cnWCiicEpxW.exe.0.dr

                Networking

                barindex
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeDNS query: name: api.ipify.org
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeDNS query: name: api.ipify.org
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeDNS query: name: api.ipify.org
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeDNS query: name: api.ipify.org
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeDNS query: name: api.ipify.org
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeDNS query: name: api.ipify.org
                Source: C:\Users\user\AppData\Roaming\cnWCiicEpxW.exeDNS query: name: api.ipify.org
                Source: C:\Users\user\AppData\Roaming\cnWCiicEpxW.exeDNS query: name: api.ipify.org
                Source: C:\Users\user\AppData\Roaming\cnWCiicEpxW.exeDNS query: name: api.ipify.org
                Source: C:\Users\user\AppData\Roaming\cnWCiicEpxW.exeDNS query: name: api.ipify.org
                Source: C:\Users\user\AppData\Roaming\cnWCiicEpxW.exeDNS query: name: api.ipify.org
                Source: C:\Users\user\AppData\Roaming\cnWCiicEpxW.exeDNS query: name: api.ipify.org
                Source: Joe Sandbox ViewJA3 fingerprint: 3b5074b1b5d032e5620f69f9f700ff0e
                Source: Joe Sandbox ViewIP Address: 199.79.62.12 199.79.62.12
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:80.0) Gecko/20100101 Firefox/80.0Host: api.ipify.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:80.0) Gecko/20100101 Firefox/80.0Host: api.ipify.orgConnection: Keep-Alive
                Source: global trafficTCP traffic: 192.168.2.6:49721 -> 199.79.62.12:587
                Source: global trafficTCP traffic: 192.168.2.6:49721 -> 199.79.62.12:587
                Source: unknownNetwork traffic detected: HTTP traffic on port 49713 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49738
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49713
                Source: unknownNetwork traffic detected: HTTP traffic on port 49738 -> 443
                Source: SHIPMENT DOCUMENTS.exe, 00000014.00000002.522417697.0000000002EF1000.00000004.00000800.00020000.00000000.sdmp, cnWCiicEpxW.exe, 0000001B.00000002.525674867.0000000003111000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://127.0.0.1:HTTP/1.1
                Source: cnWCiicEpxW.exe, 0000001B.00000002.525674867.0000000003111000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://DynDns.comDynDNSnamejidpasswordPsi/Psi
                Source: SHIPMENT DOCUMENTS.exe, 00000014.00000003.398696766.0000000007129000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ac.economia.gob.mx/cps.html0
                Source: SHIPMENT DOCUMENTS.exe, 00000014.00000003.398696766.0000000007129000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ac.economia.gob.mx/last.crl0G
                Source: SHIPMENT DOCUMENTS.exe, 00000014.00000003.408437609.00000000070C4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://acedicom.edicomgroup.com/doc0
                Source: SHIPMENT DOCUMENTS.exe, 00000014.00000003.398941782.00000000065B9000.00000004.00000800.00020000.00000000.sdmp, SHIPMENT DOCUMENTS.exe, 00000014.00000003.403651123.00000000065E4000.00000004.00000800.00020000.00000000.sdmp, SHIPMENT DOCUMENTS.exe, 00000014.00000003.407915366.00000000065B9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://acraiz.icpbrasil.gov.br/DPCacraiz.pdf0?
                Source: SHIPMENT DOCUMENTS.exe, 00000014.00000003.398941782.00000000065B9000.00000004.00000800.00020000.00000000.sdmp, SHIPMENT DOCUMENTS.exe, 00000014.00000003.403651123.00000000065E4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://acraiz.icpbrasil.gov.br/LCRacraizv1.crl0
                Source: SHIPMENT DOCUMENTS.exe, 00000014.00000003.398941782.00000000065B9000.00000004.00000800.00020000.00000000.sdmp, SHIPMENT DOCUMENTS.exe, 00000014.00000003.407915366.00000000065B9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://acraiz.icpbrasil.gov.br/LCRacraizv2.crl0
                Source: SHIPMENT DOCUMENTS.exe, 00000014.00000003.393081850.00000000010F2000.00000004.00000020.00020000.00000000.sdmp, SHIPMENT DOCUMENTS.exe, 00000014.00000002.518974908.00000000010F2000.00000004.00000020.00020000.00000000.sdmp, SHIPMENT DOCUMENTS.exe, 00000014.00000002.516536811.000000000107D000.00000004.00000020.00020000.00000000.sdmp, SHIPMENT DOCUMENTS.exe, 00000014.00000003.393347400.0000000006586000.00000004.00000800.00020000.00000000.sdmp, SHIPMENT DOCUMENTS.exe, 00000014.00000002.533736666.00000000031E6000.00000004.00000800.00020000.00000000.sdmp, cnWCiicEpxW.exe, 0000001B.00000002.520315185.00000000013A0000.00000004.00000020.00020000.00000000.sdmp, cnWCiicEpxW.exe, 0000001B.00000002.534582730.00000000033F5000.00000004.00000800.00020000.00000000.sdmp, cnWCiicEpxW.exe, 0000001B.00000002.520153626.0000000001396000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://apps.identrust.com/roots/dstrootcax3.p7c0
                Source: cnWCiicEpxW.exe, 0000001B.00000002.525674867.0000000003111000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://bvQtmz.com
                Source: SHIPMENT DOCUMENTS.exe, 00000014.00000003.400439346.00000000065EF000.00000004.00000800.00020000.00000000.sdmp, SHIPMENT DOCUMENTS.exe, 00000014.00000003.403696848.00000000065EF000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ca.disig.sk/ca/crl/ca_disig.crl0
                Source: SHIPMENT DOCUMENTS.exe, 00000014.00000003.400439346.00000000065EF000.00000004.00000800.00020000.00000000.sdmp, SHIPMENT DOCUMENTS.exe, 00000014.00000003.401332216.00000000065F2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ca.mtin.es/mtin/DPCyPoliticas0
                Source: SHIPMENT DOCUMENTS.exe, 00000014.00000003.400439346.00000000065EF000.00000004.00000800.00020000.00000000.sdmp, SHIPMENT DOCUMENTS.exe, 00000014.00000003.401332216.00000000065F2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ca.mtin.es/mtin/DPCyPoliticas0g
                Source: SHIPMENT DOCUMENTS.exe, 00000014.00000003.400439346.00000000065EF000.00000004.00000800.00020000.00000000.sdmp, SHIPMENT DOCUMENTS.exe, 00000014.00000003.401332216.00000000065F2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ca.mtin.es/mtin/crl/MTINAutoridadRaiz03
                Source: SHIPMENT DOCUMENTS.exe, 00000014.00000003.400439346.00000000065EF000.00000004.00000800.00020000.00000000.sdmp, SHIPMENT DOCUMENTS.exe, 00000014.00000003.401332216.00000000065F2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ca.mtin.es/mtin/ocsp0
                Source: SHIPMENT DOCUMENTS.exe, 00000014.00000003.400439346.00000000065EF000.00000004.00000800.00020000.00000000.sdmp, SHIPMENT DOCUMENTS.exe, 00000014.00000003.401332216.00000000065F2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ca2.mtin.es/mtin/crl/MTINAutoridadRaiz0
                Source: SHIPMENT DOCUMENTS.exe, 00000014.00000003.400439346.00000000065EF000.00000004.00000800.00020000.00000000.sdmp, SHIPMENT DOCUMENTS.exe, 00000014.00000003.401332216.00000000065F2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://certificates.starfieldtech.com/repository/1604
                Source: SHIPMENT DOCUMENTS.exe, 00000014.00000003.400439346.00000000065EF000.00000004.00000800.00020000.00000000.sdmp, SHIPMENT DOCUMENTS.exe, 00000014.00000003.401332216.00000000065F2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://certs.oati.net/repository/OATICA2.crl0
                Source: SHIPMENT DOCUMENTS.exe, 00000014.00000003.400439346.00000000065EF000.00000004.00000800.00020000.00000000.sdmp, SHIPMENT DOCUMENTS.exe, 00000014.00000003.401332216.00000000065F2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://certs.oati.net/repository/OATICA2.crt0
                Source: SHIPMENT DOCUMENTS.exe, 00000014.00000003.400439346.00000000065EF000.00000004.00000800.00020000.00000000.sdmp, SHIPMENT DOCUMENTS.exe, 00000014.00000003.401332216.00000000065F2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://certs.oaticerts.com/repository/OATICA2.crl
                Source: SHIPMENT DOCUMENTS.exe, 00000014.00000003.400439346.00000000065EF000.00000004.00000800.00020000.00000000.sdmp, SHIPMENT DOCUMENTS.exe, 00000014.00000003.401332216.00000000065F2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://certs.oaticerts.com/repository/OATICA2.crt08
                Source: SHIPMENT DOCUMENTS.exe, 00000014.00000003.398696766.0000000007129000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://cps.chambersign.org/cps/chambersignroot.html0
                Source: SHIPMENT DOCUMENTS.exe, 00000014.00000003.398941782.00000000065B9000.00000004.00000800.00020000.00000000.sdmp, SHIPMENT DOCUMENTS.exe, 00000014.00000003.403651123.00000000065E4000.00000004.00000800.00020000.00000000.sdmp, SHIPMENT DOCUMENTS.exe, 00000014.00000002.546353573.00000000065ED000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://cps.chambersign.org/cps/chambersroot.html0
                Source: SHIPMENT DOCUMENTS.exe, 00000014.00000003.392950428.00000000010D7000.00000004.00000020.00020000.00000000.sdmp, SHIPMENT DOCUMENTS.exe, 00000014.00000002.516536811.000000000107D000.00000004.00000020.00020000.00000000.sdmp, SHIPMENT DOCUMENTS.exe, 00000014.00000003.393347400.0000000006586000.00000004.00000800.00020000.00000000.sdmp, SHIPMENT DOCUMENTS.exe, 00000014.00000002.533736666.00000000031E6000.00000004.00000800.00020000.00000000.sdmp, cnWCiicEpxW.exe, 0000001B.00000002.520315185.00000000013A0000.00000004.00000020.00020000.00000000.sdmp, cnWCiicEpxW.exe, 0000001B.00000002.534582730.00000000033F5000.00000004.00000800.00020000.00000000.sdmp, cnWCiicEpxW.exe, 0000001B.00000002.519279531.000000000135D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://cps.letsencrypt.org0
                Source: SHIPMENT DOCUMENTS.exe, 00000014.00000003.393081850.00000000010F2000.00000004.00000020.00020000.00000000.sdmp, SHIPMENT DOCUMENTS.exe, 00000014.00000002.518974908.00000000010F2000.00000004.00000020.00020000.00000000.sdmp, SHIPMENT DOCUMENTS.exe, 00000014.00000002.516536811.000000000107D000.00000004.00000020.00020000.00000000.sdmp, SHIPMENT DOCUMENTS.exe, 00000014.00000003.393347400.0000000006586000.00000004.00000800.00020000.00000000.sdmp, SHIPMENT DOCUMENTS.exe, 00000014.00000002.533736666.00000000031E6000.00000004.00000800.00020000.00000000.sdmp, cnWCiicEpxW.exe, 0000001B.00000002.520315185.00000000013A0000.00000004.00000020.00020000.00000000.sdmp, cnWCiicEpxW.exe, 0000001B.00000002.534582730.00000000033F5000.00000004.00000800.00020000.00000000.sdmp, cnWCiicEpxW.exe, 0000001B.00000002.520153626.0000000001396000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://cps.root-x1.letsencrypt.org0
                Source: SHIPMENT DOCUMENTS.exe, 00000014.00000003.400439346.00000000065EF000.00000004.00000800.00020000.00000000.sdmp, SHIPMENT DOCUMENTS.exe, 00000014.00000003.401332216.00000000065F2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://cps.siths.se/sithsrootcav1.html0
                Source: SHIPMENT DOCUMENTS.exe, 00000014.00000003.398450527.0000000007136000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl.certigna.fr/certignarootca.crl01
                Source: SHIPMENT DOCUMENTS.exe, 00000014.00000003.398696766.0000000007129000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl.chambersign.org/chambersignroot.crl0
                Source: SHIPMENT DOCUMENTS.exe, 00000014.00000003.398941782.00000000065B9000.00000004.00000800.00020000.00000000.sdmp, SHIPMENT DOCUMENTS.exe, 00000014.00000003.403651123.00000000065E4000.00000004.00000800.00020000.00000000.sdmp, SHIPMENT DOCUMENTS.exe, 00000014.00000002.546353573.00000000065ED000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl.chambersign.org/chambersroot.crl0
                Source: SHIPMENT DOCUMENTS.exe, 00000014.00000003.398836058.00000000065AD000.00000004.00000800.00020000.00000000.sdmp, SHIPMENT DOCUMENTS.exe, 00000014.00000003.407868660.00000000065AE000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl.comodoca.com/AAACertificateServices.crl06
                Source: SHIPMENT DOCUMENTS.exe, 00000014.00000003.398941782.00000000065B9000.00000004.00000800.00020000.00000000.sdmp, SHIPMENT DOCUMENTS.exe, 00000014.00000003.407915366.00000000065B9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl.defence.gov.au/pki0
                Source: SHIPMENT DOCUMENTS.exe, 00000014.00000003.398450527.0000000007136000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl.dhimyotis.com/certignarootca.crl0
                Source: SHIPMENT DOCUMENTS.exe, 00000014.00000003.392950428.00000000010D7000.00000004.00000020.00020000.00000000.sdmp, SHIPMENT DOCUMENTS.exe, 00000014.00000002.518569851.00000000010E0000.00000004.00000020.00020000.00000000.sdmp, SHIPMENT DOCUMENTS.exe, 00000014.00000003.398941782.00000000065B9000.00000004.00000800.00020000.00000000.sdmp, SHIPMENT DOCUMENTS.exe, 00000014.00000003.403853962.00000000065DA000.00000004.00000800.00020000.00000000.sdmp, SHIPMENT DOCUMENTS.exe, 00000014.00000003.387644774.00000000010D8000.00000004.00000020.00020000.00000000.sdmp, cnWCiicEpxW.exe, 0000001B.00000003.494475191.00000000013BE000.00000004.00000020.00020000.00000000.sdmp, cnWCiicEpxW.exe, 0000001B.00000003.503345787.00000000013CD000.00000004.00000020.00020000.00000000.sdmp, cnWCiicEpxW.exe, 0000001B.00000002.521128082.00000000013CF000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.globalsign.net/root-r2.crl0
                Source: SHIPMENT DOCUMENTS.exe, 00000014.00000003.393081850.00000000010F2000.00000004.00000020.00020000.00000000.sdmp, SHIPMENT DOCUMENTS.exe, 00000014.00000002.518974908.00000000010F2000.00000004.00000020.00020000.00000000.sdmp, SHIPMENT DOCUMENTS.exe, 00000014.00000002.516536811.000000000107D000.00000004.00000020.00020000.00000000.sdmp, SHIPMENT DOCUMENTS.exe, 00000014.00000003.393347400.0000000006586000.00000004.00000800.00020000.00000000.sdmp, SHIPMENT DOCUMENTS.exe, 00000014.00000002.533736666.00000000031E6000.00000004.00000800.00020000.00000000.sdmp, cnWCiicEpxW.exe, 0000001B.00000002.520315185.00000000013A0000.00000004.00000020.00020000.00000000.sdmp, cnWCiicEpxW.exe, 0000001B.00000002.534582730.00000000033F5000.00000004.00000800.00020000.00000000.sdmp, cnWCiicEpxW.exe, 0000001B.00000002.520153626.0000000001396000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.identrust.com/DSTROOTCAX3CRL.crl0
                Source: SHIPMENT DOCUMENTS.exe, 00000014.00000002.546472929.0000000006603000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl.microsoft.
                Source: SHIPMENT DOCUMENTS.exe, 00000014.00000003.400439346.00000000065EF000.00000004.00000800.00020000.00000000.sdmp, SHIPMENT DOCUMENTS.exe, 00000014.00000003.401332216.00000000065F2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl.oces.trust2408.com/oces.crl0
                Source: SHIPMENT DOCUMENTS.exe, 00000014.00000003.408437609.00000000070C4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl.pki.wellsfargo.com/wsprca.crl0
                Source: SHIPMENT DOCUMENTS.exe, 00000014.00000003.398941782.00000000065B9000.00000004.00000800.00020000.00000000.sdmp, SHIPMENT DOCUMENTS.exe, 00000014.00000003.403853962.00000000065DA000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl.securetrust.com/SGCA.crl0
                Source: SHIPMENT DOCUMENTS.exe, 00000014.00000003.398941782.00000000065B9000.00000004.00000800.00020000.00000000.sdmp, SHIPMENT DOCUMENTS.exe, 00000014.00000003.403853962.00000000065DA000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl.securetrust.com/STCA.crl0
                Source: SHIPMENT DOCUMENTS.exe, 00000014.00000003.400439346.00000000065EF000.00000004.00000800.00020000.00000000.sdmp, SHIPMENT DOCUMENTS.exe, 00000014.00000003.401332216.00000000065F2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl.ssc.lt/root-a/cacrl.crl0
                Source: SHIPMENT DOCUMENTS.exe, 00000014.00000003.401258901.0000000007125000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl.ssc.lt/root-b/cacrl.crl0
                Source: SHIPMENT DOCUMENTS.exe, 00000014.00000003.398450527.0000000007136000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl.ssc.lt/root-c/cacrl.crl0
                Source: SHIPMENT DOCUMENTS.exe, 00000014.00000003.408011972.00000000065C1000.00000004.00000800.00020000.00000000.sdmp, SHIPMENT DOCUMENTS.exe, 00000014.00000003.398941782.00000000065B9000.00000004.00000800.00020000.00000000.sdmp, SHIPMENT DOCUMENTS.exe, 00000014.00000003.407915366.00000000065B9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl.xrampsecurity.com/XGCA.crl0
                Source: SHIPMENT DOCUMENTS.exe, 00000014.00000003.398941782.00000000065B9000.00000004.00000800.00020000.00000000.sdmp, SHIPMENT DOCUMENTS.exe, 00000014.00000003.407915366.00000000065B9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl1.comsign.co.il/crl/comsignglobalrootca.crl0
                Source: SHIPMENT DOCUMENTS.exe, 00000014.00000003.403139297.0000000006616000.00000004.00000800.00020000.00000000.sdmp, SHIPMENT DOCUMENTS.exe, 00000014.00000003.396165041.000000000660E000.00000004.00000800.00020000.00000000.sdmp, SHIPMENT DOCUMENTS.exe, 00000014.00000003.400776216.000000000660B000.00000004.00000800.00020000.00000000.sdmp, SHIPMENT DOCUMENTS.exe, 00000014.00000003.408642824.0000000006614000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ctldl.windowsupdate.com/
                Source: SHIPMENT DOCUMENTS.exe, 00000014.00000003.400776216.000000000660B000.00000004.00000800.00020000.00000000.sdmp, SHIPMENT DOCUMENTS.exe, 00000014.00000003.408642824.0000000006614000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ctldl.windowsupdate.com/0
                Source: SHIPMENT DOCUMENTS.exe, 00000014.00000003.396165041.000000000660E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ctldl.windowsupdate.com/C
                Source: SHIPMENT DOCUMENTS.exe, 00000014.00000002.516536811.000000000107D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en
                Source: SHIPMENT DOCUMENTS.exe, 00000014.00000003.398769792.000000000715E000.00000004.00000800.00020000.00000000.sdmp, SHIPMENT DOCUMENTS.exe, 00000014.00000003.398611848.000000000715D000.00000004.00000800.00020000.00000000.sdmp, SHIPMENT DOCUMENTS.exe, 00000014.00000003.398941782.00000000065B9000.00000004.00000800.00020000.00000000.sdmp, SHIPMENT DOCUMENTS.exe, 00000014.00000003.407915366.00000000065B9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/CABD2A79A1076A31F21D253635CB0
                Source: 77EC63BDA74BD0D0E0426DC8F80085060.20.drString found in binary or memory: http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootstl.cab
                Source: SHIPMENT DOCUMENTS.exe, 00000014.00000002.544794129.0000000006540000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootstl.cabm
                Source: SHIPMENT DOCUMENTS.exe, 00000014.00000003.398941782.00000000065B9000.00000004.00000800.00020000.00000000.sdmp, SHIPMENT DOCUMENTS.exe, 00000014.00000003.403651123.00000000065E4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://eca.hinet.net/repository/CRL2/CA.crl0
                Source: SHIPMENT DOCUMENTS.exe, 00000014.00000003.398941782.00000000065B9000.00000004.00000800.00020000.00000000.sdmp, SHIPMENT DOCUMENTS.exe, 00000014.00000003.403651123.00000000065E4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://eca.hinet.net/repository/Certs/IssuedToThisCA.p7b05
                Source: SHIPMENT DOCUMENTS.exe, 00000014.00000003.398941782.00000000065B9000.00000004.00000800.00020000.00000000.sdmp, SHIPMENT DOCUMENTS.exe, 00000014.00000003.403651123.00000000065E4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://fedir.comsign.co.il/cacert/ComSignAdvancedSecurityCA.crt0
                Source: SHIPMENT DOCUMENTS.exe, 00000014.00000003.398941782.00000000065B9000.00000004.00000800.00020000.00000000.sdmp, SHIPMENT DOCUMENTS.exe, 00000014.00000003.403651123.00000000065E4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://fedir.comsign.co.il/crl/ComSignAdvancedSecurityCA.crl0
                Source: SHIPMENT DOCUMENTS.exe, 00000014.00000003.408437609.00000000070C4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://fedir.comsign.co.il/crl/ComSignCA.crl0
                Source: SHIPMENT DOCUMENTS.exe, 00000014.00000003.398941782.00000000065B9000.00000004.00000800.00020000.00000000.sdmp, SHIPMENT DOCUMENTS.exe, 00000014.00000003.407915366.00000000065B9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://fedir.comsign.co.il/crl/comsignglobalrootca.crl0;
                Source: SHIPMENT DOCUMENTS.exe, 00000000.00000002.315590285.0000000006E62000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://fontfabrik.com
                Source: SHIPMENT DOCUMENTS.exe, 00000014.00000003.398941782.00000000065B9000.00000004.00000800.00020000.00000000.sdmp, SHIPMENT DOCUMENTS.exe, 00000014.00000003.403942163.00000000065CD000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://http.fpki.gov/fcpca/caCertsIssuedByfcpca.p7c0
                Source: SHIPMENT DOCUMENTS.exe, 00000014.00000002.533736666.00000000031E6000.00000004.00000800.00020000.00000000.sdmp, cnWCiicEpxW.exe, 0000001B.00000002.534528527.00000000033EF000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://mail.southernboilers.org
                Source: SHIPMENT DOCUMENTS.exe, 00000014.00000003.398941782.00000000065B9000.00000004.00000800.00020000.00000000.sdmp, SHIPMENT DOCUMENTS.exe, 00000014.00000003.403942163.00000000065CD000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ocsp.accv.es0
                Source: SHIPMENT DOCUMENTS.exe, 00000014.00000003.398941782.00000000065B9000.00000004.00000800.00020000.00000000.sdmp, SHIPMENT DOCUMENTS.exe, 00000014.00000003.403651123.00000000065E4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ocsp.eca.hinet.net/OCSP/ocspG2sha20
                Source: SHIPMENT DOCUMENTS.exe, 00000014.00000003.403880249.00000000065E1000.00000004.00000800.00020000.00000000.sdmp, SHIPMENT DOCUMENTS.exe, 00000014.00000003.398941782.00000000065B9000.00000004.00000800.00020000.00000000.sdmp, SHIPMENT DOCUMENTS.exe, 00000014.00000003.406958224.00000000065E3000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ocsp.ncdc.gov.sa0
                Source: SHIPMENT DOCUMENTS.exe, 00000014.00000003.398941782.00000000065B9000.00000004.00000800.00020000.00000000.sdmp, SHIPMENT DOCUMENTS.exe, 00000014.00000003.403942163.00000000065CD000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ocsp.pki.gva.es0
                Source: SHIPMENT DOCUMENTS.exe, 00000014.00000003.407487472.00000000070CC000.00000004.00000800.00020000.00000000.sdmp, SHIPMENT DOCUMENTS.exe, 00000014.00000003.398696766.0000000007129000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ocsp.suscerte.gob.ve0
                Source: SHIPMENT DOCUMENTS.exe, 00000014.00000003.401023380.000000000662C000.00000004.00000800.00020000.00000000.sdmp, SHIPMENT DOCUMENTS.exe, 00000014.00000003.403450297.0000000006634000.00000004.00000800.00020000.00000000.sdmp, SHIPMENT DOCUMENTS.exe, 00000014.00000003.408697131.0000000006630000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://pki.digidentity.eu/validatie0
                Source: SHIPMENT DOCUMENTS.exe, 00000014.00000003.398450527.0000000007136000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://pki.registradores.org/normativa/index.htm0
                Source: SHIPMENT DOCUMENTS.exe, 00000014.00000003.400439346.00000000065EF000.00000004.00000800.00020000.00000000.sdmp, SHIPMENT DOCUMENTS.exe, 00000014.00000003.408538851.0000000006603000.00000004.00000800.00020000.00000000.sdmp, SHIPMENT DOCUMENTS.exe, 00000014.00000003.401332216.00000000065F2000.00000004.00000800.00020000.00000000.sdmp, SHIPMENT DOCUMENTS.exe, 00000014.00000003.398941782.00000000065B9000.00000004.00000800.00020000.00000000.sdmp, SHIPMENT DOCUMENTS.exe, 00000014.00000003.403651123.00000000065E4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://policy.camerfirma.com0
                Source: SHIPMENT DOCUMENTS.exe, 00000014.00000003.398941782.00000000065B9000.00000004.00000800.00020000.00000000.sdmp, SHIPMENT DOCUMENTS.exe, 00000014.00000003.403942163.00000000065CD000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://postsignum.ttc.cz/crl/psrootqca2.crl0
                Source: SHIPMENT DOCUMENTS.exe, 00000014.00000003.392950428.00000000010D7000.00000004.00000020.00020000.00000000.sdmp, SHIPMENT DOCUMENTS.exe, 00000014.00000002.516536811.000000000107D000.00000004.00000020.00020000.00000000.sdmp, SHIPMENT DOCUMENTS.exe, 00000014.00000003.393347400.0000000006586000.00000004.00000800.00020000.00000000.sdmp, SHIPMENT DOCUMENTS.exe, 00000014.00000002.533736666.00000000031E6000.00000004.00000800.00020000.00000000.sdmp, cnWCiicEpxW.exe, 0000001B.00000002.520315185.00000000013A0000.00000004.00000020.00020000.00000000.sdmp, cnWCiicEpxW.exe, 0000001B.00000002.534582730.00000000033F5000.00000004.00000800.00020000.00000000.sdmp, cnWCiicEpxW.exe, 0000001B.00000002.519279531.000000000135D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://r3.i.lencr.org/0
                Source: SHIPMENT DOCUMENTS.exe, 00000014.00000003.392950428.00000000010D7000.00000004.00000020.00020000.00000000.sdmp, SHIPMENT DOCUMENTS.exe, 00000014.00000002.516536811.000000000107D000.00000004.00000020.00020000.00000000.sdmp, SHIPMENT DOCUMENTS.exe, 00000014.00000003.393347400.0000000006586000.00000004.00000800.00020000.00000000.sdmp, SHIPMENT DOCUMENTS.exe, 00000014.00000002.533736666.00000000031E6000.00000004.00000800.00020000.00000000.sdmp, cnWCiicEpxW.exe, 0000001B.00000002.520315185.00000000013A0000.00000004.00000020.00020000.00000000.sdmp, cnWCiicEpxW.exe, 0000001B.00000002.534582730.00000000033F5000.00000004.00000800.00020000.00000000.sdmp, cnWCiicEpxW.exe, 0000001B.00000002.519279531.000000000135D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://r3.o.lencr.org0
                Source: SHIPMENT DOCUMENTS.exe, 00000014.00000003.400439346.00000000065EF000.00000004.00000800.00020000.00000000.sdmp, SHIPMENT DOCUMENTS.exe, 00000014.00000003.407487472.00000000070CC000.00000004.00000800.00020000.00000000.sdmp, SHIPMENT DOCUMENTS.exe, 00000014.00000003.401332216.00000000065F2000.00000004.00000800.00020000.00000000.sdmp, SHIPMENT DOCUMENTS.exe, 00000014.00000003.398941782.00000000065B9000.00000004.00000800.00020000.00000000.sdmp, SHIPMENT DOCUMENTS.exe, 00000014.00000003.403942163.00000000065CD000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://repository.swisssign.com/0
                Source: SHIPMENT DOCUMENTS.exe, 00000000.00000002.305232047.0000000002CA1000.00000004.00000800.00020000.00000000.sdmp, SHIPMENT DOCUMENTS.exe, 00000014.00000002.522417697.0000000002EF1000.00000004.00000800.00020000.00000000.sdmp, cnWCiicEpxW.exe, 00000015.00000002.415707967.0000000002B71000.00000004.00000800.00020000.00000000.sdmp, cnWCiicEpxW.exe, 0000001B.00000002.525674867.0000000003111000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
                Source: SHIPMENT DOCUMENTS.exe, 00000014.00000003.407487472.00000000070CC000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://sertifikati.ca.posta.rs/crl/PostaCARoot.crl0
                Source: SHIPMENT DOCUMENTS.exe, 00000014.00000003.398941782.00000000065B9000.00000004.00000800.00020000.00000000.sdmp, SHIPMENT DOCUMENTS.exe, 00000014.00000003.403942163.00000000065CD000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://trustcenter-crl.certificat2.com/Keynectis/KEYNECTIS_ROOT_CA.crl0
                Source: SHIPMENT DOCUMENTS.exe, 00000014.00000003.403880249.00000000065E1000.00000004.00000800.00020000.00000000.sdmp, SHIPMENT DOCUMENTS.exe, 00000014.00000003.398941782.00000000065B9000.00000004.00000800.00020000.00000000.sdmp, SHIPMENT DOCUMENTS.exe, 00000014.00000003.406958224.00000000065E3000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://web.ncdc.gov.sa/crl/nrcacomb1.crl0
                Source: SHIPMENT DOCUMENTS.exe, 00000014.00000003.403880249.00000000065E1000.00000004.00000800.00020000.00000000.sdmp, SHIPMENT DOCUMENTS.exe, 00000014.00000003.398941782.00000000065B9000.00000004.00000800.00020000.00000000.sdmp, SHIPMENT DOCUMENTS.exe, 00000014.00000003.406958224.00000000065E3000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://web.ncdc.gov.sa/crl/nrcaparta1.crl
                Source: SHIPMENT DOCUMENTS.exe, 00000014.00000003.407487472.00000000070CC000.00000004.00000800.00020000.00000000.sdmp, SHIPMENT DOCUMENTS.exe, 00000014.00000003.398941782.00000000065B9000.00000004.00000800.00020000.00000000.sdmp, SHIPMENT DOCUMENTS.exe, 00000014.00000003.403651123.00000000065E4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.acabogacia.org/doc0
                Source: SHIPMENT DOCUMENTS.exe, 00000014.00000003.403651123.00000000065E4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.acabogacia.org0
