Windows Analysis Report invoice dhl.delivery document and original invoice sign.exe

Overview

General Information

Sample Name: invoice dhl.delivery document and original invoice sign.exe
Analysis ID: 532858
MD5: ebce26da75669d94dbc0550bf394b204
SHA1: bcc8f769e51cd9f8a160e58840f80a008e2b72e2
SHA256: 5fef546d71e9ed9f2e457bfd9aeb23a42a5074af37599c7fe4dcfeb8f687723c
Tags: DHLexeFormbook
Infos:

Most interesting Screenshot:

Detection

FormBook
Score: 100
Range: 0 - 100
Whitelisted: false
Confidence: 100%

Signatures

Found malware configuration
Multi AV Scanner detection for submitted file
Yara detected FormBook
Malicious sample detected (through community Yara rule)
Yara detected AntiVM3
System process connects to network (likely due to code injection or exploit)
Sample uses process hollowing technique
Maps a DLL or memory area into another process
Initial sample is a PE file and has a suspicious name
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Modifies the prolog of user mode functions (user mode inline hooks)
Self deletion via cmd delete
.NET source code contains potential unpacker
Injects a PE file into a foreign processes
Queues an APC in another process (thread injection)
Tries to detect virtualization through RDTSC time measurements
Modifies the context of a thread in another process (thread injection)
Executable has a suspicious name (potential lure to open the executable)
C2 URLs / IPs found in malware configuration
Uses 32bit PE files
Queries the volume information (name, serial number etc) of a device
Yara signature match
Antivirus or Machine Learning detection for unpacked file
May sleep (evasive loops) to hinder dynamic analysis
Uses code obfuscation techniques (call, push, ret)
Detected potential crypto function
Found potential string decryption / allocating functions
Sample execution stops while process was sleeping (likely an evasion)
Contains functionality to call native functions
Creates processes with suspicious names
HTTP GET or POST without a user agent
IP address seen in connection with other malware
Contains functionality for execution timing, often used to detect debuggers
Contains long sleeps (>= 3 min)
Enables debug privileges
Found inlined nop instructions (likely shell or obfuscated code)
Sample file is different than original file name gathered from version info
Contains functionality to read the PEB
Checks if the current process is being debugged
Creates a process in suspended mode (likely to inject code)
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)

Classification

AV Detection:

barindex
Found malware configuration
Source: 0000000B.00000002.622111638.0000000002CE0000.00000004.00000001.sdmp Malware Configuration Extractor: FormBook {"C2 list": ["www.cuteprofessionalscrubs.com/9gr5/"], "decoy": ["newleafcosmetix.com", "richermanscastle.com", "ru-remonton.com", "2diandongche.com", "federaldados.design", "jeffreycookweb.com", "facecs.online", "xmeclarn.xyz", "olgasmith.xyz", "sneakersonlinesale.com", "playboyshiba.com", "angelamiglioli.com", "diitaldefynd.com", "whenevergames.com", "mtheartcustom.com", "vitalactivesupply.com", "twistblogr.com", "xn--i8s140at3d6u7c.tel", "baudelaireelhakim.com", "real-estate-miami-searcher.site", "131122.xyz", "meta-medial.com", "carvanaworkers.com", "mimamincloor.com", "aglutinarteshop.com", "portal-arch.com", "mandeide.com", "golfteesy.com", "carteretcancer.center", "cuansamping.com", "jhhnet.com", "oetthalr.xyz", "toesonly.com", "ctbizmag.com", "searchonzippy.com", "plantedapts.com", "matoneg.online", "takened.xyz", "meta4.life", "africanizedfund.com", "jukeboxjason.com", "folez.online", "troddu.com", "802135.com", "guiamat.net", "gladiasol.com", "meditationandyogacentre.com", "metaverserealestateagent.com", "boogyverse.net", "melissa-mochafest.com", "cozsweeps.com", "pickles-child.com", "metaversemediaschool.com", "ahfyfz.com", "ses-coating.com", "pozada.biz", "loldollmagic.com", "mountfrenchlodge.net", "25680125.xyz", "inusuklearning.com", "dnteagcud.xyz", "yupan.site", "acloud123.xyz", "asadosdonchorizo.com"]}
Multi AV Scanner detection for submitted file
Source: invoice dhl.delivery document and original invoice sign.exe ReversingLabs: Detection: 28%
Yara detected FormBook
Source: Yara match File source: 3.0.invoice dhl.delivery document and original invoice sign.exe.400000.8.unpack, type: UNPACKEDPE
Source: Yara match File source: 3.0.invoice dhl.delivery document and original invoice sign.exe.400000.4.unpack, type: UNPACKEDPE
Source: Yara match File source: 3.2.invoice dhl.delivery document and original invoice sign.exe.400000.0.unpack, type: UNPACKEDPE
Source: Yara match File source: 3.2.invoice dhl.delivery document and original invoice sign.exe.400000.0.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 3.0.invoice dhl.delivery document and original invoice sign.exe.400000.6.unpack, type: UNPACKEDPE
Source: Yara match File source: 3.0.invoice dhl.delivery document and original invoice sign.exe.400000.6.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 3.0.invoice dhl.delivery document and original invoice sign.exe.400000.8.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 0000000B.00000002.622111638.0000000002CE0000.00000004.00000001.sdmp, type: MEMORY
Source: Yara match File source: 00000005.00000000.393113317.000000000EE6F000.00000040.00020000.sdmp, type: MEMORY
Source: Yara match File source: 00000003.00000002.437063285.0000000001400000.00000040.00020000.sdmp, type: MEMORY
Source: Yara match File source: 00000003.00000002.437007987.00000000013D0000.00000040.00020000.sdmp, type: MEMORY
Source: Yara match File source: 0000000B.00000002.617350722.0000000000700000.00000040.00020000.sdmp, type: MEMORY
Source: Yara match File source: 00000003.00000000.360478598.0000000000400000.00000040.00000001.sdmp, type: MEMORY
Source: Yara match File source: 00000003.00000002.436548736.0000000000400000.00000040.00000001.sdmp, type: MEMORY
Source: Yara match File source: 00000005.00000000.405515832.000000000EE6F000.00000040.00020000.sdmp, type: MEMORY
Source: Yara match File source: 00000003.00000000.359940174.0000000000400000.00000040.00000001.sdmp, type: MEMORY
Source: Yara match File source: 0000000B.00000002.622077394.0000000002CB0000.00000040.00020000.sdmp, type: MEMORY
Source: Yara match File source: 00000000.00000002.364023300.0000000003879000.00000004.00000001.sdmp, type: MEMORY
Antivirus or Machine Learning detection for unpacked file
Source: 3.0.invoice dhl.delivery document and original invoice sign.exe.400000.8.unpack Avira: Label: TR/Crypt.ZPACK.Gen
Source: 3.0.invoice dhl.delivery document and original invoice sign.exe.400000.4.unpack Avira: Label: TR/Crypt.ZPACK.Gen
Source: 3.2.invoice dhl.delivery document and original invoice sign.exe.400000.0.unpack Avira: Label: TR/Crypt.ZPACK.Gen
Source: 3.0.invoice dhl.delivery document and original invoice sign.exe.400000.6.unpack Avira: Label: TR/Crypt.ZPACK.Gen

Compliance:

barindex
Uses 32bit PE files
Source: invoice dhl.delivery document and original invoice sign.exe Static PE information: LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED
Source: invoice dhl.delivery document and original invoice sign.exe Static PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
Source: Binary string: msdt.pdbGCTL source: invoice dhl.delivery document and original invoice sign.exe, 00000003.00000002.438653461.00000000033D0000.00000040.00020000.sdmp
Source: Binary string: wntdll.pdbUGP source: invoice dhl.delivery document and original invoice sign.exe, 00000003.00000003.361108586.0000000001000000.00000004.00000001.sdmp, invoice dhl.delivery document and original invoice sign.exe, 00000003.00000002.437089403.0000000001440000.00000040.00000001.sdmp, invoice dhl.delivery document and original invoice sign.exe, 00000003.00000002.437330999.000000000155F000.00000040.00000001.sdmp, msdt.exe, 0000000B.00000002.622836727.00000000049FF000.00000040.00000001.sdmp, msdt.exe, 0000000B.00000002.622596492.00000000048E0000.00000040.00000001.sdmp
Source: Binary string: wntdll.pdb source: invoice dhl.delivery document and original invoice sign.exe, invoice dhl.delivery document and original invoice sign.exe, 00000003.00000003.361108586.0000000001000000.00000004.00000001.sdmp, invoice dhl.delivery document and original invoice sign.exe, 00000003.00000002.437089403.0000000001440000.00000040.00000001.sdmp, invoice dhl.delivery document and original invoice sign.exe, 00000003.00000002.437330999.000000000155F000.00000040.00000001.sdmp, msdt.exe, msdt.exe, 0000000B.00000002.622836727.00000000049FF000.00000040.00000001.sdmp, msdt.exe, 0000000B.00000002.622596492.00000000048E0000.00000040.00000001.sdmp
Source: Binary string: msdt.pdb source: invoice dhl.delivery document and original invoice sign.exe, 00000003.00000002.438653461.00000000033D0000.00000040.00020000.sdmp

Software Vulnerabilities:

barindex
Found inlined nop instructions (likely shell or obfuscated code)
Source: C:\Users\user\Desktop\invoice dhl.delivery document and original invoice sign.exe Code function: 4x nop then pop ebx 3_2_00407B1A
Source: C:\Users\user\Desktop\invoice dhl.delivery document and original invoice sign.exe Code function: 4x nop then pop edi 3_2_0040E460
Source: C:\Windows\SysWOW64\msdt.exe Code function: 4x nop then pop ebx 11_2_00707B1B
Source: C:\Windows\SysWOW64\msdt.exe Code function: 4x nop then pop edi 11_2_0070E460

Networking:

barindex
System process connects to network (likely due to code injection or exploit)
Source: C:\Windows\explorer.exe Network Connect: 44.227.76.166 80 Jump to behavior
Source: C:\Windows\explorer.exe Domain query: www.mimamincloor.com
Source: C:\Windows\explorer.exe Domain query: www.federaldados.design
C2 URLs / IPs found in malware configuration
Source: Malware configuration extractor URLs: www.cuteprofessionalscrubs.com/9gr5/
HTTP GET or POST without a user agent
Source: global traffic HTTP traffic detected: GET /9gr5/?KrIxB=GtutZXLXlTaHD4Kp&WDH=t25TG+ulm10lwD+thJsAbOsGVXQVz47UhtdUUfJn66HyA3cvvtnG3RYsUIYwzVeadKzVomQtsQ== HTTP/1.1Host: www.federaldados.designConnection: closeData Raw: 00 00 00 00 00 00 00 Data Ascii:
IP address seen in connection with other malware
Source: Joe Sandbox View IP Address: 44.227.76.166 44.227.76.166
Source: msdt.exe, 0000000B.00000002.623782144.00000000052FF000.00000004.00020000.sdmp String found in binary or memory: http://federaldados.design
Source: explorer.exe, 00000005.00000000.397083667.000000000095C000.00000004.00000020.sdmp, explorer.exe, 00000005.00000000.383799342.000000000095C000.00000004.00000020.sdmp, explorer.exe, 00000005.00000000.425291445.000000000095C000.00000004.00000020.sdmp, explorer.exe, 00000005.00000000.365143157.000000000095C000.00000004.00000020.sdmp String found in binary or memory: http://www.autoitscript.com/autoit3/J
Source: unknown DNS traffic detected: queries for: www.federaldados.design
Source: global traffic HTTP traffic detected: GET /9gr5/?KrIxB=GtutZXLXlTaHD4Kp&WDH=t25TG+ulm10lwD+thJsAbOsGVXQVz47UhtdUUfJn66HyA3cvvtnG3RYsUIYwzVeadKzVomQtsQ== HTTP/1.1Host: www.federaldados.designConnection: closeData Raw: 00 00 00 00 00 00 00 Data Ascii:

E-Banking Fraud:

barindex
Yara detected FormBook
Source: Yara match File source: 3.0.invoice dhl.delivery document and original invoice sign.exe.400000.8.unpack, type: UNPACKEDPE
Source: Yara match File source: 3.0.invoice dhl.delivery document and original invoice sign.exe.400000.4.unpack, type: UNPACKEDPE
Source: Yara match File source: 3.2.invoice dhl.delivery document and original invoice sign.exe.400000.0.unpack, type: UNPACKEDPE
Source: Yara match File source: 3.2.invoice dhl.delivery document and original invoice sign.exe.400000.0.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 3.0.invoice dhl.delivery document and original invoice sign.exe.400000.6.unpack, type: UNPACKEDPE
Source: Yara match File source: 3.0.invoice dhl.delivery document and original invoice sign.exe.400000.6.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 3.0.invoice dhl.delivery document and original invoice sign.exe.400000.8.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 0000000B.00000002.622111638.0000000002CE0000.00000004.00000001.sdmp, type: MEMORY
Source: Yara match File source: 00000005.00000000.393113317.000000000EE6F000.00000040.00020000.sdmp, type: MEMORY
Source: Yara match File source: 00000003.00000002.437063285.0000000001400000.00000040.00020000.sdmp, type: MEMORY
Source: Yara match File source: 00000003.00000002.437007987.00000000013D0000.00000040.00020000.sdmp, type: MEMORY
Source: Yara match File source: 0000000B.00000002.617350722.0000000000700000.00000040.00020000.sdmp, type: MEMORY
Source: Yara match File source: 00000003.00000000.360478598.0000000000400000.00000040.00000001.sdmp, type: MEMORY
Source: Yara match File source: 00000003.00000002.436548736.0000000000400000.00000040.00000001.sdmp, type: MEMORY
Source: Yara match File source: 00000005.00000000.405515832.000000000EE6F000.00000040.00020000.sdmp, type: MEMORY
Source: Yara match File source: 00000003.00000000.359940174.0000000000400000.00000040.00000001.sdmp, type: MEMORY
Source: Yara match File source: 0000000B.00000002.622077394.0000000002CB0000.00000040.00020000.sdmp, type: MEMORY
Source: Yara match File source: 00000000.00000002.364023300.0000000003879000.00000004.00000001.sdmp, type: MEMORY

System Summary:

barindex
Malicious sample detected (through community Yara rule)
Source: 3.0.invoice dhl.delivery document and original invoice sign.exe.400000.8.unpack, type: UNPACKEDPE Matched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
Source: 3.0.invoice dhl.delivery document and original invoice sign.exe.400000.8.unpack, type: UNPACKEDPE Matched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
Source: 3.0.invoice dhl.delivery document and original invoice sign.exe.400000.4.unpack, type: UNPACKEDPE Matched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
Source: 3.0.invoice dhl.delivery document and original invoice sign.exe.400000.4.unpack, type: UNPACKEDPE Matched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
Source: 3.2.invoice dhl.delivery document and original invoice sign.exe.400000.0.unpack, type: UNPACKEDPE Matched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
Source: 3.2.invoice dhl.delivery document and original invoice sign.exe.400000.0.unpack, type: UNPACKEDPE Matched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
Source: 3.2.invoice dhl.delivery document and original invoice sign.exe.400000.0.raw.unpack, type: UNPACKEDPE Matched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
Source: 3.2.invoice dhl.delivery document and original invoice sign.exe.400000.0.raw.unpack, type: UNPACKEDPE Matched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
Source: 3.0.invoice dhl.delivery document and original invoice sign.exe.400000.6.unpack, type: UNPACKEDPE Matched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
Source: 3.0.invoice dhl.delivery document and original invoice sign.exe.400000.6.unpack, type: UNPACKEDPE Matched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
Source: 3.0.invoice dhl.delivery document and original invoice sign.exe.400000.6.raw.unpack, type: UNPACKEDPE Matched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
Source: 3.0.invoice dhl.delivery document and original invoice sign.exe.400000.6.raw.unpack, type: UNPACKEDPE Matched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
Source: 3.0.invoice dhl.delivery document and original invoice sign.exe.400000.8.raw.unpack, type: UNPACKEDPE Matched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
Source: 3.0.invoice dhl.delivery document and original invoice sign.exe.400000.8.raw.unpack, type: UNPACKEDPE Matched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
Source: 0000000B.00000002.622111638.0000000002CE0000.00000004.00000001.sdmp, type: MEMORY Matched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
Source: 0000000B.00000002.622111638.0000000002CE0000.00000004.00000001.sdmp, type: MEMORY Matched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
Source: 00000005.00000000.393113317.000000000EE6F000.00000040.00020000.sdmp, type: MEMORY Matched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
Source: 00000005.00000000.393113317.000000000EE6F000.00000040.00020000.sdmp, type: MEMORY Matched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
Source: 00000003.00000002.437063285.0000000001400000.00000040.00020000.sdmp, type: MEMORY Matched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
Source: 00000003.00000002.437063285.0000000001400000.00000040.00020000.sdmp, type: MEMORY Matched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
Source: 00000003.00000002.437007987.00000000013D0000.00000040.00020000.sdmp, type: MEMORY Matched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
Source: 00000003.00000002.437007987.00000000013D0000.00000040.00020000.sdmp, type: MEMORY Matched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
Source: 0000000B.00000002.617350722.0000000000700000.00000040.00020000.sdmp, type: MEMORY Matched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
Source: 0000000B.00000002.617350722.0000000000700000.00000040.00020000.sdmp, type: MEMORY Matched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
Source: 00000003.00000000.360478598.0000000000400000.00000040.00000001.sdmp, type: MEMORY Matched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
Source: 00000003.00000000.360478598.0000000000400000.00000040.00000001.sdmp, type: MEMORY Matched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
Source: 00000003.00000002.436548736.0000000000400000.00000040.00000001.sdmp, type: MEMORY Matched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
Source: 00000003.00000002.436548736.0000000000400000.00000040.00000001.sdmp, type: MEMORY Matched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
Source: 00000005.00000000.405515832.000000000EE6F000.00000040.00020000.sdmp, type: MEMORY Matched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
Source: 00000005.00000000.405515832.000000000EE6F000.00000040.00020000.sdmp, type: MEMORY Matched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
Source: 00000003.00000000.359940174.0000000000400000.00000040.00000001.sdmp, type: MEMORY Matched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
Source: 00000003.00000000.359940174.0000000000400000.00000040.00000001.sdmp, type: MEMORY Matched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
Source: 0000000B.00000002.622077394.0000000002CB0000.00000040.00020000.sdmp, type: MEMORY Matched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
Source: 0000000B.00000002.622077394.0000000002CB0000.00000040.00020000.sdmp, type: MEMORY Matched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
Source: 00000000.00000002.364023300.0000000003879000.00000004.00000001.sdmp, type: MEMORY Matched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
Source: 00000000.00000002.364023300.0000000003879000.00000004.00000001.sdmp, type: MEMORY Matched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
Initial sample is a PE file and has a suspicious name
Source: initial sample Static PE information: Filename: invoice dhl.delivery document and original invoice sign.exe
Source: initial sample Static PE information: Filename: invoice dhl.delivery document and original invoice sign.exe
Executable has a suspicious name (potential lure to open the executable)
Source: invoice dhl.delivery document and original invoice sign.exe Static file information: Suspicious name
Uses 32bit PE files
Source: invoice dhl.delivery document and original invoice sign.exe Static PE information: LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED
Yara signature match
Source: 3.0.invoice dhl.delivery document and original invoice sign.exe.400000.8.unpack, type: UNPACKEDPE Matched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
Source: 3.0.invoice dhl.delivery document and original invoice sign.exe.400000.8.unpack, type: UNPACKEDPE Matched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
Source: 3.0.invoice dhl.delivery document and original invoice sign.exe.400000.4.unpack, type: UNPACKEDPE Matched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
Source: 3.0.invoice dhl.delivery document and original invoice sign.exe.400000.4.unpack, type: UNPACKEDPE Matched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
Source: 3.2.invoice dhl.delivery document and original invoice sign.exe.400000.0.unpack, type: UNPACKEDPE Matched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
Source: 3.2.invoice dhl.delivery document and original invoice sign.exe.400000.0.unpack, type: UNPACKEDPE Matched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
Source: 3.2.invoice dhl.delivery document and original invoice sign.exe.400000.0.raw.unpack, type: UNPACKEDPE Matched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
Source: 3.2.invoice dhl.delivery document and original invoice sign.exe.400000.0.raw.unpack, type: UNPACKEDPE Matched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
Source: 3.0.invoice dhl.delivery document and original invoice sign.exe.400000.6.unpack, type: UNPACKEDPE Matched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
Source: 3.0.invoice dhl.delivery document and original invoice sign.exe.400000.6.unpack, type: UNPACKEDPE Matched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
Source: 3.0.invoice dhl.delivery document and original invoice sign.exe.400000.6.raw.unpack, type: UNPACKEDPE Matched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
Source: 3.0.invoice dhl.delivery document and original invoice sign.exe.400000.6.raw.unpack, type: UNPACKEDPE Matched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
Source: 3.0.invoice dhl.delivery document and original invoice sign.exe.400000.8.raw.unpack, type: UNPACKEDPE Matched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
Source: 3.0.invoice dhl.delivery document and original invoice sign.exe.400000.8.raw.unpack, type: UNPACKEDPE Matched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
Source: 0000000B.00000002.622111638.0000000002CE0000.00000004.00000001.sdmp, type: MEMORY Matched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
Source: 0000000B.00000002.622111638.0000000002CE0000.00000004.00000001.sdmp, type: MEMORY Matched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
Source: 00000005.00000000.393113317.000000000EE6F000.00000040.00020000.sdmp, type: MEMORY Matched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
Source: 00000005.00000000.393113317.000000000EE6F000.00000040.00020000.sdmp, type: MEMORY Matched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
Source: 00000003.00000002.437063285.0000000001400000.00000040.00020000.sdmp, type: MEMORY Matched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
Source: 00000003.00000002.437063285.0000000001400000.00000040.00020000.sdmp, type: MEMORY Matched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
Source: 00000003.00000002.437007987.00000000013D0000.00000040.00020000.sdmp, type: MEMORY Matched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
Source: 00000003.00000002.437007987.00000000013D0000.00000040.00020000.sdmp, type: MEMORY Matched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
Source: 0000000B.00000002.617350722.0000000000700000.00000040.00020000.sdmp, type: MEMORY Matched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
Source: 0000000B.00000002.617350722.0000000000700000.00000040.00020000.sdmp, type: MEMORY Matched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
Source: 00000003.00000000.360478598.0000000000400000.00000040.00000001.sdmp, type: MEMORY Matched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
Source: 00000003.00000000.360478598.0000000000400000.00000040.00000001.sdmp, type: MEMORY Matched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
Source: 00000003.00000002.436548736.0000000000400000.00000040.00000001.sdmp, type: MEMORY Matched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
Source: 00000003.00000002.436548736.0000000000400000.00000040.00000001.sdmp, type: MEMORY Matched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
Source: 00000005.00000000.405515832.000000000EE6F000.00000040.00020000.sdmp, type: MEMORY Matched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
Source: 00000005.00000000.405515832.000000000EE6F000.00000040.00020000.sdmp, type: MEMORY Matched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
Source: 00000003.00000000.359940174.0000000000400000.00000040.00000001.sdmp, type: MEMORY Matched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
Source: 00000003.00000000.359940174.0000000000400000.00000040.00000001.sdmp, type: MEMORY Matched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
Source: 0000000B.00000002.622077394.0000000002CB0000.00000040.00020000.sdmp, type: MEMORY Matched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
Source: 0000000B.00000002.622077394.0000000002CB0000.00000040.00020000.sdmp, type: MEMORY Matched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
Source: 00000000.00000002.364023300.0000000003879000.00000004.00000001.sdmp, type: MEMORY Matched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
Source: 00000000.00000002.364023300.0000000003879000.00000004.00000001.sdmp, type: MEMORY Matched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
Detected potential crypto function
Source: C:\Users\user\Desktop\invoice dhl.delivery document and original invoice sign.exe Code function: 0_2_004E2855 0_2_004E2855
Source: C:\Users\user\Desktop\invoice dhl.delivery document and original invoice sign.exe Code function: 0_2_00E2C554 0_2_00E2C554
Source: C:\Users\user\Desktop\invoice dhl.delivery document and original invoice sign.exe Code function: 0_2_00E2E8AB 0_2_00E2E8AB
Source: C:\Users\user\Desktop\invoice dhl.delivery document and original invoice sign.exe Code function: 0_2_00E2E8B8 0_2_00E2E8B8
Source: C:\Users\user\Desktop\invoice dhl.delivery document and original invoice sign.exe Code function: 3_2_00401030 3_2_00401030
Source: C:\Users\user\Desktop\invoice dhl.delivery document and original invoice sign.exe Code function: 3_2_0041DB58 3_2_0041DB58
Source: C:\Users\user\Desktop\invoice dhl.delivery document and original invoice sign.exe Code function: 3_2_0041E4E9 3_2_0041E4E9
Source: C:\Users\user\Desktop\invoice dhl.delivery document and original invoice sign.exe Code function: 3_2_00402D89 3_2_00402D89
Source: C:\Users\user\Desktop\invoice dhl.delivery document and original invoice sign.exe Code function: 3_2_00402D90 3_2_00402D90
Source: C:\Users\user\Desktop\invoice dhl.delivery document and original invoice sign.exe Code function: 3_2_0041E59C 3_2_0041E59C
Source: C:\Users\user\Desktop\invoice dhl.delivery document and original invoice sign.exe Code function: 3_2_0041D5A3 3_2_0041D5A3
Source: C:\Users\user\Desktop\invoice dhl.delivery document and original invoice sign.exe Code function: 3_2_0041EDB1 3_2_0041EDB1
Source: C:\Users\user\Desktop\invoice dhl.delivery document and original invoice sign.exe Code function: 3_2_0041DE45 3_2_0041DE45
Source: C:\Users\user\Desktop\invoice dhl.delivery document and original invoice sign.exe Code function: 3_2_00409E5C 3_2_00409E5C
Source: C:\Users\user\Desktop\invoice dhl.delivery document and original invoice sign.exe Code function: 3_2_00409E60 3_2_00409E60
Source: C:\Users\user\Desktop\invoice dhl.delivery document and original invoice sign.exe Code function: 3_2_00992855 3_2_00992855
Source: C:\Users\user\Desktop\invoice dhl.delivery document and original invoice sign.exe Code function: 3_2_0146F900 3_2_0146F900
Source: C:\Users\user\Desktop\invoice dhl.delivery document and original invoice sign.exe Code function: 3_2_01484120 3_2_01484120
Source: C:\Users\user\Desktop\invoice dhl.delivery document and original invoice sign.exe Code function: 3_2_01521002 3_2_01521002
Source: C:\Users\user\Desktop\invoice dhl.delivery document and original invoice sign.exe Code function: 3_2_0153E824 3_2_0153E824
Source: C:\Users\user\Desktop\invoice dhl.delivery document and original invoice sign.exe Code function: 3_2_015328EC 3_2_015328EC
Source: C:\Users\user\Desktop\invoice dhl.delivery document and original invoice sign.exe Code function: 3_2_0147B090 3_2_0147B090
Source: C:\Users\user\Desktop\invoice dhl.delivery document and original invoice sign.exe Code function: 3_2_014920A0 3_2_014920A0
Source: C:\Users\user\Desktop\invoice dhl.delivery document and original invoice sign.exe Code function: 3_2_015320A8 3_2_015320A8
Source: C:\Users\user\Desktop\invoice dhl.delivery document and original invoice sign.exe Code function: 3_2_01532B28 3_2_01532B28
Source: C:\Users\user\Desktop\invoice dhl.delivery document and original invoice sign.exe Code function: 3_2_0152DBD2 3_2_0152DBD2
Source: C:\Users\user\Desktop\invoice dhl.delivery document and original invoice sign.exe Code function: 3_2_015203DA 3_2_015203DA
Source: C:\Users\user\Desktop\invoice dhl.delivery document and original invoice sign.exe Code function: 3_2_0149EBB0 3_2_0149EBB0
Source: C:\Users\user\Desktop\invoice dhl.delivery document and original invoice sign.exe Code function: 3_2_0151FA2B 3_2_0151FA2B
Source: C:\Users\user\Desktop\invoice dhl.delivery document and original invoice sign.exe Code function: 3_2_015322AE 3_2_015322AE
Source: C:\Users\user\Desktop\invoice dhl.delivery document and original invoice sign.exe Code function: 3_2_01531D55 3_2_01531D55
Source: C:\Users\user\Desktop\invoice dhl.delivery document and original invoice sign.exe Code function: 3_2_01532D07 3_2_01532D07
Source: C:\Users\user\Desktop\invoice dhl.delivery document and original invoice sign.exe Code function: 3_2_01460D20 3_2_01460D20
Source: C:\Users\user\Desktop\invoice dhl.delivery document and original invoice sign.exe Code function: 3_2_015325DD 3_2_015325DD
Source: C:\Users\user\Desktop\invoice dhl.delivery document and original invoice sign.exe Code function: 3_2_0147D5E0 3_2_0147D5E0
Source: C:\Users\user\Desktop\invoice dhl.delivery document and original invoice sign.exe Code function: 3_2_01492581 3_2_01492581
Source: C:\Users\user\Desktop\invoice dhl.delivery document and original invoice sign.exe Code function: 3_2_0152D466 3_2_0152D466
Source: C:\Users\user\Desktop\invoice dhl.delivery document and original invoice sign.exe Code function: 3_2_0147841F 3_2_0147841F
Source: C:\Users\user\Desktop\invoice dhl.delivery document and original invoice sign.exe Code function: 3_2_0153DFCE 3_2_0153DFCE
Source: C:\Users\user\Desktop\invoice dhl.delivery document and original invoice sign.exe Code function: 3_2_01531FF1 3_2_01531FF1
Source: C:\Users\user\Desktop\invoice dhl.delivery document and original invoice sign.exe Code function: 3_2_0152D616 3_2_0152D616
Source: C:\Users\user\Desktop\invoice dhl.delivery document and original invoice sign.exe Code function: 3_2_01486E30 3_2_01486E30
Source: C:\Users\user\Desktop\invoice dhl.delivery document and original invoice sign.exe Code function: 3_2_01532EF7 3_2_01532EF7
Source: C:\Windows\SysWOW64\msdt.exe Code function: 11_2_0491B090 11_2_0491B090
Source: C:\Windows\SysWOW64\msdt.exe Code function: 11_2_049320A0 11_2_049320A0
Source: C:\Windows\SysWOW64\msdt.exe Code function: 11_2_049D20A8 11_2_049D20A8
Source: C:\Windows\SysWOW64\msdt.exe Code function: 11_2_0491841F 11_2_0491841F
Source: C:\Windows\SysWOW64\msdt.exe Code function: 11_2_049C1002 11_2_049C1002
Source: C:\Windows\SysWOW64\msdt.exe Code function: 11_2_04932581 11_2_04932581
Source: C:\Windows\SysWOW64\msdt.exe Code function: 11_2_049D25DD 11_2_049D25DD
Source: C:\Windows\SysWOW64\msdt.exe Code function: 11_2_0491D5E0 11_2_0491D5E0
Source: C:\Windows\SysWOW64\msdt.exe Code function: 11_2_0490F900 11_2_0490F900
Source: C:\Windows\SysWOW64\msdt.exe Code function: 11_2_049D2D07 11_2_049D2D07
Source: C:\Windows\SysWOW64\msdt.exe Code function: 11_2_04900D20 11_2_04900D20
Source: C:\Windows\SysWOW64\msdt.exe Code function: 11_2_04924120 11_2_04924120
Source: C:\Windows\SysWOW64\msdt.exe Code function: 11_2_049D1D55 11_2_049D1D55
Source: C:\Windows\SysWOW64\msdt.exe Code function: 11_2_049D22AE 11_2_049D22AE
Source: C:\Windows\SysWOW64\msdt.exe Code function: 11_2_049D2EF7 11_2_049D2EF7
Source: C:\Windows\SysWOW64\msdt.exe Code function: 11_2_04926E30 11_2_04926E30
Source: C:\Windows\SysWOW64\msdt.exe Code function: 11_2_0493EBB0 11_2_0493EBB0
Source: C:\Windows\SysWOW64\msdt.exe Code function: 11_2_049CDBD2 11_2_049CDBD2
Source: C:\Windows\SysWOW64\msdt.exe Code function: 11_2_049D1FF1 11_2_049D1FF1
Source: C:\Windows\SysWOW64\msdt.exe Code function: 11_2_049D2B28 11_2_049D2B28
Source: C:\Windows\SysWOW64\msdt.exe Code function: 11_2_0071DB58 11_2_0071DB58
Source: C:\Windows\SysWOW64\msdt.exe Code function: 11_2_0071E4E9 11_2_0071E4E9
Source: C:\Windows\SysWOW64\msdt.exe Code function: 11_2_0071D5A3 11_2_0071D5A3
Source: C:\Windows\SysWOW64\msdt.exe Code function: 11_2_0071EDAD 11_2_0071EDAD
Source: C:\Windows\SysWOW64\msdt.exe Code function: 11_2_00702D90 11_2_00702D90
Source: C:\Windows\SysWOW64\msdt.exe Code function: 11_2_0071E59C 11_2_0071E59C
Source: C:\Windows\SysWOW64\msdt.exe Code function: 11_2_00702D89 11_2_00702D89
Source: C:\Windows\SysWOW64\msdt.exe Code function: 11_2_00709E60 11_2_00709E60
Source: C:\Windows\SysWOW64\msdt.exe Code function: 11_2_00709E5C 11_2_00709E5C
Source: C:\Windows\SysWOW64\msdt.exe Code function: 11_2_0071DE45 11_2_0071DE45
Source: C:\Windows\SysWOW64\msdt.exe Code function: 11_2_00702FB0 11_2_00702FB0
Found potential string decryption / allocating functions
Source: C:\Users\user\Desktop\invoice dhl.delivery document and original invoice sign.exe Code function: String function: 0146B150 appears 45 times
Source: C:\Windows\SysWOW64\msdt.exe Code function: String function: 0490B150 appears 35 times
Contains functionality to call native functions
Source: C:\Users\user\Desktop\invoice dhl.delivery document and original invoice sign.exe Code function: 3_2_0041A360 NtCreateFile, 3_2_0041A360
Source: C:\Users\user\Desktop\invoice dhl.delivery document and original invoice sign.exe Code function: 3_2_0041A410 NtReadFile, 3_2_0041A410
Source: C:\Users\user\Desktop\invoice dhl.delivery document and original invoice sign.exe Code function: 3_2_0041A490 NtClose, 3_2_0041A490
Source: C:\Users\user\Desktop\invoice dhl.delivery document and original invoice sign.exe Code function: 3_2_0041A540 NtAllocateVirtualMemory, 3_2_0041A540
Source: C:\Users\user\Desktop\invoice dhl.delivery document and original invoice sign.exe Code function: 3_2_0041A40A NtReadFile, 3_2_0041A40A
Source: C:\Users\user\Desktop\invoice dhl.delivery document and original invoice sign.exe Code function: 3_2_0041A53C NtAllocateVirtualMemory, 3_2_0041A53C
Source: C:\Users\user\Desktop\invoice dhl.delivery document and original invoice sign.exe Code function: 3_2_014A9910 NtAdjustPrivilegesToken,LdrInitializeThunk, 3_2_014A9910
Source: C:\Users\user\Desktop\invoice dhl.delivery document and original invoice sign.exe Code function: 3_2_014A99A0 NtCreateSection,LdrInitializeThunk, 3_2_014A99A0
Source: C:\Users\user\Desktop\invoice dhl.delivery document and original invoice sign.exe Code function: 3_2_014A9840 NtDelayExecution,LdrInitializeThunk, 3_2_014A9840
Source: C:\Users\user\Desktop\invoice dhl.delivery document and original invoice sign.exe Code function: 3_2_014A9860 NtQuerySystemInformation,LdrInitializeThunk, 3_2_014A9860
Source: C:\Users\user\Desktop\invoice dhl.delivery document and original invoice sign.exe Code function: 3_2_014A98F0 NtReadVirtualMemory,LdrInitializeThunk, 3_2_014A98F0
Source: C:\Users\user\Desktop\invoice dhl.delivery document and original invoice sign.exe Code function: 3_2_014A9A50 NtCreateFile,LdrInitializeThunk, 3_2_014A9A50
Source: C:\Users\user\Desktop\invoice dhl.delivery document and original invoice sign.exe Code function: 3_2_014A9A00 NtProtectVirtualMemory,LdrInitializeThunk, 3_2_014A9A00
Source: C:\Users\user\Desktop\invoice dhl.delivery document and original invoice sign.exe Code function: 3_2_014A9A20 NtResumeThread,LdrInitializeThunk, 3_2_014A9A20
Source: C:\Users\user\Desktop\invoice dhl.delivery document and original invoice sign.exe Code function: 3_2_014A9540 NtReadFile,LdrInitializeThunk, 3_2_014A9540
Source: C:\Users\user\Desktop\invoice dhl.delivery document and original invoice sign.exe Code function: 3_2_014A95D0 NtClose,LdrInitializeThunk, 3_2_014A95D0
Source: C:\Users\user\Desktop\invoice dhl.delivery document and original invoice sign.exe Code function: 3_2_014A9710 NtQueryInformationToken,LdrInitializeThunk, 3_2_014A9710
Source: C:\Users\user\Desktop\invoice dhl.delivery document and original invoice sign.exe Code function: 3_2_014A9780 NtMapViewOfSection,LdrInitializeThunk, 3_2_014A9780
Source: C:\Users\user\Desktop\invoice dhl.delivery document and original invoice sign.exe Code function: 3_2_014A97A0 NtUnmapViewOfSection,LdrInitializeThunk, 3_2_014A97A0
Source: C:\Users\user\Desktop\invoice dhl.delivery document and original invoice sign.exe Code function: 3_2_014A9660 NtAllocateVirtualMemory,LdrInitializeThunk, 3_2_014A9660
Source: C:\Users\user\Desktop\invoice dhl.delivery document and original invoice sign.exe Code function: 3_2_014A96E0 NtFreeVirtualMemory,LdrInitializeThunk, 3_2_014A96E0
Source: C:\Users\user\Desktop\invoice dhl.delivery document and original invoice sign.exe Code function: 3_2_014A9950 NtQueueApcThread, 3_2_014A9950
Source: C:\Users\user\Desktop\invoice dhl.delivery document and original invoice sign.exe Code function: 3_2_014A99D0 NtCreateProcessEx, 3_2_014A99D0
Source: C:\Users\user\Desktop\invoice dhl.delivery document and original invoice sign.exe Code function: 3_2_014AB040 NtSuspendThread, 3_2_014AB040
Source: C:\Users\user\Desktop\invoice dhl.delivery document and original invoice sign.exe Code function: 3_2_014A9820 NtEnumerateKey, 3_2_014A9820
Source: C:\Users\user\Desktop\invoice dhl.delivery document and original invoice sign.exe Code function: 3_2_014A98A0 NtWriteVirtualMemory, 3_2_014A98A0
Source: C:\Users\user\Desktop\invoice dhl.delivery document and original invoice sign.exe Code function: 3_2_014A9B00 NtSetValueKey, 3_2_014A9B00
Source: C:\Users\user\Desktop\invoice dhl.delivery document and original invoice sign.exe Code function: 3_2_014AA3B0 NtGetContextThread, 3_2_014AA3B0
Source: C:\Users\user\Desktop\invoice dhl.delivery document and original invoice sign.exe Code function: 3_2_014A9A10 NtQuerySection, 3_2_014A9A10
Source: C:\Users\user\Desktop\invoice dhl.delivery document and original invoice sign.exe Code function: 3_2_014A9A80 NtOpenDirectoryObject, 3_2_014A9A80
Source: C:\Users\user\Desktop\invoice dhl.delivery document and original invoice sign.exe Code function: 3_2_014A9560 NtWriteFile, 3_2_014A9560
Source: C:\Users\user\Desktop\invoice dhl.delivery document and original invoice sign.exe Code function: 3_2_014A9520 NtWaitForSingleObject, 3_2_014A9520
Source: C:\Users\user\Desktop\invoice dhl.delivery document and original invoice sign.exe Code function: 3_2_014AAD30 NtSetContextThread, 3_2_014AAD30
Source: C:\Users\user\Desktop\invoice dhl.delivery document and original invoice sign.exe Code function: 3_2_014A95F0 NtQueryInformationFile, 3_2_014A95F0
Source: C:\Users\user\Desktop\invoice dhl.delivery document and original invoice sign.exe Code function: 3_2_014A9760 NtOpenProcess, 3_2_014A9760
Source: C:\Users\user\Desktop\invoice dhl.delivery document and original invoice sign.exe Code function: 3_2_014AA770 NtOpenThread, 3_2_014AA770
Source: C:\Users\user\Desktop\invoice dhl.delivery document and original invoice sign.exe Code function: 3_2_014A9770 NtSetInformationFile, 3_2_014A9770
Source: C:\Users\user\Desktop\invoice dhl.delivery document and original invoice sign.exe Code function: 3_2_014AA710 NtOpenProcessToken, 3_2_014AA710
Source: C:\Users\user\Desktop\invoice dhl.delivery document and original invoice sign.exe Code function: 3_2_014A9730 NtQueryVirtualMemory, 3_2_014A9730
Source: C:\Users\user\Desktop\invoice dhl.delivery document and original invoice sign.exe Code function: 3_2_014A9FE0 NtCreateMutant, 3_2_014A9FE0
Source: C:\Users\user\Desktop\invoice dhl.delivery document and original invoice sign.exe Code function: 3_2_014A9650 NtQueryValueKey, 3_2_014A9650
Source: C:\Users\user\Desktop\invoice dhl.delivery document and original invoice sign.exe Code function: 3_2_014A9670 NtQueryInformationProcess, 3_2_014A9670
Source: C:\Users\user\Desktop\invoice dhl.delivery document and original invoice sign.exe Code function: 3_2_014A9610 NtEnumerateValueKey, 3_2_014A9610
Source: C:\Users\user\Desktop\invoice dhl.delivery document and original invoice sign.exe Code function: 3_2_014A96D0 NtCreateKey, 3_2_014A96D0
Source: C:\Windows\SysWOW64\msdt.exe Code function: 11_2_04949840 NtDelayExecution,LdrInitializeThunk, 11_2_04949840
Source: C:\Windows\SysWOW64\msdt.exe Code function: 11_2_04949860 NtQuerySystemInformation,LdrInitializeThunk, 11_2_04949860
Source: C:\Windows\SysWOW64\msdt.exe Code function: 11_2_049499A0 NtCreateSection,LdrInitializeThunk, 11_2_049499A0
Source: C:\Windows\SysWOW64\msdt.exe Code function: 11_2_049495D0 NtClose,LdrInitializeThunk, 11_2_049495D0
Source: C:\Windows\SysWOW64\msdt.exe Code function: 11_2_04949910 NtAdjustPrivilegesToken,LdrInitializeThunk, 11_2_04949910
Source: C:\Windows\SysWOW64\msdt.exe Code function: 11_2_04949540 NtReadFile,LdrInitializeThunk, 11_2_04949540
Source: C:\Windows\SysWOW64\msdt.exe Code function: 11_2_049496D0 NtCreateKey,LdrInitializeThunk, 11_2_049496D0
Source: C:\Windows\SysWOW64\msdt.exe Code function: 11_2_049496E0 NtFreeVirtualMemory,LdrInitializeThunk, 11_2_049496E0
Source: C:\Windows\SysWOW64\msdt.exe Code function: 11_2_04949650 NtQueryValueKey,LdrInitializeThunk, 11_2_04949650
Source: C:\Windows\SysWOW64\msdt.exe Code function: 11_2_04949A50 NtCreateFile,LdrInitializeThunk, 11_2_04949A50
Source: C:\Windows\SysWOW64\msdt.exe Code function: 11_2_04949660 NtAllocateVirtualMemory,LdrInitializeThunk, 11_2_04949660
Source: C:\Windows\SysWOW64\msdt.exe Code function: 11_2_04949780 NtMapViewOfSection,LdrInitializeThunk, 11_2_04949780
Source: C:\Windows\SysWOW64\msdt.exe Code function: 11_2_04949FE0 NtCreateMutant,LdrInitializeThunk, 11_2_04949FE0
Source: C:\Windows\SysWOW64\msdt.exe Code function: 11_2_04949710 NtQueryInformationToken,LdrInitializeThunk, 11_2_04949710
Source: C:\Windows\SysWOW64\msdt.exe Code function: 11_2_049498A0 NtWriteVirtualMemory, 11_2_049498A0
Source: C:\Windows\SysWOW64\msdt.exe Code function: 11_2_049498F0 NtReadVirtualMemory, 11_2_049498F0
Source: C:\Windows\SysWOW64\msdt.exe Code function: 11_2_04949820 NtEnumerateKey, 11_2_04949820
Source: C:\Windows\SysWOW64\msdt.exe Code function: 11_2_0494B040 NtSuspendThread, 11_2_0494B040
Source: C:\Windows\SysWOW64\msdt.exe Code function: 11_2_049499D0 NtCreateProcessEx, 11_2_049499D0
Source: C:\Windows\SysWOW64\msdt.exe Code function: 11_2_049495F0 NtQueryInformationFile, 11_2_049495F0
Source: C:\Windows\SysWOW64\msdt.exe Code function: 11_2_0494AD30 NtSetContextThread, 11_2_0494AD30
Source: C:\Windows\SysWOW64\msdt.exe Code function: 11_2_04949520 NtWaitForSingleObject, 11_2_04949520
Source: C:\Windows\SysWOW64\msdt.exe Code function: 11_2_04949950 NtQueueApcThread, 11_2_04949950
Source: C:\Windows\SysWOW64\msdt.exe Code function: 11_2_04949560 NtWriteFile, 11_2_04949560
Source: C:\Windows\SysWOW64\msdt.exe Code function: 11_2_04949A80 NtOpenDirectoryObject, 11_2_04949A80
Source: C:\Windows\SysWOW64\msdt.exe Code function: 11_2_04949610 NtEnumerateValueKey, 11_2_04949610
Source: C:\Windows\SysWOW64\msdt.exe Code function: 11_2_04949A10 NtQuerySection, 11_2_04949A10
Source: C:\Windows\SysWOW64\msdt.exe Code function: 11_2_04949A00 NtProtectVirtualMemory, 11_2_04949A00
Source: C:\Windows\SysWOW64\msdt.exe Code function: 11_2_04949A20 NtResumeThread, 11_2_04949A20
Source: C:\Windows\SysWOW64\msdt.exe Code function: 11_2_04949670 NtQueryInformationProcess, 11_2_04949670
Source: C:\Windows\SysWOW64\msdt.exe Code function: 11_2_0494A3B0 NtGetContextThread, 11_2_0494A3B0
Source: C:\Windows\SysWOW64\msdt.exe Code function: 11_2_049497A0 NtUnmapViewOfSection, 11_2_049497A0
Source: C:\Windows\SysWOW64\msdt.exe Code function: 11_2_0494A710 NtOpenProcessToken, 11_2_0494A710
Source: C:\Windows\SysWOW64\msdt.exe Code function: 11_2_04949B00 NtSetValueKey, 11_2_04949B00
Source: C:\Windows\SysWOW64\msdt.exe Code function: 11_2_04949730 NtQueryVirtualMemory, 11_2_04949730
Source: C:\Windows\SysWOW64\msdt.exe Code function: 11_2_04949770 NtSetInformationFile, 11_2_04949770
Source: C:\Windows\SysWOW64\msdt.exe Code function: 11_2_0494A770 NtOpenThread, 11_2_0494A770
Source: C:\Windows\SysWOW64\msdt.exe Code function: 11_2_04949760 NtOpenProcess, 11_2_04949760
Source: C:\Windows\SysWOW64\msdt.exe Code function: 11_2_0071A360 NtCreateFile, 11_2_0071A360
Source: C:\Windows\SysWOW64\msdt.exe Code function: 11_2_0071A410 NtReadFile, 11_2_0071A410
Source: C:\Windows\SysWOW64\msdt.exe Code function: 11_2_0071A490 NtClose, 11_2_0071A490
Source: C:\Windows\SysWOW64\msdt.exe Code function: 11_2_0071A540 NtAllocateVirtualMemory, 11_2_0071A540
Source: C:\Windows\SysWOW64\msdt.exe Code function: 11_2_0071A40A NtReadFile, 11_2_0071A40A
Source: C:\Windows\SysWOW64\msdt.exe Code function: 11_2_0071A53C NtAllocateVirtualMemory, 11_2_0071A53C
Sample file is different than original file name gathered from version info
Source: invoice dhl.delivery document and original invoice sign.exe Binary or memory string: OriginalFilename vs invoice dhl.delivery document and original invoice sign.exe
Source: invoice dhl.delivery document and original invoice sign.exe, 00000000.00000002.366898086.0000000005B80000.00000004.00020000.sdmp Binary or memory string: OriginalFilenameUI.dllF vs invoice dhl.delivery document and original invoice sign.exe
Source: invoice dhl.delivery document and original invoice sign.exe, 00000000.00000000.348349236.00000000004E2000.00000002.00020000.sdmp Binary or memory string: OriginalFilenameCMSFILEWRITABLETY.exe4 vs invoice dhl.delivery document and original invoice sign.exe
Source: invoice dhl.delivery document and original invoice sign.exe, 00000000.00000002.364023300.0000000003879000.00000004.00000001.sdmp Binary or memory string: OriginalFilenameUI.dllF vs invoice dhl.delivery document and original invoice sign.exe
Source: invoice dhl.delivery document and original invoice sign.exe Binary or memory string: OriginalFilename vs invoice dhl.delivery document and original invoice sign.exe
Source: invoice dhl.delivery document and original invoice sign.exe, 00000003.00000000.358229484.0000000000992000.00000002.00020000.sdmp Binary or memory string: OriginalFilenameCMSFILEWRITABLETY.exe4 vs invoice dhl.delivery document and original invoice sign.exe
Source: invoice dhl.delivery document and original invoice sign.exe, 00000003.00000002.438653461.00000000033D0000.00000040.00020000.sdmp Binary or memory string: OriginalFilenamemsdt.exej% vs invoice dhl.delivery document and original invoice sign.exe
Source: invoice dhl.delivery document and original invoice sign.exe, 00000003.00000002.437873001.00000000016EF000.00000040.00000001.sdmp Binary or memory string: OriginalFilenamentdll.dllj% vs invoice dhl.delivery document and original invoice sign.exe
Source: invoice dhl.delivery document and original invoice sign.exe, 00000003.00000002.437330999.000000000155F000.00000040.00000001.sdmp Binary or memory string: OriginalFilenamentdll.dllj% vs invoice dhl.delivery document and original invoice sign.exe
Source: invoice dhl.delivery document and original invoice sign.exe, 00000003.00000003.361549231.0000000001116000.00000004.00000001.sdmp Binary or memory string: OriginalFilenamentdll.dllj% vs invoice dhl.delivery document and original invoice sign.exe
Source: invoice dhl.delivery document and original invoice sign.exe Binary or memory string: OriginalFilenameCMSFILEWRITABLETY.exe4 vs invoice dhl.delivery document and original invoice sign.exe
Source: invoice dhl.delivery document and original invoice sign.exe Static PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
Source: invoice dhl.delivery document and original invoice sign.exe ReversingLabs: Detection: 28%
Source: invoice dhl.delivery document and original invoice sign.exe Static PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
Source: C:\Users\user\Desktop\invoice dhl.delivery document and original invoice sign.exe Key opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers Jump to behavior
Source: unknown Process created: C:\Users\user\Desktop\invoice dhl.delivery document and original invoice sign.exe "C:\Users\user\Desktop\invoice dhl.delivery document and original invoice sign.exe"
Source: C:\Users\user\Desktop\invoice dhl.delivery document and original invoice sign.exe Process created: C:\Users\user\Desktop\invoice dhl.delivery document and original invoice sign.exe C:\Users\user\Desktop\invoice dhl.delivery document and original invoice sign.exe
Source: C:\Windows\explorer.exe Process created: C:\Windows\SysWOW64\msdt.exe C:\Windows\SysWOW64\msdt.exe
Source: C:\Windows\SysWOW64\msdt.exe Process created: C:\Windows\SysWOW64\cmd.exe /c del "C:\Users\user\Desktop\invoice dhl.delivery document and original invoice sign.exe"
Source: C:\Windows\SysWOW64\cmd.exe Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Users\user\Desktop\invoice dhl.delivery document and original invoice sign.exe Process created: C:\Users\user\Desktop\invoice dhl.delivery document and original invoice sign.exe C:\Users\user\Desktop\invoice dhl.delivery document and original invoice sign.exe Jump to behavior
Source: C:\Windows\SysWOW64\msdt.exe Process created: C:\Windows\SysWOW64\cmd.exe /c del "C:\Users\user\Desktop\invoice dhl.delivery document and original invoice sign.exe" Jump to behavior
Source: C:\Windows\explorer.exe Key value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{6C3EE638-B588-4D7D-B30A-E7E36759305D}\InprocServer32 Jump to behavior
Source: C:\Users\user\Desktop\invoice dhl.delivery document and original invoice sign.exe File created: C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\invoice dhl.delivery document and original invoice sign.exe.log Jump to behavior
Source: classification engine Classification label: mal100.troj.evad.winEXE@7/1@2/1
Source: C:\Users\user\Desktop\invoice dhl.delivery document and original invoice sign.exe Section loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll Jump to behavior
Source: C:\Windows\System32\conhost.exe Mutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7108:120:WilError_01
Source: invoice dhl.delivery document and original invoice sign.exe, 00000000.00000002.364023300.0000000003879000.00000004.00000001.sdmp Binary or memory string: .SlnpI3O)
Source: invoice dhl.delivery document and original invoice sign.exe, 00000000.00000002.364023300.0000000003879000.00000004.00000001.sdmp Binary or memory string: .Slnp
Source: C:\Windows\explorer.exe File read: C:\Windows\System32\drivers\etc\hosts Jump to behavior
Source: C:\Windows\explorer.exe File read: C:\Windows\System32\drivers\etc\hosts Jump to behavior
Source: C:\Users\user\Desktop\invoice dhl.delivery document and original invoice sign.exe File opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dll Jump to behavior
Source: invoice dhl.delivery document and original invoice sign.exe Static PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
Source: invoice dhl.delivery document and original invoice sign.exe Static PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
Source: Binary string: msdt.pdbGCTL source: invoice dhl.delivery document and original invoice sign.exe, 00000003.00000002.438653461.00000000033D0000.00000040.00020000.sdmp
Source: Binary string: wntdll.pdbUGP source: invoice dhl.delivery document and original invoice sign.exe, 00000003.00000003.361108586.0000000001000000.00000004.00000001.sdmp, invoice dhl.delivery document and original invoice sign.exe, 00000003.00000002.437089403.0000000001440000.00000040.00000001.sdmp, invoice dhl.delivery document and original invoice sign.exe, 00000003.00000002.437330999.000000000155F000.00000040.00000001.sdmp, msdt.exe, 0000000B.00000002.622836727.00000000049FF000.00000040.00000001.sdmp, msdt.exe, 0000000B.00000002.622596492.00000000048E0000.00000040.00000001.sdmp
Source: Binary string: wntdll.pdb source: invoice dhl.delivery document and original invoice sign.exe, invoice dhl.delivery document and original invoice sign.exe, 00000003.00000003.361108586.0000000001000000.00000004.00000001.sdmp, invoice dhl.delivery document and original invoice sign.exe, 00000003.00000002.437089403.0000000001440000.00000040.00000001.sdmp, invoice dhl.delivery document and original invoice sign.exe, 00000003.00000002.437330999.000000000155F000.00000040.00000001.sdmp, msdt.exe, msdt.exe, 0000000B.00000002.622836727.00000000049FF000.00000040.00000001.sdmp, msdt.exe, 0000000B.00000002.622596492.00000000048E0000.00000040.00000001.sdmp
Source: Binary string: msdt.pdb source: invoice dhl.delivery document and original invoice sign.exe, 00000003.00000002.438653461.00000000033D0000.00000040.00020000.sdmp

