Loading ...

Play interactive tourEdit tour

Windows Analysis Report DHL_AWB_NO#907853880911.exe

Overview

General Information

Sample Name:DHL_AWB_NO#907853880911.exe
Analysis ID:532893
MD5:37340b33801b049ca07055a4bcca5f27
SHA1:f742cbc4772f88bcc3e98b3a1f2396d813cc0ff5
SHA256:ea87186f72f8963ae73aaa33ab50634f83f945cdef2b73e7bef08dce61807c56
Tags:exeFormbook
Infos:

Most interesting Screenshot:

Detection

FormBook
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Multi AV Scanner detection for submitted file
Yara detected FormBook
Malicious sample detected (through community Yara rule)
Yara detected AntiVM3
Multi AV Scanner detection for domain / URL
Sample uses process hollowing technique
Maps a DLL or memory area into another process
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Self deletion via cmd delete
.NET source code contains potential unpacker
Injects a PE file into a foreign processes
Queues an APC in another process (thread injection)
Tries to detect virtualization through RDTSC time measurements
Modifies the context of a thread in another process (thread injection)
C2 URLs / IPs found in malware configuration
Uses 32bit PE files
Queries the volume information (name, serial number etc) of a device
Yara signature match
Antivirus or Machine Learning detection for unpacked file
May sleep (evasive loops) to hinder dynamic analysis
Uses code obfuscation techniques (call, push, ret)
Detected potential crypto function
Found potential string decryption / allocating functions
Sample execution stops while process was sleeping (likely an evasion)
Contains functionality to call native functions
Contains functionality for execution timing, often used to detect debuggers
Contains long sleeps (>= 3 min)
Enables debug privileges
Found inlined nop instructions (likely shell or obfuscated code)
Sample file is different than original file name gathered from version info
PE file contains strange resources
Contains functionality to read the PEB
Checks if the current process is being debugged
Contains capabilities to detect virtual machines
Monitors certain registry keys / values for changes (often done to protect autostart functionality)
Creates a process in suspended mode (likely to inject code)
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)

Classification

Process Tree

  • System is w10x64
  • DHL_AWB_NO#907853880911.exe (PID: 7156 cmdline: "C:\Users\user\Desktop\DHL_AWB_NO#907853880911.exe" MD5: 37340B33801B049CA07055A4BCCA5F27)
    • DHL_AWB_NO#907853880911.exe (PID: 5160 cmdline: C:\Users\user\Desktop\DHL_AWB_NO#907853880911.exe MD5: 37340B33801B049CA07055A4BCCA5F27)
      • explorer.exe (PID: 3424 cmdline: C:\Windows\Explorer.EXE MD5: AD5296B280E8F522A8A897C96BAB0E1D)
        • mstsc.exe (PID: 6700 cmdline: C:\Windows\SysWOW64\mstsc.exe MD5: 2412003BE253A515C620CE4890F3D8F3)
          • cmd.exe (PID: 4088 cmdline: /c del "C:\Users\user\Desktop\DHL_AWB_NO#907853880911.exe" MD5: F3BDBE3BB6F734E357235F4D5898582D)
            • conhost.exe (PID: 6880 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
          • explorer.exe (PID: 980 cmdline: "C:\Windows\explorer.exe" /LOADSAVEDWINDOWS MD5: AD5296B280E8F522A8A897C96BAB0E1D)
  • cleanup

Malware Configuration

Threatname: FormBook

{"C2 list": ["www.makheads.com/fl9w/"], "decoy": ["alicebowtique.com", "way2discounts.com", "chihangjingmi.com", "exmcap.com", "artisquid.com", "financelbs.com", "tresholdnetwork.com", "www-9367.com", "funtripsouthindia.com", "ibew-neca.com", "elqaunim.com", "gbetapi.com", "turkthee.com", "greaterdetroitrealtyexpert.com", "springhousevet.com", "dgjt1688.com", "broomsweeping.com", "bettyfred.xyz", "afmcabnot6.xyz", "toylandmetaverse.com", "livelifeloveloes.com", "tabuchikazuharu.com", "johnnymarrjaguarguitar.com", "pintoppers.net", "anstransport.net", "gazprommeta.com", "starisle.online", "abbeastore.com", "piratcigo.com", "opito.digital", "bemaster.guru", "foerderportal-thueringen.net", "mendy.link", "qasimabdullah.com", "michaelsmetaverse.com", "oasiganaiblog.com", "metaplayvr.com", "lesspainmoresleep.com", "600717ua.xyz", "lauraderksen.com", "listentoyourovo.com", "businessfunnelpro.com", "lowpricetoday.online", "etutorpay.com", "uootpon.xyz", "dazelu8.com", "kirklandweightlosssecret.com", "godrunner001.com", "melvinmillsroof.com", "herdeiras.com", "fitztoursmontreal.com", "super-ultra-porn.net", "choumok-bom.com", "raribledollar.com", "womencando.info", "meicarijp-jpo.com", "yymfzp.com", "sops.wiki", "rusungolf.com", "smellyrose.com", "hueslook.club", "screenlyco.com", "akasamotor.online", "formacioneducaciondesarollo.com"]}

Yara Overview

Memory Dumps

SourceRuleDescriptionAuthorStrings
00000005.00000000.719427940.000000000E898000.00000040.00020000.sdmpJoeSecurity_FormBookYara detected FormBookJoe Security
    00000005.00000000.719427940.000000000E898000.00000040.00020000.sdmpFormbook_1autogenerated rule brought to you by yara-signatorFelix Bilstein - yara-signator at cocacoding dot com
    • 0x26a5:$sequence_1: 3C 24 0F 84 76 FF FF FF 3C 25 74 94
    • 0x2191:$sequence_2: 3B 4F 14 73 95 85 C9 74 91
    • 0x27a7:$sequence_3: 3C 69 75 44 8B 7D 18 8B 0F
    • 0x291f:$sequence_4: 5D C3 8D 50 7C 80 FA 07
    • 0x140c:$sequence_6: 57 89 45 FC 89 45 F4 89 45 F8
    • 0x8917:$sequence_8: 3C 54 74 04 3C 74 75 F4
    • 0x991a:$sequence_9: 56 68 03 01 00 00 8D 85 95 FE FF FF 6A 00
    00000005.00000000.719427940.000000000E898000.00000040.00020000.sdmpFormbookdetect Formbook in memoryJPCERT/CC Incident Response Group
    • 0x5839:$sqlite3step: 68 34 1C 7B E1
    • 0x594c:$sqlite3step: 68 34 1C 7B E1
    • 0x5868:$sqlite3text: 68 38 2A 90 C5
    • 0x598d:$sqlite3text: 68 38 2A 90 C5
    • 0x587b:$sqlite3blob: 68 53 D8 7F 8C
    • 0x59a3:$sqlite3blob: 68 53 D8 7F 8C
    00000002.00000000.672669530.0000000000400000.00000040.00000001.sdmpJoeSecurity_FormBookYara detected FormBookJoe Security
      00000002.00000000.672669530.0000000000400000.00000040.00000001.sdmpFormbook_1autogenerated rule brought to you by yara-signatorFelix Bilstein - yara-signator at cocacoding dot com
      • 0x9908:$sequence_0: 03 C8 0F 31 2B C1 89 45 FC
      • 0x9b72:$sequence_0: 03 C8 0F 31 2B C1 89 45 FC
      • 0x156a5:$sequence_1: 3C 24 0F 84 76 FF FF FF 3C 25 74 94
      • 0x15191:$sequence_2: 3B 4F 14 73 95 85 C9 74 91
      • 0x157a7:$sequence_3: 3C 69 75 44 8B 7D 18 8B 0F
      • 0x1591f:$sequence_4: 5D C3 8D 50 7C 80 FA 07
      • 0xa58a:$sequence_5: 0F BE 5C 0E 01 0F B6 54 0E 02 83 E3 0F C1 EA 06
      • 0x1440c:$sequence_6: 57 89 45 FC 89 45 F4 89 45 F8
      • 0xb283:$sequence_7: 66 89 0C 02 5B 8B E5 5D
      • 0x1b917:$sequence_8: 3C 54 74 04 3C 74 75 F4
      • 0x1c91a:$sequence_9: 56 68 03 01 00 00 8D 85 95 FE FF FF 6A 00
      Click to see the 33 entries