                Source: SHIPMENT DOCUMENTS.exe, 00000014.00000003.398941782.00000000065B9000.00000004.00000800.00020000.00000000.sdmp, SHIPMENT DOCUMENTS.exe, 00000014.00000003.403942163.00000000065CD000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.accv.es/fileadmin/Archivos/certificados/raizaccv1.crt0
                Source: SHIPMENT DOCUMENTS.exe, 00000014.00000003.398941782.00000000065B9000.00000004.00000800.00020000.00000000.sdmp, SHIPMENT DOCUMENTS.exe, 00000014.00000003.403942163.00000000065CD000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.accv.es/fileadmin/Archivos/certificados/raizaccv1_der.crl0
                Source: SHIPMENT DOCUMENTS.exe, 00000014.00000003.398941782.00000000065B9000.00000004.00000800.00020000.00000000.sdmp, SHIPMENT DOCUMENTS.exe, 00000014.00000003.403942163.00000000065CD000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.accv.es/legislacion_c.htm0U
                Source: SHIPMENT DOCUMENTS.exe, 00000014.00000003.398941782.00000000065B9000.00000004.00000800.00020000.00000000.sdmp, SHIPMENT DOCUMENTS.exe, 00000014.00000003.403942163.00000000065CD000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.accv.es00
                Source: SHIPMENT DOCUMENTS.exe, 00000014.00000003.398941782.00000000065B9000.00000004.00000800.00020000.00000000.sdmp, SHIPMENT DOCUMENTS.exe, 00000014.00000003.403651123.00000000065E4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.agesic.gub.uy/acrn/acrn.crl0)
                Source: SHIPMENT DOCUMENTS.exe, 00000014.00000003.398941782.00000000065B9000.00000004.00000800.00020000.00000000.sdmp, SHIPMENT DOCUMENTS.exe, 00000014.00000003.403651123.00000000065E4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.agesic.gub.uy/acrn/cps_acrn.pdf0
                Source: SHIPMENT DOCUMENTS.exe, 00000014.00000003.407868660.00000000065AE000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.ancert.com/cps0
                Source: SHIPMENT DOCUMENTS.exe, 00000014.00000003.400439346.00000000065EF000.00000004.00000800.00020000.00000000.sdmp, SHIPMENT DOCUMENTS.exe, 00000014.00000003.401332216.00000000065F2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.anf.es
                Source: SHIPMENT DOCUMENTS.exe, 00000014.00000003.398836058.00000000065AD000.00000004.00000800.00020000.00000000.sdmp, SHIPMENT DOCUMENTS.exe, 00000014.00000003.407868660.00000000065AE000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.anf.es/AC/RC/ocsp0c
                Source: SHIPMENT DOCUMENTS.exe, 00000014.00000003.400439346.00000000065EF000.00000004.00000800.00020000.00000000.sdmp, SHIPMENT DOCUMENTS.exe, 00000014.00000003.401332216.00000000065F2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.anf.es/es/address-direccion.html
                Source: SHIPMENT DOCUMENTS.exe, 00000000.00000002.315590285.0000000006E62000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0
                Source: SHIPMENT DOCUMENTS.exe, 00000014.00000003.407487472.00000000070CC000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.ca.posta.rs/dokumentacija0h
                Source: SHIPMENT DOCUMENTS.exe, 00000000.00000002.315590285.0000000006E62000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.carterandcone.coml
                Source: SHIPMENT DOCUMENTS.exe, 00000014.00000003.408437609.00000000070C4000.00000004.00000800.00020000.00000000.sdmp, SHIPMENT DOCUMENTS.exe, 00000014.00000003.398941782.00000000065B9000.00000004.00000800.00020000.00000000.sdmp, SHIPMENT DOCUMENTS.exe, 00000014.00000003.407915366.00000000065B9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.cert.fnmt.es/dpcs/0
                Source: SHIPMENT DOCUMENTS.exe, 00000014.00000003.400776216.000000000660B000.00000004.00000800.00020000.00000000.sdmp, SHIPMENT DOCUMENTS.exe, 00000014.00000003.408594188.000000000660D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.certeurope.fr/reference/pc-root2.pdf0
                Source: SHIPMENT DOCUMENTS.exe, 00000014.00000003.400776216.000000000660B000.00000004.00000800.00020000.00000000.sdmp, SHIPMENT DOCUMENTS.exe, 00000014.00000003.408594188.000000000660D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.certeurope.fr/reference/root2.crl0
                Source: SHIPMENT DOCUMENTS.exe, 00000014.00000003.398836058.00000000065AD000.00000004.00000800.00020000.00000000.sdmp, SHIPMENT DOCUMENTS.exe, 00000014.00000003.407868660.00000000065AE000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.certicamara.com/dpc/0Z
                Source: SHIPMENT DOCUMENTS.exe, 00000014.00000003.400439346.00000000065EF000.00000004.00000800.00020000.00000000.sdmp, SHIPMENT DOCUMENTS.exe, 00000014.00000003.401332216.00000000065F2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.certplus.com/CRL/class1.crl0
                Source: SHIPMENT DOCUMENTS.exe, 00000014.00000003.398941782.00000000065B9000.00000004.00000800.00020000.00000000.sdmp, SHIPMENT DOCUMENTS.exe, 00000014.00000003.403651123.00000000065E4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.certplus.com/CRL/class2.crl0
                Source: SHIPMENT DOCUMENTS.exe, 00000014.00000003.407487472.00000000070CC000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.certplus.com/CRL/class3.crl0
                Source: SHIPMENT DOCUMENTS.exe, 00000014.00000003.398450527.0000000007136000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.certplus.com/CRL/class3P.crl0
                Source: SHIPMENT DOCUMENTS.exe, 00000014.00000003.401023380.000000000662C000.00000004.00000800.00020000.00000000.sdmp, SHIPMENT DOCUMENTS.exe, 00000014.00000003.408697131.0000000006630000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.certplus.com/CRL/class3TS.crl0
                Source: SHIPMENT DOCUMENTS.exe, 00000014.00000003.398941782.00000000065B9000.00000004.00000800.00020000.00000000.sdmp, SHIPMENT DOCUMENTS.exe, 00000014.00000003.403651123.00000000065E4000.00000004.00000800.00020000.00000000.sdmp, SHIPMENT DOCUMENTS.exe, 00000014.00000003.398696766.0000000007129000.00000004.00000800.00020000.00000000.sdmp, SHIPMENT DOCUMENTS.exe, 00000014.00000002.546353573.00000000065ED000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.chambersign.org1
                Source: SHIPMENT DOCUMENTS.exe, 00000014.00000003.398941782.00000000065B9000.00000004.00000800.00020000.00000000.sdmp, SHIPMENT DOCUMENTS.exe, 00000014.00000003.403651123.00000000065E4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.comsign.co.il/cps0
                Source: SHIPMENT DOCUMENTS.exe, 00000014.00000003.402966476.000000000660E000.00000004.00000800.00020000.00000000.sdmp, SHIPMENT DOCUMENTS.exe, 00000014.00000003.400776216.000000000660B000.00000004.00000800.00020000.00000000.sdmp, SHIPMENT DOCUMENTS.exe, 00000014.00000003.408594188.000000000660D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.correo.com.uy/correocert/cps.pdf0
                Source: SHIPMENT DOCUMENTS.exe, 00000014.00000003.407487472.00000000070CC000.00000004.00000800.00020000.00000000.sdmp, SHIPMENT DOCUMENTS.exe, 00000014.00000003.398696766.0000000007129000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.datev.de/zertifikat-policy-bt0
                Source: SHIPMENT DOCUMENTS.exe, 00000014.00000003.400439346.00000000065EF000.00000004.00000800.00020000.00000000.sdmp, SHIPMENT DOCUMENTS.exe, 00000014.00000003.401332216.00000000065F2000.00000004.00000800.00020000.00000000.sdmp, SHIPMENT DOCUMENTS.exe, 00000014.00000003.398941782.00000000065B9000.00000004.00000800.00020000.00000000.sdmp, SHIPMENT DOCUMENTS.exe, 00000014.00000003.408391129.00000000065D8000.00000004.00000800.00020000.00000000.sdmp, SHIPMENT DOCUMENTS.exe, 00000014.00000003.403942163.00000000065CD000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.datev.de/zertifikat-policy-int0
                Source: SHIPMENT DOCUMENTS.exe, 00000014.00000003.398450527.0000000007136000.00000004.00000800.00020000.00000000.sdmp, SHIPMENT DOCUMENTS.exe, 00000014.00000003.398941782.00000000065B9000.00000004.00000800.00020000.00000000.sdmp, SHIPMENT DOCUMENTS.exe, 00000014.00000003.407915366.00000000065B9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.datev.de/zertifikat-policy-std0
                Source: SHIPMENT DOCUMENTS.exe, 00000014.00000003.403880249.00000000065E1000.00000004.00000800.00020000.00000000.sdmp, SHIPMENT DOCUMENTS.exe, 00000014.00000003.398941782.00000000065B9000.00000004.00000800.00020000.00000000.sdmp, SHIPMENT DOCUMENTS.exe, 00000014.00000003.406958224.00000000065E3000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.defence.gov.au/pki0
                Source: SHIPMENT DOCUMENTS.exe, 00000014.00000003.400439346.00000000065EF000.00000004.00000800.00020000.00000000.sdmp, SHIPMENT DOCUMENTS.exe, 00000014.00000003.403696848.00000000065EF000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.disig.sk/ca/crl/ca_disig.crl0
                Source: SHIPMENT DOCUMENTS.exe, 00000014.00000003.400439346.00000000065EF000.00000004.00000800.00020000.00000000.sdmp, SHIPMENT DOCUMENTS.exe, 00000014.00000003.403696848.00000000065EF000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.disig.sk/ca0f
                Source: SHIPMENT DOCUMENTS.exe, 00000014.00000003.398941782.00000000065B9000.00000004.00000800.00020000.00000000.sdmp, SHIPMENT DOCUMENTS.exe, 00000014.00000003.407915366.00000000065B9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.dnie.es/dpc0
                Source: SHIPMENT DOCUMENTS.exe, 00000014.00000003.398450527.0000000007136000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.e-me.lv/repository0
                Source: SHIPMENT DOCUMENTS.exe, 00000014.00000003.398450527.0000000007136000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.e-szigno.hu/RootCA.crl
                Source: SHIPMENT DOCUMENTS.exe, 00000014.00000003.398450527.0000000007136000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.e-szigno.hu/RootCA.crt0
                Source: SHIPMENT DOCUMENTS.exe, 00000014.00000003.398450527.0000000007136000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.e-szigno.hu/SZSZ/0
                Source: SHIPMENT DOCUMENTS.exe, 00000014.00000003.398450527.0000000007136000.00000004.00000800.00020000.00000000.sdmp, SHIPMENT DOCUMENTS.exe, 00000014.00000003.398941782.00000000065B9000.00000004.00000800.00020000.00000000.sdmp, SHIPMENT DOCUMENTS.exe, 00000014.00000003.403651123.00000000065E4000.00000004.00000800.00020000.00000000.sdmp, SHIPMENT DOCUMENTS.exe, 00000014.00000003.407915366.00000000065B9000.00000004.00000800.00020000.00000000.sdmp, SHIPMENT DOCUMENTS.exe, 00000014.00000002.546037308.00000000065B9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.e-trust.be/CPS/QNcerts
                Source: SHIPMENT DOCUMENTS.exe, 00000014.00000003.398696766.0000000007129000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.ecee.gov.pt/dpc0
                Source: SHIPMENT DOCUMENTS.exe, 00000014.00000003.398836058.00000000065AD000.00000004.00000800.00020000.00000000.sdmp, SHIPMENT DOCUMENTS.exe, 00000014.00000003.407868660.00000000065AE000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.echoworx.com/ca/root2/cps.pdf0
                Source: SHIPMENT DOCUMENTS.exe, 00000014.00000003.398836058.00000000065AD000.00000004.00000800.00020000.00000000.sdmp, SHIPMENT DOCUMENTS.exe, 00000014.00000003.407868660.00000000065AE000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.eme.lv/repository0
                Source: SHIPMENT DOCUMENTS.exe, 00000014.00000003.398941782.00000000065B9000.00000004.00000800.00020000.00000000.sdmp, SHIPMENT DOCUMENTS.exe, 00000014.00000003.407915366.00000000065B9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.firmaprofesional.com/cps0
                Source: SHIPMENT DOCUMENTS.exe, 00000000.00000002.315590285.0000000006E62000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com
                Source: SHIPMENT DOCUMENTS.exe, 00000000.00000002.315590285.0000000006E62000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers
                Source: SHIPMENT DOCUMENTS.exe, 00000000.00000002.315590285.0000000006E62000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/?
                Source: SHIPMENT DOCUMENTS.exe, 00000000.00000002.315590285.0000000006E62000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/cabarga.htmlN
                Source: SHIPMENT DOCUMENTS.exe, 00000000.00000002.315590285.0000000006E62000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/frere-jones.html
                Source: SHIPMENT DOCUMENTS.exe, 00000000.00000002.315590285.0000000006E62000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers8
                Source: SHIPMENT DOCUMENTS.exe, 00000000.00000002.315590285.0000000006E62000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers?
                Source: SHIPMENT DOCUMENTS.exe, 00000000.00000002.315590285.0000000006E62000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designersG
                Source: SHIPMENT DOCUMENTS.exe, 00000000.00000002.315590285.0000000006E62000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fonts.com
                Source: SHIPMENT DOCUMENTS.exe, 00000000.00000002.315590285.0000000006E62000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn
                Source: SHIPMENT DOCUMENTS.exe, 00000000.00000002.315590285.0000000006E62000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn/bThe
                Source: SHIPMENT DOCUMENTS.exe, 00000000.00000002.315590285.0000000006E62000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn/cThe
                Source: SHIPMENT DOCUMENTS.exe, 00000000.00000002.315590285.0000000006E62000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.galapagosdesign.com/DPlease
                Source: SHIPMENT DOCUMENTS.exe, 00000000.00000002.315590285.0000000006E62000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.galapagosdesign.com/staff/dennis.htm
                Source: SHIPMENT DOCUMENTS.exe, 00000014.00000003.398696766.0000000007129000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.globaltrust.info0
                Source: SHIPMENT DOCUMENTS.exe, 00000014.00000003.398696766.0000000007129000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.globaltrust.info0=
                Source: SHIPMENT DOCUMENTS.exe, 00000000.00000002.315590285.0000000006E62000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.goodfont.co.kr
                Source: SHIPMENT DOCUMENTS.exe, 00000014.00000003.401258901.0000000007125000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.ica.co.il/repository/cps/PersonalID_Practice_Statement.pdf0
                Source: SHIPMENT DOCUMENTS.exe, 00000014.00000003.398450527.0000000007136000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.informatik.admin.ch/PKI/links/CPS_2_16_756_1_17_3_1_0.pdf0
                Source: SHIPMENT DOCUMENTS.exe, 00000000.00000002.315590285.0000000006E62000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/
                Source: SHIPMENT DOCUMENTS.exe, 00000014.00000003.400439346.00000000065EF000.00000004.00000800.00020000.00000000.sdmp, SHIPMENT DOCUMENTS.exe, 00000014.00000003.401332216.00000000065F2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.oaticerts.com/repository.
                Source: SHIPMENT DOCUMENTS.exe, 00000014.00000003.398941782.00000000065B9000.00000004.00000800.00020000.00000000.sdmp, SHIPMENT DOCUMENTS.exe, 00000014.00000003.403942163.00000000065CD000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.pki.admin.ch/cps/CPS_2_16_756_1_17_3_1_0.pdf09
                Source: SHIPMENT DOCUMENTS.exe, 00000014.00000003.398836058.00000000065AD000.00000004.00000800.00020000.00000000.sdmp, SHIPMENT DOCUMENTS.exe, 00000014.00000003.407868660.00000000065AE000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.pki.admin.ch/cps/CPS_2_16_756_1_17_3_21_1.pdf0:
                Source: SHIPMENT DOCUMENTS.exe, 00000014.00000003.403712232.00000000065F1000.00000004.00000800.00020000.00000000.sdmp, SHIPMENT DOCUMENTS.exe, 00000014.00000002.546377934.00000000065F0000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.pki.admin.ch/polic
                Source: SHIPMENT DOCUMENTS.exe, 00000014.00000003.400439346.00000000065EF000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.pki.admin.ch/policy/CPS_2_16_756_1_17_3_21_1.pdf0
                Source: SHIPMENT DOCUMENTS.exe, 00000014.00000003.398941782.00000000065B9000.00000004.00000800.00020000.00000000.sdmp, SHIPMENT DOCUMENTS.exe, 00000014.00000003.403942163.00000000065CD000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.pki.gva.es/cps0
                Source: SHIPMENT DOCUMENTS.exe, 00000014.00000003.398941782.00000000065B9000.00000004.00000800.00020000.00000000.sdmp, SHIPMENT DOCUMENTS.exe, 00000014.00000003.403942163.00000000065CD000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.pki.gva.es/cps0%
                Source: SHIPMENT DOCUMENTS.exe, 00000014.00000003.400439346.00000000065EF000.00000004.00000800.00020000.00000000.sdmp, SHIPMENT DOCUMENTS.exe, 00000014.00000003.401332216.00000000065F2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.pkioverheid.nl/policies/root-policy-G20
                Source: SHIPMENT DOCUMENTS.exe, 00000014.00000003.398941782.00000000065B9000.00000004.00000800.00020000.00000000.sdmp, SHIPMENT DOCUMENTS.exe, 00000014.00000003.403853962.00000000065DA000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.pkioverheid.nl/policies/root-policy0
                Source: SHIPMENT DOCUMENTS.exe, 00000014.00000003.398941782.00000000065B9000.00000004.00000800.00020000.00000000.sdmp, SHIPMENT DOCUMENTS.exe, 00000014.00000003.403942163.00000000065CD000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.postsignum.cz/crl/psrootqca2.crl02
                Source: SHIPMENT DOCUMENTS.exe, 00000014.00000003.407487472.00000000070CC000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.quovadis.bm0
                Source: SHIPMENT DOCUMENTS.exe, 00000014.00000003.398450527.0000000007136000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.quovadisglobal.com/cps0
                Source: SHIPMENT DOCUMENTS.exe, 00000014.00000003.398941782.00000000065B9000.00000004.00000800.00020000.00000000.sdmp, SHIPMENT DOCUMENTS.exe, 00000014.00000003.403942163.00000000065CD000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.rcsc.lt/repository0
                Source: SHIPMENT DOCUMENTS.exe, 00000000.00000002.315590285.0000000006E62000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sajatypeworks.com
                Source: SHIPMENT DOCUMENTS.exe, 00000000.00000002.315590285.0000000006E62000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sakkal.com
                Source: SHIPMENT DOCUMENTS.exe, 00000000.00000002.315590285.0000000006E62000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sandoll.co.kr
                Source: SHIPMENT DOCUMENTS.exe, 00000014.00000003.401258901.0000000007125000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sk.ee/cps/0
                Source: SHIPMENT DOCUMENTS.exe, 00000014.00000003.401258901.0000000007125000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sk.ee/juur/crl/0
                Source: SHIPMENT DOCUMENTS.exe, 00000014.00000003.400439346.00000000065EF000.00000004.00000800.00020000.00000000.sdmp, SHIPMENT DOCUMENTS.exe, 00000014.00000003.401258901.0000000007125000.00000004.00000800.00020000.00000000.sdmp, SHIPMENT DOCUMENTS.exe, 00000014.00000003.401332216.00000000065F2000.00000004.00000800.00020000.00000000.sdmp, SHIPMENT DOCUMENTS.exe, 00000014.00000003.398450527.0000000007136000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.ssc.lt/cps03
                Source: SHIPMENT DOCUMENTS.exe, 00000014.00000003.407487472.00000000070CC000.00000004.00000800.00020000.00000000.sdmp, SHIPMENT DOCUMENTS.exe, 00000014.00000003.398696766.0000000007129000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.suscerte.gob.ve/dpc0
                Source: SHIPMENT DOCUMENTS.exe, 00000014.00000003.407487472.00000000070CC000.00000004.00000800.00020000.00000000.sdmp, SHIPMENT DOCUMENTS.exe, 00000014.00000003.398696766.0000000007129000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.suscerte.gob.ve/lcr0#
                Source: SHIPMENT DOCUMENTS.exe, 00000000.00000002.315590285.0000000006E62000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.tiro.com
                Source: SHIPMENT DOCUMENTS.exe, 00000014.00000003.398941782.00000000065B9000.00000004.00000800.00020000.00000000.sdmp, SHIPMENT DOCUMENTS.exe, 00000014.00000003.403651123.00000000065E4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.trustcenter.de/crl/v2/tc_class_3_ca_II.crl
                Source: SHIPMENT DOCUMENTS.exe, 00000014.00000003.401258901.0000000007125000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.trustdst.com/certificates/policy/ACES-index.html0
                Source: SHIPMENT DOCUMENTS.exe, 00000000.00000002.315590285.0000000006E62000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.typography.netD
                Source: SHIPMENT DOCUMENTS.exe, 00000014.00000003.398941782.00000000065B9000.00000004.00000800.00020000.00000000.sdmp, SHIPMENT DOCUMENTS.exe, 00000014.00000003.403651123.00000000065E4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.uce.gub.uy/acrn/acrn.crl0
                Source: SHIPMENT DOCUMENTS.exe, 00000014.00000003.398941782.00000000065B9000.00000004.00000800.00020000.00000000.sdmp, SHIPMENT DOCUMENTS.exe, 00000014.00000003.403651123.00000000065E4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.uce.gub.uy/informacion-tecnica/politicas/cp_acrn.pdf0G
                Source: SHIPMENT DOCUMENTS.exe, 00000000.00000002.315590285.0000000006E62000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.urwpp.deDPlease
                Source: SHIPMENT DOCUMENTS.exe, 00000000.00000002.315590285.0000000006E62000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.zhongyicts.com.cn
                Source: SHIPMENT DOCUMENTS.exe, 00000014.00000003.398941782.00000000065B9000.00000004.00000800.00020000.00000000.sdmp, SHIPMENT DOCUMENTS.exe, 00000014.00000003.403942163.00000000065CD000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www2.postsignum.cz/crl/psrootqca2.crl01
                Source: SHIPMENT DOCUMENTS.exe, 00000014.00000002.517701606.00000000010AE000.00000004.00000020.00020000.00000000.sdmp, SHIPMENT DOCUMENTS.exe, 00000014.00000002.516536811.000000000107D000.00000004.00000020.00020000.00000000.sdmp, SHIPMENT DOCUMENTS.exe, 00000014.00000003.393347400.0000000006586000.00000004.00000800.00020000.00000000.sdmp, SHIPMENT DOCUMENTS.exe, 00000014.00000002.533736666.00000000031E6000.00000004.00000800.00020000.00000000.sdmp, cnWCiicEpxW.exe, 0000001B.00000002.520315185.00000000013A0000.00000004.00000020.00020000.00000000.sdmp, cnWCiicEpxW.exe, 0000001B.00000002.522042764.00000000013E6000.00000004.00000020.00020000.00000000.sdmp, cnWCiicEpxW.exe, 0000001B.00000003.503605398.00000000013E6000.00000004.00000020.00020000.00000000.sdmp, cnWCiicEpxW.exe, 0000001B.00000002.534582730.00000000033F5000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://x1.c.lencr.org/0
                Source: SHIPMENT DOCUMENTS.exe, 00000014.00000002.517701606.00000000010AE000.00000004.00000020.00020000.00000000.sdmp, SHIPMENT DOCUMENTS.exe, 00000014.00000002.516536811.000000000107D000.00000004.00000020.00020000.00000000.sdmp, SHIPMENT DOCUMENTS.exe, 00000014.00000003.393347400.0000000006586000.00000004.00000800.00020000.00000000.sdmp, SHIPMENT DOCUMENTS.exe, 00000014.00000002.533736666.00000000031E6000.00000004.00000800.00020000.00000000.sdmp, cnWCiicEpxW.exe, 0000001B.00000002.520315185.00000000013A0000.00000004.00000020.00020000.00000000.sdmp, cnWCiicEpxW.exe, 0000001B.00000002.522042764.00000000013E6000.00000004.00000020.00020000.00000000.sdmp, cnWCiicEpxW.exe, 0000001B.00000003.503605398.00000000013E6000.00000004.00000020.00020000.00000000.sdmp, cnWCiicEpxW.exe, 0000001B.00000002.534582730.00000000033F5000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://x1.i.lencr.org/0
                Source: cnWCiicEpxW.exe, 0000001B.00000002.528419495.0000000003164000.00000004.00000800.00020000.00000000.sdmp, cnWCiicEpxW.exe, 0000001B.00000002.534484751.00000000033EB000.00000004.00000800.00020000.00000000.sdmp, cnWCiicEpxW.exe, 0000001B.00000002.534582730.00000000033F5000.00000004.00000800.00020000.00000000.sdmp, cnWCiicEpxW.exe, 0000001B.00000002.533917798.00000000033AA000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://9psarY6l5Bj.org
                Source: SHIPMENT DOCUMENTS.exe, 00000014.00000002.522417697.0000000002EF1000.00000004.00000800.00020000.00000000.sdmp, cnWCiicEpxW.exe, 0000001B.00000002.525674867.0000000003111000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.ipify.org
                Source: SHIPMENT DOCUMENTS.exe, 00000014.00000002.522417697.0000000002EF1000.00000004.00000800.00020000.00000000.sdmp, cnWCiicEpxW.exe, 0000001B.00000002.525674867.0000000003111000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.ipify.org/
                Source: cnWCiicEpxW.exe, 0000001B.00000002.525674867.0000000003111000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.ipify.orgmail.southernboilers.orginfo
                Source: SHIPMENT DOCUMENTS.exe, 00000014.00000003.398836058.00000000065AD000.00000004.00000800.00020000.00000000.sdmp, SHIPMENT DOCUMENTS.exe, 00000014.00000003.407868660.00000000065AE000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://crl.anf.es/AC/ANFServerCA.crl0
                Source: SHIPMENT DOCUMENTS.exe, 00000014.00000003.398941782.00000000065B9000.00000004.00000800.00020000.00000000.sdmp, SHIPMENT DOCUMENTS.exe, 00000014.00000003.403651123.00000000065E4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://eca.hinet.net/repository0
                Source: SHIPMENT DOCUMENTS.exe, 00000014.00000003.407487472.00000000070CC000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://ocsp.quovadisoffshore.com0
                Source: SHIPMENT DOCUMENTS.exe, 00000014.00000003.398450527.0000000007136000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://rca.e-szigno.hu/ocsp0-
                Source: SHIPMENT DOCUMENTS.exe, 00000014.00000003.398450527.0000000007136000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://repository.luxtrust.lu0
                Source: SHIPMENT DOCUMENTS.exe, 00000014.00000003.400439346.00000000065EF000.00000004.00000800.00020000.00000000.sdmp, SHIPMENT DOCUMENTS.exe, 00000014.00000003.401332216.00000000065F2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://web.certicamara.com/marco-legal0Z
                Source: SHIPMENT DOCUMENTS.exe, 00000014.00000003.398836058.00000000065AD000.00000004.00000800.00020000.00000000.sdmp, SHIPMENT DOCUMENTS.exe, 00000014.00000003.407868660.00000000065AE000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.anf.es/AC/ACTAS/789230
                Source: SHIPMENT DOCUMENTS.exe, 00000014.00000003.398836058.00000000065AD000.00000004.00000800.00020000.00000000.sdmp, SHIPMENT DOCUMENTS.exe, 00000014.00000003.407868660.00000000065AE000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.anf.es/AC/ANFServerCA.crl0
                Source: SHIPMENT DOCUMENTS.exe, 00000014.00000003.398836058.00000000065AD000.00000004.00000800.00020000.00000000.sdmp, SHIPMENT DOCUMENTS.exe, 00000014.00000003.407868660.00000000065AE000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.anf.es/address/)1(0&
                Source: SHIPMENT DOCUMENTS.exe, 00000014.00000003.398450527.0000000007136000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.catcert.net/verarrel
                Source: SHIPMENT DOCUMENTS.exe, 00000014.00000003.398450527.0000000007136000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.catcert.net/verarrel05
                Source: SHIPMENT DOCUMENTS.exe, 00000014.00000003.398450527.0000000007136000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.netlock.hu/docs/
                Source: SHIPMENT DOCUMENTS.exe, 00000014.00000003.407915366.00000000065B9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.netlock.net/docs
                Source: SHIPMENT DOCUMENTS.exe, 00000014.00000002.522417697.0000000002EF1000.00000004.00000800.00020000.00000000.sdmp, cnWCiicEpxW.exe, 0000001B.00000002.525674867.0000000003111000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.ziphttps://www
                Source: SHIPMENT DOCUMENTS.exe, 00000014.00000003.398450527.0000000007136000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://wwww.certigna.fr/autorites/0m
                Source: unknownDNS traffic detected: queries for: api.ipify.org
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:80.0) Gecko/20100101 Firefox/80.0Host: api.ipify.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:80.0) Gecko/20100101 Firefox/80.0Host: api.ipify.orgConnection: Keep-Alive
                Source: unknownHTTPS traffic detected: 52.20.78.240:443 -> 192.168.2.6:49713 version: TLS 1.2
                Source: unknownHTTPS traffic detected: 3.232.242.170:443 -> 192.168.2.6:49738 version: TLS 1.2