Data Obfuscation:

barindex
.NET source code contains potential unpacker
Source: invoice dhl.delivery document and original invoice sign.exe, u0006u2000.cs .Net Code: \x02 System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
Source: 0.0.invoice dhl.delivery document and original invoice sign.exe.4e0000.0.unpack, u0006u2000.cs .Net Code: \x02 System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
Source: 0.2.invoice dhl.delivery document and original invoice sign.exe.4e0000.0.unpack, u0006u2000.cs .Net Code: \x02 System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
Source: 3.0.invoice dhl.delivery document and original invoice sign.exe.990000.1.unpack, u0006u2000.cs .Net Code: \x02 System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
Source: 3.0.invoice dhl.delivery document and original invoice sign.exe.990000.2.unpack, u0006u2000.cs .Net Code: \x02 System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
Source: 3.0.invoice dhl.delivery document and original invoice sign.exe.990000.9.unpack, u0006u2000.cs .Net Code: \x02 System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
Source: 3.0.invoice dhl.delivery document and original invoice sign.exe.990000.0.unpack, u0006u2000.cs .Net Code: \x02 System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
Source: 3.2.invoice dhl.delivery document and original invoice sign.exe.990000.1.unpack, u0006u2000.cs .Net Code: \x02 System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
Source: 3.0.invoice dhl.delivery document and original invoice sign.exe.990000.7.unpack, u0006u2000.cs .Net Code: \x02 System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
Source: 3.0.invoice dhl.delivery document and original invoice sign.exe.990000.3.unpack, u0006u2000.cs .Net Code: \x02 System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
Source: 3.0.invoice dhl.delivery document and original invoice sign.exe.990000.5.unpack, u0006u2000.cs .Net Code: \x02 System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
Uses code obfuscation techniques (call, push, ret)
Source: C:\Users\user\Desktop\invoice dhl.delivery document and original invoice sign.exe Code function: 0_2_004E2855 push ds; ret 0_2_004E32A7
Source: C:\Users\user\Desktop\invoice dhl.delivery document and original invoice sign.exe Code function: 0_2_004E322B push ds; ret 0_2_004E32A7
Source: C:\Users\user\Desktop\invoice dhl.delivery document and original invoice sign.exe Code function: 3_2_0041685A push C1F93286h; ret 3_2_0041685F
Source: C:\Users\user\Desktop\invoice dhl.delivery document and original invoice sign.exe Code function: 3_2_0041D4B5 push eax; ret 3_2_0041D508
Source: C:\Users\user\Desktop\invoice dhl.delivery document and original invoice sign.exe Code function: 3_2_0041D56C push eax; ret 3_2_0041D572
Source: C:\Users\user\Desktop\invoice dhl.delivery document and original invoice sign.exe Code function: 3_2_0041D502 push eax; ret 3_2_0041D508
Source: C:\Users\user\Desktop\invoice dhl.delivery document and original invoice sign.exe Code function: 3_2_0041D50B push eax; ret 3_2_0041D572
Source: C:\Users\user\Desktop\invoice dhl.delivery document and original invoice sign.exe Code function: 3_2_0041660F push ss; retf 3_2_00416624
Source: C:\Users\user\Desktop\invoice dhl.delivery document and original invoice sign.exe Code function: 3_2_0040B75A push esp; retf 3_2_0040B75C
Source: C:\Users\user\Desktop\invoice dhl.delivery document and original invoice sign.exe Code function: 3_2_00992855 push ds; ret 3_2_009932A7
Source: C:\Users\user\Desktop\invoice dhl.delivery document and original invoice sign.exe Code function: 3_2_0099322B push ds; ret 3_2_009932A7
Source: C:\Users\user\Desktop\invoice dhl.delivery document and original invoice sign.exe Code function: 3_2_014BD0D1 push ecx; ret 3_2_014BD0E4
Source: C:\Windows\SysWOW64\msdt.exe Code function: 11_2_0495D0D1 push ecx; ret 11_2_0495D0E4
Source: C:\Windows\SysWOW64\msdt.exe Code function: 11_2_0071685A push C1F93286h; ret 11_2_0071685F
Source: C:\Windows\SysWOW64\msdt.exe Code function: 11_2_0071D4B5 push eax; ret 11_2_0071D508
Source: C:\Windows\SysWOW64\msdt.exe Code function: 11_2_0071D56C push eax; ret 11_2_0071D572
Source: C:\Windows\SysWOW64\msdt.exe Code function: 11_2_0071D502 push eax; ret 11_2_0071D508
Source: C:\Windows\SysWOW64\msdt.exe Code function: 11_2_0071D50B push eax; ret 11_2_0071D572
Source: C:\Windows\SysWOW64\msdt.exe Code function: 11_2_0071660F push ss; retf 11_2_00716624
Source: C:\Windows\SysWOW64\msdt.exe Code function: 11_2_0070B75A push esp; retf 11_2_0070B75C
Source: initial sample Static PE information: section name: .text entropy: 7.80084963355

Persistence and Installation Behavior:

barindex
Creates processes with suspicious names
Source: C:\Users\user\Desktop\invoice dhl.delivery document and original invoice sign.exe File created: \invoice dhl.delivery document and original invoice sign.exe
Source: C:\Users\user\Desktop\invoice dhl.delivery document and original invoice sign.exe File created: \invoice dhl.delivery document and original invoice sign.exe Jump to behavior

Hooking and other Techniques for Hiding and Protection:

barindex
Modifies the prolog of user mode functions (user mode inline hooks)
Source: explorer.exe User mode code has changed: module: user32.dll function: PeekMessageA new code: 0x48 0x8B 0xB8 0x8C 0xCE 0xE1
Self deletion via cmd delete
Source: C:\Windows\SysWOW64\msdt.exe Process created: /c del "C:\Users\user\Desktop\invoice dhl.delivery document and original invoice sign.exe"
Source: C:\Windows\SysWOW64\msdt.exe Process created: /c del "C:\Users\user\Desktop\invoice dhl.delivery document and original invoice sign.exe" Jump to behavior
Source: C:\Users\user\Desktop\invoice dhl.delivery document and original invoice sign.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\invoice dhl.delivery document and original invoice sign.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\invoice dhl.delivery document and original invoice sign.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\invoice dhl.delivery document and original invoice sign.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\invoice dhl.delivery document and original invoice sign.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\invoice dhl.delivery document and original invoice sign.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\invoice dhl.delivery document and original invoice sign.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\invoice dhl.delivery document and original invoice sign.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\invoice dhl.delivery document and original invoice sign.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\invoice dhl.delivery document and original invoice sign.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\invoice dhl.delivery document and original invoice sign.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\invoice dhl.delivery document and original invoice sign.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\invoice dhl.delivery document and original invoice sign.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\invoice dhl.delivery document and original invoice sign.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\invoice dhl.delivery document and original invoice sign.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\invoice dhl.delivery document and original invoice sign.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\invoice dhl.delivery document and original invoice sign.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\invoice dhl.delivery document and original invoice sign.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\invoice dhl.delivery document and original invoice sign.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\invoice dhl.delivery document and original invoice sign.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\invoice dhl.delivery document and original invoice sign.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\invoice dhl.delivery document and original invoice sign.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\invoice dhl.delivery document and original invoice sign.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\invoice dhl.delivery document and original invoice sign.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\invoice dhl.delivery document and original invoice sign.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\invoice dhl.delivery document and original invoice sign.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\invoice dhl.delivery document and original invoice sign.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\invoice dhl.delivery document and original invoice sign.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\invoice dhl.delivery document and original invoice sign.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\invoice dhl.delivery document and original invoice sign.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\invoice dhl.delivery document and original invoice sign.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\invoice dhl.delivery document and original invoice sign.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\invoice dhl.delivery document and original invoice sign.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\invoice dhl.delivery document and original invoice sign.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\msdt.exe Process information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX Jump to behavior