      Unpacked PEs

      SourceRuleDescriptionAuthorStrings
      2.0.DHL_AWB_NO#907853880911.exe.400000.8.raw.unpackJoeSecurity_FormBookYara detected FormBookJoe Security
        2.0.DHL_AWB_NO#907853880911.exe.400000.8.raw.unpackFormbook_1autogenerated rule brought to you by yara-signatorFelix Bilstein - yara-signator at cocacoding dot com
        • 0x9908:$sequence_0: 03 C8 0F 31 2B C1 89 45 FC
        • 0x9b72:$sequence_0: 03 C8 0F 31 2B C1 89 45 FC
        • 0x156a5:$sequence_1: 3C 24 0F 84 76 FF FF FF 3C 25 74 94
        • 0x15191:$sequence_2: 3B 4F 14 73 95 85 C9 74 91
        • 0x157a7:$sequence_3: 3C 69 75 44 8B 7D 18 8B 0F
        • 0x1591f:$sequence_4: 5D C3 8D 50 7C 80 FA 07
        • 0xa58a:$sequence_5: 0F BE 5C 0E 01 0F B6 54 0E 02 83 E3 0F C1 EA 06
        • 0x1440c:$sequence_6: 57 89 45 FC 89 45 F4 89 45 F8
        • 0xb283:$sequence_7: 66 89 0C 02 5B 8B E5 5D
        • 0x1b917:$sequence_8: 3C 54 74 04 3C 74 75 F4
        • 0x1c91a:$sequence_9: 56 68 03 01 00 00 8D 85 95 FE FF FF 6A 00
        2.0.DHL_AWB_NO#907853880911.exe.400000.8.raw.unpackFormbookdetect Formbook in memoryJPCERT/CC Incident Response Group
        • 0x18839:$sqlite3step: 68 34 1C 7B E1
        • 0x1894c:$sqlite3step: 68 34 1C 7B E1
        • 0x18868:$sqlite3text: 68 38 2A 90 C5
        • 0x1898d:$sqlite3text: 68 38 2A 90 C5
        • 0x1887b:$sqlite3blob: 68 53 D8 7F 8C
        • 0x189a3:$sqlite3blob: 68 53 D8 7F 8C
        2.0.DHL_AWB_NO#907853880911.exe.400000.8.unpackJoeSecurity_FormBookYara detected FormBookJoe Security
          2.0.DHL_AWB_NO#907853880911.exe.400000.8.unpackFormbook_1autogenerated rule brought to you by yara-signatorFelix Bilstein - yara-signator at cocacoding dot com
          • 0x8b08:$sequence_0: 03 C8 0F 31 2B C1 89 45 FC
          • 0x8d72:$sequence_0: 03 C8 0F 31 2B C1 89 45 FC
          • 0x148a5:$sequence_1: 3C 24 0F 84 76 FF FF FF 3C 25 74 94
          • 0x14391:$sequence_2: 3B 4F 14 73 95 85 C9 74 91
          • 0x149a7:$sequence_3: 3C 69 75 44 8B 7D 18 8B 0F
          • 0x14b1f:$sequence_4: 5D C3 8D 50 7C 80 FA 07
          • 0x978a:$sequence_5: 0F BE 5C 0E 01 0F B6 54 0E 02 83 E3 0F C1 EA 06
          • 0x1360c:$sequence_6: 57 89 45 FC 89 45 F4 89 45 F8
          • 0xa483:$sequence_7: 66 89 0C 02 5B 8B E5 5D
          • 0x1ab17:$sequence_8: 3C 54 74 04 3C 74 75 F4
          • 0x1bb1a:$sequence_9: 56 68 03 01 00 00 8D 85 95 FE FF FF 6A 00
          Click to see the 17 entries

          Sigma Overview

          No Sigma rule has matched

          Jbx Signature Overview

          Click to jump to signature section

          Show All Signature Results

          AV Detection:

          barindex
          Found malware configurationShow sources
          Source: 00000002.00000000.672669530.0000000000400000.00000040.00000001.sdmpMalware Configuration Extractor: FormBook {"C2 list": ["www.makheads.com/fl9w/"], "decoy": ["alicebowtique.com", "way2discounts.com", "chihangjingmi.com", "exmcap.com", "artisquid.com", "financelbs.com", "tresholdnetwork.com", "www-9367.com", "funtripsouthindia.com", "ibew-neca.com", "elqaunim.com", "gbetapi.com", "turkthee.com", "greaterdetroitrealtyexpert.com", "springhousevet.com", "dgjt1688.com", "broomsweeping.com", "bettyfred.xyz", "afmcabnot6.xyz", "toylandmetaverse.com", "livelifeloveloes.com", "tabuchikazuharu.com", "johnnymarrjaguarguitar.com", "pintoppers.net", "anstransport.net", "gazprommeta.com", "starisle.online", "abbeastore.com", "piratcigo.com", "opito.digital", "bemaster.guru", "foerderportal-thueringen.net", "mendy.link", "qasimabdullah.com", "michaelsmetaverse.com", "oasiganaiblog.com", "metaplayvr.com", "lesspainmoresleep.com", "600717ua.xyz", "lauraderksen.com", "listentoyourovo.com", "businessfunnelpro.com", "lowpricetoday.online", "etutorpay.com", "uootpon.xyz", "dazelu8.com", "kirklandweightlosssecret.com", "godrunner001.com", "melvinmillsroof.com", "herdeiras.com", "fitztoursmontreal.com", "super-ultra-porn.net", "choumok-bom.com", "raribledollar.com", "womencando.info", "meicarijp-jpo.com", "yymfzp.com", "sops.wiki", "rusungolf.com", "smellyrose.com", "hueslook.club", "screenlyco.com", "akasamotor.online", "formacioneducaciondesarollo.com"]}
          Multi AV Scanner detection for submitted fileShow sources
          Source: DHL_AWB_NO#907853880911.exeVirustotal: Detection: 25%Perma Link
          Source: DHL_AWB_NO#907853880911.exeMetadefender: Detection: 31%Perma Link
          Source: DHL_AWB_NO#907853880911.exeReversingLabs: Detection: 51%
          Yara detected FormBookShow sources
          Source: Yara matchFile source: 2.0.DHL_AWB_NO#907853880911.exe.400000.8.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 2.0.DHL_AWB_NO#907853880911.exe.400000.8.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 2.0.DHL_AWB_NO#907853880911.exe.400000.6.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 2.0.DHL_AWB_NO#907853880911.exe.400000.4.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 2.0.DHL_AWB_NO#907853880911.exe.400000.6.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 2.2.DHL_AWB_NO#907853880911.exe.400000.0.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 2.2.DHL_AWB_NO#907853880911.exe.400000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 00000005.00000000.719427940.000000000E898000.00000040.00020000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000002.00000000.672669530.0000000000400000.00000040.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000000.00000002.676498068.0000000003ED9000.00000004.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000009.00000002.930477185.0000000000D20000.00000004.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000000.00000002.677126052.000000000414A000.00000004.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000009.00000002.929049449.0000000000780000.00000040.00020000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000002.00000000.673053998.0000000000400000.00000040.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000009.00000002.928132789.0000000000150000.00000040.00020000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000002.00000002.736134377.0000000001060000.00000040.00020000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000002.00000002.732545477.0000000000400000.00000040.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000002.00000002.734719303.0000000000C30000.00000040.00020000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000005.00000000.705738120.000000000E898000.00000040.00020000.sdmp, type: MEMORY
          Multi AV Scanner detection for domain / URLShow sources
          Source: www.makheads.com/fl9w/Virustotal: Detection: 9%Perma Link
          Source: 2.0.DHL_AWB_NO#907853880911.exe.400000.8.unpackAvira: Label: TR/Crypt.ZPACK.Gen
          Source: 2.0.DHL_AWB_NO#907853880911.exe.400000.4.unpackAvira: Label: TR/Crypt.ZPACK.Gen
          Source: 2.0.DHL_AWB_NO#907853880911.exe.400000.6.unpackAvira: Label: TR/Crypt.ZPACK.Gen
          Source: 2.2.DHL_AWB_NO#907853880911.exe.400000.0.unpackAvira: Label: TR/Crypt.ZPACK.Gen
          Source: DHL_AWB_NO#907853880911.exeStatic PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE
          Source: DHL_AWB_NO#907853880911.exeStatic PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
          Source: Binary string: wntdll.pdbUGP source: DHL_AWB_NO#907853880911.exe, 00000002.00000002.740455030.00000000011BF000.00000040.00000001.sdmp, DHL_AWB_NO#907853880911.exe, 00000002.00000002.736402550.00000000010A0000.00000040.00000001.sdmp, mstsc.exe, 00000009.00000002.932676468.00000000047BF000.00000040.00000001.sdmp, mstsc.exe, 00000009.00000002.932440573.00000000046A0000.00000040.00000001.sdmp
          Source: Binary string: wntdll.pdb source: DHL_AWB_NO#907853880911.exe, DHL_AWB_NO#907853880911.exe, 00000002.00000002.740455030.00000000011BF000.00000040.00000001.sdmp, DHL_AWB_NO#907853880911.exe, 00000002.00000002.736402550.00000000010A0000.00000040.00000001.sdmp, mstsc.exe, mstsc.exe, 00000009.00000002.932676468.00000000047BF000.00000040.00000001.sdmp, mstsc.exe, 00000009.00000002.932440573.00000000046A0000.00000040.00000001.sdmp
          Source: Binary string: mstsc.pdbGCTL source: DHL_AWB_NO#907853880911.exe, 00000002.00000002.742005114.0000000002D40000.00000040.00020000.sdmp
          Source: Binary string: mstsc.pdb source: DHL_AWB_NO#907853880911.exe, 00000002.00000002.742005114.0000000002D40000.00000040.00020000.sdmp
          Source: C:\Users\user\Desktop\DHL_AWB_NO#907853880911.exeCode function: 4x nop then pop edi
          Source: C:\Users\user\Desktop\DHL_AWB_NO#907853880911.exeCode function: 4x nop then pop edi
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 4x nop then pop edi
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 4x nop then pop edi

          Networking:

          barindex
          C2 URLs / IPs found in malware configurationShow sources
          Source: Malware configuration extractorURLs: www.makheads.com/fl9w/
          Source: explorer.exe, 0000000F.00000000.845439337.0000000006640000.00000004.00000001.sdmp, explorer.exe, 0000000F.00000000.895194178.0000000006640000.00000004.00000001.sdmpString found in binary or memory: http://crl.globalsign.net/root-r2.crl0
          Source: unknownDNS traffic detected: queries for: www.ibew-neca.com