                System Summary

                barindex
                Source: 20.0.SHIPMENT DOCUMENTS.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: AgentTeslaV3 infostealer payload Author: ditekSHen
                Source: 20.0.SHIPMENT DOCUMENTS.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f Author: unknown
                Source: 0.2.SHIPMENT DOCUMENTS.exe.3d715a0.1.unpack, type: UNPACKEDPEMatched rule: AgentTeslaV3 infostealer payload Author: ditekSHen
                Source: 0.2.SHIPMENT DOCUMENTS.exe.3d715a0.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f Author: unknown
                Source: 21.2.cnWCiicEpxW.exe.2c8ba40.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables containing artifcats associated with disabling Widnows Defender Author: ditekSHen
                Source: 0.2.SHIPMENT DOCUMENTS.exe.2dbba3c.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables containing artifcats associated with disabling Widnows Defender Author: ditekSHen
                Source: 0.2.SHIPMENT DOCUMENTS.exe.3d715a0.1.raw.unpack, type: UNPACKEDPEMatched rule: AgentTeslaV3 infostealer payload Author: ditekSHen
                Source: 0.2.SHIPMENT DOCUMENTS.exe.3d715a0.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f Author: unknown
                Source: 0.2.SHIPMENT DOCUMENTS.exe.3ea28e8.2.raw.unpack, type: UNPACKEDPEMatched rule: AgenetTesla Type 2 Keylogger payload Author: ditekSHen
                Source: 0.2.SHIPMENT DOCUMENTS.exe.3ea28e8.2.raw.unpack, type: UNPACKEDPEMatched rule: AgentTeslaV3 infostealer payload Author: ditekSHen
                Source: 0.2.SHIPMENT DOCUMENTS.exe.3ea28e8.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects zgRAT Author: ditekSHen
                Source: 0.2.SHIPMENT DOCUMENTS.exe.3ea28e8.2.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f Author: unknown
                Source: 00000014.00000000.301553016.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f Author: unknown
                Source: 00000000.00000002.309368123.0000000003DCC000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f Author: unknown
                Source: 00000000.00000002.308207563.0000000003CA9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f Author: unknown
                Source: Process Memory Space: SHIPMENT DOCUMENTS.exe PID: 3192, type: MEMORYSTRMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f Author: unknown
                Source: Process Memory Space: SHIPMENT DOCUMENTS.exe PID: 3244, type: MEMORYSTRMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f Author: unknown
                Source: initial sampleStatic PE information: Filename: SHIPMENT DOCUMENTS.exe
                Source: 20.0.SHIPMENT DOCUMENTS.exe.400000.0.unpack, u003cPrivateImplementationDetailsu003eu007bA3AE4E87u002d6B17u002d43BFu002dA428u002d978DE49F0210u007d/F3538611u002d2A69u002d4BECu002d82C0u002d433C1F04D64D.csLarge array initialization: .cctor: array initializer size 10983
                Source: SHIPMENT DOCUMENTS.exeStatic PE information: EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
                Source: 20.0.SHIPMENT DOCUMENTS.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload
                Source: 20.0.SHIPMENT DOCUMENTS.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f reference_sample = 65463161760af7ab85f5c475a0f7b1581234a1e714a2c5a555783bdd203f85f4, os = windows, severity = x86, creation_date = 2021-03-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.AgentTesla, fingerprint = cbbb56fe6cd7277ae9595a10e05e2ce535a4e6bf205810be0bbce3a883b6f8bc, id = d3ac2b2f-14fc-4851-8a57-41032e386aeb, last_modified = 2022-06-20
                Source: 0.2.SHIPMENT DOCUMENTS.exe.3d715a0.1.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload
                Source: 0.2.SHIPMENT DOCUMENTS.exe.3d715a0.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f reference_sample = 65463161760af7ab85f5c475a0f7b1581234a1e714a2c5a555783bdd203f85f4, os = windows, severity = x86, creation_date = 2021-03-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.AgentTesla, fingerprint = cbbb56fe6cd7277ae9595a10e05e2ce535a4e6bf205810be0bbce3a883b6f8bc, id = d3ac2b2f-14fc-4851-8a57-41032e386aeb, last_modified = 2022-06-20
                Source: 21.2.cnWCiicEpxW.exe.2c8ba40.0.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_DisableWinDefender author = ditekSHen, description = Detects executables containing artifcats associated with disabling Widnows Defender
                Source: 0.2.SHIPMENT DOCUMENTS.exe.2dbba3c.0.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_DisableWinDefender author = ditekSHen, description = Detects executables containing artifcats associated with disabling Widnows Defender
                Source: 0.2.SHIPMENT DOCUMENTS.exe.3d715a0.1.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload
                Source: 0.2.SHIPMENT DOCUMENTS.exe.3d715a0.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f reference_sample = 65463161760af7ab85f5c475a0f7b1581234a1e714a2c5a555783bdd203f85f4, os = windows, severity = x86, creation_date = 2021-03-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.AgentTesla, fingerprint = cbbb56fe6cd7277ae9595a10e05e2ce535a4e6bf205810be0bbce3a883b6f8bc, id = d3ac2b2f-14fc-4851-8a57-41032e386aeb, last_modified = 2022-06-20
                Source: 0.2.SHIPMENT DOCUMENTS.exe.3ea28e8.2.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV2 author = ditekSHen, description = AgenetTesla Type 2 Keylogger payload
                Source: 0.2.SHIPMENT DOCUMENTS.exe.3ea28e8.2.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload
                Source: 0.2.SHIPMENT DOCUMENTS.exe.3ea28e8.2.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_zgRAT author = ditekSHen, description = Detects zgRAT
                Source: 0.2.SHIPMENT DOCUMENTS.exe.3ea28e8.2.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f reference_sample = 65463161760af7ab85f5c475a0f7b1581234a1e714a2c5a555783bdd203f85f4, os = windows, severity = x86, creation_date = 2021-03-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.AgentTesla, fingerprint = cbbb56fe6cd7277ae9595a10e05e2ce535a4e6bf205810be0bbce3a883b6f8bc, id = d3ac2b2f-14fc-4851-8a57-41032e386aeb, last_modified = 2022-06-20
                Source: 00000014.00000000.301553016.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f reference_sample = 65463161760af7ab85f5c475a0f7b1581234a1e714a2c5a555783bdd203f85f4, os = windows, severity = x86, creation_date = 2021-03-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.AgentTesla, fingerprint = cbbb56fe6cd7277ae9595a10e05e2ce535a4e6bf205810be0bbce3a883b6f8bc, id = d3ac2b2f-14fc-4851-8a57-41032e386aeb, last_modified = 2022-06-20
                Source: 00000000.00000002.309368123.0000000003DCC000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f reference_sample = 65463161760af7ab85f5c475a0f7b1581234a1e714a2c5a555783bdd203f85f4, os = windows, severity = x86, creation_date = 2021-03-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.AgentTesla, fingerprint = cbbb56fe6cd7277ae9595a10e05e2ce535a4e6bf205810be0bbce3a883b6f8bc, id = d3ac2b2f-14fc-4851-8a57-41032e386aeb, last_modified = 2022-06-20
                Source: 00000000.00000002.308207563.0000000003CA9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f reference_sample = 65463161760af7ab85f5c475a0f7b1581234a1e714a2c5a555783bdd203f85f4, os = windows, severity = x86, creation_date = 2021-03-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.AgentTesla, fingerprint = cbbb56fe6cd7277ae9595a10e05e2ce535a4e6bf205810be0bbce3a883b6f8bc, id = d3ac2b2f-14fc-4851-8a57-41032e386aeb, last_modified = 2022-06-20
                Source: Process Memory Space: SHIPMENT DOCUMENTS.exe PID: 3192, type: MEMORYSTRMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f reference_sample = 65463161760af7ab85f5c475a0f7b1581234a1e714a2c5a555783bdd203f85f4, os = windows, severity = x86, creation_date = 2021-03-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.AgentTesla, fingerprint = cbbb56fe6cd7277ae9595a10e05e2ce535a4e6bf205810be0bbce3a883b6f8bc, id = d3ac2b2f-14fc-4851-8a57-41032e386aeb, last_modified = 2022-06-20
                Source: Process Memory Space: SHIPMENT DOCUMENTS.exe PID: 3244, type: MEMORYSTRMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f reference_sample = 65463161760af7ab85f5c475a0f7b1581234a1e714a2c5a555783bdd203f85f4, os = windows, severity = x86, creation_date = 2021-03-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.AgentTesla, fingerprint = cbbb56fe6cd7277ae9595a10e05e2ce535a4e6bf205810be0bbce3a883b6f8bc, id = d3ac2b2f-14fc-4851-8a57-41032e386aeb, last_modified = 2022-06-20
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeCode function: 0_2_02B7C64C
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeCode function: 0_2_02B7E8D8
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeCode function: 0_2_02B7E8C8
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeCode function: 20_2_02CFFC18
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeCode function: 20_2_02CF6D43
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeCode function: 20_2_05FFC5F8
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeCode function: 20_2_05FFA130
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeCode function: 20_2_05FFD358
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeCode function: 20_2_05FF0930
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeCode function: 20_2_05FF0040
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeCode function: 20_2_05FF2A40
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeCode function: 20_2_06B7D4E8
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeCode function: 20_2_06B78840
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeCode function: 20_2_06B727F6
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeCode function: 20_2_06B723C0
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeCode function: 20_2_06B73730
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeCode function: 20_2_06B7249F
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeCode function: 20_2_06B7D484
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeCode function: 20_2_06B724E7
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeCode function: 20_2_06B730D0
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeCode function: 20_2_06B72549
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeCode function: 20_2_06B75EB8
                Source: SHIPMENT DOCUMENTS.exe, 00000000.00000002.305232047.0000000002CA1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameCassa.dll< vs SHIPMENT DOCUMENTS.exe
                Source: SHIPMENT DOCUMENTS.exe, 00000000.00000002.305232047.0000000002CA1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilename8346f821-5c18-4573-9308-3a6383bed95e.exe4 vs SHIPMENT DOCUMENTS.exe
                Source: SHIPMENT DOCUMENTS.exe, 00000000.00000002.309368123.0000000003DCC000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameMajorRevision.exe< vs SHIPMENT DOCUMENTS.exe
                Source: SHIPMENT DOCUMENTS.exe, 00000000.00000002.309368123.0000000003DCC000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenamewv6MCeq.exeH vs SHIPMENT DOCUMENTS.exe
                Source: SHIPMENT DOCUMENTS.exe, 00000000.00000000.246208925.00000000009EE000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenamewv6MCeq.exeH vs SHIPMENT DOCUMENTS.exe
                Source: SHIPMENT DOCUMENTS.exe, 00000000.00000002.325190197.00000000077C0000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameMajorRevision.exe< vs SHIPMENT DOCUMENTS.exe
                Source: SHIPMENT DOCUMENTS.exe, 00000000.00000002.308207563.0000000003CA9000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilename8346f821-5c18-4573-9308-3a6383bed95e.exe4 vs SHIPMENT DOCUMENTS.exe
                Source: SHIPMENT DOCUMENTS.exe, 00000014.00000000.301859609.0000000000438000.00000040.00000400.00020000.00000000.sdmpBinary or memory string: OriginalFilename8346f821-5c18-4573-9308-3a6383bed95e.exe4 vs SHIPMENT DOCUMENTS.exe
                Source: SHIPMENT DOCUMENTS.exe, 00000014.00000002.512831125.0000000000F38000.00000004.00000010.00020000.00000000.sdmpBinary or memory string: OriginalFilenameUNKNOWN_FILET vs SHIPMENT DOCUMENTS.exe
                Source: SHIPMENT DOCUMENTS.exeBinary or memory string: OriginalFilenamewv6MCeq.exeH vs SHIPMENT DOCUMENTS.exe
                Source: SHIPMENT DOCUMENTS.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                Source: cnWCiicEpxW.exe.0.drStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                Source: SHIPMENT DOCUMENTS.exeVirustotal: Detection: 36%
                Source: SHIPMENT DOCUMENTS.exeReversingLabs: Detection: 32%
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeFile read: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeJump to behavior
                Source: SHIPMENT DOCUMENTS.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
                Source: unknownProcess created: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exe C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exe
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeProcess created: C:\Windows\SysWOW64\schtasks.exe C:\Windows\System32\schtasks.exe" /Create /TN "Updates\cnWCiicEpxW" /XML "C:\Users\user\AppData\Local\Temp\tmp2A80.tmp
                Source: C:\Windows\SysWOW64\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeProcess created: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exe {path}
                Source: unknownProcess created: C:\Users\user\AppData\Roaming\cnWCiicEpxW.exe C:\Users\user\AppData\Roaming\cnWCiicEpxW.exe
                Source: C:\Users\user\AppData\Roaming\cnWCiicEpxW.exeProcess created: C:\Windows\SysWOW64\schtasks.exe C:\Windows\System32\schtasks.exe" /Create /TN "Updates\cnWCiicEpxW" /XML "C:\Users\user\AppData\Local\Temp\tmpC7C9.tmp
                Source: C:\Windows\SysWOW64\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                Source: C:\Users\user\AppData\Roaming\cnWCiicEpxW.exeProcess created: C:\Users\user\AppData\Roaming\cnWCiicEpxW.exe {path}
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeProcess created: C:\Windows\SysWOW64\schtasks.exe C:\Windows\System32\schtasks.exe" /Create /TN "Updates\cnWCiicEpxW" /XML "C:\Users\user\AppData\Local\Temp\tmp2A80.tmp
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeProcess created: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exe {path}
                Source: C:\Users\user\AppData\Roaming\cnWCiicEpxW.exeProcess created: C:\Windows\SysWOW64\schtasks.exe C:\Windows\System32\schtasks.exe" /Create /TN "Updates\cnWCiicEpxW" /XML "C:\Users\user\AppData\Local\Temp\tmpC7C9.tmp
                Source: C:\Users\user\AppData\Roaming\cnWCiicEpxW.exeProcess created: C:\Users\user\AppData\Roaming\cnWCiicEpxW.exe {path}
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{95E15D0A-66E6-93D9-C53C-76E6219D3341}\InProcServer32
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                Source: C:\Users\user\AppData\Roaming\cnWCiicEpxW.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                Source: C:\Users\user\AppData\Roaming\cnWCiicEpxW.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeFile created: C:\Users\user\AppData\Roaming\cnWCiicEpxW.exeJump to behavior
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeFile created: C:\Users\user\AppData\Local\Temp\tmp2A80.tmpJump to behavior
                Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@12/7@6/3
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
                Source: SHIPMENT DOCUMENTS.exe, 00000014.00000002.533082657.0000000003197000.00000004.00000800.00020000.00000000.sdmp, cnWCiicEpxW.exe, 0000001B.00000002.533894309.00000000033A5000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: CREATE TABLE password_notes (id INTEGER PRIMARY KEY AUTOINCREMENT, parent_id INTEGER NOT NULL REFERENCES logins ON UPDATE CASCADE ON DELETE CASCADE DEFERRABLE INITIALLY DEFERRED, key VARCHAR NOT NULL, value BLOB, date_created INTEGER NOT NULL, confidential INTEGER, UNIQUE (parent_id, key));
                Source: SHIPMENT DOCUMENTS.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 49.80%
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
                Source: C:\Users\user\AppData\Roaming\cnWCiicEpxW.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
                Source: C:\Users\user\AppData\Roaming\cnWCiicEpxW.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
                Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:4512:120:WilError_01
                Source: C:\Users\user\AppData\Roaming\cnWCiicEpxW.exeMutant created: \Sessions\1\BaseNamedObjects\SjgFZewpp
                Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:1632:120:WilError_01
                Source: SHIPMENT DOCUMENTS.exe, u8Kw867S61naurO56Y/I7QTkd9Ynf3eywmg2Z.csCryptographic APIs: 'CreateDecryptor'
                Source: SHIPMENT DOCUMENTS.exe, u8Kw867S61naurO56Y/I7QTkd9Ynf3eywmg2Z.csCryptographic APIs: 'CreateDecryptor'
                Source: cnWCiicEpxW.exe.0.dr, u8Kw867S61naurO56Y/I7QTkd9Ynf3eywmg2Z.csCryptographic APIs: 'CreateDecryptor'
                Source: cnWCiicEpxW.exe.0.dr, u8Kw867S61naurO56Y/I7QTkd9Ynf3eywmg2Z.csCryptographic APIs: 'CreateDecryptor'
                Source: 0.0.SHIPMENT DOCUMENTS.exe.910000.0.unpack, u8Kw867S61naurO56Y/I7QTkd9Ynf3eywmg2Z.csCryptographic APIs: 'CreateDecryptor'
                Source: 0.0.SHIPMENT DOCUMENTS.exe.910000.0.unpack, u8Kw867S61naurO56Y/I7QTkd9Ynf3eywmg2Z.csCryptographic APIs: 'CreateDecryptor'
                Source: 20.0.SHIPMENT DOCUMENTS.exe.400000.0.unpack, A/f2.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
                Source: 20.0.SHIPMENT DOCUMENTS.exe.400000.0.unpack, A/f2.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                Source: C:\Users\user\AppData\Roaming\cnWCiicEpxW.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                Source: C:\Users\user\AppData\Roaming\cnWCiicEpxW.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                Source: C:\Users\user\AppData\Roaming\cnWCiicEpxW.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                Source: C:\Users\user\AppData\Roaming\cnWCiicEpxW.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                Source: Window RecorderWindow detected: More than 3 window changes detected
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dll
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676
                Source: SHIPMENT DOCUMENTS.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
                Source: SHIPMENT DOCUMENTS.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                Source: SHIPMENT DOCUMENTS.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                Source: Binary string: wv6MCeq.pdb source: SHIPMENT DOCUMENTS.exe, cnWCiicEpxW.exe.0.dr

                Data Obfuscation

                barindex
                Source: SHIPMENT DOCUMENTS.exe, u8Kw867S61naurO56Y/BiGykUAwkcHjngJunl.cs.Net Code: NLQjT5EheN System.Reflection.Assembly System.AppDomain::Load(System.Byte[])
                Source: cnWCiicEpxW.exe.0.dr, u8Kw867S61naurO56Y/BiGykUAwkcHjngJunl.cs.Net Code: NLQjT5EheN System.Reflection.Assembly System.AppDomain::Load(System.Byte[])
                Source: 0.0.SHIPMENT DOCUMENTS.exe.910000.0.unpack, u8Kw867S61naurO56Y/BiGykUAwkcHjngJunl.cs.Net Code: NLQjT5EheN System.Reflection.Assembly System.AppDomain::Load(System.Byte[])
                Source: SHIPMENT DOCUMENTS.exe, u8Kw867S61naurO56Y/I7QTkd9Ynf3eywmg2Z.cs.Net Code: stackVariable1.GetMethod("GetDelegateForFunctionPointer", V_0)
                Source: cnWCiicEpxW.exe.0.dr, u8Kw867S61naurO56Y/I7QTkd9Ynf3eywmg2Z.cs.Net Code: stackVariable1.GetMethod("GetDelegateForFunctionPointer", V_0)
                Source: 0.0.SHIPMENT DOCUMENTS.exe.910000.0.unpack, u8Kw867S61naurO56Y/I7QTkd9Ynf3eywmg2Z.cs.Net Code: stackVariable1.GetMethod("GetDelegateForFunctionPointer", V_0)
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeCode function: 20_2_05FF9308 push FFFFFF8Eh; iretd
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeCode function: 20_2_06B73730 push es; iretd
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeCode function: 20_2_06B73730 push es; iretd
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeCode function: 20_2_06B73730 push es; iretd
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeCode function: 20_2_06B73730 push es; retf B740h
                Source: initial sampleStatic PE information: section name: .text entropy: 7.505864996836325
                Source: initial sampleStatic PE information: section name: .text entropy: 7.505864996836325
                Source: SHIPMENT DOCUMENTS.exe, u8Kw867S61naurO56Y/I7QTkd9Ynf3eywmg2Z.csHigh entropy of concatenated method names: '.cctor', 'QyVAiFQXUMZNF', 'nrlBdwomul', 'qZYBsin8PU', 'KAFBokh5nO', 'RQABMSq4Rp', 'n1wBxskWtA', 'EayBA3cOvR', 'EQLB1FRk1a', 'sBZB4RFpgY'
                Source: SHIPMENT DOCUMENTS.exe, u8Kw867S61naurO56Y/fRes4fpy4RpLUhyAi8.csHigh entropy of concatenated method names: '.ctor', 'Dispose', 'aoajPGGDsy', 'hp7gJ2SG99', 'YlXgNqNV92', 'ShJgZNmYte', 'V5FguwXIpP', 'AccgWWdBto', 'dlPg9Onwjy', 'Y9cgoPBKT4'
                Source: SHIPMENT DOCUMENTS.exe, u8Kw867S61naurO56Y/nUXdDFvBAxd7UyEdwu.csHigh entropy of concatenated method names: '.ctor', 'Dispose', 'wvHvP3hj8P', 'JUEgs0GjTP', 'rsGgCmkLkM', 'kUIgtAyTSy', 'jLVgUPfcNM', 'v5AgMtdIqt', 'Y5Ig20u0b5', 'a8NgiMIdRN'
                Source: SHIPMENT DOCUMENTS.exe, u8Kw867S61naurO56Y/hg860IXTVynHirxdTO.csHigh entropy of concatenated method names: '.ctor', 'Dispose', 'yHPv7bBIPH', 'kUIgtAyTSy', 'jLVgUPfcNM', 'JUEgs0GjTP', 'rsGgCmkLkM', 'v5AgMtdIqt', 'Y5Ig20u0b5', 'a8NgiMIdRN'
                Source: SHIPMENT DOCUMENTS.exe, u8Kw867S61naurO56Y/poopYPE0sHxymQfoHf.csHigh entropy of concatenated method names: '.ctor', 'Dispose', 'EQDWadX3F4', 'hp7gJ2SG99', 'YlXgNqNV92', 'e5UOtnnHAr', 'JAlOUgsCnU', 'TovOiJRdNK', 'SSMODoqyQS', 'ui2Okw6Hdb'
                Source: SHIPMENT DOCUMENTS.exe, u8Kw867S61naurO56Y/M1Lgw25sFV1h7SPnbi.csHigh entropy of concatenated method names: '.ctor', 'Dispose', 'm0WIhK8QiV', 'kUIgtAyTSy', 'jLVgUPfcNM', 'QZTlW8PLsG', 'wsll9k5vYj', 'CikllggbKD', 'uDJlpDhb9w', 'XqKlgSM0Ku'
                Source: SHIPMENT DOCUMENTS.exe, u8Kw867S61naurO56Y/F8m8MfBnBsxD9J6mrM.csHigh entropy of concatenated method names: '.ctor', 'Dispose', 'iWYI1I0E2F', 'JUEgs0GjTP', 'rsGgCmkLkM', 'obeO4qj1Pw', 'OXDOTEmSDM', 'b0klvedo5x', 'OJylGKIGJr', 'UDGOs8fXXR'
                Source: SHIPMENT DOCUMENTS.exe, u8Kw867S61naurO56Y/yhxL5gnBtYUFRLosDJ.csHigh entropy of concatenated method names: '.ctor', 'Dispose', 'nsVW18YwIQ', 'JUEgs0GjTP', 'rsGgCmkLkM', 'v5AgMtdIqt', 'Y5Ig20u0b5', 'a8NgiMIdRN', 'kKggDyvo6l', 't66gICG2nM'
                Source: SHIPMENT DOCUMENTS.exe, u8Kw867S61naurO56Y/VAZPILaYygsjOwTXV7.csHigh entropy of concatenated method names: '.ctor', 'Dispose', 'qb2qk6j6e', 'WTNKhKJWKf', 'uAeKxSM7G6', 'DfnKSsXgLT', 'oFEKm7CYOT', 'bExKas7caH', 'qFmKA4iXNn', 'pwvKF8fvEX'
                Source: SHIPMENT DOCUMENTS.exe, u8Kw867S61naurO56Y/BiGykUAwkcHjngJunl.csHigh entropy of concatenated method names: '.ctor', 'PFcjjPniVb', 'GKAjvqIFPE', 'zPKjWLXew4', 'nrRjIH62AE', 'c3JjBXCu0A', 'S4rjeqyZLl', 'A9ajbrB7yW', 'Dispose', 'I66jgx55If'
                Source: cnWCiicEpxW.exe.0.dr, u8Kw867S61naurO56Y/I7QTkd9Ynf3eywmg2Z.csHigh entropy of concatenated method names: '.cctor', 'QyVAiFQXUMZNF', 'nrlBdwomul', 'qZYBsin8PU', 'KAFBokh5nO', 'RQABMSq4Rp', 'n1wBxskWtA', 'EayBA3cOvR', 'EQLB1FRk1a', 'sBZB4RFpgY'
                Source: cnWCiicEpxW.exe.0.dr, u8Kw867S61naurO56Y/fRes4fpy4RpLUhyAi8.csHigh entropy of concatenated method names: '.ctor', 'Dispose', 'aoajPGGDsy', 'hp7gJ2SG99', 'YlXgNqNV92', 'ShJgZNmYte', 'V5FguwXIpP', 'AccgWWdBto', 'dlPg9Onwjy', 'Y9cgoPBKT4'
                Source: cnWCiicEpxW.exe.0.dr, u8Kw867S61naurO56Y/nUXdDFvBAxd7UyEdwu.csHigh entropy of concatenated method names: '.ctor', 'Dispose', 'wvHvP3hj8P', 'JUEgs0GjTP', 'rsGgCmkLkM', 'kUIgtAyTSy', 'jLVgUPfcNM', 'v5AgMtdIqt', 'Y5Ig20u0b5', 'a8NgiMIdRN'
                Source: cnWCiicEpxW.exe.0.dr, u8Kw867S61naurO56Y/hg860IXTVynHirxdTO.csHigh entropy of concatenated method names: '.ctor', 'Dispose', 'yHPv7bBIPH', 'kUIgtAyTSy', 'jLVgUPfcNM', 'JUEgs0GjTP', 'rsGgCmkLkM', 'v5AgMtdIqt', 'Y5Ig20u0b5', 'a8NgiMIdRN'
                Source: cnWCiicEpxW.exe.0.dr, u8Kw867S61naurO56Y/poopYPE0sHxymQfoHf.csHigh entropy of concatenated method names: '.ctor', 'Dispose', 'EQDWadX3F4', 'hp7gJ2SG99', 'YlXgNqNV92', 'e5UOtnnHAr', 'JAlOUgsCnU', 'TovOiJRdNK', 'SSMODoqyQS', 'ui2Okw6Hdb'
                Source: cnWCiicEpxW.exe.0.dr, u8Kw867S61naurO56Y/M1Lgw25sFV1h7SPnbi.csHigh entropy of concatenated method names: '.ctor', 'Dispose', 'm0WIhK8QiV', 'kUIgtAyTSy', 'jLVgUPfcNM', 'QZTlW8PLsG', 'wsll9k5vYj', 'CikllggbKD', 'uDJlpDhb9w', 'XqKlgSM0Ku'
                Source: cnWCiicEpxW.exe.0.dr, u8Kw867S61naurO56Y/yhxL5gnBtYUFRLosDJ.csHigh entropy of concatenated method names: '.ctor', 'Dispose', 'nsVW18YwIQ', 'JUEgs0GjTP', 'rsGgCmkLkM', 'v5AgMtdIqt', 'Y5Ig20u0b5', 'a8NgiMIdRN', 'kKggDyvo6l', 't66gICG2nM'
                Source: cnWCiicEpxW.exe.0.dr, u8Kw867S61naurO56Y/F8m8MfBnBsxD9J6mrM.csHigh entropy of concatenated method names: '.ctor', 'Dispose', 'iWYI1I0E2F', 'JUEgs0GjTP', 'rsGgCmkLkM', 'obeO4qj1Pw', 'OXDOTEmSDM', 'b0klvedo5x', 'OJylGKIGJr', 'UDGOs8fXXR'
                Source: cnWCiicEpxW.exe.0.dr, u8Kw867S61naurO56Y/VAZPILaYygsjOwTXV7.csHigh entropy of concatenated method names: '.ctor', 'Dispose', 'qb2qk6j6e', 'WTNKhKJWKf', 'uAeKxSM7G6', 'DfnKSsXgLT', 'oFEKm7CYOT', 'bExKas7caH', 'qFmKA4iXNn', 'pwvKF8fvEX'
                Source: cnWCiicEpxW.exe.0.dr, u8Kw867S61naurO56Y/BiGykUAwkcHjngJunl.csHigh entropy of concatenated method names: '.ctor', 'PFcjjPniVb', 'GKAjvqIFPE', 'zPKjWLXew4', 'nrRjIH62AE', 'c3JjBXCu0A', 'S4rjeqyZLl', 'A9ajbrB7yW', 'Dispose', 'I66jgx55If'
                Source: 0.0.SHIPMENT DOCUMENTS.exe.910000.0.unpack, u8Kw867S61naurO56Y/I7QTkd9Ynf3eywmg2Z.csHigh entropy of concatenated method names: '.cctor', 'QyVAiFQXUMZNF', 'nrlBdwomul', 'qZYBsin8PU', 'KAFBokh5nO', 'RQABMSq4Rp', 'n1wBxskWtA', 'EayBA3cOvR', 'EQLB1FRk1a', 'sBZB4RFpgY'
                Source: 0.0.SHIPMENT DOCUMENTS.exe.910000.0.unpack, u8Kw867S61naurO56Y/fRes4fpy4RpLUhyAi8.csHigh entropy of concatenated method names: '.ctor', 'Dispose', 'aoajPGGDsy', 'hp7gJ2SG99', 'YlXgNqNV92', 'ShJgZNmYte', 'V5FguwXIpP', 'AccgWWdBto', 'dlPg9Onwjy', 'Y9cgoPBKT4'
                Source: 0.0.SHIPMENT DOCUMENTS.exe.910000.0.unpack, u8Kw867S61naurO56Y/nUXdDFvBAxd7UyEdwu.csHigh entropy of concatenated method names: '.ctor', 'Dispose', 'wvHvP3hj8P', 'JUEgs0GjTP', 'rsGgCmkLkM', 'kUIgtAyTSy', 'jLVgUPfcNM', 'v5AgMtdIqt', 'Y5Ig20u0b5', 'a8NgiMIdRN'
                Source: 0.0.SHIPMENT DOCUMENTS.exe.910000.0.unpack, u8Kw867S61naurO56Y/hg860IXTVynHirxdTO.csHigh entropy of concatenated method names: '.ctor', 'Dispose', 'yHPv7bBIPH', 'kUIgtAyTSy', 'jLVgUPfcNM', 'JUEgs0GjTP', 'rsGgCmkLkM', 'v5AgMtdIqt', 'Y5Ig20u0b5', 'a8NgiMIdRN'
                Source: 0.0.SHIPMENT DOCUMENTS.exe.910000.0.unpack, u8Kw867S61naurO56Y/poopYPE0sHxymQfoHf.csHigh entropy of concatenated method names: '.ctor', 'Dispose', 'EQDWadX3F4', 'hp7gJ2SG99', 'YlXgNqNV92', 'e5UOtnnHAr', 'JAlOUgsCnU', 'TovOiJRdNK', 'SSMODoqyQS', 'ui2Okw6Hdb'
                Source: 0.0.SHIPMENT DOCUMENTS.exe.910000.0.unpack, u8Kw867S61naurO56Y/M1Lgw25sFV1h7SPnbi.csHigh entropy of concatenated method names: '.ctor', 'Dispose', 'm0WIhK8QiV', 'kUIgtAyTSy', 'jLVgUPfcNM', 'QZTlW8PLsG', 'wsll9k5vYj', 'CikllggbKD', 'uDJlpDhb9w', 'XqKlgSM0Ku'
                Source: 0.0.SHIPMENT DOCUMENTS.exe.910000.0.unpack, u8Kw867S61naurO56Y/yhxL5gnBtYUFRLosDJ.csHigh entropy of concatenated method names: '.ctor', 'Dispose', 'nsVW18YwIQ', 'JUEgs0GjTP', 'rsGgCmkLkM', 'v5AgMtdIqt', 'Y5Ig20u0b5', 'a8NgiMIdRN', 'kKggDyvo6l', 't66gICG2nM'
                Source: 0.0.SHIPMENT DOCUMENTS.exe.910000.0.unpack, u8Kw867S61naurO56Y/F8m8MfBnBsxD9J6mrM.csHigh entropy of concatenated method names: '.ctor', 'Dispose', 'iWYI1I0E2F', 'JUEgs0GjTP', 'rsGgCmkLkM', 'obeO4qj1Pw', 'OXDOTEmSDM', 'b0klvedo5x', 'OJylGKIGJr', 'UDGOs8fXXR'
                Source: 0.0.SHIPMENT DOCUMENTS.exe.910000.0.unpack, u8Kw867S61naurO56Y/VAZPILaYygsjOwTXV7.csHigh entropy of concatenated method names: '.ctor', 'Dispose', 'qb2qk6j6e', 'WTNKhKJWKf', 'uAeKxSM7G6', 'DfnKSsXgLT', 'oFEKm7CYOT', 'bExKas7caH', 'qFmKA4iXNn', 'pwvKF8fvEX'
                Source: 0.0.SHIPMENT DOCUMENTS.exe.910000.0.unpack, u8Kw867S61naurO56Y/BiGykUAwkcHjngJunl.csHigh entropy of concatenated method names: '.ctor', 'PFcjjPniVb', 'GKAjvqIFPE', 'zPKjWLXew4', 'nrRjIH62AE', 'c3JjBXCu0A', 'S4rjeqyZLl', 'A9ajbrB7yW', 'Dispose', 'I66jgx55If'
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeFile created: C:\Users\user\AppData\Roaming\cnWCiicEpxW.exeJump to dropped file