Malware Analysis System Evasion:

barindex
Yara detected AntiVM3
Source: Yara match File source: 00000000.00000002.363236510.00000000028A6000.00000004.00000001.sdmp, type: MEMORY
Source: Yara match File source: 00000000.00000002.363182286.0000000002871000.00000004.00000001.sdmp, type: MEMORY
Source: Yara match File source: Process Memory Space: invoice dhl.delivery document and original invoice sign.exe PID: 3452, type: MEMORYSTR
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Source: invoice dhl.delivery document and original invoice sign.exe, 00000000.00000002.363236510.00000000028A6000.00000004.00000001.sdmp, invoice dhl.delivery document and original invoice sign.exe, 00000000.00000002.363182286.0000000002871000.00000004.00000001.sdmp Binary or memory string: SBIEDLL.DLL
Source: invoice dhl.delivery document and original invoice sign.exe, 00000000.00000002.363236510.00000000028A6000.00000004.00000001.sdmp, invoice dhl.delivery document and original invoice sign.exe, 00000000.00000002.363182286.0000000002871000.00000004.00000001.sdmp Binary or memory string: KERNEL32.DLL.WINE_GET_UNIX_FILE_NAME
Tries to detect virtualization through RDTSC time measurements
Source: C:\Users\user\Desktop\invoice dhl.delivery document and original invoice sign.exe RDTSC instruction interceptor: First address: 0000000000409904 second address: 000000000040990A instructions: 0x00000000 rdtsc 0x00000002 xor ecx, ecx 0x00000004 add ecx, eax 0x00000006 rdtsc
Source: C:\Users\user\Desktop\invoice dhl.delivery document and original invoice sign.exe RDTSC instruction interceptor: First address: 0000000000409B7E second address: 0000000000409B84 instructions: 0x00000000 rdtsc 0x00000002 xor ecx, ecx 0x00000004 add ecx, eax 0x00000006 rdtsc
Source: C:\Windows\SysWOW64\msdt.exe RDTSC instruction interceptor: First address: 0000000000709904 second address: 000000000070990A instructions: 0x00000000 rdtsc 0x00000002 xor ecx, ecx 0x00000004 add ecx, eax 0x00000006 rdtsc
Source: C:\Windows\SysWOW64\msdt.exe RDTSC instruction interceptor: First address: 0000000000709B7E second address: 0000000000709B84 instructions: 0x00000000 rdtsc 0x00000002 xor ecx, ecx 0x00000004 add ecx, eax 0x00000006 rdtsc
May sleep (evasive loops) to hinder dynamic analysis
Source: C:\Users\user\Desktop\invoice dhl.delivery document and original invoice sign.exe TID: 3576 Thread sleep time: -40062s >= -30000s Jump to behavior
Source: C:\Users\user\Desktop\invoice dhl.delivery document and original invoice sign.exe TID: 5916 Thread sleep time: -922337203685477s >= -30000s Jump to behavior
Source: C:\Windows\explorer.exe TID: 6932 Thread sleep time: -38000s >= -30000s Jump to behavior
Sample execution stops while process was sleeping (likely an evasion)
Source: C:\Windows\explorer.exe Last function: Thread delayed
Source: C:\Windows\SysWOW64\msdt.exe Last function: Thread delayed
Contains functionality for execution timing, often used to detect debuggers
Source: C:\Users\user\Desktop\invoice dhl.delivery document and original invoice sign.exe Code function: 3_2_00409AB0 rdtsc 3_2_00409AB0
Contains long sleeps (>= 3 min)
Source: C:\Users\user\Desktop\invoice dhl.delivery document and original invoice sign.exe Thread delayed: delay time: 922337203685477 Jump to behavior
Source: C:\Users\user\Desktop\invoice dhl.delivery document and original invoice sign.exe Process information queried: ProcessInformation Jump to behavior
Source: C:\Users\user\Desktop\invoice dhl.delivery document and original invoice sign.exe Thread delayed: delay time: 40062 Jump to behavior
Source: C:\Users\user\Desktop\invoice dhl.delivery document and original invoice sign.exe Thread delayed: delay time: 922337203685477 Jump to behavior
Source: invoice dhl.delivery document and original invoice sign.exe, 00000000.00000002.363182286.0000000002871000.00000004.00000001.sdmp Binary or memory string: VMware SVGA IIBAdd-MpPreference -ExclusionPath "
Source: explorer.exe, 00000005.00000000.374553794.00000000083E8000.00000004.00000001.sdmp Binary or memory string: VMware SATA CD00dRom0
Source: explorer.exe, 00000005.00000000.403668866.0000000008430000.00000004.00000001.sdmp Binary or memory string: SCSI\Disk&Ven_VMware&Prod_Virtual_disk\5&1ec51bf7&0&000000
Source: invoice dhl.delivery document and original invoice sign.exe, 00000000.00000002.363182286.0000000002871000.00000004.00000001.sdmp Binary or memory string: InstallPathJC:\PROGRAM FILES\VMWARE\VMWARE TOOLS\
Source: explorer.exe, 00000005.00000000.388071286.0000000006420000.00000004.00000001.sdmp Binary or memory string: \\?\scsi#cdrom&ven_necvmwar&prod_vmware_sata_cd00#5&280b647&0&000000#{53f56308-b6bf-11d0-94f2-00a0c91efb8b}
Source: invoice dhl.delivery document and original invoice sign.exe, 00000000.00000002.363182286.0000000002871000.00000004.00000001.sdmp Binary or memory string: vmware
Source: explorer.exe, 00000005.00000000.374553794.00000000083E8000.00000004.00000001.sdmp Binary or memory string: VMware SATA CD00
Source: explorer.exe, 00000005.00000000.388071286.0000000006420000.00000004.00000001.sdmp Binary or memory string: \\?\scsi#cdrom&ven_necvmwar&prod_vmware_sata_cd00#5&280b647&0&000000#{53f56308-b6bf-11d0-94f2-00a0c91efb8b}
Source: explorer.exe, 00000005.00000000.390916923.00000000082E2000.00000004.00000001.sdmp Binary or memory string: \\?\scsi#cdrom&ven_necvmwar&prod_vmware_sata_cd00#5&280b647&0&000000#{53f56308-b6bf-11d0-94f2-00a0c91efb8b}>
Source: explorer.exe, 00000005.00000000.390916923.00000000082E2000.00000004.00000001.sdmp Binary or memory string: SCSI\CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00\5&280b647&0&000000
Source: explorer.exe, 00000005.00000000.403668866.0000000008430000.00000004.00000001.sdmp Binary or memory string: SCSI\CDROM&VEN_NECVMWAR&PROD_VMWARE_SATA_CD00\5&280B647&0&000000-;
Source: invoice dhl.delivery document and original invoice sign.exe, 00000000.00000002.363182286.0000000002871000.00000004.00000001.sdmp Binary or memory string: VMWAREDSOFTWARE\VMware, Inc.\VMware Tools
Source: explorer.exe, 00000005.00000000.365143157.000000000095C000.00000004.00000020.sdmp Binary or memory string: \\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&280b647&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}G

Anti Debugging:

barindex
Contains functionality for execution timing, often used to detect debuggers
Source: C:\Users\user\Desktop\invoice dhl.delivery document and original invoice sign.exe Code function: 3_2_00409AB0 rdtsc 3_2_00409AB0
Enables debug privileges
Source: C:\Users\user\Desktop\invoice dhl.delivery document and original invoice sign.exe Process token adjusted: Debug Jump to behavior
Contains functionality to read the PEB
Source: C:\Users\user\Desktop\invoice dhl.delivery document and original invoice sign.exe Code function: 3_2_0148B944 mov eax, dword ptr fs:[00000030h] 3_2_0148B944
Source: C:\Users\user\Desktop\invoice dhl.delivery document and original invoice sign.exe Code function: 3_2_0148B944 mov eax, dword ptr fs:[00000030h] 3_2_0148B944
Source: C:\Users\user\Desktop\invoice dhl.delivery document and original invoice sign.exe Code function: 3_2_0146C962 mov eax, dword ptr fs:[00000030h] 3_2_0146C962
Source: C:\Users\user\Desktop\invoice dhl.delivery document and original invoice sign.exe Code function: 3_2_0146B171 mov eax, dword ptr fs:[00000030h] 3_2_0146B171
Source: C:\Users\user\Desktop\invoice dhl.delivery document and original invoice sign.exe Code function: 3_2_0146B171 mov eax, dword ptr fs:[00000030h] 3_2_0146B171
Source: C:\Users\user\Desktop\invoice dhl.delivery document and original invoice sign.exe Code function: 3_2_01469100 mov eax, dword ptr fs:[00000030h] 3_2_01469100
Source: C:\Users\user\Desktop\invoice dhl.delivery document and original invoice sign.exe Code function: 3_2_01469100 mov eax, dword ptr fs:[00000030h] 3_2_01469100
Source: C:\Users\user\Desktop\invoice dhl.delivery document and original invoice sign.exe Code function: 3_2_01469100 mov eax, dword ptr fs:[00000030h] 3_2_01469100
Source: C:\Users\user\Desktop\invoice dhl.delivery document and original invoice sign.exe Code function: 3_2_01484120 mov eax, dword ptr fs:[00000030h] 3_2_01484120
Source: C:\Users\user\Desktop\invoice dhl.delivery document and original invoice sign.exe Code function: 3_2_01484120 mov eax, dword ptr fs:[00000030h] 3_2_01484120
Source: C:\Users\user\Desktop\invoice dhl.delivery document and original invoice sign.exe Code function: 3_2_01484120 mov eax, dword ptr fs:[00000030h] 3_2_01484120
Source: C:\Users\user\Desktop\invoice dhl.delivery document and original invoice sign.exe Code function: 3_2_01484120 mov eax, dword ptr fs:[00000030h] 3_2_01484120
Source: C:\Users\user\Desktop\invoice dhl.delivery document and original invoice sign.exe Code function: 3_2_01484120 mov ecx, dword ptr fs:[00000030h] 3_2_01484120
Source: C:\Users\user\Desktop\invoice dhl.delivery document and original invoice sign.exe Code function: 3_2_0149513A mov eax, dword ptr fs:[00000030h] 3_2_0149513A
Source: C:\Users\user\Desktop\invoice dhl.delivery document and original invoice sign.exe Code function: 3_2_0149513A mov eax, dword ptr fs:[00000030h] 3_2_0149513A
Source: C:\Users\user\Desktop\invoice dhl.delivery document and original invoice sign.exe Code function: 3_2_014F41E8 mov eax, dword ptr fs:[00000030h] 3_2_014F41E8
Source: C:\Users\user\Desktop\invoice dhl.delivery document and original invoice sign.exe Code function: 3_2_0146B1E1 mov eax, dword ptr fs:[00000030h] 3_2_0146B1E1
Source: C:\Users\user\Desktop\invoice dhl.delivery document and original invoice sign.exe Code function: 3_2_0146B1E1 mov eax, dword ptr fs:[00000030h] 3_2_0146B1E1
Source: C:\Users\user\Desktop\invoice dhl.delivery document and original invoice sign.exe Code function: 3_2_0146B1E1 mov eax, dword ptr fs:[00000030h] 3_2_0146B1E1
Source: C:\Users\user\Desktop\invoice dhl.delivery document and original invoice sign.exe Code function: 3_2_0148C182 mov eax, dword ptr fs:[00000030h] 3_2_0148C182
Source: C:\Users\user\Desktop\invoice dhl.delivery document and original invoice sign.exe Code function: 3_2_0149A185 mov eax, dword ptr fs:[00000030h] 3_2_0149A185
Source: C:\Users\user\Desktop\invoice dhl.delivery document and original invoice sign.exe Code function: 3_2_01492990 mov eax, dword ptr fs:[00000030h] 3_2_01492990
Source: C:\Users\user\Desktop\invoice dhl.delivery document and original invoice sign.exe Code function: 3_2_014E69A6 mov eax, dword ptr fs:[00000030h] 3_2_014E69A6
Source: C:\Users\user\Desktop\invoice dhl.delivery document and original invoice sign.exe Code function: 3_2_014961A0 mov eax, dword ptr fs:[00000030h] 3_2_014961A0
Source: C:\Users\user\Desktop\invoice dhl.delivery document and original invoice sign.exe Code function: 3_2_014961A0 mov eax, dword ptr fs:[00000030h] 3_2_014961A0
Source: C:\Users\user\Desktop\invoice dhl.delivery document and original invoice sign.exe Code function: 3_2_014E51BE mov eax, dword ptr fs:[00000030h] 3_2_014E51BE
Source: C:\Users\user\Desktop\invoice dhl.delivery document and original invoice sign.exe Code function: 3_2_014E51BE mov eax, dword ptr fs:[00000030h] 3_2_014E51BE
Source: C:\Users\user\Desktop\invoice dhl.delivery document and original invoice sign.exe Code function: 3_2_014E51BE mov eax, dword ptr fs:[00000030h] 3_2_014E51BE
Source: C:\Users\user\Desktop\invoice dhl.delivery document and original invoice sign.exe Code function: 3_2_014E51BE mov eax, dword ptr fs:[00000030h] 3_2_014E51BE
Source: C:\Users\user\Desktop\invoice dhl.delivery document and original invoice sign.exe Code function: 3_2_015249A4 mov eax, dword ptr fs:[00000030h] 3_2_015249A4
Source: C:\Users\user\Desktop\invoice dhl.delivery document and original invoice sign.exe Code function: 3_2_015249A4 mov eax, dword ptr fs:[00000030h] 3_2_015249A4
Source: C:\Users\user\Desktop\invoice dhl.delivery document and original invoice sign.exe Code function: 3_2_015249A4 mov eax, dword ptr fs:[00000030h] 3_2_015249A4
Source: C:\Users\user\Desktop\invoice dhl.delivery document and original invoice sign.exe Code function: 3_2_015249A4 mov eax, dword ptr fs:[00000030h] 3_2_015249A4
Source: C:\Users\user\Desktop\invoice dhl.delivery document and original invoice sign.exe Code function: 3_2_01480050 mov eax, dword ptr fs:[00000030h] 3_2_01480050
Source: C:\Users\user\Desktop\invoice dhl.delivery document and original invoice sign.exe Code function: 3_2_01480050 mov eax, dword ptr fs:[00000030h] 3_2_01480050
Source: C:\Users\user\Desktop\invoice dhl.delivery document and original invoice sign.exe Code function: 3_2_01522073 mov eax, dword ptr fs:[00000030h] 3_2_01522073
Source: C:\Users\user\Desktop\invoice dhl.delivery document and original invoice sign.exe Code function: 3_2_01531074 mov eax, dword ptr fs:[00000030h] 3_2_01531074
Source: C:\Users\user\Desktop\invoice dhl.delivery document and original invoice sign.exe Code function: 3_2_01534015 mov eax, dword ptr fs:[00000030h] 3_2_01534015
Source: C:\Users\user\Desktop\invoice dhl.delivery document and original invoice sign.exe Code function: 3_2_01534015 mov eax, dword ptr fs:[00000030h] 3_2_01534015
Source: C:\Users\user\Desktop\invoice dhl.delivery document and original invoice sign.exe Code function: 3_2_014E7016 mov eax, dword ptr fs:[00000030h] 3_2_014E7016
Source: C:\Users\user\Desktop\invoice dhl.delivery document and original invoice sign.exe Code function: 3_2_014E7016 mov eax, dword ptr fs:[00000030h] 3_2_014E7016
Source: C:\Users\user\Desktop\invoice dhl.delivery document and original invoice sign.exe Code function: 3_2_014E7016 mov eax, dword ptr fs:[00000030h] 3_2_014E7016
Source: C:\Users\user\Desktop\invoice dhl.delivery document and original invoice sign.exe Code function: 3_2_0149002D mov eax, dword ptr fs:[00000030h] 3_2_0149002D
Source: C:\Users\user\Desktop\invoice dhl.delivery document and original invoice sign.exe Code function: 3_2_0149002D mov eax, dword ptr fs:[00000030h] 3_2_0149002D
Source: C:\Users\user\Desktop\invoice dhl.delivery document and original invoice sign.exe Code function: 3_2_0149002D mov eax, dword ptr fs:[00000030h] 3_2_0149002D
Source: C:\Users\user\Desktop\invoice dhl.delivery document and original invoice sign.exe Code function: 3_2_0149002D mov eax, dword ptr fs:[00000030h] 3_2_0149002D
Source: C:\Users\user\Desktop\invoice dhl.delivery document and original invoice sign.exe Code function: 3_2_0149002D mov eax, dword ptr fs:[00000030h] 3_2_0149002D
Source: C:\Users\user\Desktop\invoice dhl.delivery document and original invoice sign.exe Code function: 3_2_0147B02A mov eax, dword ptr fs:[00000030h] 3_2_0147B02A
Source: C:\Users\user\Desktop\invoice dhl.delivery document and original invoice sign.exe Code function: 3_2_0147B02A mov eax, dword ptr fs:[00000030h] 3_2_0147B02A
Source: C:\Users\user\Desktop\invoice dhl.delivery document and original invoice sign.exe Code function: 3_2_0147B02A mov eax, dword ptr fs:[00000030h] 3_2_0147B02A
Source: C:\Users\user\Desktop\invoice dhl.delivery document and original invoice sign.exe Code function: 3_2_0147B02A mov eax, dword ptr fs:[00000030h] 3_2_0147B02A
Source: C:\Users\user\Desktop\invoice dhl.delivery document and original invoice sign.exe Code function: 3_2_014FB8D0 mov eax, dword ptr fs:[00000030h] 3_2_014FB8D0
Source: C:\Users\user\Desktop\invoice dhl.delivery document and original invoice sign.exe Code function: 3_2_014FB8D0 mov ecx, dword ptr fs:[00000030h] 3_2_014FB8D0
Source: C:\Users\user\Desktop\invoice dhl.delivery document and original invoice sign.exe Code function: 3_2_014FB8D0 mov eax, dword ptr fs:[00000030h] 3_2_014FB8D0
Source: C:\Users\user\Desktop\invoice dhl.delivery document and original invoice sign.exe Code function: 3_2_014FB8D0 mov eax, dword ptr fs:[00000030h] 3_2_014FB8D0
Source: C:\Users\user\Desktop\invoice dhl.delivery document and original invoice sign.exe Code function: 3_2_014FB8D0 mov eax, dword ptr fs:[00000030h] 3_2_014FB8D0
Source: C:\Users\user\Desktop\invoice dhl.delivery document and original invoice sign.exe Code function: 3_2_014FB8D0 mov eax, dword ptr fs:[00000030h] 3_2_014FB8D0
Source: C:\Users\user\Desktop\invoice dhl.delivery document and original invoice sign.exe Code function: 3_2_014640E1 mov eax, dword ptr fs:[00000030h] 3_2_014640E1
Source: C:\Users\user\Desktop\invoice dhl.delivery document and original invoice sign.exe Code function: 3_2_014640E1 mov eax, dword ptr fs:[00000030h] 3_2_014640E1
Source: C:\Users\user\Desktop\invoice dhl.delivery document and original invoice sign.exe Code function: 3_2_014640E1 mov eax, dword ptr fs:[00000030h] 3_2_014640E1
Source: C:\Users\user\Desktop\invoice dhl.delivery document and original invoice sign.exe Code function: 3_2_014658EC mov eax, dword ptr fs:[00000030h] 3_2_014658EC
Source: C:\Users\user\Desktop\invoice dhl.delivery document and original invoice sign.exe Code function: 3_2_01469080 mov eax, dword ptr fs:[00000030h] 3_2_01469080
Source: C:\Users\user\Desktop\invoice dhl.delivery document and original invoice sign.exe Code function: 3_2_014E3884 mov eax, dword ptr fs:[00000030h] 3_2_014E3884
Source: C:\Users\user\Desktop\invoice dhl.delivery document and original invoice sign.exe Code function: 3_2_014E3884 mov eax, dword ptr fs:[00000030h] 3_2_014E3884
Source: C:\Users\user\Desktop\invoice dhl.delivery document and original invoice sign.exe Code function: 3_2_014A90AF mov eax, dword ptr fs:[00000030h] 3_2_014A90AF
Source: C:\Users\user\Desktop\invoice dhl.delivery document and original invoice sign.exe Code function: 3_2_014920A0 mov eax, dword ptr fs:[00000030h] 3_2_014920A0
Source: C:\Users\user\Desktop\invoice dhl.delivery document and original invoice sign.exe Code function: 3_2_014920A0 mov eax, dword ptr fs:[00000030h] 3_2_014920A0
Source: C:\Users\user\Desktop\invoice dhl.delivery document and original invoice sign.exe Code function: 3_2_014920A0 mov eax, dword ptr fs:[00000030h] 3_2_014920A0
Source: C:\Users\user\Desktop\invoice dhl.delivery document and original invoice sign.exe Code function: 3_2_014920A0 mov eax, dword ptr fs:[00000030h] 3_2_014920A0
Source: C:\Users\user\Desktop\invoice dhl.delivery document and original invoice sign.exe Code function: 3_2_014920A0 mov eax, dword ptr fs:[00000030h] 3_2_014920A0
Source: C:\Users\user\Desktop\invoice dhl.delivery document and original invoice sign.exe Code function: 3_2_014920A0 mov eax, dword ptr fs:[00000030h] 3_2_014920A0
Source: C:\Users\user\Desktop\invoice dhl.delivery document and original invoice sign.exe Code function: 3_2_0149F0BF mov ecx, dword ptr fs:[00000030h] 3_2_0149F0BF
Source: C:\Users\user\Desktop\invoice dhl.delivery document and original invoice sign.exe Code function: 3_2_0149F0BF mov eax, dword ptr fs:[00000030h] 3_2_0149F0BF
Source: C:\Users\user\Desktop\invoice dhl.delivery document and original invoice sign.exe Code function: 3_2_0149F0BF mov eax, dword ptr fs:[00000030h] 3_2_0149F0BF
Source: C:\Users\user\Desktop\invoice dhl.delivery document and original invoice sign.exe Code function: 3_2_0146DB40 mov eax, dword ptr fs:[00000030h] 3_2_0146DB40
Source: C:\Users\user\Desktop\invoice dhl.delivery document and original invoice sign.exe Code function: 3_2_01538B58 mov eax, dword ptr fs:[00000030h] 3_2_01538B58
Source: C:\Users\user\Desktop\invoice dhl.delivery document and original invoice sign.exe Code function: 3_2_0146F358 mov eax, dword ptr fs:[00000030h] 3_2_0146F358
Source: C:\Users\user\Desktop\invoice dhl.delivery document and original invoice sign.exe Code function: 3_2_0146DB60 mov ecx, dword ptr fs:[00000030h] 3_2_0146DB60
Source: C:\Users\user\Desktop\invoice dhl.delivery document and original invoice sign.exe Code function: 3_2_01493B7A mov eax, dword ptr fs:[00000030h] 3_2_01493B7A
Source: C:\Users\user\Desktop\invoice dhl.delivery document and original invoice sign.exe Code function: 3_2_01493B7A mov eax, dword ptr fs:[00000030h] 3_2_01493B7A
Source: C:\Users\user\Desktop\invoice dhl.delivery document and original invoice sign.exe Code function: 3_2_0152131B mov eax, dword ptr fs:[00000030h] 3_2_0152131B
Source: C:\Users\user\Desktop\invoice dhl.delivery document and original invoice sign.exe Code function: 3_2_014E53CA mov eax, dword ptr fs:[00000030h] 3_2_014E53CA
Source: C:\Users\user\Desktop\invoice dhl.delivery document and original invoice sign.exe Code function: 3_2_014E53CA mov eax, dword ptr fs:[00000030h] 3_2_014E53CA
Source: C:\Users\user\Desktop\invoice dhl.delivery document and original invoice sign.exe Code function: 3_2_0148DBE9 mov eax, dword ptr fs:[00000030h] 3_2_0148DBE9
Source: C:\Users\user\Desktop\invoice dhl.delivery document and original invoice sign.exe Code function: 3_2_014903E2 mov eax, dword ptr fs:[00000030h] 3_2_014903E2
Source: C:\Users\user\Desktop\invoice dhl.delivery document and original invoice sign.exe Code function: 3_2_014903E2 mov eax, dword ptr fs:[00000030h] 3_2_014903E2
Source: C:\Users\user\Desktop\invoice dhl.delivery document and original invoice sign.exe Code function: 3_2_014903E2 mov eax, dword ptr fs:[00000030h] 3_2_014903E2
Source: C:\Users\user\Desktop\invoice dhl.delivery document and original invoice sign.exe Code function: 3_2_014903E2 mov eax, dword ptr fs:[00000030h] 3_2_014903E2
Source: C:\Users\user\Desktop\invoice dhl.delivery document and original invoice sign.exe Code function: 3_2_014903E2 mov eax, dword ptr fs:[00000030h] 3_2_014903E2
Source: C:\Users\user\Desktop\invoice dhl.delivery document and original invoice sign.exe Code function: 3_2_014903E2 mov eax, dword ptr fs:[00000030h] 3_2_014903E2
Source: C:\Users\user\Desktop\invoice dhl.delivery document and original invoice sign.exe Code function: 3_2_01471B8F mov eax, dword ptr fs:[00000030h] 3_2_01471B8F
Source: C:\Users\user\Desktop\invoice dhl.delivery document and original invoice sign.exe Code function: 3_2_01471B8F mov eax, dword ptr fs:[00000030h] 3_2_01471B8F
Source: C:\Users\user\Desktop\invoice dhl.delivery document and original invoice sign.exe Code function: 3_2_0151D380 mov ecx, dword ptr fs:[00000030h] 3_2_0151D380
Source: C:\Users\user\Desktop\invoice dhl.delivery document and original invoice sign.exe Code function: 3_2_0152138A mov eax, dword ptr fs:[00000030h] 3_2_0152138A
Source: C:\Users\user\Desktop\invoice dhl.delivery document and original invoice sign.exe Code function: 3_2_0149B390 mov eax, dword ptr fs:[00000030h] 3_2_0149B390
Source: C:\Users\user\Desktop\invoice dhl.delivery document and original invoice sign.exe Code function: 3_2_01492397 mov eax, dword ptr fs:[00000030h] 3_2_01492397
Source: C:\Users\user\Desktop\invoice dhl.delivery document and original invoice sign.exe Code function: 3_2_01494BAD mov eax, dword ptr fs:[00000030h] 3_2_01494BAD
Source: C:\Users\user\Desktop\invoice dhl.delivery document and original invoice sign.exe Code function: 3_2_01494BAD mov eax, dword ptr fs:[00000030h] 3_2_01494BAD
Source: C:\Users\user\Desktop\invoice dhl.delivery document and original invoice sign.exe Code function: 3_2_01494BAD mov eax, dword ptr fs:[00000030h] 3_2_01494BAD
Source: C:\Users\user\Desktop\invoice dhl.delivery document and original invoice sign.exe Code function: 3_2_01535BA5 mov eax, dword ptr fs:[00000030h] 3_2_01535BA5
Source: C:\Users\user\Desktop\invoice dhl.delivery document and original invoice sign.exe Code function: 3_2_01469240 mov eax, dword ptr fs:[00000030h] 3_2_01469240
Source: C:\Users\user\Desktop\invoice dhl.delivery document and original invoice sign.exe Code function: 3_2_01469240 mov eax, dword ptr fs:[00000030h] 3_2_01469240
Source: C:\Users\user\Desktop\invoice dhl.delivery document and original invoice sign.exe Code function: 3_2_01469240 mov eax, dword ptr fs:[00000030h] 3_2_01469240
Source: C:\Users\user\Desktop\invoice dhl.delivery document and original invoice sign.exe Code function: 3_2_01469240 mov eax, dword ptr fs:[00000030h] 3_2_01469240
Source: C:\Users\user\Desktop\invoice dhl.delivery document and original invoice sign.exe Code function: 3_2_0152EA55 mov eax, dword ptr fs:[00000030h] 3_2_0152EA55
Source: C:\Users\user\Desktop\invoice dhl.delivery document and original invoice sign.exe Code function: 3_2_014F4257 mov eax, dword ptr fs:[00000030h] 3_2_014F4257
Source: C:\Users\user\Desktop\invoice dhl.delivery document and original invoice sign.exe Code function: 3_2_014A927A mov eax, dword ptr fs:[00000030h] 3_2_014A927A
Source: C:\Users\user\Desktop\invoice dhl.delivery document and original invoice sign.exe Code function: 3_2_0151B260 mov eax, dword ptr fs:[00000030h] 3_2_0151B260
Source: C:\Users\user\Desktop\invoice dhl.delivery document and original invoice sign.exe Code function: 3_2_0151B260 mov eax, dword ptr fs:[00000030h] 3_2_0151B260
Source: C:\Users\user\Desktop\invoice dhl.delivery document and original invoice sign.exe Code function: 3_2_01538A62 mov eax, dword ptr fs:[00000030h] 3_2_01538A62
Source: C:\Users\user\Desktop\invoice dhl.delivery document and original invoice sign.exe Code function: 3_2_0152AA16 mov eax, dword ptr fs:[00000030h] 3_2_0152AA16
Source: C:\Users\user\Desktop\invoice dhl.delivery document and original invoice sign.exe Code function: 3_2_0152AA16 mov eax, dword ptr fs:[00000030h] 3_2_0152AA16
Source: C:\Users\user\Desktop\invoice dhl.delivery document and original invoice sign.exe Code function: 3_2_01478A0A mov eax, dword ptr fs:[00000030h] 3_2_01478A0A
Source: C:\Users\user\Desktop\invoice dhl.delivery document and original invoice sign.exe Code function: 3_2_0146AA16 mov eax, dword ptr fs:[00000030h] 3_2_0146AA16
Source: C:\Users\user\Desktop\invoice dhl.delivery document and original invoice sign.exe Code function: 3_2_0146AA16 mov eax, dword ptr fs:[00000030h] 3_2_0146AA16
Source: C:\Users\user\Desktop\invoice dhl.delivery document and original invoice sign.exe Code function: 3_2_01483A1C mov eax, dword ptr fs:[00000030h] 3_2_01483A1C
Source: C:\Users\user\Desktop\invoice dhl.delivery document and original invoice sign.exe Code function: 3_2_01465210 mov eax, dword ptr fs:[00000030h] 3_2_01465210
Source: C:\Users\user\Desktop\invoice dhl.delivery document and original invoice sign.exe Code function: 3_2_01465210 mov ecx, dword ptr fs:[00000030h] 3_2_01465210
Source: C:\Users\user\Desktop\invoice dhl.delivery document and original invoice sign.exe Code function: 3_2_01465210 mov eax, dword ptr fs:[00000030h] 3_2_01465210
Source: C:\Users\user\Desktop\invoice dhl.delivery document and original invoice sign.exe Code function: 3_2_01465210 mov eax, dword ptr fs:[00000030h] 3_2_01465210
Source: C:\Users\user\Desktop\invoice dhl.delivery document and original invoice sign.exe Code function: 3_2_014A4A2C mov eax, dword ptr fs:[00000030h] 3_2_014A4A2C
Source: C:\Users\user\Desktop\invoice dhl.delivery document and original invoice sign.exe Code function: 3_2_014A4A2C mov eax, dword ptr fs:[00000030h] 3_2_014A4A2C
Source: C:\Users\user\Desktop\invoice dhl.delivery document and original invoice sign.exe Code function: 3_2_01492ACB mov eax, dword ptr fs:[00000030h] 3_2_01492ACB
Source: C:\Users\user\Desktop\invoice dhl.delivery document and original invoice sign.exe Code function: 3_2_01492AE4 mov eax, dword ptr fs:[00000030h] 3_2_01492AE4
Source: C:\Users\user\Desktop\invoice dhl.delivery document and original invoice sign.exe Code function: 3_2_0149D294 mov eax, dword ptr fs:[00000030h] 3_2_0149D294
Source: C:\Users\user\Desktop\invoice dhl.delivery document and original invoice sign.exe Code function: 3_2_0149D294 mov eax, dword ptr fs:[00000030h] 3_2_0149D294
Source: C:\Users\user\Desktop\invoice dhl.delivery document and original invoice sign.exe Code function: 3_2_014652A5 mov eax, dword ptr fs:[00000030h] 3_2_014652A5
Source: C:\Users\user\Desktop\invoice dhl.delivery document and original invoice sign.exe Code function: 3_2_014652A5 mov eax, dword ptr fs:[00000030h] 3_2_014652A5
Source: C:\Users\user\Desktop\invoice dhl.delivery document and original invoice sign.exe Code function: 3_2_014652A5 mov eax, dword ptr fs:[00000030h] 3_2_014652A5
Source: C:\Users\user\Desktop\invoice dhl.delivery document and original invoice sign.exe Code function: 3_2_014652A5 mov eax, dword ptr fs:[00000030h] 3_2_014652A5
Source: C:\Users\user\Desktop\invoice dhl.delivery document and original invoice sign.exe Code function: 3_2_014652A5 mov eax, dword ptr fs:[00000030h] 3_2_014652A5
Source: C:\Users\user\Desktop\invoice dhl.delivery document and original invoice sign.exe Code function: 3_2_0147AAB0 mov eax, dword ptr fs:[00000030h] 3_2_0147AAB0
Source: C:\Users\user\Desktop\invoice dhl.delivery document and original invoice sign.exe Code function: 3_2_0147AAB0 mov eax, dword ptr fs:[00000030h] 3_2_0147AAB0
Source: C:\Users\user\Desktop\invoice dhl.delivery document and original invoice sign.exe Code function: 3_2_0149FAB0 mov eax, dword ptr fs:[00000030h] 3_2_0149FAB0
Source: C:\Users\user\Desktop\invoice dhl.delivery document and original invoice sign.exe Code function: 3_2_014A3D43 mov eax, dword ptr fs:[00000030h] 3_2_014A3D43
Source: C:\Users\user\Desktop\invoice dhl.delivery document and original invoice sign.exe Code function: 3_2_014E3540 mov eax, dword ptr fs:[00000030h] 3_2_014E3540
Source: C:\Users\user\Desktop\invoice dhl.delivery document and original invoice sign.exe Code function: 3_2_01513D40 mov eax, dword ptr fs:[00000030h] 3_2_01513D40
Source: C:\Users\user\Desktop\invoice dhl.delivery document and original invoice sign.exe Code function: 3_2_01487D50 mov eax, dword ptr fs:[00000030h] 3_2_01487D50
Source: C:\Users\user\Desktop\invoice dhl.delivery document and original invoice sign.exe Code function: 3_2_0148C577 mov eax, dword ptr fs:[00000030h] 3_2_0148C577
Source: C:\Users\user\Desktop\invoice dhl.delivery document and original invoice sign.exe Code function: 3_2_0148C577 mov eax, dword ptr fs:[00000030h] 3_2_0148C577
Source: C:\Users\user\Desktop\invoice dhl.delivery document and original invoice sign.exe Code function: 3_2_01538D34 mov eax, dword ptr fs:[00000030h] 3_2_01538D34
Source: C:\Users\user\Desktop\invoice dhl.delivery document and original invoice sign.exe Code function: 3_2_0152E539 mov eax, dword ptr fs:[00000030h] 3_2_0152E539
Source: C:\Users\user\Desktop\invoice dhl.delivery document and original invoice sign.exe Code function: 3_2_01494D3B mov eax, dword ptr fs:[00000030h] 3_2_01494D3B
Source: C:\Users\user\Desktop\invoice dhl.delivery document and original invoice sign.exe Code function: 3_2_01494D3B mov eax, dword ptr fs:[00000030h] 3_2_01494D3B
Source: C:\Users\user\Desktop\invoice dhl.delivery document and original invoice sign.exe Code function: 3_2_01494D3B mov eax, dword ptr fs:[00000030h] 3_2_01494D3B
Source: C:\Users\user\Desktop\invoice dhl.delivery document and original invoice sign.exe Code function: 3_2_01473D34 mov eax, dword ptr fs:[00000030h] 3_2_01473D34
Source: C:\Users\user\Desktop\invoice dhl.delivery document and original invoice sign.exe Code function: 3_2_01473D34 mov eax, dword ptr fs:[00000030h] 3_2_01473D34
Source: C:\Users\user\Desktop\invoice dhl.delivery document and original invoice sign.exe Code function: 3_2_01473D34 mov eax, dword ptr fs:[00000030h] 3_2_01473D34
Source: C:\Users\user\Desktop\invoice dhl.delivery document and original invoice sign.exe Code function: 3_2_01473D34 mov eax, dword ptr fs:[00000030h] 3_2_01473D34
Source: C:\Users\user\Desktop\invoice dhl.delivery document and original invoice sign.exe Code function: 3_2_01473D34 mov eax, dword ptr fs:[00000030h] 3_2_01473D34
Source: C:\Users\user\Desktop\invoice dhl.delivery document and original invoice sign.exe Code function: 3_2_01473D34 mov eax, dword ptr fs:[00000030h] 3_2_01473D34
Source: C:\Users\user\Desktop\invoice dhl.delivery document and original invoice sign.exe Code function: 3_2_01473D34 mov eax, dword ptr fs:[00000030h] 3_2_01473D34
Source: C:\Users\user\Desktop\invoice dhl.delivery document and original invoice sign.exe Code function: 3_2_01473D34 mov eax, dword ptr fs:[00000030h] 3_2_01473D34
Source: C:\Users\user\Desktop\invoice dhl.delivery document and original invoice sign.exe Code function: 3_2_01473D34 mov eax, dword ptr fs:[00000030h] 3_2_01473D34
Source: C:\Users\user\Desktop\invoice dhl.delivery document and original invoice sign.exe Code function: 3_2_01473D34 mov eax, dword ptr fs:[00000030h] 3_2_01473D34
Source: C:\Users\user\Desktop\invoice dhl.delivery document and original invoice sign.exe Code function: 3_2_01473D34 mov eax, dword ptr fs:[00000030h] 3_2_01473D34
Source: C:\Users\user\Desktop\invoice dhl.delivery document and original invoice sign.exe Code function: 3_2_01473D34 mov eax, dword ptr fs:[00000030h] 3_2_01473D34
Source: C:\Users\user\Desktop\invoice dhl.delivery document and original invoice sign.exe Code function: 3_2_01473D34 mov eax, dword ptr fs:[00000030h] 3_2_01473D34
Source: C:\Users\user\Desktop\invoice dhl.delivery document and original invoice sign.exe Code function: 3_2_0146AD30 mov eax, dword ptr fs:[00000030h] 3_2_0146AD30
Source: C:\Users\user\Desktop\invoice dhl.delivery document and original invoice sign.exe Code function: 3_2_014EA537 mov eax, dword ptr fs:[00000030h] 3_2_014EA537
Source: C:\Users\user\Desktop\invoice dhl.delivery document and original invoice sign.exe Code function: 3_2_014E6DC9 mov eax, dword ptr fs:[00000030h] 3_2_014E6DC9
Source: C:\Users\user\Desktop\invoice dhl.delivery document and original invoice sign.exe Code function: 3_2_014E6DC9 mov eax, dword ptr fs:[00000030h] 3_2_014E6DC9
Source: C:\Users\user\Desktop\invoice dhl.delivery document and original invoice sign.exe Code function: 3_2_014E6DC9 mov eax, dword ptr fs:[00000030h] 3_2_014E6DC9
Source: C:\Users\user\Desktop\invoice dhl.delivery document and original invoice sign.exe Code function: 3_2_014E6DC9 mov ecx, dword ptr fs:[00000030h] 3_2_014E6DC9
Source: C:\Users\user\Desktop\invoice dhl.delivery document and original invoice sign.exe Code function: 3_2_014E6DC9 mov eax, dword ptr fs:[00000030h] 3_2_014E6DC9
Source: C:\Users\user\Desktop\invoice dhl.delivery document and original invoice sign.exe Code function: 3_2_014E6DC9 mov eax, dword ptr fs:[00000030h] 3_2_014E6DC9
Source: C:\Users\user\Desktop\invoice dhl.delivery document and original invoice sign.exe Code function: 3_2_01518DF1 mov eax, dword ptr fs:[00000030h] 3_2_01518DF1
Source: C:\Users\user\Desktop\invoice dhl.delivery document and original invoice sign.exe Code function: 3_2_0147D5E0 mov eax, dword ptr fs:[00000030h] 3_2_0147D5E0
Source: C:\Users\user\Desktop\invoice dhl.delivery document and original invoice sign.exe Code function: 3_2_0147D5E0 mov eax, dword ptr fs:[00000030h] 3_2_0147D5E0
Source: C:\Users\user\Desktop\invoice dhl.delivery document and original invoice sign.exe Code function: 3_2_0152FDE2 mov eax, dword ptr fs:[00000030h] 3_2_0152FDE2
Source: C:\Users\user\Desktop\invoice dhl.delivery document and original invoice sign.exe Code function: 3_2_0152FDE2 mov eax, dword ptr fs:[00000030h] 3_2_0152FDE2
Source: C:\Users\user\Desktop\invoice dhl.delivery document and original invoice sign.exe Code function: 3_2_0152FDE2 mov eax, dword ptr fs:[00000030h] 3_2_0152FDE2
Source: C:\Users\user\Desktop\invoice dhl.delivery document and original invoice sign.exe Code function: 3_2_0152FDE2 mov eax, dword ptr fs:[00000030h] 3_2_0152FDE2
Source: C:\Users\user\Desktop\invoice dhl.delivery document and original invoice sign.exe Code function: 3_2_01492581 mov eax, dword ptr fs:[00000030h] 3_2_01492581
Source: C:\Users\user\Desktop\invoice dhl.delivery document and original invoice sign.exe Code function: 3_2_01492581 mov eax, dword ptr fs:[00000030h] 3_2_01492581
Source: C:\Users\user\Desktop\invoice dhl.delivery document and original invoice sign.exe Code function: 3_2_01492581 mov eax, dword ptr fs:[00000030h] 3_2_01492581
Source: C:\Users\user\Desktop\invoice dhl.delivery document and original invoice sign.exe Code function: 3_2_01492581 mov eax, dword ptr fs:[00000030h] 3_2_01492581
Source: C:\Users\user\Desktop\invoice dhl.delivery document and original invoice sign.exe Code function: 3_2_01462D8A mov eax, dword ptr fs:[00000030h] 3_2_01462D8A
Source: C:\Users\user\Desktop\invoice dhl.delivery document and original invoice sign.exe Code function: 3_2_01462D8A mov eax, dword ptr fs:[00000030h] 3_2_01462D8A
Source: C:\Users\user\Desktop\invoice dhl.delivery document and original invoice sign.exe Code function: 3_2_01462D8A mov eax, dword ptr fs:[00000030h] 3_2_01462D8A
Source: C:\Users\user\Desktop\invoice dhl.delivery document and original invoice sign.exe Code function: 3_2_01462D8A mov eax, dword ptr fs:[00000030h] 3_2_01462D8A
Source: C:\Users\user\Desktop\invoice dhl.delivery document and original invoice sign.exe Code function: 3_2_01462D8A mov eax, dword ptr fs:[00000030h] 3_2_01462D8A
Source: C:\Users\user\Desktop\invoice dhl.delivery document and original invoice sign.exe Code function: 3_2_0149FD9B mov eax, dword ptr fs:[00000030h] 3_2_0149FD9B
Source: C:\Users\user\Desktop\invoice dhl.delivery document and original invoice sign.exe Code function: 3_2_0149FD9B mov eax, dword ptr fs:[00000030h] 3_2_0149FD9B
Source: C:\Users\user\Desktop\invoice dhl.delivery document and original invoice sign.exe Code function: 3_2_014935A1 mov eax, dword ptr fs:[00000030h] 3_2_014935A1
Source: C:\Users\user\Desktop\invoice dhl.delivery document and original invoice sign.exe Code function: 3_2_01491DB5 mov eax, dword ptr fs:[00000030h] 3_2_01491DB5
Source: C:\Users\user\Desktop\invoice dhl.delivery document and original invoice sign.exe Code function: 3_2_01491DB5 mov eax, dword ptr fs:[00000030h] 3_2_01491DB5
Source: C:\Users\user\Desktop\invoice dhl.delivery document and original invoice sign.exe Code function: 3_2_01491DB5 mov eax, dword ptr fs:[00000030h] 3_2_01491DB5
Source: C:\Users\user\Desktop\invoice dhl.delivery document and original invoice sign.exe Code function: 3_2_015305AC mov eax, dword ptr fs:[00000030h] 3_2_015305AC
Source: C:\Users\user\Desktop\invoice dhl.delivery document and original invoice sign.exe Code function: 3_2_015305AC mov eax, dword ptr fs:[00000030h] 3_2_015305AC
Source: C:\Users\user\Desktop\invoice dhl.delivery document and original invoice sign.exe Code function: 3_2_0149A44B mov eax, dword ptr fs:[00000030h] 3_2_0149A44B
Source: C:\Users\user\Desktop\invoice dhl.delivery document and original invoice sign.exe Code function: 3_2_014FC450 mov eax, dword ptr fs:[00000030h] 3_2_014FC450
Source: C:\Users\user\Desktop\invoice dhl.delivery document and original invoice sign.exe Code function: 3_2_014FC450 mov eax, dword ptr fs:[00000030h] 3_2_014FC450
Source: C:\Users\user\Desktop\invoice dhl.delivery document and original invoice sign.exe Code function: 3_2_0148746D mov eax, dword ptr fs:[00000030h] 3_2_0148746D
Source: C:\Users\user\Desktop\invoice dhl.delivery document and original invoice sign.exe Code function: 3_2_014E6C0A mov eax, dword ptr fs:[00000030h] 3_2_014E6C0A
Source: C:\Users\user\Desktop\invoice dhl.delivery document and original invoice sign.exe Code function: 3_2_014E6C0A mov eax, dword ptr fs:[00000030h] 3_2_014E6C0A
Source: C:\Users\user\Desktop\invoice dhl.delivery document and original invoice sign.exe Code function: 3_2_014E6C0A mov eax, dword ptr fs:[00000030h] 3_2_014E6C0A
Source: C:\Users\user\Desktop\invoice dhl.delivery document and original invoice sign.exe Code function: 3_2_014E6C0A mov eax, dword ptr fs:[00000030h] 3_2_014E6C0A
Source: C:\Users\user\Desktop\invoice dhl.delivery document and original invoice sign.exe Code function: 3_2_01521C06 mov eax, dword ptr fs:[00000030h] 3_2_01521C06
Source: C:\Users\user\Desktop\invoice dhl.delivery document and original invoice sign.exe Code function: 3_2_01521C06 mov eax, dword ptr fs:[00000030h] 3_2_01521C06
Source: C:\Users\user\Desktop\invoice dhl.delivery document and original invoice sign.exe Code function: 3_2_01521C06 mov eax, dword ptr fs:[00000030h] 3_2_01521C06
Source: C:\Users\user\Desktop\invoice dhl.delivery document and original invoice sign.exe Code function: 3_2_01521C06 mov eax, dword ptr fs:[00000030h] 3_2_01521C06
Source: C:\Users\user\Desktop\invoice dhl.delivery document and original invoice sign.exe Code function: 3_2_01521C06 mov eax, dword ptr fs:[00000030h] 3_2_01521C06
Source: C:\Users\user\Desktop\invoice dhl.delivery document and original invoice sign.exe Code function: 3_2_01521C06 mov eax, dword ptr fs:[00000030h] 3_2_01521C06
Source: C:\Users\user\Desktop\invoice dhl.delivery document and original invoice sign.exe Code function: 3_2_01521C06 mov eax, dword ptr fs:[00000030h] 3_2_01521C06
Source: C:\Users\user\Desktop\invoice dhl.delivery document and original invoice sign.exe Code function: 3_2_01521C06 mov eax, dword ptr fs:[00000030h] 3_2_01521C06
Source: C:\Users\user\Desktop\invoice dhl.delivery document and original invoice sign.exe Code function: 3_2_01521C06 mov eax, dword ptr fs:[00000030h] 3_2_01521C06
Source: C:\Users\user\Desktop\invoice dhl.delivery document and original invoice sign.exe Code function: 3_2_01521C06 mov eax, dword ptr fs:[00000030h] 3_2_01521C06
Source: C:\Users\user\Desktop\invoice dhl.delivery document and original invoice sign.exe Code function: 3_2_01521C06 mov eax, dword ptr fs:[00000030h] 3_2_01521C06
Source: C:\Users\user\Desktop\invoice dhl.delivery document and original invoice sign.exe Code function: 3_2_01521C06 mov eax, dword ptr fs:[00000030h] 3_2_01521C06
Source: C:\Users\user\Desktop\invoice dhl.delivery document and original invoice sign.exe Code function: 3_2_01521C06 mov eax, dword ptr fs:[00000030h] 3_2_01521C06
Source: C:\Users\user\Desktop\invoice dhl.delivery document and original invoice sign.exe Code function: 3_2_01521C06 mov eax, dword ptr fs:[00000030h] 3_2_01521C06
Source: C:\Users\user\Desktop\invoice dhl.delivery document and original invoice sign.exe Code function: 3_2_0153740D mov eax, dword ptr fs:[00000030h] 3_2_0153740D
Source: C:\Users\user\Desktop\invoice dhl.delivery document and original invoice sign.exe Code function: 3_2_0153740D mov eax, dword ptr fs:[00000030h] 3_2_0153740D
Source: C:\Users\user\Desktop\invoice dhl.delivery document and original invoice sign.exe Code function: 3_2_0153740D mov eax, dword ptr fs:[00000030h] 3_2_0153740D
Source: C:\Users\user\Desktop\invoice dhl.delivery document and original invoice sign.exe Code function: 3_2_0149BC2C mov eax, dword ptr fs:[00000030h] 3_2_0149BC2C