          E-Banking Fraud:

          barindex
          Yara detected FormBookShow sources
          Source: Yara matchFile source: 2.0.DHL_AWB_NO#907853880911.exe.400000.8.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 2.0.DHL_AWB_NO#907853880911.exe.400000.8.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 2.0.DHL_AWB_NO#907853880911.exe.400000.6.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 2.0.DHL_AWB_NO#907853880911.exe.400000.4.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 2.0.DHL_AWB_NO#907853880911.exe.400000.6.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 2.2.DHL_AWB_NO#907853880911.exe.400000.0.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 2.2.DHL_AWB_NO#907853880911.exe.400000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 00000005.00000000.719427940.000000000E898000.00000040.00020000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000002.00000000.672669530.0000000000400000.00000040.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000000.00000002.676498068.0000000003ED9000.00000004.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000009.00000002.930477185.0000000000D20000.00000004.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000000.00000002.677126052.000000000414A000.00000004.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000009.00000002.929049449.0000000000780000.00000040.00020000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000002.00000000.673053998.0000000000400000.00000040.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000009.00000002.928132789.0000000000150000.00000040.00020000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000002.00000002.736134377.0000000001060000.00000040.00020000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000002.00000002.732545477.0000000000400000.00000040.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000002.00000002.734719303.0000000000C30000.00000040.00020000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000005.00000000.705738120.000000000E898000.00000040.00020000.sdmp, type: MEMORY

          System Summary:

          barindex
          Malicious sample detected (through community Yara rule)Show sources
          Source: 2.0.DHL_AWB_NO#907853880911.exe.400000.8.raw.unpack, type: UNPACKEDPEMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 2.0.DHL_AWB_NO#907853880911.exe.400000.8.raw.unpack, type: UNPACKEDPEMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 2.0.DHL_AWB_NO#907853880911.exe.400000.8.unpack, type: UNPACKEDPEMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 2.0.DHL_AWB_NO#907853880911.exe.400000.8.unpack, type: UNPACKEDPEMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 2.0.DHL_AWB_NO#907853880911.exe.400000.6.raw.unpack, type: UNPACKEDPEMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 2.0.DHL_AWB_NO#907853880911.exe.400000.6.raw.unpack, type: UNPACKEDPEMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 2.0.DHL_AWB_NO#907853880911.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 2.0.DHL_AWB_NO#907853880911.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 2.0.DHL_AWB_NO#907853880911.exe.400000.6.unpack, type: UNPACKEDPEMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 2.0.DHL_AWB_NO#907853880911.exe.400000.6.unpack, type: UNPACKEDPEMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 2.2.DHL_AWB_NO#907853880911.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 2.2.DHL_AWB_NO#907853880911.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 2.2.DHL_AWB_NO#907853880911.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 2.2.DHL_AWB_NO#907853880911.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 00000005.00000000.719427940.000000000E898000.00000040.00020000.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 00000005.00000000.719427940.000000000E898000.00000040.00020000.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 00000002.00000000.672669530.0000000000400000.00000040.00000001.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 00000002.00000000.672669530.0000000000400000.00000040.00000001.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 00000000.00000002.676498068.0000000003ED9000.00000004.00000001.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 00000000.00000002.676498068.0000000003ED9000.00000004.00000001.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 00000009.00000002.930477185.0000000000D20000.00000004.00000001.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 00000009.00000002.930477185.0000000000D20000.00000004.00000001.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 00000000.00000002.677126052.000000000414A000.00000004.00000001.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 00000000.00000002.677126052.000000000414A000.00000004.00000001.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 00000009.00000002.929049449.0000000000780000.00000040.00020000.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 00000009.00000002.929049449.0000000000780000.00000040.00020000.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 00000002.00000000.673053998.0000000000400000.00000040.00000001.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 00000002.00000000.673053998.0000000000400000.00000040.00000001.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 00000009.00000002.928132789.0000000000150000.00000040.00020000.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 00000009.00000002.928132789.0000000000150000.00000040.00020000.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 00000002.00000002.736134377.0000000001060000.00000040.00020000.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 00000002.00000002.736134377.0000000001060000.00000040.00020000.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 00000002.00000002.732545477.0000000000400000.00000040.00000001.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 00000002.00000002.732545477.0000000000400000.00000040.00000001.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 00000002.00000002.734719303.0000000000C30000.00000040.00020000.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 00000002.00000002.734719303.0000000000C30000.00000040.00020000.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 00000005.00000000.705738120.000000000E898000.00000040.00020000.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 00000005.00000000.705738120.000000000E898000.00000040.00020000.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: DHL_AWB_NO#907853880911.exeStatic PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE
          Source: 2.0.DHL_AWB_NO#907853880911.exe.400000.8.raw.unpack, type: UNPACKEDPEMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 2.0.DHL_AWB_NO#907853880911.exe.400000.8.raw.unpack, type: UNPACKEDPEMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 2.0.DHL_AWB_NO#907853880911.exe.400000.8.unpack, type: UNPACKEDPEMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 2.0.DHL_AWB_NO#907853880911.exe.400000.8.unpack, type: UNPACKEDPEMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 2.0.DHL_AWB_NO#907853880911.exe.400000.6.raw.unpack, type: UNPACKEDPEMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 2.0.DHL_AWB_NO#907853880911.exe.400000.6.raw.unpack, type: UNPACKEDPEMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 2.0.DHL_AWB_NO#907853880911.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 2.0.DHL_AWB_NO#907853880911.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 2.0.DHL_AWB_NO#907853880911.exe.400000.6.unpack, type: UNPACKEDPEMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 2.0.DHL_AWB_NO#907853880911.exe.400000.6.unpack, type: UNPACKEDPEMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 2.2.DHL_AWB_NO#907853880911.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 2.2.DHL_AWB_NO#907853880911.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 2.2.DHL_AWB_NO#907853880911.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 2.2.DHL_AWB_NO#907853880911.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 00000005.00000000.719427940.000000000E898000.00000040.00020000.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 00000005.00000000.719427940.000000000E898000.00000040.00020000.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 00000002.00000000.672669530.0000000000400000.00000040.00000001.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 00000002.00000000.672669530.0000000000400000.00000040.00000001.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 00000000.00000002.676498068.0000000003ED9000.00000004.00000001.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 00000000.00000002.676498068.0000000003ED9000.00000004.00000001.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 00000009.00000002.930477185.0000000000D20000.00000004.00000001.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 00000009.00000002.930477185.0000000000D20000.00000004.00000001.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 00000000.00000002.677126052.000000000414A000.00000004.00000001.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 00000000.00000002.677126052.000000000414A000.00000004.00000001.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 00000009.00000002.929049449.0000000000780000.00000040.00020000.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 00000009.00000002.929049449.0000000000780000.00000040.00020000.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 00000002.00000000.673053998.0000000000400000.00000040.00000001.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 00000002.00000000.673053998.0000000000400000.00000040.00000001.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 00000009.00000002.928132789.0000000000150000.00000040.00020000.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 00000009.00000002.928132789.0000000000150000.00000040.00020000.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 00000002.00000002.736134377.0000000001060000.00000040.00020000.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 00000002.00000002.736134377.0000000001060000.00000040.00020000.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 00000002.00000002.732545477.0000000000400000.00000040.00000001.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 00000002.00000002.732545477.0000000000400000.00000040.00000001.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 00000002.00000002.734719303.0000000000C30000.00000040.00020000.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 00000002.00000002.734719303.0000000000C30000.00000040.00020000.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 00000005.00000000.705738120.000000000E898000.00000040.00020000.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 00000005.00000000.705738120.000000000E898000.00000040.00020000.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: C:\Users\user\Desktop\DHL_AWB_NO#907853880911.exeCode function: 2_2_0041E86E
          Source: C:\Users\user\Desktop\DHL_AWB_NO#907853880911.exeCode function: 2_2_00401026
          Source: C:\Users\user\Desktop\DHL_AWB_NO#907853880911.exeCode function: 2_2_00401030
          Source: C:\Users\user\Desktop\DHL_AWB_NO#907853880911.exeCode function: 2_2_0041E195
          Source: C:\Users\user\Desktop\DHL_AWB_NO#907853880911.exeCode function: 2_2_0041D9A3
          Source: C:\Users\user\Desktop\DHL_AWB_NO#907853880911.exeCode function: 2_2_0041E25A
          Source: C:\Users\user\Desktop\DHL_AWB_NO#907853880911.exeCode function: 2_2_00402D87
          Source: C:\Users\user\Desktop\DHL_AWB_NO#907853880911.exeCode function: 2_2_00402D90
          Source: C:\Users\user\Desktop\DHL_AWB_NO#907853880911.exeCode function: 2_2_00409E4D
          Source: C:\Users\user\Desktop\DHL_AWB_NO#907853880911.exeCode function: 2_2_00409E50
          Source: C:\Users\user\Desktop\DHL_AWB_NO#907853880911.exeCode function: 2_2_0041DE24
          Source: C:\Users\user\Desktop\DHL_AWB_NO#907853880911.exeCode function: 2_2_0041D7AB
          Source: C:\Users\user\Desktop\DHL_AWB_NO#907853880911.exeCode function: 2_2_00402FB0
          Source: C:\Users\user\Desktop\DHL_AWB_NO#907853880911.exeCode function: 2_2_010CF900
          Source: C:\Users\user\Desktop\DHL_AWB_NO#907853880911.exeCode function: 2_2_010E4120
          Source: C:\Users\user\Desktop\DHL_AWB_NO#907853880911.exeCode function: 2_2_010E99BF
          Source: C:\Users\user\Desktop\DHL_AWB_NO#907853880911.exeCode function: 2_2_01181002
          Source: C:\Users\user\Desktop\DHL_AWB_NO#907853880911.exeCode function: 2_2_0119E824
          Source: C:\Users\user\Desktop\DHL_AWB_NO#907853880911.exeCode function: 2_2_010EA830
          Source: C:\Users\user\Desktop\DHL_AWB_NO#907853880911.exeCode function: 2_2_010DB090
          Source: C:\Users\user\Desktop\DHL_AWB_NO#907853880911.exeCode function: 2_2_010F20A0