                Boot Survival

                barindex
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeProcess created: C:\Windows\SysWOW64\schtasks.exe C:\Windows\System32\schtasks.exe" /Create /TN "Updates\cnWCiicEpxW" /XML "C:\Users\user\AppData\Local\Temp\tmp2A80.tmp
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeRegistry key monitored for changes: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeRegistry key monitored for changes: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\AutoUpdate
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeRegistry key monitored for changes: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot
                Source: C:\Users\user\AppData\Roaming\cnWCiicEpxW.exeRegistry key monitored for changes: HKEY_CURRENT_USER_Classes
                Source: C:\Users\user\AppData\Roaming\cnWCiicEpxW.exeRegistry key monitored for changes: HKEY_CURRENT_USER_Classes
                Source: C:\Users\user\AppData\Roaming\cnWCiicEpxW.exeRegistry key monitored for changes: HKEY_CURRENT_USER_Classes
                Source: C:\Users\user\AppData\Roaming\cnWCiicEpxW.exeRegistry key monitored for changes: HKEY_CURRENT_USER_Classes
                Source: C:\Users\user\AppData\Roaming\cnWCiicEpxW.exeRegistry key monitored for changes: HKEY_CURRENT_USER_Classes
                Source: C:\Users\user\AppData\Roaming\cnWCiicEpxW.exeRegistry key monitored for changes: HKEY_CURRENT_USER_Classes
                Source: C:\Users\user\AppData\Roaming\cnWCiicEpxW.exeRegistry key monitored for changes: HKEY_CURRENT_USER_Classes
                Source: C:\Users\user\AppData\Roaming\cnWCiicEpxW.exeRegistry key monitored for changes: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\cnWCiicEpxW.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\cnWCiicEpxW.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\cnWCiicEpxW.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\cnWCiicEpxW.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\cnWCiicEpxW.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\cnWCiicEpxW.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\cnWCiicEpxW.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\cnWCiicEpxW.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\cnWCiicEpxW.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\cnWCiicEpxW.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\cnWCiicEpxW.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\cnWCiicEpxW.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\cnWCiicEpxW.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\cnWCiicEpxW.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\cnWCiicEpxW.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\cnWCiicEpxW.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\cnWCiicEpxW.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\cnWCiicEpxW.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\cnWCiicEpxW.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\cnWCiicEpxW.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\cnWCiicEpxW.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\cnWCiicEpxW.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\cnWCiicEpxW.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\cnWCiicEpxW.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\cnWCiicEpxW.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\cnWCiicEpxW.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\cnWCiicEpxW.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\cnWCiicEpxW.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\cnWCiicEpxW.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\cnWCiicEpxW.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\cnWCiicEpxW.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\cnWCiicEpxW.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\cnWCiicEpxW.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\cnWCiicEpxW.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\cnWCiicEpxW.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\cnWCiicEpxW.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\cnWCiicEpxW.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\cnWCiicEpxW.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\cnWCiicEpxW.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\cnWCiicEpxW.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\cnWCiicEpxW.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\cnWCiicEpxW.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\cnWCiicEpxW.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\cnWCiicEpxW.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\cnWCiicEpxW.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\cnWCiicEpxW.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\cnWCiicEpxW.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\cnWCiicEpxW.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\cnWCiicEpxW.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\cnWCiicEpxW.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\cnWCiicEpxW.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\cnWCiicEpxW.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\cnWCiicEpxW.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\cnWCiicEpxW.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\cnWCiicEpxW.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\cnWCiicEpxW.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\cnWCiicEpxW.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\cnWCiicEpxW.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\cnWCiicEpxW.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\cnWCiicEpxW.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\cnWCiicEpxW.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\cnWCiicEpxW.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\cnWCiicEpxW.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\cnWCiicEpxW.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\cnWCiicEpxW.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\cnWCiicEpxW.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\cnWCiicEpxW.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\cnWCiicEpxW.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\cnWCiicEpxW.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\cnWCiicEpxW.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\cnWCiicEpxW.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\cnWCiicEpxW.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\cnWCiicEpxW.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\cnWCiicEpxW.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\cnWCiicEpxW.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\cnWCiicEpxW.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\cnWCiicEpxW.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\cnWCiicEpxW.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\cnWCiicEpxW.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\cnWCiicEpxW.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\cnWCiicEpxW.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\cnWCiicEpxW.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\cnWCiicEpxW.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\cnWCiicEpxW.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\cnWCiicEpxW.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\cnWCiicEpxW.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\cnWCiicEpxW.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\cnWCiicEpxW.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\cnWCiicEpxW.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\cnWCiicEpxW.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\cnWCiicEpxW.exeProcess information set: NOOPENFILEERRORBOX

                Malware Analysis System Evasion

                barindex
                Source: Yara matchFile source: Process Memory Space: SHIPMENT DOCUMENTS.exe PID: 3192, type: MEMORYSTR
                Source: SHIPMENT DOCUMENTS.exe, 00000000.00000002.305232047.0000000002CA1000.00000004.00000800.00020000.00000000.sdmp, cnWCiicEpxW.exe, 00000015.00000002.415707967.0000000002B71000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: WINE_GET_UNIX_FILE_NAME
                Source: SHIPMENT DOCUMENTS.exe, 00000000.00000002.305232047.0000000002CA1000.00000004.00000800.00020000.00000000.sdmp, cnWCiicEpxW.exe, 00000015.00000002.415707967.0000000002B71000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: SBIEDLL.DLL
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_NetworkAdapterConfiguration
                Source: C:\Users\user\AppData\Roaming\cnWCiicEpxW.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_NetworkAdapterConfiguration
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
                Source: C:\Users\user\AppData\Roaming\cnWCiicEpxW.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exe TID: 3180Thread sleep time: -922337203685477s >= -30000s
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exe TID: 2356Thread sleep count: 9568 > 30
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exe TID: 5876Thread sleep time: -12912720851596678s >= -30000s
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exe TID: 5876Thread sleep time: -100000s >= -30000s
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exe TID: 5876Thread sleep time: -99887s >= -30000s
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exe TID: 5876Thread sleep time: -99759s >= -30000s
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exe TID: 5876Thread sleep time: -99635s >= -30000s
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exe TID: 5876Thread sleep time: -99515s >= -30000s
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exe TID: 5876Thread sleep time: -99406s >= -30000s
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exe TID: 5876Thread sleep time: -99296s >= -30000s
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exe TID: 5876Thread sleep time: -99186s >= -30000s
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exe TID: 5876Thread sleep time: -99077s >= -30000s
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exe TID: 5876Thread sleep time: -98968s >= -30000s
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exe TID: 5876Thread sleep time: -98859s >= -30000s
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exe TID: 5876Thread sleep time: -98747s >= -30000s
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exe TID: 5876Thread sleep time: -98624s >= -30000s
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exe TID: 5876Thread sleep time: -98510s >= -30000s
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exe TID: 5876Thread sleep time: -98380s >= -30000s
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exe TID: 5876Thread sleep time: -98203s >= -30000s
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exe TID: 5876Thread sleep time: -97732s >= -30000s
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exe TID: 5876Thread sleep time: -97608s >= -30000s
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exe TID: 5876Thread sleep time: -97484s >= -30000s
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exe TID: 5876Thread sleep time: -97364s >= -30000s
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exe TID: 5876Thread sleep time: -97203s >= -30000s
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exe TID: 5876Thread sleep time: -97062s >= -30000s
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exe TID: 5876Thread sleep time: -96922s >= -30000s
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exe TID: 5876Thread sleep time: -96578s >= -30000s
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exe TID: 5876Thread sleep time: -96452s >= -30000s
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exe TID: 5876Thread sleep time: -96310s >= -30000s
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exe TID: 5876Thread sleep time: -96109s >= -30000s
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exe TID: 5876Thread sleep time: -95968s >= -30000s
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exe TID: 5876Thread sleep time: -95832s >= -30000s
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exe TID: 5876Thread sleep time: -95715s >= -30000s
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exe TID: 5876Thread sleep time: -95562s >= -30000s
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exe TID: 5876Thread sleep time: -94406s >= -30000s
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exe TID: 5876Thread sleep time: -93250s >= -30000s
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exe TID: 5876Thread sleep time: -93062s >= -30000s
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exe TID: 5876Thread sleep time: -91250s >= -30000s
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exe TID: 5876Thread sleep time: -91000s >= -30000s
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exe TID: 5876Thread sleep time: -90843s >= -30000s
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exe TID: 5876Thread sleep time: -90684s >= -30000s
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exe TID: 5876Thread sleep time: -90562s >= -30000s
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exe TID: 5876Thread sleep time: -90452s >= -30000s
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exe TID: 5876Thread sleep time: -90343s >= -30000s
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exe TID: 5876Thread sleep time: -90202s >= -30000s
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exe TID: 5876Thread sleep time: -90078s >= -30000s
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exe TID: 5876Thread sleep time: -89945s >= -30000s
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exe TID: 5876Thread sleep time: -89827s >= -30000s
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exe TID: 5876Thread sleep time: -89703s >= -30000s
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exe TID: 5876Thread sleep time: -89589s >= -30000s
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exe TID: 5876Thread sleep time: -89466s >= -30000s
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exe TID: 5876Thread sleep time: -89356s >= -30000s
                Source: C:\Users\user\AppData\Roaming\cnWCiicEpxW.exe TID: 2968Thread sleep time: -922337203685477s >= -30000s
                Source: C:\Users\user\AppData\Roaming\cnWCiicEpxW.exe TID: 5972Thread sleep time: -922337203685477s >= -30000s
                Source: C:\Users\user\AppData\Roaming\cnWCiicEpxW.exe TID: 6080Thread sleep time: -12912720851596678s >= -30000s
                Source: C:\Users\user\AppData\Roaming\cnWCiicEpxW.exe TID: 6080Thread sleep time: -100000s >= -30000s
                Source: C:\Users\user\AppData\Roaming\cnWCiicEpxW.exe TID: 3536Thread sleep count: 9400 > 30
                Source: C:\Users\user\AppData\Roaming\cnWCiicEpxW.exe TID: 6080Thread sleep time: -99859s >= -30000s
                Source: C:\Users\user\AppData\Roaming\cnWCiicEpxW.exe TID: 6080Thread sleep time: -99703s >= -30000s
                Source: C:\Users\user\AppData\Roaming\cnWCiicEpxW.exe TID: 6080Thread sleep time: -99588s >= -30000s
                Source: C:\Users\user\AppData\Roaming\cnWCiicEpxW.exe TID: 6080Thread sleep time: -99485s >= -30000s
                Source: C:\Users\user\AppData\Roaming\cnWCiicEpxW.exe TID: 6080Thread sleep time: -99344s >= -30000s
                Source: C:\Users\user\AppData\Roaming\cnWCiicEpxW.exe TID: 6080Thread sleep time: -99234s >= -30000s
                Source: C:\Users\user\AppData\Roaming\cnWCiicEpxW.exe TID: 6080Thread sleep time: -99105s >= -30000s
                Source: C:\Users\user\AppData\Roaming\cnWCiicEpxW.exe TID: 6080Thread sleep time: -98981s >= -30000s
                Source: C:\Users\user\AppData\Roaming\cnWCiicEpxW.exe TID: 6080Thread sleep time: -98793s >= -30000s
                Source: C:\Users\user\AppData\Roaming\cnWCiicEpxW.exe TID: 6080Thread sleep time: -98670s >= -30000s
                Source: C:\Users\user\AppData\Roaming\cnWCiicEpxW.exe TID: 6080Thread sleep time: -98562s >= -30000s
                Source: C:\Users\user\AppData\Roaming\cnWCiicEpxW.exe TID: 6080Thread sleep time: -98452s >= -30000s
                Source: C:\Users\user\AppData\Roaming\cnWCiicEpxW.exe TID: 6080Thread sleep time: -98328s >= -30000s
                Source: C:\Users\user\AppData\Roaming\cnWCiicEpxW.exe TID: 6080Thread sleep time: -98198s >= -30000s
                Source: C:\Users\user\AppData\Roaming\cnWCiicEpxW.exe TID: 6080Thread sleep time: -98004s >= -30000s
                Source: C:\Users\user\AppData\Roaming\cnWCiicEpxW.exe TID: 6080Thread sleep time: -97860s >= -30000s
                Source: C:\Users\user\AppData\Roaming\cnWCiicEpxW.exe TID: 6080Thread sleep time: -97718s >= -30000s
                Source: C:\Users\user\AppData\Roaming\cnWCiicEpxW.exe TID: 6080Thread sleep time: -97609s >= -30000s
                Source: C:\Users\user\AppData\Roaming\cnWCiicEpxW.exe TID: 6080Thread sleep time: -97500s >= -30000s
                Source: C:\Users\user\AppData\Roaming\cnWCiicEpxW.exe TID: 6080Thread sleep time: -97390s >= -30000s
                Source: C:\Users\user\AppData\Roaming\cnWCiicEpxW.exe TID: 6080Thread sleep time: -97281s >= -30000s
                Source: C:\Users\user\AppData\Roaming\cnWCiicEpxW.exe TID: 6080Thread sleep time: -97172s >= -30000s
                Source: C:\Users\user\AppData\Roaming\cnWCiicEpxW.exe TID: 6080Thread sleep time: -97058s >= -30000s
                Source: C:\Users\user\AppData\Roaming\cnWCiicEpxW.exe TID: 6080Thread sleep time: -96920s >= -30000s
                Source: C:\Users\user\AppData\Roaming\cnWCiicEpxW.exe TID: 6080Thread sleep time: -96808s >= -30000s
                Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                Source: C:\Users\user\AppData\Roaming\cnWCiicEpxW.exeLast function: Thread delayed
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeThread delayed: delay time: 922337203685477
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeThread delayed: delay time: 922337203685477
                Source: C:\Users\user\AppData\Roaming\cnWCiicEpxW.exeThread delayed: delay time: 922337203685477
                Source: C:\Users\user\AppData\Roaming\cnWCiicEpxW.exeThread delayed: delay time: 922337203685477
                Source: C:\Users\user\AppData\Roaming\cnWCiicEpxW.exeThread delayed: delay time: 922337203685477
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeWindow / User API: threadDelayed 9568
                Source: C:\Users\user\AppData\Roaming\cnWCiicEpxW.exeWindow / User API: threadDelayed 9400
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                Source: C:\Users\user\AppData\Roaming\cnWCiicEpxW.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                Source: C:\Users\user\AppData\Roaming\cnWCiicEpxW.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeProcess information queried: ProcessInformation
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeThread delayed: delay time: 922337203685477
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeThread delayed: delay time: 922337203685477
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeThread delayed: delay time: 100000
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeThread delayed: delay time: 99887
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeThread delayed: delay time: 99759
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeThread delayed: delay time: 99635
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeThread delayed: delay time: 99515
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeThread delayed: delay time: 99406
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeThread delayed: delay time: 99296
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeThread delayed: delay time: 99186
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeThread delayed: delay time: 99077
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeThread delayed: delay time: 98968
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeThread delayed: delay time: 98859
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeThread delayed: delay time: 98747
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeThread delayed: delay time: 98624
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeThread delayed: delay time: 98510
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeThread delayed: delay time: 98380
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeThread delayed: delay time: 98203
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeThread delayed: delay time: 97732
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeThread delayed: delay time: 97608
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeThread delayed: delay time: 97484
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeThread delayed: delay time: 97364
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeThread delayed: delay time: 97203
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeThread delayed: delay time: 97062
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeThread delayed: delay time: 96922
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeThread delayed: delay time: 96578
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeThread delayed: delay time: 96452
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeThread delayed: delay time: 96310
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeThread delayed: delay time: 96109
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeThread delayed: delay time: 95968
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeThread delayed: delay time: 95832
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeThread delayed: delay time: 95715
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeThread delayed: delay time: 95562
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeThread delayed: delay time: 94406
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeThread delayed: delay time: 93250
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeThread delayed: delay time: 93062
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeThread delayed: delay time: 91250
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeThread delayed: delay time: 91000
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeThread delayed: delay time: 90843
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeThread delayed: delay time: 90684
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeThread delayed: delay time: 90562
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeThread delayed: delay time: 90452
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeThread delayed: delay time: 90343
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeThread delayed: delay time: 90202
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeThread delayed: delay time: 90078
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeThread delayed: delay time: 89945
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeThread delayed: delay time: 89827
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeThread delayed: delay time: 89703
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeThread delayed: delay time: 89589
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeThread delayed: delay time: 89466
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeThread delayed: delay time: 89356
                Source: C:\Users\user\AppData\Roaming\cnWCiicEpxW.exeThread delayed: delay time: 922337203685477
                Source: C:\Users\user\AppData\Roaming\cnWCiicEpxW.exeThread delayed: delay time: 922337203685477
                Source: C:\Users\user\AppData\Roaming\cnWCiicEpxW.exeThread delayed: delay time: 922337203685477
                Source: C:\Users\user\AppData\Roaming\cnWCiicEpxW.exeThread delayed: delay time: 100000
                Source: C:\Users\user\AppData\Roaming\cnWCiicEpxW.exeThread delayed: delay time: 99859
                Source: C:\Users\user\AppData\Roaming\cnWCiicEpxW.exeThread delayed: delay time: 99703
                Source: C:\Users\user\AppData\Roaming\cnWCiicEpxW.exeThread delayed: delay time: 99588
                Source: C:\Users\user\AppData\Roaming\cnWCiicEpxW.exeThread delayed: delay time: 99485
                Source: C:\Users\user\AppData\Roaming\cnWCiicEpxW.exeThread delayed: delay time: 99344
                Source: C:\Users\user\AppData\Roaming\cnWCiicEpxW.exeThread delayed: delay time: 99234
                Source: C:\Users\user\AppData\Roaming\cnWCiicEpxW.exeThread delayed: delay time: 99105
                Source: C:\Users\user\AppData\Roaming\cnWCiicEpxW.exeThread delayed: delay time: 98981
                Source: C:\Users\user\AppData\Roaming\cnWCiicEpxW.exeThread delayed: delay time: 98793
                Source: C:\Users\user\AppData\Roaming\cnWCiicEpxW.exeThread delayed: delay time: 98670
                Source: C:\Users\user\AppData\Roaming\cnWCiicEpxW.exeThread delayed: delay time: 98562
                Source: C:\Users\user\AppData\Roaming\cnWCiicEpxW.exeThread delayed: delay time: 98452
                Source: C:\Users\user\AppData\Roaming\cnWCiicEpxW.exeThread delayed: delay time: 98328
                Source: C:\Users\user\AppData\Roaming\cnWCiicEpxW.exeThread delayed: delay time: 98198
                Source: C:\Users\user\AppData\Roaming\cnWCiicEpxW.exeThread delayed: delay time: 98004
                Source: C:\Users\user\AppData\Roaming\cnWCiicEpxW.exeThread delayed: delay time: 97860
                Source: C:\Users\user\AppData\Roaming\cnWCiicEpxW.exeThread delayed: delay time: 97718
                Source: C:\Users\user\AppData\Roaming\cnWCiicEpxW.exeThread delayed: delay time: 97609
                Source: C:\Users\user\AppData\Roaming\cnWCiicEpxW.exeThread delayed: delay time: 97500
                Source: C:\Users\user\AppData\Roaming\cnWCiicEpxW.exeThread delayed: delay time: 97390
                Source: C:\Users\user\AppData\Roaming\cnWCiicEpxW.exeThread delayed: delay time: 97281
                Source: C:\Users\user\AppData\Roaming\cnWCiicEpxW.exeThread delayed: delay time: 97172
                Source: C:\Users\user\AppData\Roaming\cnWCiicEpxW.exeThread delayed: delay time: 97058
                Source: C:\Users\user\AppData\Roaming\cnWCiicEpxW.exeThread delayed: delay time: 96920
                Source: C:\Users\user\AppData\Roaming\cnWCiicEpxW.exeThread delayed: delay time: 96808
                Source: cnWCiicEpxW.exe, 00000015.00000002.415707967.0000000002B71000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: VMware SVGA IIOData Source=localhost\sqlexpress;Initial Catalog=dbSMS;Integrated Security=True
                Source: cnWCiicEpxW.exe, 00000015.00000002.415707967.0000000002B71000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: vmware
                Source: cnWCiicEpxW.exe, 00000015.00000002.415707967.0000000002B71000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: C:\PROGRAM FILES\VMWARE\VMWARE TOOLS\
                Source: cnWCiicEpxW.exe, 00000015.00000002.415707967.0000000002B71000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: SOFTWARE\VMware, Inc.\VMware Tools
                Source: SHIPMENT DOCUMENTS.exe, 00000014.00000003.397543098.000000000660B000.00000004.00000800.00020000.00000000.sdmp, SHIPMENT DOCUMENTS.exe, 00000014.00000002.546575639.000000000660D000.00000004.00000800.00020000.00000000.sdmp, SHIPMENT DOCUMENTS.exe, 00000014.00000003.396165041.000000000660E000.00000004.00000800.00020000.00000000.sdmp, SHIPMENT DOCUMENTS.exe, 00000014.00000002.518569851.00000000010E0000.00000004.00000020.00020000.00000000.sdmp, SHIPMENT DOCUMENTS.exe, 00000014.00000003.400776216.000000000660B000.00000004.00000800.00020000.00000000.sdmp, SHIPMENT DOCUMENTS.exe, 00000014.00000003.396428303.0000000006606000.00000004.00000800.00020000.00000000.sdmp, SHIPMENT DOCUMENTS.exe, 00000014.00000003.408594188.000000000660D000.00000004.00000800.00020000.00000000.sdmp, SHIPMENT DOCUMENTS.exe, 00000014.00000003.397431025.000000000660B000.00000004.00000800.00020000.00000000.sdmp, SHIPMENT DOCUMENTS.exe, 00000014.00000003.397802691.000000000660B000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
                Source: cnWCiicEpxW.exe, 00000015.00000002.415707967.0000000002B71000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: VMWARE
                Source: cnWCiicEpxW.exe, 00000015.00000002.415707967.0000000002B71000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: InstallPath%C:\PROGRAM FILES\VMWARE\VMWARE TOOLS\
                Source: cnWCiicEpxW.exe, 00000015.00000002.415707967.0000000002B71000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: VMWARE"SOFTWARE\VMware, Inc.\VMware ToolsLHARDWARE\DEVICEMAP\Scsi\Scsi Port 1\Scsi Bus 0\Target Id 0\Logical Unit Id 0LHARDWARE\DEVICEMAP\Scsi\Scsi Port 2\Scsi Bus 0\Target Id 0\Logical Unit Id 0'SYSTEM\ControlSet001\Services\Disk\Enum
                Source: cnWCiicEpxW.exe, 00000015.00000002.415707967.0000000002B71000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: VMware SVGA II
                Source: cnWCiicEpxW.exe, 00000015.00000002.415707967.0000000002B71000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: vmwareNSYSTEM\ControlSet001\Control\Class\{4D36E968-E325-11CE-BFC1-08002BE10318}\0000
                Source: cnWCiicEpxW.exe, 0000001B.00000003.494475191.00000000013BE000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
                Source: SHIPMENT DOCUMENTS.exe, 00000014.00000003.393067640.00000000010F0000.00000004.00000020.00020000.00000000.sdmp, SHIPMENT DOCUMENTS.exe, 00000014.00000003.387644774.00000000010D8000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll__
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeProcess token adjusted: Debug
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeProcess token adjusted: Debug
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeMemory allocated: page read and write | page guard