Source: C:\Users\user\Desktop\invoice dhl.delivery document and original invoice sign.exe Code function: 3_2_01538CD6 mov eax, dword ptr fs:[00000030h] 3_2_01538CD6
Source: C:\Users\user\Desktop\invoice dhl.delivery document and original invoice sign.exe Code function: 3_2_015214FB mov eax, dword ptr fs:[00000030h] 3_2_015214FB
Source: C:\Users\user\Desktop\invoice dhl.delivery document and original invoice sign.exe Code function: 3_2_014E6CF0 mov eax, dword ptr fs:[00000030h] 3_2_014E6CF0
Source: C:\Users\user\Desktop\invoice dhl.delivery document and original invoice sign.exe Code function: 3_2_014E6CF0 mov eax, dword ptr fs:[00000030h] 3_2_014E6CF0
Source: C:\Users\user\Desktop\invoice dhl.delivery document and original invoice sign.exe Code function: 3_2_014E6CF0 mov eax, dword ptr fs:[00000030h] 3_2_014E6CF0
Source: C:\Users\user\Desktop\invoice dhl.delivery document and original invoice sign.exe Code function: 3_2_0147849B mov eax, dword ptr fs:[00000030h] 3_2_0147849B
Source: C:\Users\user\Desktop\invoice dhl.delivery document and original invoice sign.exe Code function: 3_2_0147EF40 mov eax, dword ptr fs:[00000030h] 3_2_0147EF40
Source: C:\Users\user\Desktop\invoice dhl.delivery document and original invoice sign.exe Code function: 3_2_0147FF60 mov eax, dword ptr fs:[00000030h] 3_2_0147FF60
Source: C:\Users\user\Desktop\invoice dhl.delivery document and original invoice sign.exe Code function: 3_2_01538F6A mov eax, dword ptr fs:[00000030h] 3_2_01538F6A
Source: C:\Users\user\Desktop\invoice dhl.delivery document and original invoice sign.exe Code function: 3_2_0149A70E mov eax, dword ptr fs:[00000030h] 3_2_0149A70E
Source: C:\Users\user\Desktop\invoice dhl.delivery document and original invoice sign.exe Code function: 3_2_0149A70E mov eax, dword ptr fs:[00000030h] 3_2_0149A70E
Source: C:\Users\user\Desktop\invoice dhl.delivery document and original invoice sign.exe Code function: 3_2_0153070D mov eax, dword ptr fs:[00000030h] 3_2_0153070D
Source: C:\Users\user\Desktop\invoice dhl.delivery document and original invoice sign.exe Code function: 3_2_0153070D mov eax, dword ptr fs:[00000030h] 3_2_0153070D
Source: C:\Users\user\Desktop\invoice dhl.delivery document and original invoice sign.exe Code function: 3_2_0148F716 mov eax, dword ptr fs:[00000030h] 3_2_0148F716
Source: C:\Users\user\Desktop\invoice dhl.delivery document and original invoice sign.exe Code function: 3_2_014FFF10 mov eax, dword ptr fs:[00000030h] 3_2_014FFF10
Source: C:\Users\user\Desktop\invoice dhl.delivery document and original invoice sign.exe Code function: 3_2_014FFF10 mov eax, dword ptr fs:[00000030h] 3_2_014FFF10
Source: C:\Users\user\Desktop\invoice dhl.delivery document and original invoice sign.exe Code function: 3_2_01464F2E mov eax, dword ptr fs:[00000030h] 3_2_01464F2E
Source: C:\Users\user\Desktop\invoice dhl.delivery document and original invoice sign.exe Code function: 3_2_01464F2E mov eax, dword ptr fs:[00000030h] 3_2_01464F2E
Source: C:\Users\user\Desktop\invoice dhl.delivery document and original invoice sign.exe Code function: 3_2_0149E730 mov eax, dword ptr fs:[00000030h] 3_2_0149E730
Source: C:\Users\user\Desktop\invoice dhl.delivery document and original invoice sign.exe Code function: 3_2_014A37F5 mov eax, dword ptr fs:[00000030h] 3_2_014A37F5
Source: C:\Users\user\Desktop\invoice dhl.delivery document and original invoice sign.exe Code function: 3_2_01478794 mov eax, dword ptr fs:[00000030h] 3_2_01478794
Source: C:\Users\user\Desktop\invoice dhl.delivery document and original invoice sign.exe Code function: 3_2_014E7794 mov eax, dword ptr fs:[00000030h] 3_2_014E7794
Source: C:\Users\user\Desktop\invoice dhl.delivery document and original invoice sign.exe Code function: 3_2_014E7794 mov eax, dword ptr fs:[00000030h] 3_2_014E7794
Source: C:\Users\user\Desktop\invoice dhl.delivery document and original invoice sign.exe Code function: 3_2_014E7794 mov eax, dword ptr fs:[00000030h] 3_2_014E7794
Source: C:\Users\user\Desktop\invoice dhl.delivery document and original invoice sign.exe Code function: 3_2_01477E41 mov eax, dword ptr fs:[00000030h] 3_2_01477E41
Source: C:\Users\user\Desktop\invoice dhl.delivery document and original invoice sign.exe Code function: 3_2_01477E41 mov eax, dword ptr fs:[00000030h] 3_2_01477E41
Source: C:\Users\user\Desktop\invoice dhl.delivery document and original invoice sign.exe Code function: 3_2_01477E41 mov eax, dword ptr fs:[00000030h] 3_2_01477E41
Source: C:\Users\user\Desktop\invoice dhl.delivery document and original invoice sign.exe Code function: 3_2_01477E41 mov eax, dword ptr fs:[00000030h] 3_2_01477E41
Source: C:\Users\user\Desktop\invoice dhl.delivery document and original invoice sign.exe Code function: 3_2_01477E41 mov eax, dword ptr fs:[00000030h] 3_2_01477E41
Source: C:\Users\user\Desktop\invoice dhl.delivery document and original invoice sign.exe Code function: 3_2_01477E41 mov eax, dword ptr fs:[00000030h] 3_2_01477E41
Source: C:\Users\user\Desktop\invoice dhl.delivery document and original invoice sign.exe Code function: 3_2_0152AE44 mov eax, dword ptr fs:[00000030h] 3_2_0152AE44
Source: C:\Users\user\Desktop\invoice dhl.delivery document and original invoice sign.exe Code function: 3_2_0152AE44 mov eax, dword ptr fs:[00000030h] 3_2_0152AE44
Source: C:\Users\user\Desktop\invoice dhl.delivery document and original invoice sign.exe Code function: 3_2_0147766D mov eax, dword ptr fs:[00000030h] 3_2_0147766D
Source: C:\Users\user\Desktop\invoice dhl.delivery document and original invoice sign.exe Code function: 3_2_0148AE73 mov eax, dword ptr fs:[00000030h] 3_2_0148AE73
Source: C:\Users\user\Desktop\invoice dhl.delivery document and original invoice sign.exe Code function: 3_2_0148AE73 mov eax, dword ptr fs:[00000030h] 3_2_0148AE73
Source: C:\Users\user\Desktop\invoice dhl.delivery document and original invoice sign.exe Code function: 3_2_0148AE73 mov eax, dword ptr fs:[00000030h] 3_2_0148AE73
Source: C:\Users\user\Desktop\invoice dhl.delivery document and original invoice sign.exe Code function: 3_2_0148AE73 mov eax, dword ptr fs:[00000030h] 3_2_0148AE73
Source: C:\Users\user\Desktop\invoice dhl.delivery document and original invoice sign.exe Code function: 3_2_0148AE73 mov eax, dword ptr fs:[00000030h] 3_2_0148AE73
Source: C:\Users\user\Desktop\invoice dhl.delivery document and original invoice sign.exe Code function: 3_2_0146C600 mov eax, dword ptr fs:[00000030h] 3_2_0146C600
Source: C:\Users\user\Desktop\invoice dhl.delivery document and original invoice sign.exe Code function: 3_2_0146C600 mov eax, dword ptr fs:[00000030h] 3_2_0146C600
Source: C:\Users\user\Desktop\invoice dhl.delivery document and original invoice sign.exe Code function: 3_2_0146C600 mov eax, dword ptr fs:[00000030h] 3_2_0146C600
Source: C:\Users\user\Desktop\invoice dhl.delivery document and original invoice sign.exe Code function: 3_2_01498E00 mov eax, dword ptr fs:[00000030h] 3_2_01498E00
Source: C:\Users\user\Desktop\invoice dhl.delivery document and original invoice sign.exe Code function: 3_2_0149A61C mov eax, dword ptr fs:[00000030h] 3_2_0149A61C
Source: C:\Users\user\Desktop\invoice dhl.delivery document and original invoice sign.exe Code function: 3_2_0149A61C mov eax, dword ptr fs:[00000030h] 3_2_0149A61C
Source: C:\Users\user\Desktop\invoice dhl.delivery document and original invoice sign.exe Code function: 3_2_01521608 mov eax, dword ptr fs:[00000030h] 3_2_01521608
Source: C:\Users\user\Desktop\invoice dhl.delivery document and original invoice sign.exe Code function: 3_2_0146E620 mov eax, dword ptr fs:[00000030h] 3_2_0146E620
Source: C:\Users\user\Desktop\invoice dhl.delivery document and original invoice sign.exe Code function: 3_2_0151FE3F mov eax, dword ptr fs:[00000030h] 3_2_0151FE3F
Source: C:\Users\user\Desktop\invoice dhl.delivery document and original invoice sign.exe Code function: 3_2_01538ED6 mov eax, dword ptr fs:[00000030h] 3_2_01538ED6
Source: C:\Users\user\Desktop\invoice dhl.delivery document and original invoice sign.exe Code function: 3_2_014936CC mov eax, dword ptr fs:[00000030h] 3_2_014936CC
Source: C:\Users\user\Desktop\invoice dhl.delivery document and original invoice sign.exe Code function: 3_2_014A8EC7 mov eax, dword ptr fs:[00000030h] 3_2_014A8EC7
Source: C:\Users\user\Desktop\invoice dhl.delivery document and original invoice sign.exe Code function: 3_2_0151FEC0 mov eax, dword ptr fs:[00000030h] 3_2_0151FEC0
Source: C:\Users\user\Desktop\invoice dhl.delivery document and original invoice sign.exe Code function: 3_2_014776E2 mov eax, dword ptr fs:[00000030h] 3_2_014776E2
Source: C:\Users\user\Desktop\invoice dhl.delivery document and original invoice sign.exe Code function: 3_2_014916E0 mov ecx, dword ptr fs:[00000030h] 3_2_014916E0
Source: C:\Users\user\Desktop\invoice dhl.delivery document and original invoice sign.exe Code function: 3_2_014FFE87 mov eax, dword ptr fs:[00000030h] 3_2_014FFE87
Source: C:\Users\user\Desktop\invoice dhl.delivery document and original invoice sign.exe Code function: 3_2_014E46A7 mov eax, dword ptr fs:[00000030h] 3_2_014E46A7
Source: C:\Users\user\Desktop\invoice dhl.delivery document and original invoice sign.exe Code function: 3_2_01530EA5 mov eax, dword ptr fs:[00000030h] 3_2_01530EA5
Source: C:\Users\user\Desktop\invoice dhl.delivery document and original invoice sign.exe Code function: 3_2_01530EA5 mov eax, dword ptr fs:[00000030h] 3_2_01530EA5
Source: C:\Users\user\Desktop\invoice dhl.delivery document and original invoice sign.exe Code function: 3_2_01530EA5 mov eax, dword ptr fs:[00000030h] 3_2_01530EA5
Source: C:\Windows\SysWOW64\msdt.exe Code function: 11_2_0491849B mov eax, dword ptr fs:[00000030h] 11_2_0491849B
Source: C:\Windows\SysWOW64\msdt.exe Code function: 11_2_04909080 mov eax, dword ptr fs:[00000030h] 11_2_04909080
Source: C:\Windows\SysWOW64\msdt.exe Code function: 11_2_04983884 mov eax, dword ptr fs:[00000030h] 11_2_04983884
Source: C:\Windows\SysWOW64\msdt.exe Code function: 11_2_04983884 mov eax, dword ptr fs:[00000030h] 11_2_04983884
Source: C:\Windows\SysWOW64\msdt.exe Code function: 11_2_0493F0BF mov ecx, dword ptr fs:[00000030h] 11_2_0493F0BF
Source: C:\Windows\SysWOW64\msdt.exe Code function: 11_2_0493F0BF mov eax, dword ptr fs:[00000030h] 11_2_0493F0BF
Source: C:\Windows\SysWOW64\msdt.exe Code function: 11_2_0493F0BF mov eax, dword ptr fs:[00000030h] 11_2_0493F0BF
Source: C:\Windows\SysWOW64\msdt.exe Code function: 11_2_049320A0 mov eax, dword ptr fs:[00000030h] 11_2_049320A0
Source: C:\Windows\SysWOW64\msdt.exe Code function: 11_2_049320A0 mov eax, dword ptr fs:[00000030h] 11_2_049320A0
Source: C:\Windows\SysWOW64\msdt.exe Code function: 11_2_049320A0 mov eax, dword ptr fs:[00000030h] 11_2_049320A0
Source: C:\Windows\SysWOW64\msdt.exe Code function: 11_2_049320A0 mov eax, dword ptr fs:[00000030h] 11_2_049320A0
Source: C:\Windows\SysWOW64\msdt.exe Code function: 11_2_049320A0 mov eax, dword ptr fs:[00000030h] 11_2_049320A0
Source: C:\Windows\SysWOW64\msdt.exe Code function: 11_2_049320A0 mov eax, dword ptr fs:[00000030h] 11_2_049320A0
Source: C:\Windows\SysWOW64\msdt.exe Code function: 11_2_049490AF mov eax, dword ptr fs:[00000030h] 11_2_049490AF
Source: C:\Windows\SysWOW64\msdt.exe Code function: 11_2_0499B8D0 mov eax, dword ptr fs:[00000030h] 11_2_0499B8D0
Source: C:\Windows\SysWOW64\msdt.exe Code function: 11_2_0499B8D0 mov ecx, dword ptr fs:[00000030h] 11_2_0499B8D0
Source: C:\Windows\SysWOW64\msdt.exe Code function: 11_2_0499B8D0 mov eax, dword ptr fs:[00000030h] 11_2_0499B8D0
Source: C:\Windows\SysWOW64\msdt.exe Code function: 11_2_0499B8D0 mov eax, dword ptr fs:[00000030h] 11_2_0499B8D0
Source: C:\Windows\SysWOW64\msdt.exe Code function: 11_2_0499B8D0 mov eax, dword ptr fs:[00000030h] 11_2_0499B8D0
Source: C:\Windows\SysWOW64\msdt.exe Code function: 11_2_0499B8D0 mov eax, dword ptr fs:[00000030h] 11_2_0499B8D0
Source: C:\Windows\SysWOW64\msdt.exe Code function: 11_2_049D8CD6 mov eax, dword ptr fs:[00000030h] 11_2_049D8CD6
Source: C:\Windows\SysWOW64\msdt.exe Code function: 11_2_049C14FB mov eax, dword ptr fs:[00000030h] 11_2_049C14FB
Source: C:\Windows\SysWOW64\msdt.exe Code function: 11_2_04986CF0 mov eax, dword ptr fs:[00000030h] 11_2_04986CF0
Source: C:\Windows\SysWOW64\msdt.exe Code function: 11_2_04986CF0 mov eax, dword ptr fs:[00000030h] 11_2_04986CF0
Source: C:\Windows\SysWOW64\msdt.exe Code function: 11_2_04986CF0 mov eax, dword ptr fs:[00000030h] 11_2_04986CF0
Source: C:\Windows\SysWOW64\msdt.exe Code function: 11_2_049058EC mov eax, dword ptr fs:[00000030h] 11_2_049058EC
Source: C:\Windows\SysWOW64\msdt.exe Code function: 11_2_049D4015 mov eax, dword ptr fs:[00000030h] 11_2_049D4015
Source: C:\Windows\SysWOW64\msdt.exe Code function: 11_2_049D4015 mov eax, dword ptr fs:[00000030h] 11_2_049D4015
Source: C:\Windows\SysWOW64\msdt.exe Code function: 11_2_04987016 mov eax, dword ptr fs:[00000030h] 11_2_04987016
Source: C:\Windows\SysWOW64\msdt.exe Code function: 11_2_04987016 mov eax, dword ptr fs:[00000030h] 11_2_04987016
Source: C:\Windows\SysWOW64\msdt.exe Code function: 11_2_04987016 mov eax, dword ptr fs:[00000030h] 11_2_04987016
Source: C:\Windows\SysWOW64\msdt.exe Code function: 11_2_049D740D mov eax, dword ptr fs:[00000030h] 11_2_049D740D
Source: C:\Windows\SysWOW64\msdt.exe Code function: 11_2_049D740D mov eax, dword ptr fs:[00000030h] 11_2_049D740D
Source: C:\Windows\SysWOW64\msdt.exe Code function: 11_2_049D740D mov eax, dword ptr fs:[00000030h] 11_2_049D740D
Source: C:\Windows\SysWOW64\msdt.exe Code function: 11_2_04986C0A mov eax, dword ptr fs:[00000030h] 11_2_04986C0A
Source: C:\Windows\SysWOW64\msdt.exe Code function: 11_2_04986C0A mov eax, dword ptr fs:[00000030h] 11_2_04986C0A
Source: C:\Windows\SysWOW64\msdt.exe Code function: 11_2_04986C0A mov eax, dword ptr fs:[00000030h] 11_2_04986C0A
Source: C:\Windows\SysWOW64\msdt.exe Code function: 11_2_04986C0A mov eax, dword ptr fs:[00000030h] 11_2_04986C0A
Source: C:\Windows\SysWOW64\msdt.exe Code function: 11_2_049C1C06 mov eax, dword ptr fs:[00000030h] 11_2_049C1C06
Source: C:\Windows\SysWOW64\msdt.exe Code function: 11_2_049C1C06 mov eax, dword ptr fs:[00000030h] 11_2_049C1C06
Source: C:\Windows\SysWOW64\msdt.exe Code function: 11_2_049C1C06 mov eax, dword ptr fs:[00000030h] 11_2_049C1C06
Source: C:\Windows\SysWOW64\msdt.exe Code function: 11_2_049C1C06 mov eax, dword ptr fs:[00000030h] 11_2_049C1C06
Source: C:\Windows\SysWOW64\msdt.exe Code function: 11_2_049C1C06 mov eax, dword ptr fs:[00000030h] 11_2_049C1C06
Source: C:\Windows\SysWOW64\msdt.exe Code function: 11_2_049C1C06 mov eax, dword ptr fs:[00000030h] 11_2_049C1C06
Source: C:\Windows\SysWOW64\msdt.exe Code function: 11_2_049C1C06 mov eax, dword ptr fs:[00000030h] 11_2_049C1C06
Source: C:\Windows\SysWOW64\msdt.exe Code function: 11_2_049C1C06 mov eax, dword ptr fs:[00000030h] 11_2_049C1C06
Source: C:\Windows\SysWOW64\msdt.exe Code function: 11_2_049C1C06 mov eax, dword ptr fs:[00000030h] 11_2_049C1C06
Source: C:\Windows\SysWOW64\msdt.exe Code function: 11_2_049C1C06 mov eax, dword ptr fs:[00000030h] 11_2_049C1C06
Source: C:\Windows\SysWOW64\msdt.exe Code function: 11_2_049C1C06 mov eax, dword ptr fs:[00000030h] 11_2_049C1C06
Source: C:\Windows\SysWOW64\msdt.exe Code function: 11_2_049C1C06 mov eax, dword ptr fs:[00000030h] 11_2_049C1C06
Source: C:\Windows\SysWOW64\msdt.exe Code function: 11_2_049C1C06 mov eax, dword ptr fs:[00000030h] 11_2_049C1C06
Source: C:\Windows\SysWOW64\msdt.exe Code function: 11_2_049C1C06 mov eax, dword ptr fs:[00000030h] 11_2_049C1C06
Source: C:\Windows\SysWOW64\msdt.exe Code function: 11_2_0491B02A mov eax, dword ptr fs:[00000030h] 11_2_0491B02A
Source: C:\Windows\SysWOW64\msdt.exe Code function: 11_2_0491B02A mov eax, dword ptr fs:[00000030h] 11_2_0491B02A
Source: C:\Windows\SysWOW64\msdt.exe Code function: 11_2_0491B02A mov eax, dword ptr fs:[00000030h] 11_2_0491B02A
Source: C:\Windows\SysWOW64\msdt.exe Code function: 11_2_0491B02A mov eax, dword ptr fs:[00000030h] 11_2_0491B02A
Source: C:\Windows\SysWOW64\msdt.exe Code function: 11_2_0493002D mov eax, dword ptr fs:[00000030h] 11_2_0493002D
Source: C:\Windows\SysWOW64\msdt.exe Code function: 11_2_0493002D mov eax, dword ptr fs:[00000030h] 11_2_0493002D
Source: C:\Windows\SysWOW64\msdt.exe Code function: 11_2_0493002D mov eax, dword ptr fs:[00000030h] 11_2_0493002D
Source: C:\Windows\SysWOW64\msdt.exe Code function: 11_2_0493002D mov eax, dword ptr fs:[00000030h] 11_2_0493002D
Source: C:\Windows\SysWOW64\msdt.exe Code function: 11_2_0493002D mov eax, dword ptr fs:[00000030h] 11_2_0493002D
Source: C:\Windows\SysWOW64\msdt.exe Code function: 11_2_0493BC2C mov eax, dword ptr fs:[00000030h] 11_2_0493BC2C
Source: C:\Windows\SysWOW64\msdt.exe Code function: 11_2_04920050 mov eax, dword ptr fs:[00000030h] 11_2_04920050
Source: C:\Windows\SysWOW64\msdt.exe Code function: 11_2_04920050 mov eax, dword ptr fs:[00000030h] 11_2_04920050
Source: C:\Windows\SysWOW64\msdt.exe Code function: 11_2_0499C450 mov eax, dword ptr fs:[00000030h] 11_2_0499C450
Source: C:\Windows\SysWOW64\msdt.exe Code function: 11_2_0499C450 mov eax, dword ptr fs:[00000030h] 11_2_0499C450
Source: C:\Windows\SysWOW64\msdt.exe Code function: 11_2_0493A44B mov eax, dword ptr fs:[00000030h] 11_2_0493A44B
Source: C:\Windows\SysWOW64\msdt.exe Code function: 11_2_049D1074 mov eax, dword ptr fs:[00000030h] 11_2_049D1074
Source: C:\Windows\SysWOW64\msdt.exe Code function: 11_2_049C2073 mov eax, dword ptr fs:[00000030h] 11_2_049C2073
Source: C:\Windows\SysWOW64\msdt.exe Code function: 11_2_0492746D mov eax, dword ptr fs:[00000030h] 11_2_0492746D
Source: C:\Windows\SysWOW64\msdt.exe Code function: 11_2_04932990 mov eax, dword ptr fs:[00000030h] 11_2_04932990
Source: C:\Windows\SysWOW64\msdt.exe Code function: 11_2_0493FD9B mov eax, dword ptr fs:[00000030h] 11_2_0493FD9B
Source: C:\Windows\SysWOW64\msdt.exe Code function: 11_2_0493FD9B mov eax, dword ptr fs:[00000030h] 11_2_0493FD9B
Source: C:\Windows\SysWOW64\msdt.exe Code function: 11_2_0492C182 mov eax, dword ptr fs:[00000030h] 11_2_0492C182
Source: C:\Windows\SysWOW64\msdt.exe Code function: 11_2_04932581 mov eax, dword ptr fs:[00000030h] 11_2_04932581
Source: C:\Windows\SysWOW64\msdt.exe Code function: 11_2_04932581 mov eax, dword ptr fs:[00000030h] 11_2_04932581
Source: C:\Windows\SysWOW64\msdt.exe Code function: 11_2_04932581 mov eax, dword ptr fs:[00000030h] 11_2_04932581
Source: C:\Windows\SysWOW64\msdt.exe Code function: 11_2_04932581 mov eax, dword ptr fs:[00000030h] 11_2_04932581
Source: C:\Windows\SysWOW64\msdt.exe Code function: 11_2_0493A185 mov eax, dword ptr fs:[00000030h] 11_2_0493A185
Source: C:\Windows\SysWOW64\msdt.exe Code function: 11_2_04902D8A mov eax, dword ptr fs:[00000030h] 11_2_04902D8A
Source: C:\Windows\SysWOW64\msdt.exe Code function: 11_2_04902D8A mov eax, dword ptr fs:[00000030h] 11_2_04902D8A
Source: C:\Windows\SysWOW64\msdt.exe Code function: 11_2_04902D8A mov eax, dword ptr fs:[00000030h] 11_2_04902D8A
Source: C:\Windows\SysWOW64\msdt.exe Code function: 11_2_04902D8A mov eax, dword ptr fs:[00000030h] 11_2_04902D8A
Source: C:\Windows\SysWOW64\msdt.exe Code function: 11_2_04902D8A mov eax, dword ptr fs:[00000030h] 11_2_04902D8A
Source: C:\Windows\SysWOW64\msdt.exe Code function: 11_2_04931DB5 mov eax, dword ptr fs:[00000030h] 11_2_04931DB5
Source: C:\Windows\SysWOW64\msdt.exe Code function: 11_2_04931DB5 mov eax, dword ptr fs:[00000030h] 11_2_04931DB5
Source: C:\Windows\SysWOW64\msdt.exe Code function: 11_2_04931DB5 mov eax, dword ptr fs:[00000030h] 11_2_04931DB5
Source: C:\Windows\SysWOW64\msdt.exe Code function: 11_2_049851BE mov eax, dword ptr fs:[00000030h] 11_2_049851BE
Source: C:\Windows\SysWOW64\msdt.exe Code function: 11_2_049851BE mov eax, dword ptr fs:[00000030h] 11_2_049851BE
Source: C:\Windows\SysWOW64\msdt.exe Code function: 11_2_049851BE mov eax, dword ptr fs:[00000030h] 11_2_049851BE
Source: C:\Windows\SysWOW64\msdt.exe Code function: 11_2_049851BE mov eax, dword ptr fs:[00000030h] 11_2_049851BE
Source: C:\Windows\SysWOW64\msdt.exe Code function: 11_2_049D05AC mov eax, dword ptr fs:[00000030h] 11_2_049D05AC
Source: C:\Windows\SysWOW64\msdt.exe Code function: 11_2_049D05AC mov eax, dword ptr fs:[00000030h] 11_2_049D05AC
Source: C:\Windows\SysWOW64\msdt.exe Code function: 11_2_049335A1 mov eax, dword ptr fs:[00000030h] 11_2_049335A1
Source: C:\Windows\SysWOW64\msdt.exe Code function: 11_2_049361A0 mov eax, dword ptr fs:[00000030h] 11_2_049361A0
Source: C:\Windows\SysWOW64\msdt.exe Code function: 11_2_049361A0 mov eax, dword ptr fs:[00000030h] 11_2_049361A0
Source: C:\Windows\SysWOW64\msdt.exe Code function: 11_2_049869A6 mov eax, dword ptr fs:[00000030h] 11_2_049869A6
Source: C:\Windows\SysWOW64\msdt.exe Code function: 11_2_04986DC9 mov eax, dword ptr fs:[00000030h] 11_2_04986DC9
Source: C:\Windows\SysWOW64\msdt.exe Code function: 11_2_04986DC9 mov eax, dword ptr fs:[00000030h] 11_2_04986DC9
Source: C:\Windows\SysWOW64\msdt.exe Code function: 11_2_04986DC9 mov eax, dword ptr fs:[00000030h] 11_2_04986DC9
Source: C:\Windows\SysWOW64\msdt.exe Code function: 11_2_04986DC9 mov ecx, dword ptr fs:[00000030h] 11_2_04986DC9
Source: C:\Windows\SysWOW64\msdt.exe Code function: 11_2_04986DC9 mov eax, dword ptr fs:[00000030h] 11_2_04986DC9
Source: C:\Windows\SysWOW64\msdt.exe Code function: 11_2_04986DC9 mov eax, dword ptr fs:[00000030h] 11_2_04986DC9
Source: C:\Windows\SysWOW64\msdt.exe Code function: 11_2_049B8DF1 mov eax, dword ptr fs:[00000030h] 11_2_049B8DF1
Source: C:\Windows\SysWOW64\msdt.exe Code function: 11_2_0490B1E1 mov eax, dword ptr fs:[00000030h] 11_2_0490B1E1
Source: C:\Windows\SysWOW64\msdt.exe Code function: 11_2_0490B1E1 mov eax, dword ptr fs:[00000030h] 11_2_0490B1E1
Source: C:\Windows\SysWOW64\msdt.exe Code function: 11_2_0490B1E1 mov eax, dword ptr fs:[00000030h] 11_2_0490B1E1
Source: C:\Windows\SysWOW64\msdt.exe Code function: 11_2_049941E8 mov eax, dword ptr fs:[00000030h] 11_2_049941E8
Source: C:\Windows\SysWOW64\msdt.exe Code function: 11_2_0491D5E0 mov eax, dword ptr fs:[00000030h] 11_2_0491D5E0
Source: C:\Windows\SysWOW64\msdt.exe Code function: 11_2_0491D5E0 mov eax, dword ptr fs:[00000030h] 11_2_0491D5E0
Source: C:\Windows\SysWOW64\msdt.exe Code function: 11_2_049CFDE2 mov eax, dword ptr fs:[00000030h] 11_2_049CFDE2
Source: C:\Windows\SysWOW64\msdt.exe Code function: 11_2_049CFDE2 mov eax, dword ptr fs:[00000030h] 11_2_049CFDE2
Source: C:\Windows\SysWOW64\msdt.exe Code function: 11_2_049CFDE2 mov eax, dword ptr fs:[00000030h] 11_2_049CFDE2
Source: C:\Windows\SysWOW64\msdt.exe Code function: 11_2_049CFDE2 mov eax, dword ptr fs:[00000030h] 11_2_049CFDE2
Source: C:\Windows\SysWOW64\msdt.exe Code function: 11_2_04909100 mov eax, dword ptr fs:[00000030h] 11_2_04909100
Source: C:\Windows\SysWOW64\msdt.exe Code function: 11_2_04909100 mov eax, dword ptr fs:[00000030h] 11_2_04909100
Source: C:\Windows\SysWOW64\msdt.exe Code function: 11_2_04909100 mov eax, dword ptr fs:[00000030h] 11_2_04909100
Source: C:\Windows\SysWOW64\msdt.exe Code function: 11_2_0490AD30 mov eax, dword ptr fs:[00000030h] 11_2_0490AD30
Source: C:\Windows\SysWOW64\msdt.exe Code function: 11_2_04913D34 mov eax, dword ptr fs:[00000030h] 11_2_04913D34
Source: C:\Windows\SysWOW64\msdt.exe Code function: 11_2_04913D34 mov eax, dword ptr fs:[00000030h] 11_2_04913D34
Source: C:\Windows\SysWOW64\msdt.exe Code function: 11_2_04913D34 mov eax, dword ptr fs:[00000030h] 11_2_04913D34
Source: C:\Windows\SysWOW64\msdt.exe Code function: 11_2_04913D34 mov eax, dword ptr fs:[00000030h] 11_2_04913D34
Source: C:\Windows\SysWOW64\msdt.exe Code function: 11_2_04913D34 mov eax, dword ptr fs:[00000030h] 11_2_04913D34
Source: C:\Windows\SysWOW64\msdt.exe Code function: 11_2_04913D34 mov eax, dword ptr fs:[00000030h] 11_2_04913D34
Source: C:\Windows\SysWOW64\msdt.exe Code function: 11_2_04913D34 mov eax, dword ptr fs:[00000030h] 11_2_04913D34
Source: C:\Windows\SysWOW64\msdt.exe Code function: 11_2_04913D34 mov eax, dword ptr fs:[00000030h] 11_2_04913D34
Source: C:\Windows\SysWOW64\msdt.exe Code function: 11_2_04913D34 mov eax, dword ptr fs:[00000030h] 11_2_04913D34
Source: C:\Windows\SysWOW64\msdt.exe Code function: 11_2_04913D34 mov eax, dword ptr fs:[00000030h] 11_2_04913D34
Source: C:\Windows\SysWOW64\msdt.exe Code function: 11_2_04913D34 mov eax, dword ptr fs:[00000030h] 11_2_04913D34
Source: C:\Windows\SysWOW64\msdt.exe Code function: 11_2_04913D34 mov eax, dword ptr fs:[00000030h] 11_2_04913D34
Source: C:\Windows\SysWOW64\msdt.exe Code function: 11_2_04913D34 mov eax, dword ptr fs:[00000030h] 11_2_04913D34
Source: C:\Windows\SysWOW64\msdt.exe Code function: 11_2_049CE539 mov eax, dword ptr fs:[00000030h] 11_2_049CE539
Source: C:\Windows\SysWOW64\msdt.exe Code function: 11_2_04934D3B mov eax, dword ptr fs:[00000030h] 11_2_04934D3B
Source: C:\Windows\SysWOW64\msdt.exe Code function: 11_2_04934D3B mov eax, dword ptr fs:[00000030h] 11_2_04934D3B
Source: C:\Windows\SysWOW64\msdt.exe Code function: 11_2_04934D3B mov eax, dword ptr fs:[00000030h] 11_2_04934D3B
Source: C:\Windows\SysWOW64\msdt.exe Code function: 11_2_049D8D34 mov eax, dword ptr fs:[00000030h] 11_2_049D8D34
Source: C:\Windows\SysWOW64\msdt.exe Code function: 11_2_0493513A mov eax, dword ptr fs:[00000030h] 11_2_0493513A
Source: C:\Windows\SysWOW64\msdt.exe Code function: 11_2_0493513A mov eax, dword ptr fs:[00000030h] 11_2_0493513A
Source: C:\Windows\SysWOW64\msdt.exe Code function: 11_2_0498A537 mov eax, dword ptr fs:[00000030h] 11_2_0498A537
Source: C:\Windows\SysWOW64\msdt.exe Code function: 11_2_04924120 mov eax, dword ptr fs:[00000030h] 11_2_04924120
Source: C:\Windows\SysWOW64\msdt.exe Code function: 11_2_04924120 mov eax, dword ptr fs:[00000030h] 11_2_04924120
Source: C:\Windows\SysWOW64\msdt.exe Code function: 11_2_04924120 mov eax, dword ptr fs:[00000030h] 11_2_04924120
Source: C:\Windows\SysWOW64\msdt.exe Code function: 11_2_04924120 mov eax, dword ptr fs:[00000030h] 11_2_04924120
Source: C:\Windows\SysWOW64\msdt.exe Code function: 11_2_04924120 mov ecx, dword ptr fs:[00000030h] 11_2_04924120
Source: C:\Windows\SysWOW64\msdt.exe Code function: 11_2_04927D50 mov eax, dword ptr fs:[00000030h] 11_2_04927D50
Source: C:\Windows\SysWOW64\msdt.exe Code function: 11_2_0492B944 mov eax, dword ptr fs:[00000030h] 11_2_0492B944
Source: C:\Windows\SysWOW64\msdt.exe Code function: 11_2_0492B944 mov eax, dword ptr fs:[00000030h] 11_2_0492B944
Source: C:\Windows\SysWOW64\msdt.exe Code function: 11_2_04943D43 mov eax, dword ptr fs:[00000030h] 11_2_04943D43
Source: C:\Windows\SysWOW64\msdt.exe Code function: 11_2_04983540 mov eax, dword ptr fs:[00000030h] 11_2_04983540
Source: C:\Windows\SysWOW64\msdt.exe Code function: 11_2_0490B171 mov eax, dword ptr fs:[00000030h] 11_2_0490B171
Source: C:\Windows\SysWOW64\msdt.exe Code function: 11_2_0490B171 mov eax, dword ptr fs:[00000030h] 11_2_0490B171
Source: C:\Windows\SysWOW64\msdt.exe Code function: 11_2_0492C577 mov eax, dword ptr fs:[00000030h] 11_2_0492C577
Source: C:\Windows\SysWOW64\msdt.exe Code function: 11_2_0492C577 mov eax, dword ptr fs:[00000030h] 11_2_0492C577
Source: C:\Windows\SysWOW64\msdt.exe Code function: 11_2_0490C962 mov eax, dword ptr fs:[00000030h] 11_2_0490C962
Source: C:\Windows\SysWOW64\msdt.exe Code function: 11_2_0493D294 mov eax, dword ptr fs:[00000030h] 11_2_0493D294
Source: C:\Windows\SysWOW64\msdt.exe Code function: 11_2_0493D294 mov eax, dword ptr fs:[00000030h] 11_2_0493D294
Source: C:\Windows\SysWOW64\msdt.exe Code function: 11_2_0499FE87 mov eax, dword ptr fs:[00000030h] 11_2_0499FE87
Source: C:\Windows\SysWOW64\msdt.exe Code function: 11_2_0491AAB0 mov eax, dword ptr fs:[00000030h] 11_2_0491AAB0
Source: C:\Windows\SysWOW64\msdt.exe Code function: 11_2_0491AAB0 mov eax, dword ptr fs:[00000030h] 11_2_0491AAB0
Source: C:\Windows\SysWOW64\msdt.exe Code function: 11_2_0493FAB0 mov eax, dword ptr fs:[00000030h] 11_2_0493FAB0
Source: C:\Windows\SysWOW64\msdt.exe Code function: 11_2_049052A5 mov eax, dword ptr fs:[00000030h] 11_2_049052A5
Source: C:\Windows\SysWOW64\msdt.exe Code function: 11_2_049052A5 mov eax, dword ptr fs:[00000030h] 11_2_049052A5
Source: C:\Windows\SysWOW64\msdt.exe Code function: 11_2_049052A5 mov eax, dword ptr fs:[00000030h] 11_2_049052A5
Source: C:\Windows\SysWOW64\msdt.exe Code function: 11_2_049052A5 mov eax, dword ptr fs:[00000030h] 11_2_049052A5
Source: C:\Windows\SysWOW64\msdt.exe Code function: 11_2_049052A5 mov eax, dword ptr fs:[00000030h] 11_2_049052A5
Source: C:\Windows\SysWOW64\msdt.exe Code function: 11_2_049D0EA5 mov eax, dword ptr fs:[00000030h] 11_2_049D0EA5
Source: C:\Windows\SysWOW64\msdt.exe Code function: 11_2_049D0EA5 mov eax, dword ptr fs:[00000030h] 11_2_049D0EA5
Source: C:\Windows\SysWOW64\msdt.exe Code function: 11_2_049D0EA5 mov eax, dword ptr fs:[00000030h] 11_2_049D0EA5
Source: C:\Windows\SysWOW64\msdt.exe Code function: 11_2_049846A7 mov eax, dword ptr fs:[00000030h] 11_2_049846A7
Source: C:\Windows\SysWOW64\msdt.exe Code function: 11_2_049D8ED6 mov eax, dword ptr fs:[00000030h] 11_2_049D8ED6
Source: C:\Windows\SysWOW64\msdt.exe Code function: 11_2_04948EC7 mov eax, dword ptr fs:[00000030h] 11_2_04948EC7
Source: C:\Windows\SysWOW64\msdt.exe Code function: 11_2_04932ACB mov eax, dword ptr fs:[00000030h] 11_2_04932ACB
Source: C:\Windows\SysWOW64\msdt.exe Code function: 11_2_049BFEC0 mov eax, dword ptr fs:[00000030h] 11_2_049BFEC0
Source: C:\Windows\SysWOW64\msdt.exe Code function: 11_2_049336CC mov eax, dword ptr fs:[00000030h] 11_2_049336CC
Source: C:\Windows\SysWOW64\msdt.exe Code function: 11_2_049316E0 mov ecx, dword ptr fs:[00000030h] 11_2_049316E0
Source: C:\Windows\SysWOW64\msdt.exe Code function: 11_2_049176E2 mov eax, dword ptr fs:[00000030h] 11_2_049176E2
Source: C:\Windows\SysWOW64\msdt.exe Code function: 11_2_04932AE4 mov eax, dword ptr fs:[00000030h] 11_2_04932AE4
Source: C:\Windows\SysWOW64\msdt.exe Code function: 11_2_04905210 mov eax, dword ptr fs:[00000030h] 11_2_04905210
Source: C:\Windows\SysWOW64\msdt.exe Code function: 11_2_04905210 mov ecx, dword ptr fs:[00000030h] 11_2_04905210
Source: C:\Windows\SysWOW64\msdt.exe Code function: 11_2_04905210 mov eax, dword ptr fs:[00000030h] 11_2_04905210
Source: C:\Windows\SysWOW64\msdt.exe Code function: 11_2_04905210 mov eax, dword ptr fs:[00000030h] 11_2_04905210
Source: C:\Windows\SysWOW64\msdt.exe Code function: 11_2_0490AA16 mov eax, dword ptr fs:[00000030h] 11_2_0490AA16
Source: C:\Windows\SysWOW64\msdt.exe Code function: 11_2_0490AA16 mov eax, dword ptr fs:[00000030h] 11_2_0490AA16
Source: C:\Windows\SysWOW64\msdt.exe Code function: 11_2_04923A1C mov eax, dword ptr fs:[00000030h] 11_2_04923A1C
Source: C:\Windows\SysWOW64\msdt.exe Code function: 11_2_0493A61C mov eax, dword ptr fs:[00000030h] 11_2_0493A61C
Source: C:\Windows\SysWOW64\msdt.exe Code function: 11_2_0493A61C mov eax, dword ptr fs:[00000030h] 11_2_0493A61C
Source: C:\Windows\SysWOW64\msdt.exe Code function: 11_2_0490C600 mov eax, dword ptr fs:[00000030h] 11_2_0490C600
Source: C:\Windows\SysWOW64\msdt.exe Code function: 11_2_0490C600 mov eax, dword ptr fs:[00000030h] 11_2_0490C600
Source: C:\Windows\SysWOW64\msdt.exe Code function: 11_2_0490C600 mov eax, dword ptr fs:[00000030h] 11_2_0490C600
Source: C:\Windows\SysWOW64\msdt.exe Code function: 11_2_04938E00 mov eax, dword ptr fs:[00000030h] 11_2_04938E00
Source: C:\Windows\SysWOW64\msdt.exe Code function: 11_2_049C1608 mov eax, dword ptr fs:[00000030h] 11_2_049C1608
Source: C:\Windows\SysWOW64\msdt.exe Code function: 11_2_04918A0A mov eax, dword ptr fs:[00000030h] 11_2_04918A0A
Source: C:\Windows\SysWOW64\msdt.exe Code function: 11_2_049BFE3F mov eax, dword ptr fs:[00000030h] 11_2_049BFE3F
Source: C:\Windows\SysWOW64\msdt.exe Code function: 11_2_0490E620 mov eax, dword ptr fs:[00000030h] 11_2_0490E620
Source: C:\Windows\SysWOW64\msdt.exe Code function: 11_2_04944A2C mov eax, dword ptr fs:[00000030h] 11_2_04944A2C
Source: C:\Windows\SysWOW64\msdt.exe Code function: 11_2_04944A2C mov eax, dword ptr fs:[00000030h] 11_2_04944A2C
Source: C:\Windows\SysWOW64\msdt.exe Code function: 11_2_049CEA55 mov eax, dword ptr fs:[00000030h] 11_2_049CEA55
Source: C:\Windows\SysWOW64\msdt.exe Code function: 11_2_04994257 mov eax, dword ptr fs:[00000030h] 11_2_04994257
Source: C:\Windows\SysWOW64\msdt.exe Code function: 11_2_04909240 mov eax, dword ptr fs:[00000030h] 11_2_04909240
Source: C:\Windows\SysWOW64\msdt.exe Code function: 11_2_04909240 mov eax, dword ptr fs:[00000030h] 11_2_04909240
Source: C:\Windows\SysWOW64\msdt.exe Code function: 11_2_04909240 mov eax, dword ptr fs:[00000030h] 11_2_04909240
Source: C:\Windows\SysWOW64\msdt.exe Code function: 11_2_04909240 mov eax, dword ptr fs:[00000030h] 11_2_04909240
Source: C:\Windows\SysWOW64\msdt.exe Code function: 11_2_04917E41 mov eax, dword ptr fs:[00000030h] 11_2_04917E41
Source: C:\Windows\SysWOW64\msdt.exe Code function: 11_2_04917E41 mov eax, dword ptr fs:[00000030h] 11_2_04917E41
Source: C:\Windows\SysWOW64\msdt.exe Code function: 11_2_04917E41 mov eax, dword ptr fs:[00000030h] 11_2_04917E41
Source: C:\Windows\SysWOW64\msdt.exe Code function: 11_2_04917E41 mov eax, dword ptr fs:[00000030h] 11_2_04917E41
Source: C:\Windows\SysWOW64\msdt.exe Code function: 11_2_04917E41 mov eax, dword ptr fs:[00000030h] 11_2_04917E41
Source: C:\Windows\SysWOW64\msdt.exe Code function: 11_2_04917E41 mov eax, dword ptr fs:[00000030h] 11_2_04917E41
Source: C:\Windows\SysWOW64\msdt.exe Code function: 11_2_049CAE44 mov eax, dword ptr fs:[00000030h] 11_2_049CAE44
Source: C:\Windows\SysWOW64\msdt.exe Code function: 11_2_049CAE44 mov eax, dword ptr fs:[00000030h] 11_2_049CAE44
Source: C:\Windows\SysWOW64\msdt.exe Code function: 11_2_0492AE73 mov eax, dword ptr fs:[00000030h] 11_2_0492AE73
Source: C:\Windows\SysWOW64\msdt.exe Code function: 11_2_0492AE73 mov eax, dword ptr fs:[00000030h] 11_2_0492AE73
Source: C:\Windows\SysWOW64\msdt.exe Code function: 11_2_0492AE73 mov eax, dword ptr fs:[00000030h] 11_2_0492AE73
Source: C:\Windows\SysWOW64\msdt.exe Code function: 11_2_0492AE73 mov eax, dword ptr fs:[00000030h] 11_2_0492AE73
Source: C:\Windows\SysWOW64\msdt.exe Code function: 11_2_0492AE73 mov eax, dword ptr fs:[00000030h] 11_2_0492AE73
Source: C:\Windows\SysWOW64\msdt.exe Code function: 11_2_0494927A mov eax, dword ptr fs:[00000030h] 11_2_0494927A
Source: C:\Windows\SysWOW64\msdt.exe Code function: 11_2_049BB260 mov eax, dword ptr fs:[00000030h] 11_2_049BB260
Source: C:\Windows\SysWOW64\msdt.exe Code function: 11_2_049BB260 mov eax, dword ptr fs:[00000030h] 11_2_049BB260
Source: C:\Windows\SysWOW64\msdt.exe Code function: 11_2_0491766D mov eax, dword ptr fs:[00000030h] 11_2_0491766D
Source: C:\Windows\SysWOW64\msdt.exe Code function: 11_2_049D8A62 mov eax, dword ptr fs:[00000030h] 11_2_049D8A62
Source: C:\Windows\SysWOW64\msdt.exe Code function: 11_2_0493B390 mov eax, dword ptr fs:[00000030h] 11_2_0493B390
Source: C:\Windows\SysWOW64\msdt.exe Code function: 11_2_04932397 mov eax, dword ptr fs:[00000030h] 11_2_04932397
Source: C:\Windows\SysWOW64\msdt.exe Code function: 11_2_04918794 mov eax, dword ptr fs:[00000030h] 11_2_04918794
Source: C:\Windows\SysWOW64\msdt.exe Code function: 11_2_04987794 mov eax, dword ptr fs:[00000030h] 11_2_04987794
Source: C:\Windows\SysWOW64\msdt.exe Code function: 11_2_04987794 mov eax, dword ptr fs:[00000030h] 11_2_04987794
Source: C:\Windows\SysWOW64\msdt.exe Code function: 11_2_04987794 mov eax, dword ptr fs:[00000030h] 11_2_04987794
Checks if the current process is being debugged
Source: C:\Users\user\Desktop\invoice dhl.delivery document and original invoice sign.exe Process queried: DebugPort Jump to behavior
Source: C:\Windows\SysWOW64\msdt.exe Process queried: DebugPort Jump to behavior
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Source: C:\Users\user\Desktop\invoice dhl.delivery document and original invoice sign.exe Code function: 3_2_0040ACF0 LdrLoadDll, 3_2_0040ACF0
Source: C:\Users\user\Desktop\invoice dhl.delivery document and original invoice sign.exe Memory allocated: page read and write | page guard Jump to behavior