          Source: C:\Users\user\Desktop\DHL_AWB_NO#907853880911.exeCode function: 2_2_011920A8
          Source: C:\Users\user\Desktop\DHL_AWB_NO#907853880911.exeCode function: 2_2_011928EC
          Source: C:\Users\user\Desktop\DHL_AWB_NO#907853880911.exeCode function: 2_2_010EA309
          Source: C:\Users\user\Desktop\DHL_AWB_NO#907853880911.exeCode function: 2_2_01192B28
          Source: C:\Users\user\Desktop\DHL_AWB_NO#907853880911.exeCode function: 2_2_010EAB40
          Source: C:\Users\user\Desktop\DHL_AWB_NO#907853880911.exeCode function: 2_2_010FEBB0
          Source: C:\Users\user\Desktop\DHL_AWB_NO#907853880911.exeCode function: 2_2_011803DA
          Source: C:\Users\user\Desktop\DHL_AWB_NO#907853880911.exeCode function: 2_2_0118DBD2
          Source: C:\Users\user\Desktop\DHL_AWB_NO#907853880911.exeCode function: 2_2_010FABD8
          Source: C:\Users\user\Desktop\DHL_AWB_NO#907853880911.exeCode function: 2_2_011723E3
          Source: C:\Users\user\Desktop\DHL_AWB_NO#907853880911.exeCode function: 2_2_0117FA2B
          Source: C:\Users\user\Desktop\DHL_AWB_NO#907853880911.exeCode function: 2_2_011922AE
          Source: C:\Users\user\Desktop\DHL_AWB_NO#907853880911.exeCode function: 2_2_01184AEF
          Source: C:\Users\user\Desktop\DHL_AWB_NO#907853880911.exeCode function: 2_2_01192D07
          Source: C:\Users\user\Desktop\DHL_AWB_NO#907853880911.exeCode function: 2_2_010C0D20
          Source: C:\Users\user\Desktop\DHL_AWB_NO#907853880911.exeCode function: 2_2_01191D55
          Source: C:\Users\user\Desktop\DHL_AWB_NO#907853880911.exeCode function: 2_2_01182D82
          Source: C:\Users\user\Desktop\DHL_AWB_NO#907853880911.exeCode function: 2_2_011925DD
          Source: C:\Users\user\Desktop\DHL_AWB_NO#907853880911.exeCode function: 2_2_010DD5E0
          Source: C:\Users\user\Desktop\DHL_AWB_NO#907853880911.exeCode function: 2_2_010D841F
          Source: C:\Users\user\Desktop\DHL_AWB_NO#907853880911.exeCode function: 2_2_0118D466
          Source: C:\Users\user\Desktop\DHL_AWB_NO#907853880911.exeCode function: 2_2_01184496
          Source: C:\Users\user\Desktop\DHL_AWB_NO#907853880911.exeCode function: 2_2_0119DFCE
          Source: C:\Users\user\Desktop\DHL_AWB_NO#907853880911.exeCode function: 2_2_01191FF1
          Source: C:\Users\user\Desktop\DHL_AWB_NO#907853880911.exeCode function: 2_2_0118D616
          Source: C:\Users\user\Desktop\DHL_AWB_NO#907853880911.exeCode function: 2_2_010E6E30
          Source: C:\Users\user\Desktop\DHL_AWB_NO#907853880911.exeCode function: 2_2_01192EF7
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 9_2_0478D466
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 9_2_046D841F
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 9_2_04791D55
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 9_2_046C0D20
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 9_2_04792D07
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 9_2_046DD5E0
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 9_2_047925DD
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 9_2_046F2581
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 9_2_046E6E30
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 9_2_0478D616
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 9_2_04792EF7
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 9_2_04791FF1
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 9_2_0479DFCE
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 9_2_0479E824
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 9_2_04781002
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 9_2_047928EC
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 9_2_046F20A0
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 9_2_047920A8
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 9_2_046DB090
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 9_2_046E4120
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 9_2_046CF900
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 9_2_047922AE
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 9_2_04792B28
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 9_2_047803DA
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 9_2_0478DBD2
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 9_2_046FEBB0
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 9_2_0016E86E
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 9_2_0016E195
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 9_2_0016D9A3
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 9_2_0016E25A
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 9_2_00152D90
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 9_2_00152D87
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 9_2_0016DE24
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 9_2_00159E50
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 9_2_00159E4D
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 9_2_00152FB0
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 9_2_0016D7AB
          Source: C:\Users\user\Desktop\DHL_AWB_NO#907853880911.exeCode function: String function: 010CB150 appears 133 times
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: String function: 046CB150 appears 45 times
          Source: C:\Users\user\Desktop\DHL_AWB_NO#907853880911.exeCode function: 2_2_0041A350 NtCreateFile,
          Source: C:\Users\user\Desktop\DHL_AWB_NO#907853880911.exeCode function: 2_2_0041A400 NtReadFile,
          Source: C:\Users\user\Desktop\DHL_AWB_NO#907853880911.exeCode function: 2_2_0041A480 NtClose,
          Source: C:\Users\user\Desktop\DHL_AWB_NO#907853880911.exeCode function: 2_2_0041A530 NtAllocateVirtualMemory,
          Source: C:\Users\user\Desktop\DHL_AWB_NO#907853880911.exeCode function: 2_2_0041A34A NtCreateFile,
          Source: C:\Users\user\Desktop\DHL_AWB_NO#907853880911.exeCode function: 2_2_0041A3FB NtReadFile,
          Source: C:\Users\user\Desktop\DHL_AWB_NO#907853880911.exeCode function: 2_2_0041A47B NtReadFile,
          Source: C:\Users\user\Desktop\DHL_AWB_NO#907853880911.exeCode function: 2_2_0041A4AA NtClose,
          Source: C:\Users\user\Desktop\DHL_AWB_NO#907853880911.exeCode function: 2_2_0041A52C NtAllocateVirtualMemory,
          Source: C:\Users\user\Desktop\DHL_AWB_NO#907853880911.exeCode function: 2_2_0041A5AA NtAllocateVirtualMemory,
          Source: C:\Users\user\Desktop\DHL_AWB_NO#907853880911.exeCode function: 2_2_01109910 NtAdjustPrivilegesToken,LdrInitializeThunk,
          Source: C:\Users\user\Desktop\DHL_AWB_NO#907853880911.exeCode function: 2_2_011099A0 NtCreateSection,LdrInitializeThunk,
          Source: C:\Users\user\Desktop\DHL_AWB_NO#907853880911.exeCode function: 2_2_01109840 NtDelayExecution,LdrInitializeThunk,
          Source: C:\Users\user\Desktop\DHL_AWB_NO#907853880911.exeCode function: 2_2_01109860 NtQuerySystemInformation,LdrInitializeThunk,
          Source: C:\Users\user\Desktop\DHL_AWB_NO#907853880911.exeCode function: 2_2_011098F0 NtReadVirtualMemory,LdrInitializeThunk,
          Source: C:\Users\user\Desktop\DHL_AWB_NO#907853880911.exeCode function: 2_2_01109A00 NtProtectVirtualMemory,LdrInitializeThunk,
          Source: C:\Users\user\Desktop\DHL_AWB_NO#907853880911.exeCode function: 2_2_01109A20 NtResumeThread,LdrInitializeThunk,
          Source: C:\Users\user\Desktop\DHL_AWB_NO#907853880911.exeCode function: 2_2_01109A50 NtCreateFile,LdrInitializeThunk,
          Source: C:\Users\user\Desktop\DHL_AWB_NO#907853880911.exeCode function: 2_2_01109540 NtReadFile,LdrInitializeThunk,
          Source: C:\Users\user\Desktop\DHL_AWB_NO#907853880911.exeCode function: 2_2_011095D0 NtClose,LdrInitializeThunk,
          Source: C:\Users\user\Desktop\DHL_AWB_NO#907853880911.exeCode function: 2_2_01109710 NtQueryInformationToken,LdrInitializeThunk,
          Source: C:\Users\user\Desktop\DHL_AWB_NO#907853880911.exeCode function: 2_2_01109780 NtMapViewOfSection,LdrInitializeThunk,
          Source: C:\Users\user\Desktop\DHL_AWB_NO#907853880911.exeCode function: 2_2_011097A0 NtUnmapViewOfSection,LdrInitializeThunk,
          Source: C:\Users\user\Desktop\DHL_AWB_NO#907853880911.exeCode function: 2_2_01109660 NtAllocateVirtualMemory,LdrInitializeThunk,
          Source: C:\Users\user\Desktop\DHL_AWB_NO#907853880911.exeCode function: 2_2_011096E0 NtFreeVirtualMemory,LdrInitializeThunk,
          Source: C:\Users\user\Desktop\DHL_AWB_NO#907853880911.exeCode function: 2_2_01109950 NtQueueApcThread,
          Source: C:\Users\user\Desktop\DHL_AWB_NO#907853880911.exeCode function: 2_2_011099D0 NtCreateProcessEx,
          Source: C:\Users\user\Desktop\DHL_AWB_NO#907853880911.exeCode function: 2_2_01109820 NtEnumerateKey,
          Source: C:\Users\user\Desktop\DHL_AWB_NO#907853880911.exeCode function: 2_2_0110B040 NtSuspendThread,
          Source: C:\Users\user\Desktop\DHL_AWB_NO#907853880911.exeCode function: 2_2_011098A0 NtWriteVirtualMemory,
          Source: C:\Users\user\Desktop\DHL_AWB_NO#907853880911.exeCode function: 2_2_01109B00 NtSetValueKey,
          Source: C:\Users\user\Desktop\DHL_AWB_NO#907853880911.exeCode function: 2_2_0110A3B0 NtGetContextThread,
          Source: C:\Users\user\Desktop\DHL_AWB_NO#907853880911.exeCode function: 2_2_01109A10 NtQuerySection,
          Source: C:\Users\user\Desktop\DHL_AWB_NO#907853880911.exeCode function: 2_2_01109A80 NtOpenDirectoryObject,
          Source: C:\Users\user\Desktop\DHL_AWB_NO#907853880911.exeCode function: 2_2_0110AD30 NtSetContextThread,
          Source: C:\Users\user\Desktop\DHL_AWB_NO#907853880911.exeCode function: 2_2_01109520 NtWaitForSingleObject,
          Source: C:\Users\user\Desktop\DHL_AWB_NO#907853880911.exeCode function: 2_2_01109560 NtWriteFile,
          Source: C:\Users\user\Desktop\DHL_AWB_NO#907853880911.exeCode function: 2_2_011095F0 NtQueryInformationFile,
          Source: C:\Users\user\Desktop\DHL_AWB_NO#907853880911.exeCode function: 2_2_0110A710 NtOpenProcessToken,
          Source: C:\Users\user\Desktop\DHL_AWB_NO#907853880911.exeCode function: 2_2_01109730 NtQueryVirtualMemory,
          Source: C:\Users\user\Desktop\DHL_AWB_NO#907853880911.exeCode function: 2_2_0110A770 NtOpenThread,
          Source: C:\Users\user\Desktop\DHL_AWB_NO#907853880911.exeCode function: 2_2_01109770 NtSetInformationFile,
          Source: C:\Users\user\Desktop\DHL_AWB_NO#907853880911.exeCode function: 2_2_01109760 NtOpenProcess,
          Source: C:\Users\user\Desktop\DHL_AWB_NO#907853880911.exeCode function: 2_2_01109FE0 NtCreateMutant,
          Source: C:\Users\user\Desktop\DHL_AWB_NO#907853880911.exeCode function: 2_2_01109610 NtEnumerateValueKey,
          Source: C:\Users\user\Desktop\DHL_AWB_NO#907853880911.exeCode function: 2_2_01109650 NtQueryValueKey,