                HIPS / PFW / Operating System Protection Evasion

                barindex
                Source: SHIPMENT DOCUMENTS.exe, u8Kw867S61naurO56Y/I7QTkd9Ynf3eywmg2Z.csReference to suspicious API methods: ('LU7BJiCwx1', 'GetProcAddress@kernel32'), ('I49BKhrl98', 'LoadLibrary@kernel32')
                Source: cnWCiicEpxW.exe.0.dr, u8Kw867S61naurO56Y/I7QTkd9Ynf3eywmg2Z.csReference to suspicious API methods: ('LU7BJiCwx1', 'GetProcAddress@kernel32'), ('I49BKhrl98', 'LoadLibrary@kernel32')
                Source: 0.0.SHIPMENT DOCUMENTS.exe.910000.0.unpack, u8Kw867S61naurO56Y/I7QTkd9Ynf3eywmg2Z.csReference to suspicious API methods: ('LU7BJiCwx1', 'GetProcAddress@kernel32'), ('I49BKhrl98', 'LoadLibrary@kernel32')
                Source: 20.0.SHIPMENT DOCUMENTS.exe.400000.0.unpack, A/C1.csReference to suspicious API methods: ('A', 'VirtualAllocExNuma@kernel32.dll')
                Source: 20.0.SHIPMENT DOCUMENTS.exe.400000.0.unpack, A/e2.csReference to suspicious API methods: ('A', 'MapVirtualKey@user32.dll')
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeMemory written: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exe base: 400000 value starts with: 4D5A
                Source: C:\Users\user\AppData\Roaming\cnWCiicEpxW.exeMemory written: C:\Users\user\AppData\Roaming\cnWCiicEpxW.exe base: 400000 value starts with: 4D5A
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeProcess created: C:\Windows\SysWOW64\schtasks.exe C:\Windows\System32\schtasks.exe" /Create /TN "Updates\cnWCiicEpxW" /XML "C:\Users\user\AppData\Local\Temp\tmp2A80.tmp
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeProcess created: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exe {path}
                Source: C:\Users\user\AppData\Roaming\cnWCiicEpxW.exeProcess created: C:\Windows\SysWOW64\schtasks.exe C:\Windows\System32\schtasks.exe" /Create /TN "Updates\cnWCiicEpxW" /XML "C:\Users\user\AppData\Local\Temp\tmpC7C9.tmp
                Source: C:\Users\user\AppData\Roaming\cnWCiicEpxW.exeProcess created: C:\Users\user\AppData\Roaming\cnWCiicEpxW.exe {path}
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exe VolumeInformation
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\arial.ttf VolumeInformation
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\ariali.ttf VolumeInformation
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\arialbd.ttf VolumeInformation
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\arialbi.ttf VolumeInformation
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\ARIALN.TTF VolumeInformation
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\ariblk.ttf VolumeInformation
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\ARIALNI.TTF VolumeInformation
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\ARIALNB.TTF VolumeInformation
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\ARIALNBI.TTF VolumeInformation
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformation
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\calibri.ttf VolumeInformation
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\calibril.ttf VolumeInformation
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\calibrii.ttf VolumeInformation
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\calibrili.ttf VolumeInformation
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\calibrib.ttf VolumeInformation
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\calibriz.ttf VolumeInformation
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\cambria.ttc VolumeInformation
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\cambriai.ttf VolumeInformation
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\cambriab.ttf VolumeInformation
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\cambriaz.ttf VolumeInformation
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\Candara.ttf VolumeInformation
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\Candarai.ttf VolumeInformation
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\Candarab.ttf VolumeInformation
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\Candaraz.ttf VolumeInformation
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\comic.ttf VolumeInformation
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\comici.ttf VolumeInformation
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\comicbd.ttf VolumeInformation
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\comicz.ttf VolumeInformation
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\consola.ttf VolumeInformation
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\consolai.ttf VolumeInformation
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\consolab.ttf VolumeInformation
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\consolaz.ttf VolumeInformation
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\constan.ttf VolumeInformation
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\constani.ttf VolumeInformation
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\constanb.ttf VolumeInformation
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\constanz.ttf VolumeInformation
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\corbel.ttf VolumeInformation
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\corbeli.ttf VolumeInformation
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\corbelb.ttf VolumeInformation
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\corbelz.ttf VolumeInformation
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\cour.ttf VolumeInformation
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\couri.ttf VolumeInformation
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\courbd.ttf VolumeInformation
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\courbi.ttf VolumeInformation
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\ebrima.ttf VolumeInformation
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\ebrimabd.ttf VolumeInformation
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\framd.ttf VolumeInformation
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\FRADM.TTF VolumeInformation
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\framdit.ttf VolumeInformation
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\FRADMIT.TTF VolumeInformation
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\FRAMDCN.TTF VolumeInformation
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\FRADMCN.TTF VolumeInformation
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\FRAHV.TTF VolumeInformation
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\FRAHVIT.TTF VolumeInformation
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\Gabriola.ttf VolumeInformation
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\gadugi.ttf VolumeInformation
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\gadugib.ttf VolumeInformation
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\georgia.ttf VolumeInformation
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\georgiai.ttf VolumeInformation
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\georgiab.ttf VolumeInformation
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\georgiaz.ttf VolumeInformation
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\impact.ttf VolumeInformation
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\Inkfree.ttf VolumeInformation
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\javatext.ttf VolumeInformation
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\LeelawUI.ttf VolumeInformation
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\LeelUIsl.ttf VolumeInformation
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\LeelaUIb.ttf VolumeInformation
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\lucon.ttf VolumeInformation
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\l_10646.ttf VolumeInformation
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\malgun.ttf VolumeInformation
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\malgunsl.ttf VolumeInformation
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\malgunbd.ttf VolumeInformation
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\himalaya.ttf VolumeInformation
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\msjh.ttc VolumeInformation
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\msjhl.ttc VolumeInformation
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\msjhbd.ttc VolumeInformation
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\ntailu.ttf VolumeInformation
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\ntailub.ttf VolumeInformation
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\phagspa.ttf VolumeInformation
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\phagspab.ttf VolumeInformation
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformation
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\taile.ttf VolumeInformation
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\taileb.ttf VolumeInformation
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\msyh.ttc VolumeInformation
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\msyhl.ttc VolumeInformation
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\msyhbd.ttc VolumeInformation
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\msyi.ttf VolumeInformation
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\mingliub.ttc VolumeInformation
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\monbaiti.ttf VolumeInformation
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\msgothic.ttc VolumeInformation
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\mvboli.ttf VolumeInformation
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\mmrtext.ttf VolumeInformation
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\mmrtextb.ttf VolumeInformation
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\Nirmala.ttf VolumeInformation
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\NirmalaS.ttf VolumeInformation
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\NirmalaB.ttf VolumeInformation
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\pala.ttf VolumeInformation
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\palai.ttf VolumeInformation
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\palab.ttf VolumeInformation
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\palabi.ttf VolumeInformation
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\segoepr.ttf VolumeInformation
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\segoeprb.ttf VolumeInformation
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\segoesc.ttf VolumeInformation
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\segoescb.ttf VolumeInformation
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\segoeuii.ttf VolumeInformation
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\seguisli.ttf VolumeInformation
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\seguili.ttf VolumeInformation
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\seguisbi.ttf VolumeInformation
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\segoeuiz.ttf VolumeInformation
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\seguibl.ttf VolumeInformation
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\seguibli.ttf VolumeInformation
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\seguiemj.ttf VolumeInformation
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\seguihis.ttf VolumeInformation
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\seguisym.ttf VolumeInformation
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\simsun.ttc VolumeInformation
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\simsunb.ttf VolumeInformation
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\Sitka.ttc VolumeInformation
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\SitkaI.ttc VolumeInformation
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\SitkaB.ttc VolumeInformation
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\SitkaZ.ttc VolumeInformation
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\sylfaen.ttf VolumeInformation
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\symbol.ttf VolumeInformation
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\tahoma.ttf VolumeInformation
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\tahomabd.ttf VolumeInformation
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\timesi.ttf VolumeInformation
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\timesbd.ttf VolumeInformation
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\timesbi.ttf VolumeInformation
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\trebuc.ttf VolumeInformation
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\trebucit.ttf VolumeInformation
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\trebucbd.ttf VolumeInformation
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\trebucbi.ttf VolumeInformation
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\verdana.ttf VolumeInformation
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\verdanai.ttf VolumeInformation
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\verdanab.ttf VolumeInformation
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\verdanaz.ttf VolumeInformation
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\webdings.ttf VolumeInformation
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\wingding.ttf VolumeInformation
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\YuGothR.ttc VolumeInformation
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\YuGothM.ttc VolumeInformation
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\YuGothL.ttc VolumeInformation
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\YuGothB.ttc VolumeInformation
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\holomdl2.ttf VolumeInformation
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\CENTURY.TTF VolumeInformation
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\LEELAWAD.TTF VolumeInformation
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\LEELAWDB.TTF VolumeInformation
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\MSUIGHUR.TTF VolumeInformation
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\MSUIGHUB.TTF VolumeInformation
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\WINGDNG2.TTF VolumeInformation
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\WINGDNG3.TTF VolumeInformation
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\TEMPSITC.TTF VolumeInformation
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\PRISTINA.TTF VolumeInformation
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\PAPYRUS.TTF VolumeInformation
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\MISTRAL.TTF VolumeInformation
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\LHANDW.TTF VolumeInformation
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\ITCKRIST.TTF VolumeInformation
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\JUICE___.TTF VolumeInformation
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\FRSCRIPT.TTF VolumeInformation
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\FREESCPT.TTF VolumeInformation
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\BRADHITC.TTF VolumeInformation
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\OUTLOOK.TTF VolumeInformation
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\BKANT.TTF VolumeInformation
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\ANTQUAI.TTF VolumeInformation
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\ANTQUAB.TTF VolumeInformation
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\ANTQUABI.TTF VolumeInformation
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\GARA.TTF VolumeInformation
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\GARAIT.TTF VolumeInformation
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\GARABD.TTF VolumeInformation
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\MTCORSVA.TTF VolumeInformation
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\GOTHIC.TTF VolumeInformation
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\GOTHICI.TTF VolumeInformation
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\GOTHICB.TTF VolumeInformation
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\GOTHICBI.TTF VolumeInformation
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\ALGER.TTF VolumeInformation
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\BASKVILL.TTF VolumeInformation
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\BAUHS93.TTF VolumeInformation
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\BELL.TTF VolumeInformation
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\BELLI.TTF VolumeInformation
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\BELLB.TTF VolumeInformation
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\BRLNSR.TTF VolumeInformation
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\BRLNSDB.TTF VolumeInformation
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\BRLNSB.TTF VolumeInformation
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\BERNHC.TTF VolumeInformation
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\BOD_PSTC.TTF VolumeInformation
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\BRITANIC.TTF VolumeInformation
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\BROADW.TTF VolumeInformation
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\BRUSHSCI.TTF VolumeInformation
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\CALIFR.TTF VolumeInformation
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\CALIFI.TTF VolumeInformation
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\CALIFB.TTF VolumeInformation
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\CENTAUR.TTF VolumeInformation
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\CHILLER.TTF VolumeInformation
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\COLONNA.TTF VolumeInformation
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\COOPBL.TTF VolumeInformation
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\FTLTLT.TTF VolumeInformation
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\HARLOWSI.TTF VolumeInformation
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\HARNGTON.TTF VolumeInformation
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\HTOWERT.TTF VolumeInformation
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\HTOWERTI.TTF VolumeInformation
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\JOKERMAN.TTF VolumeInformation
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\KUNSTLER.TTF VolumeInformation
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\LBRITE.TTF VolumeInformation
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\LBRITED.TTF VolumeInformation
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\LBRITEI.TTF VolumeInformation
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\LBRITEDI.TTF VolumeInformation
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\LCALLIG.TTF VolumeInformation
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\LFAX.TTF VolumeInformation
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\LFAXD.TTF VolumeInformation
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\LFAXI.TTF VolumeInformation
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\LFAXDI.TTF VolumeInformation
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\MAGNETOB.TTF VolumeInformation
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\MATURASC.TTF VolumeInformation
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\MOD20.TTF VolumeInformation
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\NIAGENG.TTF VolumeInformation
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\NIAGSOL.TTF VolumeInformation
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\OLDENGL.TTF VolumeInformation
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\ONYX.TTF VolumeInformation
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\PARCHM.TTF VolumeInformation
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\PLAYBILL.TTF VolumeInformation
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\POORICH.TTF VolumeInformation
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\RAVIE.TTF VolumeInformation
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\INFROMAN.TTF VolumeInformation
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\SHOWG.TTF VolumeInformation
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\SNAP____.TTF VolumeInformation
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\STENCIL.TTF VolumeInformation
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\VINERITC.TTF VolumeInformation
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\VIVALDII.TTF VolumeInformation
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\VLADIMIR.TTF VolumeInformation
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\LATINWD.TTF VolumeInformation
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\TCM_____.TTF VolumeInformation
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\TCMI____.TTF VolumeInformation
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\TCB_____.TTF VolumeInformation
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\TCBI____.TTF VolumeInformation
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\TCCM____.TTF VolumeInformation
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\TCCB____.TTF VolumeInformation
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\TCCEB.TTF VolumeInformation
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\SCRIPTBL.TTF VolumeInformation
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\ROCK.TTF VolumeInformation
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\ROCKI.TTF VolumeInformation
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\ROCKB.TTF VolumeInformation
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\ROCKEB.TTF VolumeInformation
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\ROCKBI.TTF VolumeInformation
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\ROCC____.TTF VolumeInformation
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\ROCCB___.TTF VolumeInformation
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\RAGE.TTF VolumeInformation
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\PERTILI.TTF VolumeInformation
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\PERTIBD.TTF VolumeInformation
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\PER_____.TTF VolumeInformation
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\PERI____.TTF VolumeInformation
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\PERB____.TTF VolumeInformation
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\PERBI___.TTF VolumeInformation
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\PALSCRI.TTF VolumeInformation
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\OCRAEXT.TTF VolumeInformation
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\MAIAN.TTF VolumeInformation
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\LTYPE.TTF VolumeInformation
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\LTYPEO.TTF VolumeInformation
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\LTYPEB.TTF VolumeInformation
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\LTYPEBO.TTF VolumeInformation
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\LSANS.TTF VolumeInformation
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\LSANSD.TTF VolumeInformation
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\LSANSI.TTF VolumeInformation
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\LSANSDI.TTF VolumeInformation
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\IMPRISHA.TTF VolumeInformation
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\HATTEN.TTF VolumeInformation
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\GOUDYSTO.TTF VolumeInformation
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\GOUDOS.TTF VolumeInformation
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\GOUDOSI.TTF VolumeInformation
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\GOUDOSB.TTF VolumeInformation
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\GLECB.TTF VolumeInformation
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\GIL_____.TTF VolumeInformation
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\GILI____.TTF VolumeInformation
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\GILB____.TTF VolumeInformation
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\GILBI___.TTF VolumeInformation
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\GILC____.TTF VolumeInformation
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\GLSNECB.TTF VolumeInformation
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\GIGI.TTF VolumeInformation
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\FRABK.TTF VolumeInformation
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\FRABKIT.TTF VolumeInformation
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\FORTE.TTF VolumeInformation
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\FELIXTI.TTF VolumeInformation
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\ERASMD.TTF VolumeInformation
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\ERASLGHT.TTF VolumeInformation
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\ERASDEMI.TTF VolumeInformation
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\ERASBD.TTF VolumeInformation
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\ENGR.TTF VolumeInformation
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\ELEPHNT.TTF VolumeInformation
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\ELEPHNTI.TTF VolumeInformation
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\ITCEDSCR.TTF VolumeInformation
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\CURLZ___.TTF VolumeInformation
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\COPRGTL.TTF VolumeInformation
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\COPRGTB.TTF VolumeInformation
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\CENSCBK.TTF VolumeInformation
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\SCHLBKI.TTF VolumeInformation
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\SCHLBKB.TTF VolumeInformation
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\SCHLBKBI.TTF VolumeInformation
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\CASTELAR.TTF VolumeInformation
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\CALIST.TTF VolumeInformation
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\CALISTI.TTF VolumeInformation
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\CALISTB.TTF VolumeInformation
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\CALISTBI.TTF VolumeInformation
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\BOOKOS.TTF VolumeInformation
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\BOOKOSB.TTF VolumeInformation
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\BOOKOSI.TTF VolumeInformation
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\BOOKOSBI.TTF VolumeInformation
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\BOD_R.TTF VolumeInformation
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\BOD_I.TTF VolumeInformation
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\BOD_B.TTF VolumeInformation
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\BOD_BI.TTF VolumeInformation
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\BOD_CR.TTF VolumeInformation
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\BOD_BLAR.TTF VolumeInformation
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\BOD_CI.TTF VolumeInformation
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\BOD_CB.TTF VolumeInformation
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\BOD_BLAI.TTF VolumeInformation
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\BOD_CBI.TTF VolumeInformation
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\ITCBLKAD.TTF VolumeInformation
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\ARLRDBD.TTF VolumeInformation
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\AGENCYR.TTF VolumeInformation
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\AGENCYB.TTF VolumeInformation
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\BSSYM7.TTF VolumeInformation
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\REFSAN.TTF VolumeInformation
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\REFSPCL.TTF VolumeInformation
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\MTEXTRA.TTF VolumeInformation
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\marlett.ttf VolumeInformation
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\segoeuii.ttf VolumeInformation
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\segoeuiz.ttf VolumeInformation
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformation
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exe VolumeInformation
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformation
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformation
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformation
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Management.dll VolumeInformation
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
                Source: C:\Users\user\AppData\Roaming\cnWCiicEpxW.exeQueries volume information: C:\Users\user\AppData\Roaming\cnWCiicEpxW.exe VolumeInformation
                Source: C:\Users\user\AppData\Roaming\cnWCiicEpxW.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
                Source: C:\Users\user\AppData\Roaming\cnWCiicEpxW.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
                Source: C:\Users\user\AppData\Roaming\cnWCiicEpxW.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
                Source: C:\Users\user\AppData\Roaming\cnWCiicEpxW.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
                Source: C:\Users\user\AppData\Roaming\cnWCiicEpxW.exeQueries volume information: C:\Users\user\AppData\Roaming\cnWCiicEpxW.exe VolumeInformation
                Source: C:\Users\user\AppData\Roaming\cnWCiicEpxW.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
                Source: C:\Users\user\AppData\Roaming\cnWCiicEpxW.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
                Source: C:\Users\user\AppData\Roaming\cnWCiicEpxW.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformation
                Source: C:\Users\user\AppData\Roaming\cnWCiicEpxW.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformation
                Source: C:\Users\user\AppData\Roaming\cnWCiicEpxW.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformation
                Source: C:\Users\user\AppData\Roaming\cnWCiicEpxW.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Management.dll VolumeInformation
                Source: C:\Users\user\AppData\Roaming\cnWCiicEpxW.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
                Source: C:\Users\user\AppData\Roaming\cnWCiicEpxW.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid

                Stealing of Sensitive Information

                barindex
                Source: Yara matchFile source: 20.0.SHIPMENT DOCUMENTS.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.SHIPMENT DOCUMENTS.exe.3d715a0.1.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.SHIPMENT DOCUMENTS.exe.3d715a0.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.SHIPMENT DOCUMENTS.exe.3ea28e8.2.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000014.00000000.301553016.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000002.309368123.0000000003DCC000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000002.308207563.0000000003CA9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: SHIPMENT DOCUMENTS.exe PID: 3192, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: SHIPMENT DOCUMENTS.exe PID: 3244, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: cnWCiicEpxW.exe PID: 3132, type: MEMORYSTR
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.ini
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.ini
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeKey opened: HKEY_CURRENT_USER\Software\IncrediMail\Identities
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676
                Source: C:\Users\user\AppData\Roaming\cnWCiicEpxW.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.ini
                Source: C:\Users\user\AppData\Roaming\cnWCiicEpxW.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.ini
                Source: C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Martin Prikryl\WinSCP 2\Sessions
                Source: C:\Users\user\AppData\Roaming\cnWCiicEpxW.exeFile opened: C:\Users\user\AppData\Roaming\FileZilla\recentservers.xml
                Source: C:\Users\user\AppData\Roaming\cnWCiicEpxW.exeFile opened: C:\Users\user\AppData\Roaming\SmartFTP\Client 2.0\Favorites\Quick Connect\
                Source: C:\Users\user\AppData\Roaming\cnWCiicEpxW.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login Data
                Source: C:\Users\user\AppData\Roaming\cnWCiicEpxW.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.ini
                Source: Yara matchFile source: 0000001B.00000002.528419495.0000000003164000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000001B.00000002.525674867.0000000003111000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000014.00000002.522417697.0000000002EF1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000014.00000002.524431731.0000000002F44000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: SHIPMENT DOCUMENTS.exe PID: 3244, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: cnWCiicEpxW.exe PID: 3132, type: MEMORYSTR

                Remote Access Functionality

                barindex
                Source: Yara matchFile source: 20.0.SHIPMENT DOCUMENTS.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.SHIPMENT DOCUMENTS.exe.3d715a0.1.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.SHIPMENT DOCUMENTS.exe.3d715a0.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.SHIPMENT DOCUMENTS.exe.3ea28e8.2.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000014.00000000.301553016.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000002.309368123.0000000003DCC000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000002.308207563.0000000003CA9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: SHIPMENT DOCUMENTS.exe PID: 3192, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: SHIPMENT DOCUMENTS.exe PID: 3244, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: cnWCiicEpxW.exe PID: 3132, type: MEMORYSTR
                Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
                Valid Accounts211
                Windows Management Instrumentation
                1
                Scheduled Task/Job
                111
                Process Injection
                1
                Disable or Modify Tools
                2
                OS Credential Dumping
                1
                File and Directory Discovery
                Remote Services11
                Archive Collected Data
                Exfiltration Over Other Network Medium1
                Ingress Tool Transfer
                Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
                Default Accounts1
                Native API
                Boot or Logon Initialization Scripts1
                Scheduled Task/Job
                1
                Deobfuscate/Decode Files or Information
                1
                Credentials in Registry
                114
                System Information Discovery
                Remote Desktop Protocol2
                Data from Local System
                Exfiltration Over Bluetooth11
                Encrypted Channel
                Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
                Domain Accounts1
                Scheduled Task/Job
                Logon Script (Windows)Logon Script (Windows)2
                Obfuscated Files or Information
                Security Account Manager1
                Query Registry
                SMB/Windows Admin Shares1
                Email Collection
                Automated Exfiltration1
                Non-Standard Port
                Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
                Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)23
                Software Packing
                NTDS311
                Security Software Discovery
                Distributed Component Object ModelInput CaptureScheduled Transfer2
                Non-Application Layer Protocol
                SIM Card SwapCarrier Billing Fraud
                Cloud AccountsCronNetwork Logon ScriptNetwork Logon Script1
                Masquerading
                LSA Secrets1
                Process Discovery
                SSHKeyloggingData Transfer Size Limits23
                Application Layer Protocol
                Manipulate Device CommunicationManipulate App Store Rankings or Ratings
                Replication Through Removable MediaLaunchdRc.commonRc.common131
                Virtualization/Sandbox Evasion
                Cached Domain Credentials131
                Virtualization/Sandbox Evasion
                VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
                External Remote ServicesScheduled TaskStartup ItemsStartup Items111
                Process Injection
                DCSync1
                Application Window Discovery
                Windows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
                Drive-by CompromiseCommand and Scripting InterpreterScheduled Task/JobScheduled Task/JobIndicator Removal from ToolsProc Filesystem1
                Remote System Discovery
                Shared WebrootCredential API HookingExfiltration Over Symmetric Encrypted Non-C2 ProtocolApplication Layer ProtocolDowngrade to Insecure ProtocolsGenerate Fraudulent Advertising Revenue
                Exploit Public-Facing ApplicationPowerShellAt (Linux)At (Linux)Masquerading/etc/passwd and /etc/shadow1
                System Network Configuration Discovery
                Software Deployment ToolsData StagedExfiltration Over Asymmetric Encrypted Non-C2 ProtocolWeb ProtocolsRogue Cellular Base StationData Destruction
                Hide Legend

                Legend:

                • Process
                • Signature
                • Created File
                • DNS/IP Info
                • Is Dropped
                • Is Windows Process
                • Number of created Registry Values
                • Number of created Files
                • Visual Basic
                • Delphi
                • Java
                • .Net C# or VB.NET
                • C, C++ or other language
                • Is malicious
                • Internet
                behaviorgraph top1 signatures2 2 Behavior Graph ID: 756110 Sample: SHIPMENT DOCUMENTS.exe Startdate: 29/11/2022 Architecture: WINDOWS Score: 100 43 Malicious sample detected (through community Yara rule) 2->43 45 Sigma detected: Scheduled temp file as task from temp location 2->45 47 Multi AV Scanner detection for submitted file 2->47 49 13 other signatures 2->49 7 cnWCiicEpxW.exe 5 2->7         started        10 SHIPMENT DOCUMENTS.exe 6 2->10         started        process3 file4 51 Multi AV Scanner detection for dropped file 7->51 53 Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines) 7->53 55 May check the online IP address of the machine 7->55 59 2 other signatures 7->59 13 cnWCiicEpxW.exe 14 3 7->13         started        17 schtasks.exe 1 7->17         started        27 C:\Users\user\AppData\...\cnWCiicEpxW.exe, PE32 10->27 dropped 29 C:\Users\user\AppData\Local\...\tmp2A80.tmp, XML 10->29 dropped 31 C:\Users\user\...\SHIPMENT DOCUMENTS.exe.log, ASCII 10->31 dropped 57 Injects a PE file into a foreign processes 10->57 19 SHIPMENT DOCUMENTS.exe 15 3 10->19         started        21 schtasks.exe 1 10->21         started        signatures5 process6 dnsIp7 33 3.232.242.170, 443, 49738 AMAZON-AESUS United States 13->33 35 api.ipify.org 13->35 61 Tries to steal Mail credentials (via file / registry access) 13->61 63 Tries to harvest and steal ftp login credentials 13->63 65 Tries to harvest and steal browser information (history, passwords, etc) 13->65 23 conhost.exe 17->23         started        37 mail.southernboilers.org 199.79.62.12, 49721, 49743, 587 PUBLIC-DOMAIN-REGISTRYUS United States 19->37 39 api.ipify.org.herokudns.com 52.20.78.240, 443, 49713 AMAZON-AESUS United States 19->39 41 2 other IPs or domains 19->41 67 Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc) 19->67 25 conhost.exe 21->25         started        signatures8 process9