HIPS / PFW / Operating System Protection Evasion:

barindex
System process connects to network (likely due to code injection or exploit)
Source: C:\Windows\explorer.exe Network Connect: 44.227.76.166 80 Jump to behavior
Source: C:\Windows\explorer.exe Domain query: www.mimamincloor.com
Source: C:\Windows\explorer.exe Domain query: www.federaldados.design
Sample uses process hollowing technique
Source: C:\Users\user\Desktop\invoice dhl.delivery document and original invoice sign.exe Section unmapped: C:\Windows\SysWOW64\msdt.exe base address: B30000 Jump to behavior
Maps a DLL or memory area into another process
Source: C:\Users\user\Desktop\invoice dhl.delivery document and original invoice sign.exe Section loaded: unknown target: C:\Windows\explorer.exe protection: execute and read and write Jump to behavior
Source: C:\Users\user\Desktop\invoice dhl.delivery document and original invoice sign.exe Section loaded: unknown target: C:\Windows\explorer.exe protection: execute and read and write Jump to behavior
Source: C:\Users\user\Desktop\invoice dhl.delivery document and original invoice sign.exe Section loaded: unknown target: C:\Windows\SysWOW64\msdt.exe protection: execute and read and write Jump to behavior
Source: C:\Users\user\Desktop\invoice dhl.delivery document and original invoice sign.exe Section loaded: unknown target: C:\Windows\SysWOW64\msdt.exe protection: execute and read and write Jump to behavior
Source: C:\Windows\SysWOW64\msdt.exe Section loaded: unknown target: C:\Windows\explorer.exe protection: read write Jump to behavior
Source: C:\Windows\SysWOW64\msdt.exe Section loaded: unknown target: C:\Windows\explorer.exe protection: execute and read and write Jump to behavior
Injects a PE file into a foreign processes
Source: C:\Users\user\Desktop\invoice dhl.delivery document and original invoice sign.exe Memory written: C:\Users\user\Desktop\invoice dhl.delivery document and original invoice sign.exe base: 400000 value starts with: 4D5A Jump to behavior
Queues an APC in another process (thread injection)
Source: C:\Users\user\Desktop\invoice dhl.delivery document and original invoice sign.exe Thread APC queued: target process: C:\Windows\explorer.exe Jump to behavior
Modifies the context of a thread in another process (thread injection)
Source: C:\Users\user\Desktop\invoice dhl.delivery document and original invoice sign.exe Thread register set: target process: 3440 Jump to behavior
Source: C:\Users\user\Desktop\invoice dhl.delivery document and original invoice sign.exe Thread register set: target process: 3440 Jump to behavior
Source: C:\Windows\SysWOW64\msdt.exe Thread register set: target process: 3440 Jump to behavior
Creates a process in suspended mode (likely to inject code)
Source: C:\Users\user\Desktop\invoice dhl.delivery document and original invoice sign.exe Process created: C:\Users\user\Desktop\invoice dhl.delivery document and original invoice sign.exe C:\Users\user\Desktop\invoice dhl.delivery document and original invoice sign.exe Jump to behavior
Source: C:\Windows\SysWOW64\msdt.exe Process created: C:\Windows\SysWOW64\cmd.exe /c del "C:\Users\user\Desktop\invoice dhl.delivery document and original invoice sign.exe" Jump to behavior
Source: explorer.exe, 00000005.00000000.403617766.00000000083E8000.00000004.00000001.sdmp, explorer.exe, 00000005.00000000.374553794.00000000083E8000.00000004.00000001.sdmp, explorer.exe, 00000005.00000000.398386364.0000000004F80000.00000004.00000001.sdmp, explorer.exe, 00000005.00000000.384921843.0000000000EE0000.00000002.00020000.sdmp, explorer.exe, 00000005.00000000.397294824.0000000000EE0000.00000002.00020000.sdmp, explorer.exe, 00000005.00000000.365817476.0000000000EE0000.00000002.00020000.sdmp, explorer.exe, 00000005.00000000.425639054.0000000000EE0000.00000002.00020000.sdmp, msdt.exe, 0000000B.00000002.622298398.0000000003140000.00000002.00020000.sdmp Binary or memory string: Shell_TrayWnd
Source: explorer.exe, 00000005.00000000.364857450.00000000008B8000.00000004.00000020.sdmp, explorer.exe, 00000005.00000000.384921843.0000000000EE0000.00000002.00020000.sdmp, explorer.exe, 00000005.00000000.397294824.0000000000EE0000.00000002.00020000.sdmp, explorer.exe, 00000005.00000000.365817476.0000000000EE0000.00000002.00020000.sdmp, explorer.exe, 00000005.00000000.425639054.0000000000EE0000.00000002.00020000.sdmp, explorer.exe, 00000005.00000000.396982165.00000000008B8000.00000004.00000020.sdmp, explorer.exe, 00000005.00000000.425085384.00000000008B8000.00000004.00000020.sdmp, explorer.exe, 00000005.00000000.383606390.00000000008B8000.00000004.00000020.sdmp, msdt.exe, 0000000B.00000002.622298398.0000000003140000.00000002.00020000.sdmp Binary or memory string: Progman
Source: explorer.exe, 00000005.00000000.384921843.0000000000EE0000.00000002.00020000.sdmp, explorer.exe, 00000005.00000000.397294824.0000000000EE0000.00000002.00020000.sdmp, explorer.exe, 00000005.00000000.365817476.0000000000EE0000.00000002.00020000.sdmp, explorer.exe, 00000005.00000000.425639054.0000000000EE0000.00000002.00020000.sdmp, msdt.exe, 0000000B.00000002.622298398.0000000003140000.00000002.00020000.sdmp Binary or memory string: &Program Manager
Source: explorer.exe, 00000005.00000000.384921843.0000000000EE0000.00000002.00020000.sdmp, explorer.exe, 00000005.00000000.397294824.0000000000EE0000.00000002.00020000.sdmp, explorer.exe, 00000005.00000000.365817476.0000000000EE0000.00000002.00020000.sdmp, explorer.exe, 00000005.00000000.425639054.0000000000EE0000.00000002.00020000.sdmp, msdt.exe, 0000000B.00000002.622298398.0000000003140000.00000002.00020000.sdmp Binary or memory string: Progmanlock