          Source: C:\Users\user\Desktop\DHL_AWB_NO#907853880911.exeCode function: 2_2_01109670 NtQueryInformationProcess,
          Source: C:\Users\user\Desktop\DHL_AWB_NO#907853880911.exeCode function: 2_2_011096D0 NtCreateKey,
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 9_2_04709540 NtReadFile,LdrInitializeThunk,
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 9_2_047095D0 NtClose,LdrInitializeThunk,
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 9_2_04709660 NtAllocateVirtualMemory,LdrInitializeThunk,
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 9_2_04709650 NtQueryValueKey,LdrInitializeThunk,
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 9_2_047096E0 NtFreeVirtualMemory,LdrInitializeThunk,
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 9_2_047096D0 NtCreateKey,LdrInitializeThunk,
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 9_2_04709710 NtQueryInformationToken,LdrInitializeThunk,
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 9_2_04709FE0 NtCreateMutant,LdrInitializeThunk,
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 9_2_04709780 NtMapViewOfSection,LdrInitializeThunk,
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 9_2_04709860 NtQuerySystemInformation,LdrInitializeThunk,
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 9_2_04709840 NtDelayExecution,LdrInitializeThunk,
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 9_2_04709910 NtAdjustPrivilegesToken,LdrInitializeThunk,
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 9_2_047099A0 NtCreateSection,LdrInitializeThunk,
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 9_2_04709A50 NtCreateFile,LdrInitializeThunk,
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 9_2_04709560 NtWriteFile,
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 9_2_0470AD30 NtSetContextThread,
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 9_2_04709520 NtWaitForSingleObject,
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 9_2_047095F0 NtQueryInformationFile,
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 9_2_04709670 NtQueryInformationProcess,
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 9_2_04709610 NtEnumerateValueKey,
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 9_2_0470A770 NtOpenThread,
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 9_2_04709770 NtSetInformationFile,
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 9_2_04709760 NtOpenProcess,
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 9_2_04709730 NtQueryVirtualMemory,
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 9_2_0470A710 NtOpenProcessToken,
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 9_2_047097A0 NtUnmapViewOfSection,
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 9_2_0470B040 NtSuspendThread,
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 9_2_04709820 NtEnumerateKey,
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 9_2_047098F0 NtReadVirtualMemory,
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 9_2_047098A0 NtWriteVirtualMemory,
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 9_2_04709950 NtQueueApcThread,
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 9_2_047099D0 NtCreateProcessEx,
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 9_2_04709A20 NtResumeThread,
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 9_2_04709A10 NtQuerySection,
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 9_2_04709A00 NtProtectVirtualMemory,
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 9_2_04709A80 NtOpenDirectoryObject,
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 9_2_04709B00 NtSetValueKey,
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 9_2_0470A3B0 NtGetContextThread,
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 9_2_0016A350 NtCreateFile,
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 9_2_0016A400 NtReadFile,
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 9_2_0016A480 NtClose,
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 9_2_0016A530 NtAllocateVirtualMemory,
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 9_2_0016A34A NtCreateFile,
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 9_2_0016A3FB NtReadFile,
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 9_2_0016A47B NtReadFile,
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 9_2_0016A4AA NtClose,
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 9_2_0016A52C NtAllocateVirtualMemory,
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 9_2_0016A5AA NtAllocateVirtualMemory,
          Source: DHL_AWB_NO#907853880911.exeBinary or memory string: OriginalFilename vs DHL_AWB_NO#907853880911.exe
          Source: DHL_AWB_NO#907853880911.exe, 00000000.00000000.661693370.0000000000B32000.00000002.00020000.sdmpBinary or memory string: OriginalFilenameITypeLibExporterNameProvid.exeF vs DHL_AWB_NO#907853880911.exe
          Source: DHL_AWB_NO#907853880911.exe, 00000000.00000002.676134512.0000000002ED1000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameInnerException.dll" vs DHL_AWB_NO#907853880911.exe
          Source: DHL_AWB_NO#907853880911.exe, 00000000.00000002.676733257.0000000003FAB000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameUI.dllF vs DHL_AWB_NO#907853880911.exe
          Source: DHL_AWB_NO#907853880911.exeBinary or memory string: OriginalFilename vs DHL_AWB_NO#907853880911.exe
          Source: DHL_AWB_NO#907853880911.exe, 00000002.00000000.673078741.0000000000602000.00000002.00020000.sdmpBinary or memory string: OriginalFilenameITypeLibExporterNameProvid.exeF vs DHL_AWB_NO#907853880911.exe
          Source: DHL_AWB_NO#907853880911.exe, 00000002.00000002.740455030.00000000011BF000.00000040.00000001.sdmpBinary or memory string: OriginalFilenamentdll.dllj% vs DHL_AWB_NO#907853880911.exe
          Source: DHL_AWB_NO#907853880911.exe, 00000002.00000002.742234522.0000000002E63000.00000040.00020000.sdmpBinary or memory string: OriginalFilenamemstsc.exej% vs DHL_AWB_NO#907853880911.exe
          Source: DHL_AWB_NO#907853880911.exe, 00000002.00000002.741583326.000000000134F000.00000040.00000001.sdmpBinary or memory string: OriginalFilenamentdll.dllj% vs DHL_AWB_NO#907853880911.exe
          Source: DHL_AWB_NO#907853880911.exeBinary or memory string: OriginalFilenameITypeLibExporterNameProvid.exeF vs DHL_AWB_NO#907853880911.exe
          Source: DHL_AWB_NO#907853880911.exeStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
          Source: DHL_AWB_NO#907853880911.exeStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
          Source: DHL_AWB_NO#907853880911.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
          Source: DHL_AWB_NO#907853880911.exeVirustotal: Detection: 25%
          Source: DHL_AWB_NO#907853880911.exeMetadefender: Detection: 31%
          Source: DHL_AWB_NO#907853880911.exeReversingLabs: Detection: 51%
          Source: DHL_AWB_NO#907853880911.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
          Source: C:\Users\user\Desktop\DHL_AWB_NO#907853880911.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
          Source: unknownProcess created: C:\Users\user\Desktop\DHL_AWB_NO#907853880911.exe "C:\Users\user\Desktop\DHL_AWB_NO#907853880911.exe"
          Source: C:\Users\user\Desktop\DHL_AWB_NO#907853880911.exeProcess created: C:\Users\user\Desktop\DHL_AWB_NO#907853880911.exe C:\Users\user\Desktop\DHL_AWB_NO#907853880911.exe
          Source: C:\Windows\explorer.exeProcess created: C:\Windows\SysWOW64\mstsc.exe C:\Windows\SysWOW64\mstsc.exe
          Source: C:\Windows\SysWOW64\mstsc.exeProcess created: C:\Windows\SysWOW64\cmd.exe /c del "C:\Users\user\Desktop\DHL_AWB_NO#907853880911.exe"
          Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
          Source: C:\Windows\SysWOW64\mstsc.exeProcess created: C:\Windows\explorer.exe "C:\Windows\explorer.exe" /LOADSAVEDWINDOWS
          Source: C:\Users\user\Desktop\DHL_AWB_NO#907853880911.exeProcess created: C:\Users\user\Desktop\DHL_AWB_NO#907853880911.exe C:\Users\user\Desktop\DHL_AWB_NO#907853880911.exe
          Source: C:\Windows\SysWOW64\mstsc.exeProcess created: C:\Windows\SysWOW64\cmd.exe /c del "C:\Users\user\Desktop\DHL_AWB_NO#907853880911.exe"
          Source: C:\Windows\explorer.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{660b90c8-73a9-4b58-8cae-355b7f55341b}\InProcServer32
          Source: C:\Users\user\Desktop\DHL_AWB_NO#907853880911.exeFile created: C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\DHL_AWB_NO#907853880911.exe.logJump to behavior
          Source: classification engineClassification label: mal100.troj.evad.winEXE@8/1@1/0
          Source: C:\Windows\explorer.exeFile read: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\desktop.iniJump to behavior
          Source: C:\Users\user\Desktop\DHL_AWB_NO#907853880911.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
          Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6880:120:WilError_01
          Source: C:\Users\user\Desktop\DHL_AWB_NO#907853880911.exeMutant created: \Sessions\1\BaseNamedObjects\BEvagxB
          Source: C:\Windows\SysWOW64\mstsc.exeProcess created: C:\Windows\explorer.exe
          Source: Window RecorderWindow detected: More than 3 window changes detected
          Source: C:\Users\user\Desktop\DHL_AWB_NO#907853880911.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dll
          Source: DHL_AWB_NO#907853880911.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
          Source: DHL_AWB_NO#907853880911.exeStatic PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
          Source: Binary string: wntdll.pdbUGP source: DHL_AWB_NO#907853880911.exe, 00000002.00000002.740455030.00000000011BF000.00000040.00000001.sdmp, DHL_AWB_NO#907853880911.exe, 00000002.00000002.736402550.00000000010A0000.00000040.00000001.sdmp, mstsc.exe, 00000009.00000002.932676468.00000000047BF000.00000040.00000001.sdmp, mstsc.exe, 00000009.00000002.932440573.00000000046A0000.00000040.00000001.sdmp
          Source: Binary string: wntdll.pdb source: DHL_AWB_NO#907853880911.exe, DHL_AWB_NO#907853880911.exe, 00000002.00000002.740455030.00000000011BF000.00000040.00000001.sdmp, DHL_AWB_NO#907853880911.exe, 00000002.00000002.736402550.00000000010A0000.00000040.00000001.sdmp, mstsc.exe, mstsc.exe, 00000009.00000002.932676468.00000000047BF000.00000040.00000001.sdmp, mstsc.exe, 00000009.00000002.932440573.00000000046A0000.00000040.00000001.sdmp
          Source: Binary string: mstsc.pdbGCTL source: DHL_AWB_NO#907853880911.exe, 00000002.00000002.742005114.0000000002D40000.00000040.00020000.sdmp
          Source: Binary string: mstsc.pdb source: DHL_AWB_NO#907853880911.exe, 00000002.00000002.742005114.0000000002D40000.00000040.00020000.sdmp