                This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                windows-stand
                SourceDetectionScannerLabelLink
                SHIPMENT DOCUMENTS.exe36%VirustotalBrowse
                SHIPMENT DOCUMENTS.exe32%ReversingLabsWin32.Trojan.Woreflint
                SHIPMENT DOCUMENTS.exe100%Joe Sandbox ML
                SourceDetectionScannerLabelLink
                C:\Users\user\AppData\Roaming\cnWCiicEpxW.exe100%Joe Sandbox ML
                C:\Users\user\AppData\Roaming\cnWCiicEpxW.exe32%ReversingLabsWin32.Trojan.Woreflint
                SourceDetectionScannerLabelLinkDownload
                20.0.SHIPMENT DOCUMENTS.exe.400000.0.unpack100%AviraTR/Spy.Gen8Download File
                SourceDetectionScannerLabelLink
                mail.southernboilers.org0%VirustotalBrowse
                SourceDetectionScannerLabelLink
                http://www.certplus.com/CRL/class3.crl00%URL Reputationsafe
                http://www.e-me.lv/repository00%URL Reputationsafe
                http://www.acabogacia.org/doc00%URL Reputationsafe
                http://crl.chambersign.org/chambersroot.crl00%URL Reputationsafe
                http://ocsp.suscerte.gob.ve00%URL Reputationsafe
                http://www.postsignum.cz/crl/psrootqca2.crl020%URL Reputationsafe
                http://crl.dhimyotis.com/certignarootca.crl00%URL Reputationsafe
                http://www.chambersign.org10%URL Reputationsafe
                http://www.pkioverheid.nl/policies/root-policy00%URL Reputationsafe
                http://www.suscerte.gob.ve/lcr0#0%URL Reputationsafe
                http://ca2.mtin.es/mtin/crl/MTINAutoridadRaiz00%URL Reputationsafe
                http://crl.ssc.lt/root-c/cacrl.crl00%URL Reputationsafe
                http://postsignum.ttc.cz/crl/psrootqca2.crl00%URL Reputationsafe
                http://www.trustcenter.de/crl/v2/tc_class_3_ca_II.crl0%URL Reputationsafe
                http://127.0.0.1:HTTP/1.10%Avira URL Cloudsafe
                http://ca.disig.sk/ca/crl/ca_disig.crl00%URL Reputationsafe
                http://crl1.comsign.co.il/crl/comsignglobalrootca.crl00%URL Reputationsafe
                http://www.certplus.com/CRL/class3P.crl00%URL Reputationsafe
                http://www.sajatypeworks.com0%URL Reputationsafe
                http://www.founder.com.cn/cn/cThe0%URL Reputationsafe
                http://www.suscerte.gob.ve/dpc00%URL Reputationsafe
                http://www.certplus.com/CRL/class2.crl00%URL Reputationsafe
                http://www.disig.sk/ca/crl/ca_disig.crl00%URL Reputationsafe
                http://www.defence.gov.au/pki00%URL Reputationsafe
                http://www.galapagosdesign.com/DPlease0%URL Reputationsafe
                http://www.sk.ee/cps/00%URL Reputationsafe
                http://www.urwpp.deDPlease0%URL Reputationsafe
                http://www.zhongyicts.com.cn0%URL Reputationsafe
                http://cps.root-x1.letsencrypt.org00%URL Reputationsafe
                http://policy.camerfirma.com00%URL Reputationsafe
                http://www.ssc.lt/cps030%URL Reputationsafe
                http://ocsp.pki.gva.es00%URL Reputationsafe
                http://acraiz.icpbrasil.gov.br/DPCacraiz.pdf0?0%URL Reputationsafe
                http://ca.mtin.es/mtin/ocsp00%URL Reputationsafe
                http://cps.letsencrypt.org00%URL Reputationsafe
                http://crl.ssc.lt/root-b/cacrl.crl00%URL Reputationsafe
                http://web.ncdc.gov.sa/crl/nrcacomb1.crl00%URL Reputationsafe
                http://www.uce.gub.uy/informacion-tecnica/politicas/cp_acrn.pdf0G0%URL Reputationsafe
                https://wwww.certigna.fr/autorites/0m0%URL Reputationsafe
                http://www.dnie.es/dpc00%URL Reputationsafe
                http://www.ica.co.il/repository/cps/PersonalID_Practice_Statement.pdf00%URL Reputationsafe
                https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.ziphttps://www0%URL Reputationsafe
                http://ca.mtin.es/mtin/DPCyPoliticas00%URL Reputationsafe
                http://www.globaltrust.info00%URL Reputationsafe
                http://www.certplus.com/CRL/class3TS.crl00%URL Reputationsafe
                http://crl.microsoft.0%URL Reputationsafe
                http://www.carterandcone.coml0%URL Reputationsafe
                http://ac.economia.gob.mx/last.crl0G0%URL Reputationsafe
                https://www.catcert.net/verarrel0%URL Reputationsafe
                http://www.disig.sk/ca0f0%URL Reputationsafe
                http://www.globaltrust.info0=0%Avira URL Cloudsafe
                http://www.sk.ee/juur/crl/00%URL Reputationsafe
                http://crl.chambersign.org/chambersignroot.crl00%URL Reputationsafe
                http://crl.xrampsecurity.com/XGCA.crl00%URL Reputationsafe
                http://certs.oati.net/repository/OATICA2.crl00%URL Reputationsafe
                http://crl.oces.trust2408.com/oces.crl00%URL Reputationsafe
                http://www.quovadis.bm00%URL Reputationsafe
                http://crl.ssc.lt/root-a/cacrl.crl00%URL Reputationsafe
                http://certs.oaticerts.com/repository/OATICA2.crl0%URL Reputationsafe
                http://www.trustdst.com/certificates/policy/ACES-index.html00%URL Reputationsafe
                http://certs.oati.net/repository/OATICA2.crt00%URL Reputationsafe
                https://9psarY6l5Bj.org0%Avira URL Cloudsafe
                http://mail.southernboilers.org0%Avira URL Cloudsafe
                http://bvQtmz.com0%Avira URL Cloudsafe
                http://www.accv.es000%URL Reputationsafe
                http://www.pkioverheid.nl/policies/root-policy-G200%URL Reputationsafe
                https://www.netlock.net/docs0%URL Reputationsafe
                http://www.e-trust.be/CPS/QNcerts0%URL Reputationsafe
                http://ocsp.ncdc.gov.sa00%URL Reputationsafe
                http://fedir.comsign.co.il/crl/ComSignCA.crl00%URL Reputationsafe
                http://trustcenter-crl.certificat2.com/Keynectis/KEYNECTIS_ROOT_CA.crl00%URL Reputationsafe
                http://web.ncdc.gov.sa/crl/nrcaparta1.crl0%URL Reputationsafe
                http://www.founder.com.cn/cn/bThe0%URL Reputationsafe
                NameIPActiveMaliciousAntivirus DetectionReputation
                mail.southernboilers.org
                199.79.62.12
                truefalseunknown
                api.ipify.org.herokudns.com
                52.20.78.240
                truefalse
                  unknown
                  windowsupdatebg.s.llnwi.net
                  178.79.242.0
                  truefalse
                    unknown
                    api.ipify.org
                    unknown
                    unknownfalse
                      high
                      NameSourceMaliciousAntivirus DetectionReputation
                      http://127.0.0.1:HTTP/1.1SHIPMENT DOCUMENTS.exe, 00000014.00000002.522417697.0000000002EF1000.00000004.00000800.00020000.00000000.sdmp, cnWCiicEpxW.exe, 0000001B.00000002.525674867.0000000003111000.00000004.00000800.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: safe
                      low
                      http://www.certplus.com/CRL/class3.crl0SHIPMENT DOCUMENTS.exe, 00000014.00000003.407487472.00000000070CC000.00000004.00000800.00020000.00000000.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      http://www.e-me.lv/repository0SHIPMENT DOCUMENTS.exe, 00000014.00000003.398450527.0000000007136000.00000004.00000800.00020000.00000000.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      http://www.acabogacia.org/doc0SHIPMENT DOCUMENTS.exe, 00000014.00000003.407487472.00000000070CC000.00000004.00000800.00020000.00000000.sdmp, SHIPMENT DOCUMENTS.exe, 00000014.00000003.398941782.00000000065B9000.00000004.00000800.00020000.00000000.sdmp, SHIPMENT DOCUMENTS.exe, 00000014.00000003.403651123.00000000065E4000.00000004.00000800.00020000.00000000.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      http://crl.chambersign.org/chambersroot.crl0SHIPMENT DOCUMENTS.exe, 00000014.00000003.398941782.00000000065B9000.00000004.00000800.00020000.00000000.sdmp, SHIPMENT DOCUMENTS.exe, 00000014.00000003.403651123.00000000065E4000.00000004.00000800.00020000.00000000.sdmp, SHIPMENT DOCUMENTS.exe, 00000014.00000002.546353573.00000000065ED000.00000004.00000800.00020000.00000000.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      http://ocsp.suscerte.gob.ve0SHIPMENT DOCUMENTS.exe, 00000014.00000003.407487472.00000000070CC000.00000004.00000800.00020000.00000000.sdmp, SHIPMENT DOCUMENTS.exe, 00000014.00000003.398696766.0000000007129000.00000004.00000800.00020000.00000000.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      http://www.postsignum.cz/crl/psrootqca2.crl02SHIPMENT DOCUMENTS.exe, 00000014.00000003.398941782.00000000065B9000.00000004.00000800.00020000.00000000.sdmp, SHIPMENT DOCUMENTS.exe, 00000014.00000003.403942163.00000000065CD000.00000004.00000800.00020000.00000000.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      http://mail.southernboilers.orgSHIPMENT DOCUMENTS.exe, 00000014.00000002.533736666.00000000031E6000.00000004.00000800.00020000.00000000.sdmp, cnWCiicEpxW.exe, 0000001B.00000002.534528527.00000000033EF000.00000004.00000800.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      http://crl.dhimyotis.com/certignarootca.crl0SHIPMENT DOCUMENTS.exe, 00000014.00000003.398450527.0000000007136000.00000004.00000800.00020000.00000000.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      http://sertifikati.ca.posta.rs/crl/PostaCARoot.crl0SHIPMENT DOCUMENTS.exe, 00000014.00000003.407487472.00000000070CC000.00000004.00000800.00020000.00000000.sdmpfalse
                        high
                        http://www.chambersign.org1SHIPMENT DOCUMENTS.exe, 00000014.00000003.398941782.00000000065B9000.00000004.00000800.00020000.00000000.sdmp, SHIPMENT DOCUMENTS.exe, 00000014.00000003.403651123.00000000065E4000.00000004.00000800.00020000.00000000.sdmp, SHIPMENT DOCUMENTS.exe, 00000014.00000003.398696766.0000000007129000.00000004.00000800.00020000.00000000.sdmp, SHIPMENT DOCUMENTS.exe, 00000014.00000002.546353573.00000000065ED000.00000004.00000800.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        http://www.pkioverheid.nl/policies/root-policy0SHIPMENT DOCUMENTS.exe, 00000014.00000003.398941782.00000000065B9000.00000004.00000800.00020000.00000000.sdmp, SHIPMENT DOCUMENTS.exe, 00000014.00000003.403853962.00000000065DA000.00000004.00000800.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        http://repository.swisssign.com/0SHIPMENT DOCUMENTS.exe, 00000014.00000003.400439346.00000000065EF000.00000004.00000800.00020000.00000000.sdmp, SHIPMENT DOCUMENTS.exe, 00000014.00000003.407487472.00000000070CC000.00000004.00000800.00020000.00000000.sdmp, SHIPMENT DOCUMENTS.exe, 00000014.00000003.401332216.00000000065F2000.00000004.00000800.00020000.00000000.sdmp, SHIPMENT DOCUMENTS.exe, 00000014.00000003.398941782.00000000065B9000.00000004.00000800.00020000.00000000.sdmp, SHIPMENT DOCUMENTS.exe, 00000014.00000003.403942163.00000000065CD000.00000004.00000800.00020000.00000000.sdmpfalse
                          high
                          http://www.fontbureau.com/designersSHIPMENT DOCUMENTS.exe, 00000000.00000002.315590285.0000000006E62000.00000004.00000800.00020000.00000000.sdmpfalse
                            high
                            http://www.pki.admin.ch/policSHIPMENT DOCUMENTS.exe, 00000014.00000003.403712232.00000000065F1000.00000004.00000800.00020000.00000000.sdmp, SHIPMENT DOCUMENTS.exe, 00000014.00000002.546377934.00000000065F0000.00000004.00000800.00020000.00000000.sdmpfalse
                              high
                              http://www.suscerte.gob.ve/lcr0#SHIPMENT DOCUMENTS.exe, 00000014.00000003.407487472.00000000070CC000.00000004.00000800.00020000.00000000.sdmp, SHIPMENT DOCUMENTS.exe, 00000014.00000003.398696766.0000000007129000.00000004.00000800.00020000.00000000.sdmpfalse
                              • URL Reputation: safe
                              unknown
                              http://ca2.mtin.es/mtin/crl/MTINAutoridadRaiz0SHIPMENT DOCUMENTS.exe, 00000014.00000003.400439346.00000000065EF000.00000004.00000800.00020000.00000000.sdmp, SHIPMENT DOCUMENTS.exe, 00000014.00000003.401332216.00000000065F2000.00000004.00000800.00020000.00000000.sdmpfalse
                              • URL Reputation: safe
                              unknown
                              http://crl.ssc.lt/root-c/cacrl.crl0SHIPMENT DOCUMENTS.exe, 00000014.00000003.398450527.0000000007136000.00000004.00000800.00020000.00000000.sdmpfalse
                              • URL Reputation: safe
                              unknown
                              http://postsignum.ttc.cz/crl/psrootqca2.crl0SHIPMENT DOCUMENTS.exe, 00000014.00000003.398941782.00000000065B9000.00000004.00000800.00020000.00000000.sdmp, SHIPMENT DOCUMENTS.exe, 00000014.00000003.403942163.00000000065CD000.00000004.00000800.00020000.00000000.sdmpfalse
                              • URL Reputation: safe
                              unknown
                              http://www.trustcenter.de/crl/v2/tc_class_3_ca_II.crlSHIPMENT DOCUMENTS.exe, 00000014.00000003.398941782.00000000065B9000.00000004.00000800.00020000.00000000.sdmp, SHIPMENT DOCUMENTS.exe, 00000014.00000003.403651123.00000000065E4000.00000004.00000800.00020000.00000000.sdmpfalse
                              • URL Reputation: safe
                              unknown
                              http://ca.disig.sk/ca/crl/ca_disig.crl0SHIPMENT DOCUMENTS.exe, 00000014.00000003.400439346.00000000065EF000.00000004.00000800.00020000.00000000.sdmp, SHIPMENT DOCUMENTS.exe, 00000014.00000003.403696848.00000000065EF000.00000004.00000800.00020000.00000000.sdmpfalse
                              • URL Reputation: safe
                              unknown
                              http://crl1.comsign.co.il/crl/comsignglobalrootca.crl0SHIPMENT DOCUMENTS.exe, 00000014.00000003.398941782.00000000065B9000.00000004.00000800.00020000.00000000.sdmp, SHIPMENT DOCUMENTS.exe, 00000014.00000003.407915366.00000000065B9000.00000004.00000800.00020000.00000000.sdmpfalse
                              • URL Reputation: safe
                              unknown
                              http://www.certplus.com/CRL/class3P.crl0SHIPMENT DOCUMENTS.exe, 00000014.00000003.398450527.0000000007136000.00000004.00000800.00020000.00000000.sdmpfalse
                              • URL Reputation: safe
                              unknown
                              http://www.sajatypeworks.comSHIPMENT DOCUMENTS.exe, 00000000.00000002.315590285.0000000006E62000.00000004.00000800.00020000.00000000.sdmpfalse
                              • URL Reputation: safe
                              unknown
                              http://www.founder.com.cn/cn/cTheSHIPMENT DOCUMENTS.exe, 00000000.00000002.315590285.0000000006E62000.00000004.00000800.00020000.00000000.sdmpfalse
                              • URL Reputation: safe
                              unknown
                              http://www.suscerte.gob.ve/dpc0SHIPMENT DOCUMENTS.exe, 00000014.00000003.407487472.00000000070CC000.00000004.00000800.00020000.00000000.sdmp, SHIPMENT DOCUMENTS.exe, 00000014.00000003.398696766.0000000007129000.00000004.00000800.00020000.00000000.sdmpfalse
                              • URL Reputation: safe
                              unknown
                              http://www.certeurope.fr/reference/root2.crl0SHIPMENT DOCUMENTS.exe, 00000014.00000003.400776216.000000000660B000.00000004.00000800.00020000.00000000.sdmp, SHIPMENT DOCUMENTS.exe, 00000014.00000003.408594188.000000000660D000.00000004.00000800.00020000.00000000.sdmpfalse
                                high
                                http://www.certplus.com/CRL/class2.crl0SHIPMENT DOCUMENTS.exe, 00000014.00000003.398941782.00000000065B9000.00000004.00000800.00020000.00000000.sdmp, SHIPMENT DOCUMENTS.exe, 00000014.00000003.403651123.00000000065E4000.00000004.00000800.00020000.00000000.sdmpfalse
                                • URL Reputation: safe
                                unknown
                                http://www.disig.sk/ca/crl/ca_disig.crl0SHIPMENT DOCUMENTS.exe, 00000014.00000003.400439346.00000000065EF000.00000004.00000800.00020000.00000000.sdmp, SHIPMENT DOCUMENTS.exe, 00000014.00000003.403696848.00000000065EF000.00000004.00000800.00020000.00000000.sdmpfalse
                                • URL Reputation: safe
                                unknown
                                http://eca.hinet.net/repository/Certs/IssuedToThisCA.p7b05SHIPMENT DOCUMENTS.exe, 00000014.00000003.398941782.00000000065B9000.00000004.00000800.00020000.00000000.sdmp, SHIPMENT DOCUMENTS.exe, 00000014.00000003.403651123.00000000065E4000.00000004.00000800.00020000.00000000.sdmpfalse
                                  high
                                  http://www.defence.gov.au/pki0SHIPMENT DOCUMENTS.exe, 00000014.00000003.403880249.00000000065E1000.00000004.00000800.00020000.00000000.sdmp, SHIPMENT DOCUMENTS.exe, 00000014.00000003.398941782.00000000065B9000.00000004.00000800.00020000.00000000.sdmp, SHIPMENT DOCUMENTS.exe, 00000014.00000003.406958224.00000000065E3000.00000004.00000800.00020000.00000000.sdmpfalse
                                  • URL Reputation: safe
                                  unknown
                                  http://www.galapagosdesign.com/DPleaseSHIPMENT DOCUMENTS.exe, 00000000.00000002.315590285.0000000006E62000.00000004.00000800.00020000.00000000.sdmpfalse
                                  • URL Reputation: safe
                                  unknown
                                  http://www.sk.ee/cps/0SHIPMENT DOCUMENTS.exe, 00000014.00000003.401258901.0000000007125000.00000004.00000800.00020000.00000000.sdmpfalse
                                  • URL Reputation: safe
                                  unknown
                                  http://www.globaltrust.info0=SHIPMENT DOCUMENTS.exe, 00000014.00000003.398696766.0000000007129000.00000004.00000800.00020000.00000000.sdmpfalse
                                  • Avira URL Cloud: safe
                                  low
                                  http://www.anf.esSHIPMENT DOCUMENTS.exe, 00000014.00000003.400439346.00000000065EF000.00000004.00000800.00020000.00000000.sdmp, SHIPMENT DOCUMENTS.exe, 00000014.00000003.401332216.00000000065F2000.00000004.00000800.00020000.00000000.sdmpfalse
                                    high
                                    http://www.pki.admin.ch/cps/CPS_2_16_756_1_17_3_1_0.pdf09SHIPMENT DOCUMENTS.exe, 00000014.00000003.398941782.00000000065B9000.00000004.00000800.00020000.00000000.sdmp, SHIPMENT DOCUMENTS.exe, 00000014.00000003.403942163.00000000065CD000.00000004.00000800.00020000.00000000.sdmpfalse
                                      high
                                      http://www.urwpp.deDPleaseSHIPMENT DOCUMENTS.exe, 00000000.00000002.315590285.0000000006E62000.00000004.00000800.00020000.00000000.sdmpfalse
                                      • URL Reputation: safe
                                      unknown
                                      http://www.zhongyicts.com.cnSHIPMENT DOCUMENTS.exe, 00000000.00000002.315590285.0000000006E62000.00000004.00000800.00020000.00000000.sdmpfalse
                                      • URL Reputation: safe
                                      unknown
                                      http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameSHIPMENT DOCUMENTS.exe, 00000000.00000002.305232047.0000000002CA1000.00000004.00000800.00020000.00000000.sdmp, SHIPMENT DOCUMENTS.exe, 00000014.00000002.522417697.0000000002EF1000.00000004.00000800.00020000.00000000.sdmp, cnWCiicEpxW.exe, 00000015.00000002.415707967.0000000002B71000.00000004.00000800.00020000.00000000.sdmp, cnWCiicEpxW.exe, 0000001B.00000002.525674867.0000000003111000.00000004.00000800.00020000.00000000.sdmpfalse
                                        high
                                        http://pki.registradores.org/normativa/index.htm0SHIPMENT DOCUMENTS.exe, 00000014.00000003.398450527.0000000007136000.00000004.00000800.00020000.00000000.sdmpfalse
                                          high
                                          http://cps.root-x1.letsencrypt.org0SHIPMENT DOCUMENTS.exe, 00000014.00000003.393081850.00000000010F2000.00000004.00000020.00020000.00000000.sdmp, SHIPMENT DOCUMENTS.exe, 00000014.00000002.518974908.00000000010F2000.00000004.00000020.00020000.00000000.sdmp, SHIPMENT DOCUMENTS.exe, 00000014.00000002.516536811.000000000107D000.00000004.00000020.00020000.00000000.sdmp, SHIPMENT DOCUMENTS.exe, 00000014.00000003.393347400.0000000006586000.00000004.00000800.00020000.00000000.sdmp, SHIPMENT DOCUMENTS.exe, 00000014.00000002.533736666.00000000031E6000.00000004.00000800.00020000.00000000.sdmp, cnWCiicEpxW.exe, 0000001B.00000002.520315185.00000000013A0000.00000004.00000020.00020000.00000000.sdmp, cnWCiicEpxW.exe, 0000001B.00000002.534582730.00000000033F5000.00000004.00000800.00020000.00000000.sdmp, cnWCiicEpxW.exe, 0000001B.00000002.520153626.0000000001396000.00000004.00000020.00020000.00000000.sdmpfalse
                                          • URL Reputation: safe
                                          unknown
                                          http://policy.camerfirma.com0SHIPMENT DOCUMENTS.exe, 00000014.00000003.400439346.00000000065EF000.00000004.00000800.00020000.00000000.sdmp, SHIPMENT DOCUMENTS.exe, 00000014.00000003.408538851.0000000006603000.00000004.00000800.00020000.00000000.sdmp, SHIPMENT DOCUMENTS.exe, 00000014.00000003.401332216.00000000065F2000.00000004.00000800.00020000.00000000.sdmp, SHIPMENT DOCUMENTS.exe, 00000014.00000003.398941782.00000000065B9000.00000004.00000800.00020000.00000000.sdmp, SHIPMENT DOCUMENTS.exe, 00000014.00000003.403651123.00000000065E4000.00000004.00000800.00020000.00000000.sdmpfalse
                                          • URL Reputation: safe
                                          unknown
                                          http://www.ssc.lt/cps03SHIPMENT DOCUMENTS.exe, 00000014.00000003.400439346.00000000065EF000.00000004.00000800.00020000.00000000.sdmp, SHIPMENT DOCUMENTS.exe, 00000014.00000003.401258901.0000000007125000.00000004.00000800.00020000.00000000.sdmp, SHIPMENT DOCUMENTS.exe, 00000014.00000003.401332216.00000000065F2000.00000004.00000800.00020000.00000000.sdmp, SHIPMENT DOCUMENTS.exe, 00000014.00000003.398450527.0000000007136000.00000004.00000800.00020000.00000000.sdmpfalse
                                          • URL Reputation: safe
                                          unknown
                                          http://ocsp.pki.gva.es0SHIPMENT DOCUMENTS.exe, 00000014.00000003.398941782.00000000065B9000.00000004.00000800.00020000.00000000.sdmp, SHIPMENT DOCUMENTS.exe, 00000014.00000003.403942163.00000000065CD000.00000004.00000800.00020000.00000000.sdmpfalse
                                          • URL Reputation: safe
                                          unknown
                                          http://www.anf.es/es/address-direccion.htmlSHIPMENT DOCUMENTS.exe, 00000014.00000003.400439346.00000000065EF000.00000004.00000800.00020000.00000000.sdmp, SHIPMENT DOCUMENTS.exe, 00000014.00000003.401332216.00000000065F2000.00000004.00000800.00020000.00000000.sdmpfalse
                                            high
                                            https://www.anf.es/address/)1(0&SHIPMENT DOCUMENTS.exe, 00000014.00000003.398836058.00000000065AD000.00000004.00000800.00020000.00000000.sdmp, SHIPMENT DOCUMENTS.exe, 00000014.00000003.407868660.00000000065AE000.00000004.00000800.00020000.00000000.sdmpfalse
                                              high
                                              http://acraiz.icpbrasil.gov.br/DPCacraiz.pdf0?SHIPMENT DOCUMENTS.exe, 00000014.00000003.398941782.00000000065B9000.00000004.00000800.00020000.00000000.sdmp, SHIPMENT DOCUMENTS.exe, 00000014.00000003.403651123.00000000065E4000.00000004.00000800.00020000.00000000.sdmp, SHIPMENT DOCUMENTS.exe, 00000014.00000003.407915366.00000000065B9000.00000004.00000800.00020000.00000000.sdmpfalse
                                              • URL Reputation: safe
                                              unknown
                                              http://bvQtmz.comcnWCiicEpxW.exe, 0000001B.00000002.525674867.0000000003111000.00000004.00000800.00020000.00000000.sdmpfalse
                                              • Avira URL Cloud: safe
                                              unknown
                                              http://ca.mtin.es/mtin/ocsp0SHIPMENT DOCUMENTS.exe, 00000014.00000003.400439346.00000000065EF000.00000004.00000800.00020000.00000000.sdmp, SHIPMENT DOCUMENTS.exe, 00000014.00000003.401332216.00000000065F2000.00000004.00000800.00020000.00000000.sdmpfalse
                                              • URL Reputation: safe
                                              unknown
                                              http://cps.letsencrypt.org0SHIPMENT DOCUMENTS.exe, 00000014.00000003.392950428.00000000010D7000.00000004.00000020.00020000.00000000.sdmp, SHIPMENT DOCUMENTS.exe, 00000014.00000002.516536811.000000000107D000.00000004.00000020.00020000.00000000.sdmp, SHIPMENT DOCUMENTS.exe, 00000014.00000003.393347400.0000000006586000.00000004.00000800.00020000.00000000.sdmp, SHIPMENT DOCUMENTS.exe, 00000014.00000002.533736666.00000000031E6000.00000004.00000800.00020000.00000000.sdmp, cnWCiicEpxW.exe, 0000001B.00000002.520315185.00000000013A0000.00000004.00000020.00020000.00000000.sdmp, cnWCiicEpxW.exe, 0000001B.00000002.534582730.00000000033F5000.00000004.00000800.00020000.00000000.sdmp, cnWCiicEpxW.exe, 0000001B.00000002.519279531.000000000135D000.00000004.00000020.00020000.00000000.sdmpfalse
                                              • URL Reputation: safe
                                              unknown
                                              http://crl.ssc.lt/root-b/cacrl.crl0SHIPMENT DOCUMENTS.exe, 00000014.00000003.401258901.0000000007125000.00000004.00000800.00020000.00000000.sdmpfalse
                                              • URL Reputation: safe
                                              unknown
                                              http://web.ncdc.gov.sa/crl/nrcacomb1.crl0SHIPMENT DOCUMENTS.exe, 00000014.00000003.403880249.00000000065E1000.00000004.00000800.00020000.00000000.sdmp, SHIPMENT DOCUMENTS.exe, 00000014.00000003.398941782.00000000065B9000.00000004.00000800.00020000.00000000.sdmp, SHIPMENT DOCUMENTS.exe, 00000014.00000003.406958224.00000000065E3000.00000004.00000800.00020000.00000000.sdmpfalse
                                              • URL Reputation: safe
                                              unknown
                                              http://www.certicamara.com/dpc/0ZSHIPMENT DOCUMENTS.exe, 00000014.00000003.398836058.00000000065AD000.00000004.00000800.00020000.00000000.sdmp, SHIPMENT DOCUMENTS.exe, 00000014.00000003.407868660.00000000065AE000.00000004.00000800.00020000.00000000.sdmpfalse
                                                high
                                                http://www.uce.gub.uy/informacion-tecnica/politicas/cp_acrn.pdf0GSHIPMENT DOCUMENTS.exe, 00000014.00000003.398941782.00000000065B9000.00000004.00000800.00020000.00000000.sdmp, SHIPMENT DOCUMENTS.exe, 00000014.00000003.403651123.00000000065E4000.00000004.00000800.00020000.00000000.sdmpfalse
                                                • URL Reputation: safe
                                                unknown
                                                http://crl.pki.wellsfargo.com/wsprca.crl0SHIPMENT DOCUMENTS.exe, 00000014.00000003.408437609.00000000070C4000.00000004.00000800.00020000.00000000.sdmpfalse
                                                  high
                                                  https://wwww.certigna.fr/autorites/0mSHIPMENT DOCUMENTS.exe, 00000014.00000003.398450527.0000000007136000.00000004.00000800.00020000.00000000.sdmpfalse
                                                  • URL Reputation: safe
                                                  unknown
                                                  http://www.dnie.es/dpc0SHIPMENT DOCUMENTS.exe, 00000014.00000003.398941782.00000000065B9000.00000004.00000800.00020000.00000000.sdmp, SHIPMENT DOCUMENTS.exe, 00000014.00000003.407915366.00000000065B9000.00000004.00000800.00020000.00000000.sdmpfalse
                                                  • URL Reputation: safe
                                                  unknown
                                                  http://www.ica.co.il/repository/cps/PersonalID_Practice_Statement.pdf0SHIPMENT DOCUMENTS.exe, 00000014.00000003.401258901.0000000007125000.00000004.00000800.00020000.00000000.sdmpfalse
                                                  • URL Reputation: safe
                                                  unknown
                                                  https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.ziphttps://wwwSHIPMENT DOCUMENTS.exe, 00000014.00000002.522417697.0000000002EF1000.00000004.00000800.00020000.00000000.sdmp, cnWCiicEpxW.exe, 0000001B.00000002.525674867.0000000003111000.00000004.00000800.00020000.00000000.sdmpfalse
                                                  • URL Reputation: safe
                                                  unknown
                                                  http://ca.mtin.es/mtin/DPCyPoliticas0SHIPMENT DOCUMENTS.exe, 00000014.00000003.400439346.00000000065EF000.00000004.00000800.00020000.00000000.sdmp, SHIPMENT DOCUMENTS.exe, 00000014.00000003.401332216.00000000065F2000.00000004.00000800.00020000.00000000.sdmpfalse
                                                  • URL Reputation: safe
                                                  unknown
                                                  https://www.anf.es/AC/ANFServerCA.crl0SHIPMENT DOCUMENTS.exe, 00000014.00000003.398836058.00000000065AD000.00000004.00000800.00020000.00000000.sdmp, SHIPMENT DOCUMENTS.exe, 00000014.00000003.407868660.00000000065AE000.00000004.00000800.00020000.00000000.sdmpfalse
                                                    high
                                                    http://www.globaltrust.info0SHIPMENT DOCUMENTS.exe, 00000014.00000003.398696766.0000000007129000.00000004.00000800.00020000.00000000.sdmpfalse
                                                    • URL Reputation: safe
                                                    unknown
                                                    http://certificates.starfieldtech.com/repository/1604SHIPMENT DOCUMENTS.exe, 00000014.00000003.400439346.00000000065EF000.00000004.00000800.00020000.00000000.sdmp, SHIPMENT DOCUMENTS.exe, 00000014.00000003.401332216.00000000065F2000.00000004.00000800.00020000.00000000.sdmpfalse
                                                      high
                                                      http://acedicom.edicomgroup.com/doc0SHIPMENT DOCUMENTS.exe, 00000014.00000003.408437609.00000000070C4000.00000004.00000800.00020000.00000000.sdmpfalse
                                                        high
                                                        http://www.certplus.com/CRL/class3TS.crl0SHIPMENT DOCUMENTS.exe, 00000014.00000003.401023380.000000000662C000.00000004.00000800.00020000.00000000.sdmp, SHIPMENT DOCUMENTS.exe, 00000014.00000003.408697131.0000000006630000.00000004.00000800.00020000.00000000.sdmpfalse
                                                        • URL Reputation: safe
                                                        unknown
                                                        http://crl.microsoft.SHIPMENT DOCUMENTS.exe, 00000014.00000002.546472929.0000000006603000.00000004.00000800.00020000.00000000.sdmpfalse
                                                        • URL Reputation: safe
                                                        unknown
                                                        https://crl.anf.es/AC/ANFServerCA.crl0SHIPMENT DOCUMENTS.exe, 00000014.00000003.398836058.00000000065AD000.00000004.00000800.00020000.00000000.sdmp, SHIPMENT DOCUMENTS.exe, 00000014.00000003.407868660.00000000065AE000.00000004.00000800.00020000.00000000.sdmpfalse
                                                          high
                                                          http://www.carterandcone.comlSHIPMENT DOCUMENTS.exe, 00000000.00000002.315590285.0000000006E62000.00000004.00000800.00020000.00000000.sdmpfalse
                                                          • URL Reputation: safe
                                                          unknown
                                                          http://www.certeurope.fr/reference/pc-root2.pdf0SHIPMENT DOCUMENTS.exe, 00000014.00000003.400776216.000000000660B000.00000004.00000800.00020000.00000000.sdmp, SHIPMENT DOCUMENTS.exe, 00000014.00000003.408594188.000000000660D000.00000004.00000800.00020000.00000000.sdmpfalse
                                                            high
                                                            https://9psarY6l5Bj.orgcnWCiicEpxW.exe, 0000001B.00000002.528419495.0000000003164000.00000004.00000800.00020000.00000000.sdmp, cnWCiicEpxW.exe, 0000001B.00000002.534484751.00000000033EB000.00000004.00000800.00020000.00000000.sdmp, cnWCiicEpxW.exe, 0000001B.00000002.534582730.00000000033F5000.00000004.00000800.00020000.00000000.sdmp, cnWCiicEpxW.exe, 0000001B.00000002.533917798.00000000033AA000.00000004.00000800.00020000.00000000.sdmpfalse
                                                            • Avira URL Cloud: safe
                                                            unknown
                                                            http://ac.economia.gob.mx/last.crl0GSHIPMENT DOCUMENTS.exe, 00000014.00000003.398696766.0000000007129000.00000004.00000800.00020000.00000000.sdmpfalse
                                                            • URL Reputation: safe
                                                            unknown
                                                            http://www.fontbureau.com/designers/frere-jones.htmlSHIPMENT DOCUMENTS.exe, 00000000.00000002.315590285.0000000006E62000.00000004.00000800.00020000.00000000.sdmpfalse
                                                              high
                                                              https://www.catcert.net/verarrelSHIPMENT DOCUMENTS.exe, 00000014.00000003.398450527.0000000007136000.00000004.00000800.00020000.00000000.sdmpfalse
                                                              • URL Reputation: safe
                                                              unknown
                                                              http://www.disig.sk/ca0fSHIPMENT DOCUMENTS.exe, 00000014.00000003.400439346.00000000065EF000.00000004.00000800.00020000.00000000.sdmp, SHIPMENT DOCUMENTS.exe, 00000014.00000003.403696848.00000000065EF000.00000004.00000800.00020000.00000000.sdmpfalse
                                                              • URL Reputation: safe
                                                              unknown
                                                              http://www.accv.es/fileadmin/Archivos/certificados/raizaccv1.crt0SHIPMENT DOCUMENTS.exe, 00000014.00000003.398941782.00000000065B9000.00000004.00000800.00020000.00000000.sdmp, SHIPMENT DOCUMENTS.exe, 00000014.00000003.403942163.00000000065CD000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                high
                                                                http://www.e-szigno.hu/RootCA.crlSHIPMENT DOCUMENTS.exe, 00000014.00000003.398450527.0000000007136000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                  high
                                                                  http://www.sk.ee/juur/crl/0SHIPMENT DOCUMENTS.exe, 00000014.00000003.401258901.0000000007125000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                  • URL Reputation: safe
                                                                  unknown
                                                                  http://crl.chambersign.org/chambersignroot.crl0SHIPMENT DOCUMENTS.exe, 00000014.00000003.398696766.0000000007129000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                  • URL Reputation: safe
                                                                  unknown
                                                                  http://crl.xrampsecurity.com/XGCA.crl0SHIPMENT DOCUMENTS.exe, 00000014.00000003.408011972.00000000065C1000.00000004.00000800.00020000.00000000.sdmp, SHIPMENT DOCUMENTS.exe, 00000014.00000003.398941782.00000000065B9000.00000004.00000800.00020000.00000000.sdmp, SHIPMENT DOCUMENTS.exe, 00000014.00000003.407915366.00000000065B9000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                  • URL Reputation: safe
                                                                  unknown
                                                                  http://certs.oati.net/repository/OATICA2.crl0SHIPMENT DOCUMENTS.exe, 00000014.00000003.400439346.00000000065EF000.00000004.00000800.00020000.00000000.sdmp, SHIPMENT DOCUMENTS.exe, 00000014.00000003.401332216.00000000065F2000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                  • URL Reputation: safe
                                                                  unknown
                                                                  http://crl.oces.trust2408.com/oces.crl0SHIPMENT DOCUMENTS.exe, 00000014.00000003.400439346.00000000065EF000.00000004.00000800.00020000.00000000.sdmp, SHIPMENT DOCUMENTS.exe, 00000014.00000003.401332216.00000000065F2000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                  • URL Reputation: safe
                                                                  unknown
                                                                  http://www.quovadis.bm0SHIPMENT DOCUMENTS.exe, 00000014.00000003.407487472.00000000070CC000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                  • URL Reputation: safe
                                                                  unknown
                                                                  https://eca.hinet.net/repository0SHIPMENT DOCUMENTS.exe, 00000014.00000003.398941782.00000000065B9000.00000004.00000800.00020000.00000000.sdmp, SHIPMENT DOCUMENTS.exe, 00000014.00000003.403651123.00000000065E4000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                    high
                                                                    http://crl.ssc.lt/root-a/cacrl.crl0SHIPMENT DOCUMENTS.exe, 00000014.00000003.400439346.00000000065EF000.00000004.00000800.00020000.00000000.sdmp, SHIPMENT DOCUMENTS.exe, 00000014.00000003.401332216.00000000065F2000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                    • URL Reputation: safe
                                                                    unknown
                                                                    http://certs.oaticerts.com/repository/OATICA2.crlSHIPMENT DOCUMENTS.exe, 00000014.00000003.400439346.00000000065EF000.00000004.00000800.00020000.00000000.sdmp, SHIPMENT DOCUMENTS.exe, 00000014.00000003.401332216.00000000065F2000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                    • URL Reputation: safe
                                                                    unknown
                                                                    http://www.trustdst.com/certificates/policy/ACES-index.html0SHIPMENT DOCUMENTS.exe, 00000014.00000003.401258901.0000000007125000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                    • URL Reputation: safe
                                                                    unknown
                                                                    http://certs.oati.net/repository/OATICA2.crt0SHIPMENT DOCUMENTS.exe, 00000014.00000003.400439346.00000000065EF000.00000004.00000800.00020000.00000000.sdmp, SHIPMENT DOCUMENTS.exe, 00000014.00000003.401332216.00000000065F2000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                    • URL Reputation: safe
                                                                    unknown
                                                                    http://www.accv.es00SHIPMENT DOCUMENTS.exe, 00000014.00000003.398941782.00000000065B9000.00000004.00000800.00020000.00000000.sdmp, SHIPMENT DOCUMENTS.exe, 00000014.00000003.403942163.00000000065CD000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                    • URL Reputation: safe
                                                                    unknown
                                                                    http://www.pkioverheid.nl/policies/root-policy-G20SHIPMENT DOCUMENTS.exe, 00000014.00000003.400439346.00000000065EF000.00000004.00000800.00020000.00000000.sdmp, SHIPMENT DOCUMENTS.exe, 00000014.00000003.401332216.00000000065F2000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                    • URL Reputation: safe
                                                                    unknown
                                                                    https://www.netlock.net/docsSHIPMENT DOCUMENTS.exe, 00000014.00000003.407915366.00000000065B9000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                    • URL Reputation: safe
                                                                    unknown
                                                                    http://www.pki.admin.ch/policy/CPS_2_16_756_1_17_3_21_1.pdf0SHIPMENT DOCUMENTS.exe, 00000014.00000003.400439346.00000000065EF000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                      high
                                                                      http://www.e-trust.be/CPS/QNcertsSHIPMENT DOCUMENTS.exe, 00000014.00000003.398450527.0000000007136000.00000004.00000800.00020000.00000000.sdmp, SHIPMENT DOCUMENTS.exe, 00000014.00000003.398941782.00000000065B9000.00000004.00000800.00020000.00000000.sdmp, SHIPMENT DOCUMENTS.exe, 00000014.00000003.403651123.00000000065E4000.00000004.00000800.00020000.00000000.sdmp, SHIPMENT DOCUMENTS.exe, 00000014.00000003.407915366.00000000065B9000.00000004.00000800.00020000.00000000.sdmp, SHIPMENT DOCUMENTS.exe, 00000014.00000002.546037308.00000000065B9000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                      • URL Reputation: safe
                                                                      unknown
                                                                      http://ocsp.ncdc.gov.sa0SHIPMENT DOCUMENTS.exe, 00000014.00000003.403880249.00000000065E1000.00000004.00000800.00020000.00000000.sdmp, SHIPMENT DOCUMENTS.exe, 00000014.00000003.398941782.00000000065B9000.00000004.00000800.00020000.00000000.sdmp, SHIPMENT DOCUMENTS.exe, 00000014.00000003.406958224.00000000065E3000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                      • URL Reputation: safe
                                                                      unknown
                                                                      http://www.fontbureau.com/designersGSHIPMENT DOCUMENTS.exe, 00000000.00000002.315590285.0000000006E62000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                        high
                                                                        http://fedir.comsign.co.il/crl/ComSignCA.crl0SHIPMENT DOCUMENTS.exe, 00000014.00000003.408437609.00000000070C4000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                        • URL Reputation: safe
                                                                        unknown
                                                                        http://www.fontbureau.com/designers/?SHIPMENT DOCUMENTS.exe, 00000000.00000002.315590285.0000000006E62000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                          high
                                                                          http://trustcenter-crl.certificat2.com/Keynectis/KEYNECTIS_ROOT_CA.crl0SHIPMENT DOCUMENTS.exe, 00000014.00000003.398941782.00000000065B9000.00000004.00000800.00020000.00000000.sdmp, SHIPMENT DOCUMENTS.exe, 00000014.00000003.403942163.00000000065CD000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                          • URL Reputation: safe
                                                                          unknown
                                                                          http://web.ncdc.gov.sa/crl/nrcaparta1.crlSHIPMENT DOCUMENTS.exe, 00000014.00000003.403880249.00000000065E1000.00000004.00000800.00020000.00000000.sdmp, SHIPMENT DOCUMENTS.exe, 00000014.00000003.398941782.00000000065B9000.00000004.00000800.00020000.00000000.sdmp, SHIPMENT DOCUMENTS.exe, 00000014.00000003.406958224.00000000065E3000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                          • URL Reputation: safe
                                                                          unknown
                                                                          http://www.datev.de/zertifikat-policy-int0SHIPMENT DOCUMENTS.exe, 00000014.00000003.400439346.00000000065EF000.00000004.00000800.00020000.00000000.sdmp, SHIPMENT DOCUMENTS.exe, 00000014.00000003.401332216.00000000065F2000.00000004.00000800.00020000.00000000.sdmp, SHIPMENT DOCUMENTS.exe, 00000014.00000003.398941782.00000000065B9000.00000004.00000800.00020000.00000000.sdmp, SHIPMENT DOCUMENTS.exe, 00000014.00000003.408391129.00000000065D8000.00000004.00000800.00020000.00000000.sdmp, SHIPMENT DOCUMENTS.exe, 00000014.00000003.403942163.00000000065CD000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                            high
                                                                            http://www.founder.com.cn/cn/bTheSHIPMENT DOCUMENTS.exe, 00000000.00000002.315590285.0000000006E62000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                            • URL Reputation: safe
                                                                            unknown
                                                                            • No. of IPs < 25%
                                                                            • 25% < No. of IPs < 50%
                                                                            • 50% < No. of IPs < 75%
                                                                            • 75% < No. of IPs
                                                                            IPDomainCountryFlagASNASN NameMalicious
                                                                            199.79.62.12
                                                                            mail.southernboilers.orgUnited States
                                                                            394695PUBLIC-DOMAIN-REGISTRYUSfalse
                                                                            3.232.242.170
                                                                            unknownUnited States
                                                                            14618AMAZON-AESUSfalse
                                                                            52.20.78.240
                                                                            api.ipify.org.herokudns.comUnited States
                                                                            14618AMAZON-AESUSfalse
                                                                            Joe Sandbox Version:36.0.0 Rainbow Opal
                                                                            Analysis ID:756110
                                                                            Start date and time:2022-11-29 16:42:18 +01:00
                                                                            Joe Sandbox Product:CloudBasic
                                                                            Overall analysis duration:0h 10m 46s
                                                                            Hypervisor based Inspection enabled:false
                                                                            Report type:light
                                                                            Sample file name:SHIPMENT DOCUMENTS.exe
                                                                            Cookbook file name:default.jbs
                                                                            Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 104, IE 11, Adobe Reader DC 19, Java 8 Update 211
                                                                            Number of analysed new started processes analysed:34
                                                                            Number of new started drivers analysed:0
                                                                            Number of existing processes analysed:0
                                                                            Number of existing drivers analysed:0
                                                                            Number of injected processes analysed:0
                                                                            Technologies:
                                                                            • HCA enabled
                                                                            • EGA enabled
                                                                            • HDC enabled
                                                                            • AMSI enabled
                                                                            Analysis Mode:default
                                                                            Analysis stop reason:Timeout
                                                                            Detection:MAL
                                                                            Classification:mal100.troj.spyw.evad.winEXE@12/7@6/3
                                                                            EGA Information:
                                                                            • Successful, ratio: 100%
                                                                            HDC Information:Failed
                                                                            HCA Information:
                                                                            • Successful, ratio: 100%
                                                                            • Number of executed functions: 0
                                                                            • Number of non-executed functions: 0
                                                                            Cookbook Comments:
                                                                            • Found application associated with file extension: .exe
                                                                            • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, BackgroundTransferHost.exe, HxTsr.exe, RuntimeBroker.exe, backgroundTaskHost.exe, SgrmBroker.exe, conhost.exe, svchost.exe
                                                                            • TCP Packets have been reduced to 100
                                                                            • Excluded IPs from analysis (whitelisted): 178.79.242.0, 209.197.3.8, 20.82.154.241, 20.82.228.9, 104.214.104.116, 20.65.78.40
                                                                            • Excluded domains from analysis (whitelisted): www.bing.com, asf-ris-prod-scus-azsc.southcentralus.cloudapp.azure.com, fs.microsoft.com, eudb.ris.api.iris.microsoft.com, ris-prod.trafficmanager.net, ctldl.windowsupdate.com, cds.d2s7q6s2.hwcdn.net, asf-ris-prod-eus2-azsc.eastus2.cloudapp.azure.com, arc.msn.com, wu-bg-shim.trafficmanager.net, neus1c-displaycatalog.frontdoor.bigcatalog.commerce.microsoft.com, ris.api.iris.microsoft.com, rp-consumer-prod-displaycatalog-geomap.trafficmanager.net, login.live.com, store-images.s-microsoft.com, neus2c-displaycatalog.frontdoor.bigcatalog.commerce.microsoft.com, displaycatalog.mp.microsoft.com, img-prod-cms-rt-microsoft-com.akamaized.net, cdn.onenote.net, displaycatalog-rp.md.mp.microsoft.com.akadns.net, ris-prod-eudb.trafficmanager.net