Language, Device and Operating System Detection:

barindex
Queries the volume information (name, serial number etc) of a device
Source: C:\Users\user\Desktop\invoice dhl.delivery document and original invoice sign.exe Queries volume information: C:\Users\user\Desktop\invoice dhl.delivery document and original invoice sign.exe VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\invoice dhl.delivery document and original invoice sign.exe Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\invoice dhl.delivery document and original invoice sign.exe Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\invoice dhl.delivery document and original invoice sign.exe Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\invoice dhl.delivery document and original invoice sign.exe Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\invoice dhl.delivery document and original invoice sign.exe Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\invoice dhl.delivery document and original invoice sign.exe Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\invoice dhl.delivery document and original invoice sign.exe Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\invoice dhl.delivery document and original invoice sign.exe Key value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid Jump to behavior

Stealing of Sensitive Information:

barindex
Yara detected FormBook
Source: Yara match File source: 3.0.invoice dhl.delivery document and original invoice sign.exe.400000.8.unpack, type: UNPACKEDPE
Source: Yara match File source: 3.0.invoice dhl.delivery document and original invoice sign.exe.400000.4.unpack, type: UNPACKEDPE
Source: Yara match File source: 3.2.invoice dhl.delivery document and original invoice sign.exe.400000.0.unpack, type: UNPACKEDPE
Source: Yara match File source: 3.2.invoice dhl.delivery document and original invoice sign.exe.400000.0.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 3.0.invoice dhl.delivery document and original invoice sign.exe.400000.6.unpack, type: UNPACKEDPE
Source: Yara match File source: 3.0.invoice dhl.delivery document and original invoice sign.exe.400000.6.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 3.0.invoice dhl.delivery document and original invoice sign.exe.400000.8.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 0000000B.00000002.622111638.0000000002CE0000.00000004.00000001.sdmp, type: MEMORY
Source: Yara match File source: 00000005.00000000.393113317.000000000EE6F000.00000040.00020000.sdmp, type: MEMORY
Source: Yara match File source: 00000003.00000002.437063285.0000000001400000.00000040.00020000.sdmp, type: MEMORY
Source: Yara match File source: 00000003.00000002.437007987.00000000013D0000.00000040.00020000.sdmp, type: MEMORY
Source: Yara match File source: 0000000B.00000002.617350722.0000000000700000.00000040.00020000.sdmp, type: MEMORY
Source: Yara match File source: 00000003.00000000.360478598.0000000000400000.00000040.00000001.sdmp, type: MEMORY
Source: Yara match File source: 00000003.00000002.436548736.0000000000400000.00000040.00000001.sdmp, type: MEMORY
Source: Yara match File source: 00000005.00000000.405515832.000000000EE6F000.00000040.00020000.sdmp, type: MEMORY
Source: Yara match File source: 00000003.00000000.359940174.0000000000400000.00000040.00000001.sdmp, type: MEMORY
Source: Yara match File source: 0000000B.00000002.622077394.0000000002CB0000.00000040.00020000.sdmp, type: MEMORY
Source: Yara match File source: 00000000.00000002.364023300.0000000003879000.00000004.00000001.sdmp, type: MEMORY

Remote Access Functionality:

barindex
Yara detected FormBook
Source: Yara match File source: 3.0.invoice dhl.delivery document and original invoice sign.exe.400000.8.unpack, type: UNPACKEDPE
Source: Yara match File source: 3.0.invoice dhl.delivery document and original invoice sign.exe.400000.4.unpack, type: UNPACKEDPE
Source: Yara match File source: 3.2.invoice dhl.delivery document and original invoice sign.exe.400000.0.unpack, type: UNPACKEDPE
Source: Yara match File source: 3.2.invoice dhl.delivery document and original invoice sign.exe.400000.0.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 3.0.invoice dhl.delivery document and original invoice sign.exe.400000.6.unpack, type: UNPACKEDPE
Source: Yara match File source: 3.0.invoice dhl.delivery document and original invoice sign.exe.400000.6.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 3.0.invoice dhl.delivery document and original invoice sign.exe.400000.8.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 0000000B.00000002.622111638.0000000002CE0000.00000004.00000001.sdmp, type: MEMORY
Source: Yara match File source: 00000005.00000000.393113317.000000000EE6F000.00000040.00020000.sdmp, type: MEMORY
Source: Yara match File source: 00000003.00000002.437063285.0000000001400000.00000040.00020000.sdmp, type: MEMORY
Source: Yara match File source: 00000003.00000002.437007987.00000000013D0000.00000040.00020000.sdmp, type: MEMORY
Source: Yara match File source: 0000000B.00000002.617350722.0000000000700000.00000040.00020000.sdmp, type: MEMORY
Source: Yara match File source: 00000003.00000000.360478598.0000000000400000.00000040.00000001.sdmp, type: MEMORY
Source: Yara match File source: 00000003.00000002.436548736.0000000000400000.00000040.00000001.sdmp, type: MEMORY
Source: Yara match File source: 00000005.00000000.405515832.000000000EE6F000.00000040.00020000.sdmp, type: MEMORY
Source: Yara match File source: 00000003.00000000.359940174.0000000000400000.00000040.00000001.sdmp, type: MEMORY
Source: Yara match File source: 0000000B.00000002.622077394.0000000002CB0000.00000040.00020000.sdmp, type: MEMORY
Source: Yara match File source: 00000000.00000002.364023300.0000000003879000.00000004.00000001.sdmp, type: MEMORY
  • No. of IPs < 25%
  • 25% < No. of IPs < 50%
  • 50% < No. of IPs < 75%
  • 75% < No. of IPs