                                                                            • Not all processes where analyzed, report is missing behavior information
                                                                            • Report creation exceeded maximum time and may have missing disassembly code information.
                                                                            • Report size exceeded maximum capacity and may have missing behavior information.
                                                                            • Report size getting too big, too many NtAllocateVirtualMemory calls found.
                                                                            • Report size getting too big, too many NtOpenKeyEx calls found.
                                                                            • Report size getting too big, too many NtProtectVirtualMemory calls found.
                                                                            • Report size getting too big, too many NtQueryValueKey calls found.
                                                                            TimeTypeDescription
                                                                            16:44:15API Interceptor377x Sleep call for process: SHIPMENT DOCUMENTS.exe modified
                                                                            16:44:29Task SchedulerRun new task: cnWCiicEpxW path: C:\Users\user\AppData\Roaming\cnWCiicEpxW.exe
                                                                            16:44:49API Interceptor54x Sleep call for process: cnWCiicEpxW.exe modified
                                                                            No context
                                                                            No context
                                                                            No context
                                                                            No context
                                                                            No context
                                                                            Process:C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exe
                                                                            File Type:Microsoft Cabinet archive data, Windows 2000/XP setup, 62919 bytes, 1 file, at 0x2c +A "authroot.stl", number 1, 6 datablocks, 0x1 compression
                                                                            Category:dropped
                                                                            Size (bytes):62919
                                                                            Entropy (8bit):7.995280921994772
                                                                            Encrypted:true
                                                                            SSDEEP:1536:d+OfVxHl7Wyf11lYom3xQcRVOtPHwQV4rP6Ji7:d+OxHxJlZcuPt4b6q
                                                                            MD5:3DCF580A93972319E82CAFBC047D34D5
                                                                            SHA1:8528D2A1363E5DE77DC3B1142850E51EAD0F4B6B
                                                                            SHA-256:40810E31F1B69075C727E6D557F9614D5880112895FF6F4DF1767E87AE5640D1
                                                                            SHA-512:98384BE7218340F95DAE88D1CB865F23A0B4E12855BEB6E74A3752274C9B4C601E493864DB777BCA677A370D0A9DBFFD68D94898A82014537F3A801CCE839C42
                                                                            Malicious:false
                                                                            Reputation:moderate, very likely benign file
                                                                            Preview:MSCF............,...................I.......Q.........GU.\ .authroot.stl..O..5..CK..<Tk...c_.d....A.K...+.d.-;%.BJII!.QIR..$t)Kd.-QQ*...g......^..~|N=...y....{. .4{...W....b.i...j.I.......1:..b\.0.....Ait.2t......w.%.&.",tL_...4.8L[G..;.57....AT.k.......V..K......(....mzS...G....r.".=H.?>.........x&...S%....X.M^..j...A..x.9`.9...A../.s..#.4#.....Id.w..B....s.8..(...dj....=L.)..s.d.]NxQX8....stV#.K.'7.tH..9u~.2..!..2./.....!..9C../...mP $..../y.....@p.6.}.`...5. 0r.w...@(.. .Q....)g.........m..z*.8rR..).].T9r<.L....0..`.........c.....;-.g..;.wk.)......i..c5.....{v.u...AS..=.....&.:.........+..P.N..9..EAQ.V.$s.......B.`.Mfe..8.......$...y-.q9J........W...2.Q8...O.......i..@\^.=X..dG$.M..#=....m.h..{9.'...-.v..Z...!....z.....N....i..^..,........d...%Xa~q.@D|0...Y.m...........&d.4..A..{t=...../.t.3._.....?-.....uroP?.d.Z..S..{...$.i....X..$.O..4..N.)....U.Z..P....X,.... ...Lg..35..W..s.!c...Ap.].P..8..M..W.......U..,...m.u..|=.m1..~..!..b...._.
                                                                            Process:C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exe
                                                                            File Type:data
                                                                            Category:modified
                                                                            Size (bytes):290
                                                                            Entropy (8bit):2.9611813546708383
                                                                            Encrypted:false
                                                                            SSDEEP:6:kKAJNzlNiN+SkQlPlEGYRMY9z+4KlDA3RUe/:YDVkPlE99SNxAhUe/
                                                                            MD5:37EE5D1705C30E983C3B068D6F6F6004
                                                                            SHA1:94570FA7C66A5A4199A49647CBDFA69B85AACFFB
                                                                            SHA-256:38E5CB69BAED0165FBE956D68D52E0B226806006A8952DE0D8C602B25D024684
                                                                            SHA-512:36023F34ACF3BD9779273502DBCC0535C9F9B6D1AE4F7CD9706CA6B00631C79CFECAB44F276C773DF644045A7B6F18A0D7FE604AC6D5DF8D0ADF2152E84188B6
                                                                            Malicious:false
                                                                            Preview:p...... ........q..%Y...(....................................................... ..................................h.t.t.p.:././.c.t.l.d.l...w.i.n.d.o.w.s.u.p.d.a.t.e...c.o.m./.m.s.d.o.w.n.l.o.a.d./.u.p.d.a.t.e./.v.3./.s.t.a.t.i.c./.t.r.u.s.t.e.d.r./.e.n./.a.u.t.h.r.o.o.t.s.t.l...c.a.b...
                                                                            Process:C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exe
                                                                            File Type:ASCII text, with CRLF line terminators
                                                                            Category:dropped
                                                                            Size (bytes):1216
                                                                            Entropy (8bit):5.355304211458859
                                                                            Encrypted:false
                                                                            SSDEEP:24:MLUE4K5E4Ks2E1qE4x84qXKDE4KhK3VZ9pKhPKIE4oKFKHKoZAE4Kzr7FE4j:MIHK5HKXE1qHxviYHKhQnoPtHoxHhAHY
                                                                            MD5:69206D3AF7D6EFD08F4B4726998856D3
                                                                            SHA1:E778D4BF781F7712163CF5E2F5E7C15953E484CF
                                                                            SHA-256:A937AD22F9C3E667A062BA0E116672960CD93522F6997C77C00370755929BA87
                                                                            SHA-512:CD270C3DF75E548C9B0727F13F44F45262BD474336E89AAEBE56FABFE8076CD4638F88D3C0837B67C2EB3C54055679B07E4212FB3FEDBF88C015EB5DBBCD7FF8
                                                                            Malicious:true
                                                                            Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\4f0a7eefa3cd3e0ba98b5ebddbbc72e6\System.ni.dll",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..2,"Microsoft.VisualBasic, Version=10.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\f1d8480152e0da9a60ad49c6d16a3b6d\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\8d67d92724ba494b6c7fd089d6f25b48\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a
                                                                            Process:C:\Users\user\AppData\Roaming\cnWCiicEpxW.exe
                                                                            File Type:ASCII text, with CRLF line terminators
                                                                            Category:dropped
                                                                            Size (bytes):1216
                                                                            Entropy (8bit):5.355304211458859
                                                                            Encrypted:false
                                                                            SSDEEP:24:MLUE4K5E4Ks2E1qE4x84qXKDE4KhK3VZ9pKhPKIE4oKFKHKoZAE4Kzr7FE4j:MIHK5HKXE1qHxviYHKhQnoPtHoxHhAHY
                                                                            MD5:69206D3AF7D6EFD08F4B4726998856D3
                                                                            SHA1:E778D4BF781F7712163CF5E2F5E7C15953E484CF
                                                                            SHA-256:A937AD22F9C3E667A062BA0E116672960CD93522F6997C77C00370755929BA87
                                                                            SHA-512:CD270C3DF75E548C9B0727F13F44F45262BD474336E89AAEBE56FABFE8076CD4638F88D3C0837B67C2EB3C54055679B07E4212FB3FEDBF88C015EB5DBBCD7FF8
                                                                            Malicious:false
                                                                            Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\4f0a7eefa3cd3e0ba98b5ebddbbc72e6\System.ni.dll",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..2,"Microsoft.VisualBasic, Version=10.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\f1d8480152e0da9a60ad49c6d16a3b6d\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\8d67d92724ba494b6c7fd089d6f25b48\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a
                                                                            Process:C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exe
                                                                            File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                                                            Category:dropped
                                                                            Size (bytes):1656
                                                                            Entropy (8bit):5.156182356770437
                                                                            Encrypted:false
                                                                            SSDEEP:24:2dH4+SEqC/S7h2ulNMFp2O/rlMhEMjnGpwjpIgUYODOLD9RJh7h8gKB3sUtn:cbha7JlNQV/rydbz9I3YODOLNdq3T
                                                                            MD5:D452BE05EEC71DF72B608581ADB5DCC8
                                                                            SHA1:36F9E125299B3DC5751091A6F91B9183E587229F
                                                                            SHA-256:5646F4B081F4451AA51F15E1F1803831B170AD7251DB920F06E75269658C0466
                                                                            SHA-512:41CE620A09EF983B7C42579864BF781B1543B71F11A184C3D0127AD099EE0EE6B0D523B441C6CB2E5E4A56966836E8730A591D3D830F54B57F0F580B5798D774
                                                                            Malicious:true
                                                                            Preview:<?xml version="1.0" encoding="UTF-16"?>..<Task version="1.2" xmlns="http://schemas.microsoft.com/windows/2004/02/mit/task">.. <RegistrationInfo>.. <Date>2014-10-25T14:27:44.8929027</Date>.. <Author>computer\user</Author>.. </RegistrationInfo>.. <Triggers>.. <LogonTrigger>.. <Enabled>true</Enabled>.. <UserId>computer\user</UserId>.. </LogonTrigger>.. <RegistrationTrigger>.. <Enabled>false</Enabled>.. </RegistrationTrigger>.. </Triggers>.. <Principals>.. <Principal id="Author">.. <UserId>computer\user</UserId>.. <LogonType>InteractiveToken</LogonType>.. <RunLevel>LeastPrivilege</RunLevel>.. </Principal>.. </Principals>.. <Settings>.. <MultipleInstancesPolicy>StopExisting</MultipleInstancesPolicy>.. <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>.. <StopIfGoingOnBatteries>true</StopIfGoingOnBatteries>.. <AllowHardTerminate>false</AllowHardTerminate>.. <StartWhenAvail
                                                                            Process:C:\Users\user\AppData\Roaming\cnWCiicEpxW.exe
                                                                            File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                                                            Category:dropped
                                                                            Size (bytes):1656
                                                                            Entropy (8bit):5.156182356770437
                                                                            Encrypted:false
                                                                            SSDEEP:24:2dH4+SEqC/S7h2ulNMFp2O/rlMhEMjnGpwjpIgUYODOLD9RJh7h8gKB3sUtn:cbha7JlNQV/rydbz9I3YODOLNdq3T
                                                                            MD5:D452BE05EEC71DF72B608581ADB5DCC8
                                                                            SHA1:36F9E125299B3DC5751091A6F91B9183E587229F
                                                                            SHA-256:5646F4B081F4451AA51F15E1F1803831B170AD7251DB920F06E75269658C0466
                                                                            SHA-512:41CE620A09EF983B7C42579864BF781B1543B71F11A184C3D0127AD099EE0EE6B0D523B441C6CB2E5E4A56966836E8730A591D3D830F54B57F0F580B5798D774
                                                                            Malicious:false
                                                                            Preview:<?xml version="1.0" encoding="UTF-16"?>..<Task version="1.2" xmlns="http://schemas.microsoft.com/windows/2004/02/mit/task">.. <RegistrationInfo>.. <Date>2014-10-25T14:27:44.8929027</Date>.. <Author>computer\user</Author>.. </RegistrationInfo>.. <Triggers>.. <LogonTrigger>.. <Enabled>true</Enabled>.. <UserId>computer\user</UserId>.. </LogonTrigger>.. <RegistrationTrigger>.. <Enabled>false</Enabled>.. </RegistrationTrigger>.. </Triggers>.. <Principals>.. <Principal id="Author">.. <UserId>computer\user</UserId>.. <LogonType>InteractiveToken</LogonType>.. <RunLevel>LeastPrivilege</RunLevel>.. </Principal>.. </Principals>.. <Settings>.. <MultipleInstancesPolicy>StopExisting</MultipleInstancesPolicy>.. <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>.. <StopIfGoingOnBatteries>true</StopIfGoingOnBatteries>.. <AllowHardTerminate>false</AllowHardTerminate>.. <StartWhenAvail
                                                                            Process:C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exe
                                                                            File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                            Category:dropped
                                                                            Size (bytes):896000
                                                                            Entropy (8bit):7.5003924727258
                                                                            Encrypted:false
                                                                            SSDEEP:12288:xcn1uQarFr5cE8LHWzVDLIKnnaYz4gIc+zuWl9wzV9av/SEdRMA/LyVu6gt0IPP:xYDvL6+Kn7ZciImV9an9/L1t0In
                                                                            MD5:12DC06D3034A17BE7A70A4AA45EDCE8D
                                                                            SHA1:9B68AE25498A12F19360DC0DC023AF61CA9BFA9D
                                                                            SHA-256:91826EFE412B5C829801D1C52FBB43225CF1F0FC4CBA201453AD877341C64B90
                                                                            SHA-512:49E50AFDE47577D004322820A4F37DE2DF21968751D863F312D4653934187C4F42E4AC8EEAA43F67CB73EF10A35F14E3CDEC4F710116ACAF52114007EFD6C4A1
                                                                            Malicious:true
                                                                            Antivirus:
                                                                            • Antivirus: Joe Sandbox ML, Detection: 100%
                                                                            • Antivirus: ReversingLabs, Detection: 32%
                                                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...Iz.c..............P.................. ........@.. ....................... ............@.....................................K...................................R................................................ ............... ..H............text........ ...................... ..`.rsrc...............................@..@.reloc..............................@..B........................H.......X..............................................................Z(....8.....(....8....*.&~.......*...~....*.b(....8......(....8.....*...&~.......*...~....*..0..~.......8?.......E........8....s.........8I...s.........8....s.........8....(....8....*s......... .....9....& ....8....s.........8.......0..$.......8....8....8.....~....o......8......*.0..$.......8......*8....8.....~....o......8.....0..$.......8....8....8......*.~....o......8.....0...........~....o......8....8.
                                                                            File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                            Entropy (8bit):7.5003924727258
                                                                            TrID:
                                                                            • Win32 Executable (generic) Net Framework (10011505/4) 49.80%
                                                                            • Win32 Executable (generic) a (10002005/4) 49.75%
                                                                            • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                                                                            • Windows Screen Saver (13104/52) 0.07%
                                                                            • Generic Win/DOS Executable (2004/3) 0.01%
                                                                            File name:SHIPMENT DOCUMENTS.exe
                                                                            File size:896000
                                                                            MD5:12dc06d3034a17be7a70a4aa45edce8d
                                                                            SHA1:9b68ae25498a12f19360dc0dc023af61ca9bfa9d
                                                                            SHA256:91826efe412b5c829801d1c52fbb43225cf1f0fc4cba201453ad877341c64b90
                                                                            SHA512:49e50afde47577d004322820a4f37de2df21968751d863f312d4653934187c4f42e4ac8eeaa43f67cb73ef10a35f14e3cdec4f710116acaf52114007efd6c4a1
                                                                            SSDEEP:12288:xcn1uQarFr5cE8LHWzVDLIKnnaYz4gIc+zuWl9wzV9av/SEdRMA/LyVu6gt0IPP:xYDvL6+Kn7ZciImV9an9/L1t0In
                                                                            TLSH:CA158D5232728873F5CF0135949535CC6EBCA543A6A6E2076FB7368056027BFFAACE41
                                                                            File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...Iz.c..............P.................. ........@.. ....................... ............@................................
                                                                            Icon Hash:00828e8e8686b000
                                                                            Entrypoint:0x4dc0ee
                                                                            Entrypoint Section:.text
                                                                            Digitally signed:false
                                                                            Imagebase:0x400000
                                                                            Subsystem:windows gui
                                                                            Image File Characteristics:EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
                                                                            DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                                                                            Time Stamp:0x63857A49 [Tue Nov 29 03:19:37 2022 UTC]
                                                                            TLS Callbacks:
                                                                            CLR (.Net) Version:
                                                                            OS Version Major:4
                                                                            OS Version Minor:0
                                                                            File Version Major:4
                                                                            File Version Minor:0
                                                                            Subsystem Version Major:4
                                                                            Subsystem Version Minor:0
                                                                            Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
                                                                            Instruction
                                                                            jmp dword ptr [00402000h]
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            NameVirtual AddressVirtual Size Is in Section
                                                                            IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                                            IMAGE_DIRECTORY_ENTRY_IMPORT0xdc0a00x4b.text
                                                                            IMAGE_DIRECTORY_ENTRY_RESOURCE0xde0000x5c8.rsrc
                                                                            IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                                            IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                                            IMAGE_DIRECTORY_ENTRY_BASERELOC0xe00000xc.reloc
                                                                            IMAGE_DIRECTORY_ENTRY_DEBUG0xdc0520x1c.text
                                                                            IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                                            IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                                            IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                                            IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                                            IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                                            IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                                                                            IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                                            IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                                                                            IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                                            NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                                            .text0x20000xda0f40xda200False0.7780544860315186data7.505864996836325IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                                            .rsrc0xde0000x5c80x600False0.4303385416666667data4.156459778607487IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                            .reloc0xe00000xc0x200False0.044921875data0.10191042566270775IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                                                            NameRVASizeTypeLanguageCountry
                                                                            RT_VERSION0xde0a00x33cdata
                                                                            RT_MANIFEST0xde3dc0x1eaXML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
                                                                            DLLImport
                                                                            mscoree.dll_CorExeMain
                                                                            TimestampSource PortDest PortSource IPDest IP
                                                                            Nov 29, 2022 16:43:51.102545977 CET49713443192.168.2.652.20.78.240
                                                                            Nov 29, 2022 16:43:51.102605104 CET4434971352.20.78.240192.168.2.6
                                                                            Nov 29, 2022 16:43:51.102689981 CET49713443192.168.2.652.20.78.240
                                                                            Nov 29, 2022 16:43:51.206545115 CET49713443192.168.2.652.20.78.240
                                                                            Nov 29, 2022 16:43:51.206588984 CET4434971352.20.78.240192.168.2.6
                                                                            Nov 29, 2022 16:43:51.515335083 CET4434971352.20.78.240192.168.2.6
                                                                            Nov 29, 2022 16:43:51.515436888 CET49713443192.168.2.652.20.78.240
                                                                            Nov 29, 2022 16:43:51.518362045 CET49713443192.168.2.652.20.78.240
                                                                            Nov 29, 2022 16:43:51.518392086 CET4434971352.20.78.240192.168.2.6
                                                                            Nov 29, 2022 16:43:51.518759966 CET4434971352.20.78.240192.168.2.6
                                                                            Nov 29, 2022 16:43:51.679316998 CET49713443192.168.2.652.20.78.240
                                                                            Nov 29, 2022 16:43:52.707773924 CET49713443192.168.2.652.20.78.240
                                                                            Nov 29, 2022 16:43:52.707817078 CET4434971352.20.78.240192.168.2.6
                                                                            Nov 29, 2022 16:44:00.619170904 CET49713443192.168.2.652.20.78.240
                                                                            Nov 29, 2022 16:44:00.619304895 CET4434971352.20.78.240192.168.2.6
                                                                            Nov 29, 2022 16:44:00.619389057 CET49713443192.168.2.652.20.78.240
                                                                            Nov 29, 2022 16:44:20.968451977 CET49721587192.168.2.6199.79.62.12
                                                                            Nov 29, 2022 16:44:21.135443926 CET58749721199.79.62.12192.168.2.6
                                                                            Nov 29, 2022 16:44:21.135611057 CET49721587192.168.2.6199.79.62.12
                                                                            Nov 29, 2022 16:44:21.397145033 CET58749721199.79.62.12192.168.2.6
                                                                            Nov 29, 2022 16:44:21.397443056 CET49721587192.168.2.6199.79.62.12
                                                                            Nov 29, 2022 16:44:21.564626932 CET58749721199.79.62.12192.168.2.6
                                                                            Nov 29, 2022 16:44:21.565397024 CET49721587192.168.2.6199.79.62.12
                                                                            Nov 29, 2022 16:44:21.735054016 CET58749721199.79.62.12192.168.2.6
                                                                            Nov 29, 2022 16:44:21.735600948 CET49721587192.168.2.6199.79.62.12
                                                                            Nov 29, 2022 16:44:21.908711910 CET58749721199.79.62.12192.168.2.6
                                                                            Nov 29, 2022 16:44:21.908756018 CET58749721199.79.62.12192.168.2.6
                                                                            Nov 29, 2022 16:44:21.908780098 CET58749721199.79.62.12192.168.2.6
                                                                            Nov 29, 2022 16:44:21.908802986 CET58749721199.79.62.12192.168.2.6
                                                                            Nov 29, 2022 16:44:21.908874989 CET49721587192.168.2.6199.79.62.12
                                                                            Nov 29, 2022 16:44:21.910600901 CET58749721199.79.62.12192.168.2.6
                                                                            Nov 29, 2022 16:44:21.950762033 CET49721587192.168.2.6199.79.62.12
                                                                            Nov 29, 2022 16:44:22.117940903 CET58749721199.79.62.12192.168.2.6
                                                                            Nov 29, 2022 16:44:22.270884991 CET49721587192.168.2.6199.79.62.12
                                                                            Nov 29, 2022 16:44:29.999057055 CET49721587192.168.2.6199.79.62.12
                                                                            Nov 29, 2022 16:44:30.165992975 CET58749721199.79.62.12192.168.2.6
                                                                            Nov 29, 2022 16:44:30.167831898 CET49721587192.168.2.6199.79.62.12
                                                                            Nov 29, 2022 16:44:30.335340977 CET58749721199.79.62.12192.168.2.6
                                                                            Nov 29, 2022 16:44:30.361396074 CET49721587192.168.2.6199.79.62.12
                                                                            Nov 29, 2022 16:44:30.568722963 CET58749721199.79.62.12192.168.2.6
                                                                            Nov 29, 2022 16:44:30.607850075 CET58749721199.79.62.12192.168.2.6
                                                                            Nov 29, 2022 16:44:30.616848946 CET49721587192.168.2.6199.79.62.12
                                                                            Nov 29, 2022 16:44:30.783982038 CET58749721199.79.62.12192.168.2.6
                                                                            Nov 29, 2022 16:44:30.784010887 CET58749721199.79.62.12192.168.2.6
                                                                            Nov 29, 2022 16:44:30.784365892 CET49721587192.168.2.6199.79.62.12
                                                                            Nov 29, 2022 16:44:30.982860088 CET58749721199.79.62.12192.168.2.6
                                                                            Nov 29, 2022 16:44:30.986498117 CET49721587192.168.2.6199.79.62.12
                                                                            Nov 29, 2022 16:44:31.154088974 CET58749721199.79.62.12192.168.2.6
                                                                            Nov 29, 2022 16:44:31.157778978 CET49721587192.168.2.6199.79.62.12
                                                                            Nov 29, 2022 16:44:31.158020020 CET49721587192.168.2.6199.79.62.12
                                                                            Nov 29, 2022 16:44:31.159809113 CET49721587192.168.2.6199.79.62.12
                                                                            Nov 29, 2022 16:44:31.159926891 CET49721587192.168.2.6199.79.62.12
                                                                            Nov 29, 2022 16:44:31.324496031 CET58749721199.79.62.12192.168.2.6
                                                                            Nov 29, 2022 16:44:31.324537992 CET58749721199.79.62.12192.168.2.6
                                                                            Nov 29, 2022 16:44:31.326929092 CET58749721199.79.62.12192.168.2.6
                                                                            Nov 29, 2022 16:44:31.326965094 CET58749721199.79.62.12192.168.2.6
                                                                            Nov 29, 2022 16:44:31.327480078 CET58749721199.79.62.12192.168.2.6
                                                                            Nov 29, 2022 16:44:31.459182024 CET49721587192.168.2.6199.79.62.12
                                                                            Nov 29, 2022 16:44:42.362598896 CET49738443192.168.2.63.232.242.170
                                                                            Nov 29, 2022 16:44:42.362658024 CET443497383.232.242.170192.168.2.6
                                                                            Nov 29, 2022 16:44:42.362791061 CET49738443192.168.2.63.232.242.170
                                                                            Nov 29, 2022 16:44:42.394437075 CET49738443192.168.2.63.232.242.170
                                                                            Nov 29, 2022 16:44:42.394474030 CET443497383.232.242.170192.168.2.6
                                                                            Nov 29, 2022 16:44:42.694560051 CET443497383.232.242.170192.168.2.6
                                                                            Nov 29, 2022 16:44:42.694652081 CET49738443192.168.2.63.232.242.170
                                                                            Nov 29, 2022 16:44:42.708673954 CET49738443192.168.2.63.232.242.170
                                                                            Nov 29, 2022 16:44:42.708719969 CET443497383.232.242.170192.168.2.6
                                                                            Nov 29, 2022 16:44:42.709182978 CET443497383.232.242.170192.168.2.6
                                                                            Nov 29, 2022 16:44:42.788177967 CET49738443192.168.2.63.232.242.170
                                                                            Nov 29, 2022 16:44:43.747045040 CET49738443192.168.2.63.232.242.170
                                                                            Nov 29, 2022 16:44:43.747087955 CET443497383.232.242.170192.168.2.6
                                                                            Nov 29, 2022 16:44:43.893496990 CET443497383.232.242.170192.168.2.6
                                                                            Nov 29, 2022 16:44:43.893613100 CET443497383.232.242.170192.168.2.6
                                                                            Nov 29, 2022 16:44:43.895062923 CET49738443192.168.2.63.232.242.170
                                                                            Nov 29, 2022 16:44:43.912725925 CET49738443192.168.2.63.232.242.170
                                                                            Nov 29, 2022 16:45:10.773142099 CET49743587192.168.2.6199.79.62.12
                                                                            Nov 29, 2022 16:45:10.940119028 CET58749743199.79.62.12192.168.2.6
                                                                            Nov 29, 2022 16:45:10.940232038 CET49743587192.168.2.6199.79.62.12
                                                                            Nov 29, 2022 16:45:11.515913010 CET58749743199.79.62.12192.168.2.6
                                                                            Nov 29, 2022 16:45:11.549631119 CET49743587192.168.2.6199.79.62.12
                                                                            Nov 29, 2022 16:45:11.717298031 CET58749743199.79.62.12192.168.2.6
                                                                            Nov 29, 2022 16:45:11.721335888 CET49743587192.168.2.6199.79.62.12
                                                                            Nov 29, 2022 16:45:11.889170885 CET58749743199.79.62.12192.168.2.6
                                                                            Nov 29, 2022 16:45:11.893830061 CET49743587192.168.2.6199.79.62.12
                                                                            Nov 29, 2022 16:45:12.065943956 CET58749743199.79.62.12192.168.2.6
                                                                            Nov 29, 2022 16:45:12.066029072 CET58749743199.79.62.12192.168.2.6
                                                                            Nov 29, 2022 16:45:12.066091061 CET58749743199.79.62.12192.168.2.6
                                                                            Nov 29, 2022 16:45:12.066140890 CET58749743199.79.62.12192.168.2.6
                                                                            Nov 29, 2022 16:45:12.066225052 CET49743587192.168.2.6199.79.62.12
                                                                            Nov 29, 2022 16:45:12.066225052 CET49743587192.168.2.6199.79.62.12
                                                                            Nov 29, 2022 16:45:12.067401886 CET58749743199.79.62.12192.168.2.6
                                                                            Nov 29, 2022 16:45:12.089962959 CET49743587192.168.2.6199.79.62.12
                                                                            Nov 29, 2022 16:45:12.257469893 CET58749743199.79.62.12192.168.2.6
                                                                            Nov 29, 2022 16:45:12.366664886 CET49743587192.168.2.6199.79.62.12
                                                                            Nov 29, 2022 16:45:12.534174919 CET58749743199.79.62.12192.168.2.6
                                                                            Nov 29, 2022 16:45:12.539052010 CET49743587192.168.2.6199.79.62.12
                                                                            Nov 29, 2022 16:45:12.706226110 CET58749743199.79.62.12192.168.2.6
                                                                            Nov 29, 2022 16:45:12.706975937 CET49743587192.168.2.6199.79.62.12
                                                                            Nov 29, 2022 16:45:12.914741039 CET58749743199.79.62.12192.168.2.6
                                                                            Nov 29, 2022 16:45:12.955040932 CET58749743199.79.62.12192.168.2.6
                                                                            TimestampSource PortDest PortSource IPDest IP
                                                                            Nov 29, 2022 16:43:50.994033098 CET5859553192.168.2.68.8.8.8
                                                                            Nov 29, 2022 16:43:51.012947083 CET53585958.8.8.8192.168.2.6
                                                                            Nov 29, 2022 16:43:51.037520885 CET5633153192.168.2.68.8.8.8
                                                                            Nov 29, 2022 16:43:51.056447029 CET53563318.8.8.8192.168.2.6
                                                                            Nov 29, 2022 16:44:20.796726942 CET5950453192.168.2.68.8.8.8
                                                                            Nov 29, 2022 16:44:20.967142105 CET53595048.8.8.8192.168.2.6
                                                                            Nov 29, 2022 16:44:42.209783077 CET6322953192.168.2.68.8.8.8
                                                                            Nov 29, 2022 16:44:42.226728916 CET53632298.8.8.8192.168.2.6
                                                                            Nov 29, 2022 16:44:42.301785946 CET6253853192.168.2.68.8.8.8
                                                                            Nov 29, 2022 16:44:42.320725918 CET53625388.8.8.8192.168.2.6
                                                                            Nov 29, 2022 16:45:10.583590984 CET5490353192.168.2.68.8.8.8
                                                                            Nov 29, 2022 16:45:10.742371082 CET53549038.8.8.8192.168.2.6
                                                                            TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                                            Nov 29, 2022 16:43:50.994033098 CET192.168.2.68.8.8.80x4c8dStandard query (0)api.ipify.orgA (IP address)IN (0x0001)false
                                                                            Nov 29, 2022 16:43:51.037520885 CET192.168.2.68.8.8.80x6b43Standard query (0)api.ipify.orgA (IP address)IN (0x0001)false
                                                                            Nov 29, 2022 16:44:20.796726942 CET192.168.2.68.8.8.80xde78Standard query (0)mail.southernboilers.orgA (IP address)IN (0x0001)false
                                                                            Nov 29, 2022 16:44:42.209783077 CET192.168.2.68.8.8.80x8455Standard query (0)api.ipify.orgA (IP address)IN (0x0001)false
                                                                            Nov 29, 2022 16:44:42.301785946 CET192.168.2.68.8.8.80x5a80Standard query (0)api.ipify.orgA (IP address)IN (0x0001)false
                                                                            Nov 29, 2022 16:45:10.583590984 CET192.168.2.68.8.8.80x4af5Standard query (0)mail.southernboilers.orgA (IP address)IN (0x0001)false
                                                                            TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                                            Nov 29, 2022 16:43:51.012947083 CET8.8.8.8192.168.2.60x4c8dNo error (0)api.ipify.orgapi.ipify.org.herokudns.comCNAME (Canonical name)IN (0x0001)false
                                                                            Nov 29, 2022 16:43:51.012947083 CET8.8.8.8192.168.2.60x4c8dNo error (0)api.ipify.org.herokudns.com52.20.78.240A (IP address)IN (0x0001)false
                                                                            Nov 29, 2022 16:43:51.012947083 CET8.8.8.8192.168.2.60x4c8dNo error (0)api.ipify.org.herokudns.com3.220.57.224A (IP address)IN (0x0001)false
                                                                            Nov 29, 2022 16:43:51.012947083 CET8.8.8.8192.168.2.60x4c8dNo error (0)api.ipify.org.herokudns.com3.232.242.170A (IP address)IN (0x0001)false
                                                                            Nov 29, 2022 16:43:51.012947083 CET8.8.8.8192.168.2.60x4c8dNo error (0)api.ipify.org.herokudns.com54.91.59.199A (IP address)IN (0x0001)false
                                                                            Nov 29, 2022 16:43:51.056447029 CET8.8.8.8192.168.2.60x6b43No error (0)api.ipify.orgapi.ipify.org.herokudns.comCNAME (Canonical name)IN (0x0001)false
                                                                            Nov 29, 2022 16:43:51.056447029 CET8.8.8.8192.168.2.60x6b43No error (0)api.ipify.org.herokudns.com3.220.57.224A (IP address)IN (0x0001)false
                                                                            Nov 29, 2022 16:43:51.056447029 CET8.8.8.8192.168.2.60x6b43No error (0)api.ipify.org.herokudns.com54.91.59.199A (IP address)IN (0x0001)false
                                                                            Nov 29, 2022 16:43:51.056447029 CET8.8.8.8192.168.2.60x6b43No error (0)api.ipify.org.herokudns.com52.20.78.240A (IP address)IN (0x0001)false
                                                                            Nov 29, 2022 16:43:51.056447029 CET8.8.8.8192.168.2.60x6b43No error (0)api.ipify.org.herokudns.com3.232.242.170A (IP address)IN (0x0001)false
                                                                            Nov 29, 2022 16:44:01.656429052 CET8.8.8.8192.168.2.60xb330No error (0)windowsupdatebg.s.llnwi.net178.79.242.0A (IP address)IN (0x0001)false
                                                                            Nov 29, 2022 16:44:01.656429052 CET8.8.8.8192.168.2.60xb330No error (0)windowsupdatebg.s.llnwi.net95.140.236.0A (IP address)IN (0x0001)false
                                                                            Nov 29, 2022 16:44:20.967142105 CET8.8.8.8192.168.2.60xde78No error (0)mail.southernboilers.org199.79.62.12A (IP address)IN (0x0001)false
                                                                            Nov 29, 2022 16:44:23.143907070 CET8.8.8.8192.168.2.60x7b4eNo error (0)windowsupdatebg.s.llnwi.net178.79.242.0A (IP address)IN (0x0001)false
                                                                            Nov 29, 2022 16:44:23.143907070 CET8.8.8.8192.168.2.60x7b4eNo error (0)windowsupdatebg.s.llnwi.net178.79.242.128A (IP address)IN (0x0001)false
                                                                            Nov 29, 2022 16:44:42.226728916 CET8.8.8.8192.168.2.60x8455No error (0)api.ipify.orgapi.ipify.org.herokudns.comCNAME (Canonical name)IN (0x0001)false
                                                                            Nov 29, 2022 16:44:42.226728916 CET8.8.8.8192.168.2.60x8455No error (0)api.ipify.org.herokudns.com3.232.242.170A (IP address)IN (0x0001)false
                                                                            Nov 29, 2022 16:44:42.226728916 CET8.8.8.8192.168.2.60x8455No error (0)api.ipify.org.herokudns.com54.91.59.199A (IP address)IN (0x0001)false
                                                                            Nov 29, 2022 16:44:42.226728916 CET8.8.8.8192.168.2.60x8455No error (0)api.ipify.org.herokudns.com52.20.78.240A (IP address)IN (0x0001)false
                                                                            Nov 29, 2022 16:44:42.226728916 CET8.8.8.8192.168.2.60x8455No error (0)api.ipify.org.herokudns.com3.220.57.224A (IP address)IN (0x0001)false
                                                                            Nov 29, 2022 16:44:42.320725918 CET8.8.8.8192.168.2.60x5a80No error (0)api.ipify.orgapi.ipify.org.herokudns.comCNAME (Canonical name)IN (0x0001)false
                                                                            Nov 29, 2022 16:44:42.320725918 CET8.8.8.8192.168.2.60x5a80No error (0)api.ipify.org.herokudns.com3.232.242.170A (IP address)IN (0x0001)false
                                                                            Nov 29, 2022 16:44:42.320725918 CET8.8.8.8192.168.2.60x5a80No error (0)api.ipify.org.herokudns.com54.91.59.199A (IP address)IN (0x0001)false
                                                                            Nov 29, 2022 16:44:42.320725918 CET8.8.8.8192.168.2.60x5a80No error (0)api.ipify.org.herokudns.com52.20.78.240A (IP address)IN (0x0001)false
                                                                            Nov 29, 2022 16:44:42.320725918 CET8.8.8.8192.168.2.60x5a80No error (0)api.ipify.org.herokudns.com3.220.57.224A (IP address)IN (0x0001)false
                                                                            Nov 29, 2022 16:45:10.742371082 CET8.8.8.8192.168.2.60x4af5No error (0)mail.southernboilers.org199.79.62.12A (IP address)IN (0x0001)false
                                                                            • api.ipify.org
                                                                            TimestampSource PortDest PortSource IPDest IPCommands
                                                                            Nov 29, 2022 16:44:21.397145033 CET58749721199.79.62.12192.168.2.6220-md-33.webhostbox.net ESMTP Exim 4.95 #2 Tue, 29 Nov 2022 15:44:21 +0000
                                                                            220-We do not authorize the use of this system to transport unsolicited,
                                                                            220 and/or bulk e-mail.
                                                                            Nov 29, 2022 16:44:21.397443056 CET49721587192.168.2.6199.79.62.12EHLO 942247
                                                                            Nov 29, 2022 16:44:21.564626932 CET58749721199.79.62.12192.168.2.6250-md-33.webhostbox.net Hello 942247 [102.129.143.49]
                                                                            250-SIZE 52428800
                                                                            250-8BITMIME
                                                                            250-PIPELINING
                                                                            250-PIPE_CONNECT
                                                                            250-AUTH PLAIN LOGIN
                                                                            250-STARTTLS
                                                                            250 HELP
                                                                            Nov 29, 2022 16:44:21.565397024 CET49721587192.168.2.6199.79.62.12STARTTLS
                                                                            Nov 29, 2022 16:44:21.735054016 CET58749721199.79.62.12192.168.2.6220 TLS go ahead
                                                                            Nov 29, 2022 16:45:11.515913010 CET58749743199.79.62.12192.168.2.6220-md-33.webhostbox.net ESMTP Exim 4.95 #2 Tue, 29 Nov 2022 15:45:11 +0000
                                                                            220-We do not authorize the use of this system to transport unsolicited,
                                                                            220 and/or bulk e-mail.
                                                                            Nov 29, 2022 16:45:11.549631119 CET49743587192.168.2.6199.79.62.12EHLO 942247
                                                                            Nov 29, 2022 16:45:11.717298031 CET58749743199.79.62.12192.168.2.6250-md-33.webhostbox.net Hello 942247 [102.129.143.49]
                                                                            250-SIZE 52428800
                                                                            250-8BITMIME
                                                                            250-PIPELINING
                                                                            250-PIPE_CONNECT
                                                                            250-AUTH PLAIN LOGIN
                                                                            250-STARTTLS
                                                                            250 HELP
                                                                            Nov 29, 2022 16:45:11.721335888 CET49743587192.168.2.6199.79.62.12STARTTLS
                                                                            Nov 29, 2022 16:45:11.889170885 CET58749743199.79.62.12192.168.2.6220 TLS go ahead

                                                                            Click to jump to process

                                                                            Target ID:0
                                                                            Start time:16:44:02
                                                                            Start date:29/11/2022
                                                                            Path:C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exe
                                                                            Wow64 process (32bit):true
                                                                            Commandline:C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exe
                                                                            Imagebase:0x910000
                                                                            File size:896000 bytes
                                                                            MD5 hash:12DC06D3034A17BE7A70A4AA45EDCE8D
                                                                            Has elevated privileges:true
                                                                            Has administrator privileges:true
                                                                            Programmed in:.Net C# or VB.NET
                                                                            Yara matches:
                                                                            • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000000.00000002.309368123.0000000003DCC000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                            • Rule: JoeSecurity_AgentTesla_2, Description: Yara detected AgentTesla, Source: 00000000.00000002.309368123.0000000003DCC000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                            • Rule: Windows_Trojan_AgentTesla_d3ac2b2f, Description: unknown, Source: 00000000.00000002.309368123.0000000003DCC000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                                                                            • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000000.00000002.308207563.0000000003CA9000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                            • Rule: JoeSecurity_AgentTesla_2, Description: Yara detected AgentTesla, Source: 00000000.00000002.308207563.0000000003CA9000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                            • Rule: Windows_Trojan_AgentTesla_d3ac2b2f, Description: unknown, Source: 00000000.00000002.308207563.0000000003CA9000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                                                                            Reputation:low

                                                                            Target ID:16
                                                                            Start time:16:44:26
                                                                            Start date:29/11/2022
                                                                            Path:C:\Windows\SysWOW64\schtasks.exe
                                                                            Wow64 process (32bit):true
                                                                            Commandline:C:\Windows\System32\schtasks.exe" /Create /TN "Updates\cnWCiicEpxW" /XML "C:\Users\user\AppData\Local\Temp\tmp2A80.tmp
                                                                            Imagebase:0xac0000
                                                                            File size:185856 bytes
                                                                            MD5 hash:15FF7D8324231381BAD48A052F85DF04
                                                                            Has elevated privileges:true
                                                                            Has administrator privileges:true
                                                                            Programmed in:C, C++ or other language
                                                                            Reputation:high

                                                                            Target ID:17
                                                                            Start time:16:44:26
                                                                            Start date:29/11/2022
                                                                            Path:C:\Windows\System32\conhost.exe
                                                                            Wow64 process (32bit):false
                                                                            Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                            Imagebase:0x7ff6da640000
                                                                            File size:625664 bytes
                                                                            MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                                                            Has elevated privileges:true
                                                                            Has administrator privileges:true
                                                                            Programmed in:C, C++ or other language
                                                                            Reputation:high

                                                                            Target ID:20
                                                                            Start time:16:44:28
                                                                            Start date:29/11/2022
                                                                            Path:C:\Users\user\Desktop\SHIPMENT DOCUMENTS.exe
                                                                            Wow64 process (32bit):true
                                                                            Commandline:{path}
                                                                            Imagebase:0xab0000
                                                                            File size:896000 bytes
                                                                            MD5 hash:12DC06D3034A17BE7A70A4AA45EDCE8D
                                                                            Has elevated privileges:true
                                                                            Has administrator privileges:true
                                                                            Programmed in:.Net C# or VB.NET
                                                                            Yara matches:
                                                                            • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000014.00000000.301553016.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                                            • Rule: JoeSecurity_AgentTesla_2, Description: Yara detected AgentTesla, Source: 00000014.00000000.301553016.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                                            • Rule: Windows_Trojan_AgentTesla_d3ac2b2f, Description: unknown, Source: 00000014.00000000.301553016.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: unknown
                                                                            • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000014.00000002.522417697.0000000002EF1000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                            • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000014.00000002.524431731.0000000002F44000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                            Reputation:low

                                                                            Target ID:21
                                                                            Start time:16:44:29
                                                                            Start date:29/11/2022
                                                                            Path:C:\Users\user\AppData\Roaming\cnWCiicEpxW.exe
                                                                            Wow64 process (32bit):true
                                                                            Commandline:C:\Users\user\AppData\Roaming\cnWCiicEpxW.exe
                                                                            Imagebase:0x6a0000
                                                                            File size:896000 bytes
                                                                            MD5 hash:12DC06D3034A17BE7A70A4AA45EDCE8D
                                                                            Has elevated privileges:false
                                                                            Has administrator privileges:false
                                                                            Programmed in:.Net C# or VB.NET
                                                                            Antivirus matches:
                                                                            • Detection: 100%, Joe Sandbox ML
                                                                            • Detection: 32%, ReversingLabs
                                                                            Reputation:low

                                                                            Target ID:25
                                                                            Start time:16:45:10
                                                                            Start date:29/11/2022
                                                                            Path:C:\Windows\SysWOW64\schtasks.exe
                                                                            Wow64 process (32bit):true
                                                                            Commandline:C:\Windows\System32\schtasks.exe" /Create /TN "Updates\cnWCiicEpxW" /XML "C:\Users\user\AppData\Local\Temp\tmpC7C9.tmp
                                                                            Imagebase:0xac0000
                                                                            File size:185856 bytes
                                                                            MD5 hash:15FF7D8324231381BAD48A052F85DF04
                                                                            Has elevated privileges:false
                                                                            Has administrator privileges:false
                                                                            Programmed in:C, C++ or other language
                                                                            Reputation:high

                                                                            Target ID:26
                                                                            Start time:16:45:10
                                                                            Start date:29/11/2022
                                                                            Path:C:\Windows\System32\conhost.exe
                                                                            Wow64 process (32bit):false
                                                                            Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                            Imagebase:0x7ff6da640000
                                                                            File size:625664 bytes
                                                                            MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                                                            Has elevated privileges:false
                                                                            Has administrator privileges:false
                                                                            Programmed in:C, C++ or other language
                                                                            Reputation:high

                                                                            Target ID:27
                                                                            Start time:16:45:12
                                                                            Start date:29/11/2022
                                                                            Path:C:\Users\user\AppData\Roaming\cnWCiicEpxW.exe
                                                                            Wow64 process (32bit):true
                                                                            Commandline:{path}
                                                                            Imagebase:0xb20000
                                                                            File size:896000 bytes
                                                                            MD5 hash:12DC06D3034A17BE7A70A4AA45EDCE8D
                                                                            Has elevated privileges:false
                                                                            Has administrator privileges:false
                                                                            Programmed in:.Net C# or VB.NET
                                                                            Yara matches:
                                                                            • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 0000001B.00000002.528419495.0000000003164000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                            • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 0000001B.00000002.525674867.0000000003111000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                            Reputation:low

                                                                            No disassembly