          Data Obfuscation:

          barindex
          .NET source code contains potential unpackerShow sources
          Source: DHL_AWB_NO#907853880911.exe, _PS360Drum/FrmMain.cs.Net Code: CF234052 System.Reflection.Assembly System.AppDomain::Load(System.Byte[])
          Source: 0.0.DHL_AWB_NO#907853880911.exe.b30000.0.unpack, _PS360Drum/FrmMain.cs.Net Code: CF234052 System.Reflection.Assembly System.AppDomain::Load(System.Byte[])
          Source: 0.2.DHL_AWB_NO#907853880911.exe.b30000.0.unpack, _PS360Drum/FrmMain.cs.Net Code: CF234052 System.Reflection.Assembly System.AppDomain::Load(System.Byte[])
          Source: 2.0.DHL_AWB_NO#907853880911.exe.600000.1.unpack, _PS360Drum/FrmMain.cs.Net Code: CF234052 System.Reflection.Assembly System.AppDomain::Load(System.Byte[])
          Source: 2.0.DHL_AWB_NO#907853880911.exe.600000.5.unpack, _PS360Drum/FrmMain.cs.Net Code: CF234052 System.Reflection.Assembly System.AppDomain::Load(System.Byte[])
          Source: 2.2.DHL_AWB_NO#907853880911.exe.600000.1.unpack, _PS360Drum/FrmMain.cs.Net Code: CF234052 System.Reflection.Assembly System.AppDomain::Load(System.Byte[])
          Source: 2.0.DHL_AWB_NO#907853880911.exe.600000.2.unpack, _PS360Drum/FrmMain.cs.Net Code: CF234052 System.Reflection.Assembly System.AppDomain::Load(System.Byte[])
          Source: 2.0.DHL_AWB_NO#907853880911.exe.600000.0.unpack, _PS360Drum/FrmMain.cs.Net Code: CF234052 System.Reflection.Assembly System.AppDomain::Load(System.Byte[])
          Source: 2.0.DHL_AWB_NO#907853880911.exe.600000.7.unpack, _PS360Drum/FrmMain.cs.Net Code: CF234052 System.Reflection.Assembly System.AppDomain::Load(System.Byte[])
          Source: 2.0.DHL_AWB_NO#907853880911.exe.600000.3.unpack, _PS360Drum/FrmMain.cs.Net Code: CF234052 System.Reflection.Assembly System.AppDomain::Load(System.Byte[])
          Source: 2.0.DHL_AWB_NO#907853880911.exe.600000.9.unpack, _PS360Drum/FrmMain.cs.Net Code: CF234052 System.Reflection.Assembly System.AppDomain::Load(System.Byte[])
          Source: C:\Users\user\Desktop\DHL_AWB_NO#907853880911.exeCode function: 2_2_00417008 push eax; ret
          Source: C:\Users\user\Desktop\DHL_AWB_NO#907853880911.exeCode function: 2_2_0041EA54 push dword ptr [56382DF9h]; ret
          Source: C:\Users\user\Desktop\DHL_AWB_NO#907853880911.exeCode function: 2_2_00417C59 pushfd ; iretd
          Source: C:\Users\user\Desktop\DHL_AWB_NO#907853880911.exeCode function: 2_2_0041D4F2 push eax; ret
          Source: C:\Users\user\Desktop\DHL_AWB_NO#907853880911.exeCode function: 2_2_0041D4FB push eax; ret
          Source: C:\Users\user\Desktop\DHL_AWB_NO#907853880911.exeCode function: 2_2_0041D4A5 push eax; ret
          Source: C:\Users\user\Desktop\DHL_AWB_NO#907853880911.exeCode function: 2_2_0041D55C push eax; ret
          Source: C:\Users\user\Desktop\DHL_AWB_NO#907853880911.exeCode function: 2_2_004165DC push es; iretd
          Source: C:\Users\user\Desktop\DHL_AWB_NO#907853880911.exeCode function: 2_2_0041774A push ecx; retf
          Source: C:\Users\user\Desktop\DHL_AWB_NO#907853880911.exeCode function: 2_2_0111D0D1 push ecx; ret
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 9_2_0471D0D1 push ecx; ret
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 9_2_00167008 push eax; ret
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 9_2_0016EA54 push dword ptr [56382DF9h]; ret
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 9_2_00167C59 pushfd ; iretd
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 9_2_0016D4A5 push eax; ret
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 9_2_0016D4F2 push eax; ret
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 9_2_0016D4FB push eax; ret
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 9_2_0016D55C push eax; ret
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 9_2_001665DC push es; iretd
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 9_2_0016774A push ecx; retf
          Source: initial sampleStatic PE information: section name: .text entropy: 7.7277719097

          Hooking and other Techniques for Hiding and Protection:

          barindex
          Self deletion via cmd deleteShow sources
          Source: C:\Windows\SysWOW64\mstsc.exeProcess created: /c del "C:\Users\user\Desktop\DHL_AWB_NO#907853880911.exe"
          Source: C:\Windows\SysWOW64\mstsc.exeProcess created: /c del "C:\Users\user\Desktop\DHL_AWB_NO#907853880911.exe"
          Source: C:\Windows\explorer.exeRegistry key monitored for changes: HKEY_CURRENT_USER_Classes
          Source: C:\Users\user\Desktop\DHL_AWB_NO#907853880911.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\DHL_AWB_NO#907853880911.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\DHL_AWB_NO#907853880911.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\DHL_AWB_NO#907853880911.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\DHL_AWB_NO#907853880911.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\DHL_AWB_NO#907853880911.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\DHL_AWB_NO#907853880911.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\DHL_AWB_NO#907853880911.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\DHL_AWB_NO#907853880911.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\DHL_AWB_NO#907853880911.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\DHL_AWB_NO#907853880911.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\DHL_AWB_NO#907853880911.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\DHL_AWB_NO#907853880911.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\DHL_AWB_NO#907853880911.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\DHL_AWB_NO#907853880911.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\DHL_AWB_NO#907853880911.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\DHL_AWB_NO#907853880911.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\DHL_AWB_NO#907853880911.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\DHL_AWB_NO#907853880911.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\DHL_AWB_NO#907853880911.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\DHL_AWB_NO#907853880911.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\DHL_AWB_NO#907853880911.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\DHL_AWB_NO#907853880911.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\DHL_AWB_NO#907853880911.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\DHL_AWB_NO#907853880911.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\DHL_AWB_NO#907853880911.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\DHL_AWB_NO#907853880911.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\DHL_AWB_NO#907853880911.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\DHL_AWB_NO#907853880911.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\DHL_AWB_NO#907853880911.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\DHL_AWB_NO#907853880911.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\mstsc.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX
          Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX

          Malware Analysis System Evasion:

          barindex
          Yara detected AntiVM3Show sources
          Source: Yara matchFile source: 0.2.DHL_AWB_NO#907853880911.exe.2ef3880.1.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 00000000.00000002.676134512.0000000002ED1000.00000004.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: Process Memory Space: DHL_AWB_NO#907853880911.exe PID: 7156, type: MEMORYSTR
          Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)Show sources
          Source: DHL_AWB_NO#907853880911.exe, 00000000.00000002.676134512.0000000002ED1000.00000004.00000001.sdmpBinary or memory string: SBIEDLL.DLL
          Source: DHL_AWB_NO#907853880911.exe, 00000000.00000002.676134512.0000000002ED1000.00000004.00000001.sdmpBinary or memory string: KERNEL32.DLL.WINE_GET_UNIX_FILE_NAME
          Tries to detect virtualization through RDTSC time measurementsShow sources
          Source: C:\Users\user\Desktop\DHL_AWB_NO#907853880911.exeRDTSC instruction interceptor: First address: 0000000000409904 second address: 000000000040990A instructions: 0x00000000 rdtsc 0x00000002 xor ecx, ecx 0x00000004 add ecx, eax 0x00000006 rdtsc
          Source: C:\Users\user\Desktop\DHL_AWB_NO#907853880911.exeRDTSC instruction interceptor: First address: 0000000000409B6E second address: 0000000000409B74 instructions: 0x00000000 rdtsc 0x00000002 xor ecx, ecx 0x00000004 add ecx, eax 0x00000006 rdtsc
          Source: C:\Windows\SysWOW64\mstsc.exeRDTSC instruction interceptor: First address: 0000000000159904 second address: 000000000015990A instructions: 0x00000000 rdtsc 0x00000002 xor ecx, ecx 0x00000004 add ecx, eax 0x00000006 rdtsc
          Source: C:\Windows\SysWOW64\mstsc.exeRDTSC instruction interceptor: First address: 0000000000159B6E second address: 0000000000159B74 instructions: 0x00000000 rdtsc 0x00000002 xor ecx, ecx 0x00000004 add ecx, eax 0x00000006 rdtsc
          Source: C:\Users\user\Desktop\DHL_AWB_NO#907853880911.exe TID: 7160Thread sleep time: -33950s >= -30000s
          Source: C:\Users\user\Desktop\DHL_AWB_NO#907853880911.exe TID: 5128Thread sleep time: -922337203685477s >= -30000s
          Source: C:\Windows\SysWOW64\mstsc.exeLast function: Thread delayed
          Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
          Source: C:\Users\user\Desktop\DHL_AWB_NO#907853880911.exeCode function: 2_2_00409AA0 rdtsc
          Source: C:\Users\user\Desktop\DHL_AWB_NO#907853880911.exeThread delayed: delay time: 922337203685477
          Source: C:\Windows\explorer.exeFile opened / queried: SCSI#Disk&Ven_VMware&Prod_Virtual_disk#5&1ec51bf7&0&000000#{53f56307-b6bf-11d0-94f2-00a0c91efb8b}
          Source: C:\Users\user\Desktop\DHL_AWB_NO#907853880911.exeProcess information queried: ProcessInformation
          Source: C:\Users\user\Desktop\DHL_AWB_NO#907853880911.exeThread delayed: delay time: 33950
          Source: C:\Users\user\Desktop\DHL_AWB_NO#907853880911.exeThread delayed: delay time: 922337203685477
          Source: explorer.exe, 0000000F.00000003.910451729.0000000006914000.00000004.00000001.sdmpBinary or memory string: \\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000025700000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#000000001F400000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000026700000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000000100000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&280b647&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_Msft&Prod_Virtual_DVD-ROM#2&1f4adffe&0&000001#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}BeP
          Source: explorer.exe, 0000000F.00000003.892678163.0000000006936000.00000004.00000001.sdmpBinary or memory string: VMware SATA CD00dRom0
          Source: explorer.exe, 0000000F.00000000.834831515.00000000013FF000.00000004.00000020.sdmpBinary or memory string: SCSI\Disk&Ven_VMware&Prod_Virtual_disk\5&1ec51bf7&0&000000
          Source: explorer.exe, 0000000F.00000003.843225044.00000000068F0000.00000004.00000001.sdmpBinary or memory string: \\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000025700000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#000000001F400000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000026700000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000000100000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&280b647&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_Msft&Prod_Virtual_DVD-ROM#2&1f4adffe&0&000001#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}B2
          Source: explorer.exe, 0000000F.00000003.844279531.0000000006936000.00000004.00000001.sdmpBinary or memory string: \\?\scsi#cdrom&ven_necvmwar&prod_vmware_sata_cd00#5&280b647&0&000000#{53f56308-b6bf-11d0-94f2-00a0c91efb8b}ort (PPPOE)
          Source: explorer.exe, 0000000F.00000000.873245390.000000000FA69000.00000004.00000001.sdmpBinary or memory string: \\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000025700000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#000000001F400000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000026700000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000000100000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&280b647&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_Msft&Prod_Virtual_DVD-ROM#2&1f4adffe&0&000001#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}
          Source: DHL_AWB_NO#907853880911.exe, 00000000.00000002.676134512.0000000002ED1000.00000004.00000001.sdmpBinary or memory string: InstallPathJC:\PROGRAM FILES\VMWARE\VMWARE TOOLS\
          Source: explorer.exe, 0000000F.00000003.838440381.00000000068DB000.00000004.00000001.sdmpBinary or memory string: #cdrom&ven_necvmwar&prod_vmware_sata_cd00#5&280b647&0&000000#{53f56308-b6bf-11d0-94fZ
          Source: explorer.exe, 0000000F.00000003.858695128.000000000FAD7000.00000004.00000001.sdmpBinary or memory string: \\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000025700000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#000000001F400000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000026700000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000000100000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&280b647&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_Msft&Prod_Virtual_DVD-ROM#2&1f4adffe&0&000001#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}x
          Source: explorer.exe, 0000000F.00000003.911854479.00000000069F5000.00000004.00000001.sdmpBinary or memory string: \\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000025700000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#000000001F400000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000026700000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000000100000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&280b647&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_Msft&Prod_Virtual_DVD-ROM#2&1f4adffe&0&000001#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}B)
          Source: explorer.exe, 0000000F.00000003.838239326.0000000006936000.00000004.00000001.sdmpBinary or memory string: \\?\scsi#cdrom&ven_necvmwar&prod_vmware_sata_cd00#5&280b647&0&000000#{53f56308-b6bf-11d0-94f2-00a0c91efb8b}\!
          Source: explorer.exe, 0000000F.00000003.847371587.000000000FA69000.00000004.00000001.sdmpBinary or memory string: \\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000025700000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#000000001F400000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000026700000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000000100000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&280b647&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_Msft&Prod_Virtual_DVD-ROM#2&1f4adffe&0&000001#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}B9/
          Source: explorer.exe, 00000005.00000000.684354422.000000000A60E000.00000004.00000001.sdmpBinary or memory string: \\?\scsi#cdrom&ven_necvmwar&prod_vmware_sata_cd00#5&280b647&0&000000#{53f56308-b6bf-11d0-94f2-00a0c91efb8b}
          Source: explorer.exe, 0000000F.00000000.847452775.0000000006886000.00000004.00000001.sdmpBinary or memory string: Prod_VMware_SATA_CD00#5&280bP
          Source: explorer.exe, 0000000F.00000003.842878198.0000000006893000.00000004.00000001.sdmpBinary or memory string: SCSI\CDROM&VEN_NECVMWAR&PROD_VMWARE_SATA_CD00\5&280B647&0&000000
          Source: explorer.exe, 0000000F.00000003.913038679.00000000069F7000.00000004.00000001.sdmpBinary or memory string: 8f2-11e9-90ce-806e6f6e6963}#000000001F400000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000026700000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000000100000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&280b647&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_Msft&Prod_Virtual_DVD-ROM#2&1f4adffe&0&000001#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}B[
          Source: explorer.exe, 0000000F.00000000.897004002.00000000068DC000.00000004.00000001.sdmpBinary or memory string: #CdRom&Ven_NECVMWar&Prod_VMware_SATAV
          Source: explorer.exe, 0000000F.00000003.838239326.0000000006936000.00000004.00000001.sdmpBinary or memory string: \\?\scsi#cdrom&ven_necvmwar&prod_vmware_sata_cd00#5&280b647&0&000000#{53f56308-b6bf-11d0-94f2-00a0c91efb8b}\>
          Source: explorer.exe, 00000005.00000000.678837034.0000000004710000.00000004.00000001.sdmpBinary or memory string: SCSI\Disk&Ven_VMware&Prod_Virtual_disk\5&1ec51bf7&0&000000[Wm
          Source: explorer.exe, 00000005.00000000.684528225.000000000A716000.00000004.00000001.sdmpBinary or memory string: SCSI\CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00\5&280b647&0&000000/
          Source: explorer.exe, 0000000F.00000003.870475999.000000000FADC000.00000004.00000001.sdmpBinary or memory string: \\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000025700000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#000000001F400000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000026700000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000000100000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&280b647&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_Msft&Prod_Virtual_DVD-ROM#2&1f4adffe&0&000001#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}y
          Source: explorer.exe, 0000000F.00000003.876351845.0000000006914000.00000004.00000001.sdmpBinary or memory string: \\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000025700000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#000000001F400000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000026700000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000000100000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&280b647&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_Msft&Prod_Virtual_DVD-ROM#2&1f4adffe&0&000001#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}BnQ
          Source: explorer.exe, 0000000F.00000000.897641119.0000000007040000.00000004.00000001.sdmpBinary or memory string: SCSI\CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00\5&280b647&0&0000007!
          Source: explorer.exe, 0000000F.00000003.870475999.000000000FADC000.00000004.00000001.sdmpBinary or memory string: \\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000025700000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#000000001F400000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000026700000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000000100000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&280b647&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_Msft&Prod_Virtual_DVD-ROM#2&1f4adffe&0&000001#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}{
          Source: explorer.exe, 00000005.00000000.684656202.000000000A784000.00000004.00000001.sdmpBinary or memory string: SCSI\CDROM&VEN_NECVMWAR&PROD_VMWARE_SATA_CD00\5&280B647&0&000000@
          Source: explorer.exe, 0000000F.00000003.870475999.000000000FADC000.00000004.00000001.sdmpBinary or memory string: \\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000025700000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#000000001F400000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000026700000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000000100000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&280b647&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_Msft&Prod_Virtual_DVD-ROM#2&1f4adffe&0&000001#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}|
          Source: explorer.exe, 0000000F.00000000.873245390.000000000FA69000.00000004.00000001.sdmpBinary or memory string: \\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000025700000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#000000001F400000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000026700000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000000100000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&280b647&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_Msft&Prod_Virtual_DVD-ROM#2&1f4adffe&0&000001#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}oft\WindowsAppsPATHEXT=.COBP/
          Source: DHL_AWB_NO#907853880911.exe, 00000000.00000002.676134512.0000000002ED1000.00000004.00000001.sdmpBinary or memory string: vmware
          Source: explorer.exe, 0000000F.00000003.892678163.0000000006936000.00000004.00000001.sdmpBinary or memory string: VMware SATA CD00
          Source: explorer.exe, 0000000F.00000003.838239326.0000000006936000.00000004.00000001.sdmpBinary or memory string: \??\scsi#cdrom&ven_necvmwar&prod_vmware_sata_cd00#5&280b647&0&000000#{53f56308-b6bf-11d0-94f2-00a0c91efb8b}
          Source: explorer.exe, 0000000F.00000003.911854479.00000000069F5000.00000004.00000001.sdmpBinary or memory string: \\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000025700000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#000000001F400000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000026700000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000000100000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&280b647&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_Msft&Prod_Virtual_DVD-ROM#2&1f4adffe&0&000001#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}BM
          Source: explorer.exe, 0000000F.00000003.891640168.00000000069F5000.00000004.00000001.sdmpBinary or memory string: \\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000025700000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#000000001F400000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000026700000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000000100000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&280b647&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_Msft&Prod_Virtual_DVD-ROM#2&1f4adffe&0&000001#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}B@
          Source: explorer.exe, 0000000F.00000003.892678163.0000000006936000.00000004.00000001.sdmpBinary or memory string: \\?\scsi#cdrom&ven_necvmwar&prod_vmware_sata_cd00#5&280b647&0&000000#{53f56308-b6bf-11d0-94f2-00a0c91efb8b}ort (PPPOE)6
          Source: DHL_AWB_NO#907853880911.exe, 00000000.00000002.676134512.0000000002ED1000.00000004.00000001.sdmpBinary or memory string: VMware SVGA IIBAdd-MpPreference -ExclusionPath "
          Source: explorer.exe, 0000000F.00000003.847371587.000000000FA69000.00000004.00000001.sdmpBinary or memory string: \\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000025700000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#000000001F400000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000026700000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000000100000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&280b647&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_Msft&Prod_Virtual_DVD-ROM#2&1f4adffe&0&000001#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}BG.
          Source: explorer.exe, 0000000F.00000003.909071438.00000000069F5000.00000004.00000001.sdmpBinary or memory string: \\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000025700000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#000000001F400000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000026700000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000000100000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&280b647&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_Msft&Prod_Virtual_DVD-ROM#2&1f4adffe&0&000001#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}Bw
          Source: explorer.exe, 0000000F.00000000.873245390.000000000FA69000.00000004.00000001.sdmpBinary or memory string: \\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000025700000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#000000001F400000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000026700000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000000100000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&280b647&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_Msft&Prod_Virtual_DVD-ROM#2&1f4adffe&0&000001#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}=C:\Program Files (x86)ProB
          Source: explorer.exe, 0000000F.00000000.897390395.00000000069F4000.00000004.00000001.sdmpBinary or memory string: \\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000025700000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#000000001F400000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000026700000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000000100000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&280b647&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_Msft&Prod_Virtual_DVD-ROM#2&1f4adffe&0&000001#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}Bj
          Source: explorer.exe, 00000005.00000000.684528225.000000000A716000.00000004.00000001.sdmpBinary or memory string: War&Prod_VMware_SATAa
          Source: explorer.exe, 0000000F.00000000.873245390.000000000FA69000.00000004.00000001.sdmpBinary or memory string: \\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000025700000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#000000001F400000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000026700000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000000100000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&280b647&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_Msft&Prod_Virtual_DVD-ROM#2&1f4adffe&0&000001#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}B
          Source: explorer.exe, 0000000F.00000003.892678163.0000000006936000.00000004.00000001.sdmpBinary or memory string: \\?\scsi#cdrom&ven_necvmwar&prod_vmware_sata_cd00#5&280b647&0&000000#{53f56308-b6bf-11d0-94f2-00a0c91efb8b}rt
          Source: explorer.exe, 0000000F.00000003.890522306.000000000690E000.00000004.00000001.sdmpBinary or memory string: \\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000025700000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#000000001F400000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000026700000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000000100000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&280b647&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_Msft&Prod_Virtual_DVD-ROM#2&1f4adffe&0&000001#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}Packages
          Source: explorer.exe, 0000000F.00000003.910003911.00000000069F7000.00000004.00000001.sdmpBinary or memory string: \\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000025700000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#000000001F400000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000026700000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000000100000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&280b647&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_Msft&Prod_Virtual_DVD-ROM#2&1f4adffe&0&000001#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}B[
          Source: explorer.exe, 0000000F.00000003.863615553.0000000006936000.00000004.00000001.sdmpBinary or memory string: \\?\scsi#cdrom&ven_necvmwar&prod_vmware_sata_cd00#5&280b647&0&000000#{53f56308-b6bf-11d0-94f2-00a0c91efb8b}ort (PPPOE)[
          Source: explorer.exe, 0000000F.00000003.893264606.0000000006914000.00000004.00000001.sdmpBinary or memory string: \\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000025700000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#000000001F400000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000026700000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000000100000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&280b647&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_Msft&Prod_Virtual_DVD-ROM#2&1f4adffe&0&000001#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}B R.
          Source: explorer.exe, 0000000F.00000003.847371587.000000000FA69000.00000004.00000001.sdmpBinary or memory string: \\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000025700000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#000000001F400000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000026700000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000000100000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&280b647&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_Msft&Prod_Virtual_DVD-ROM#2&1f4adffe&0&000001#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}BP/
          Source: explorer.exe, 0000000F.00000003.890522306.000000000690E000.00000004.00000001.sdmpBinary or memory string: \\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000025700000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#000000001F400000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000026700000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000000100000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&280b647&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_Msft&Prod_Virtual_DVD-ROM#2&1f4adffe&0&000001#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}microsoft.windows.contenB
          Source: DHL_AWB_NO#907853880911.exe, 00000000.00000002.676134512.0000000002ED1000.00000004.00000001.sdmpBinary or memory string: VMWAREDSOFTWARE\VMware, Inc.\VMware Tools
          Source: explorer.exe, 0000000F.00000003.891479405.000000000690E000.00000004.00000001.sdmpBinary or memory string: \\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000025700000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#000000001F400000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000026700000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000000100000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&280b647&0&000000#{53f5630d-b6bf-11d0-94f2-00
          Source: explorer.exe, 0000000F.00000000.873245390.000000000FA69000.00000004.00000001.sdmpBinary or memory string: \\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000025700000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#000000001F400000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000026700000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000000100000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&280b647&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_Msft&Prod_Virtual_DVD-ROM#2&1f4adffe&0&000001#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}B](
          Source: explorer.exe, 0000000F.00000003.892678163.0000000006936000.00000004.00000001.sdmpBinary or memory string: \\?\scsi#cdrom&ven_necvmwar&prod_vmware_sata_cd00#5&280b647&0&000000#{53f56308-b6bf-11d0-94f2-00a0c91efb8b}
          Source: explorer.exe, 0000000F.00000003.849093600.00000000069EA000.00000004.00000001.sdmpBinary or memory string: \\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000025700000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#000000001F400000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000026700000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000000100000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&280b647&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\X
          Source: explorer.exe, 00000005.00000000.680799524.0000000006650000.00000004.00000001.sdmpBinary or memory string: \\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&280b647&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}
          Source: explorer.exe, 0000000F.00000003.834800963.00000000067D6000.00000004.00000001.sdmpBinary or memory string: SCSI\CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00\5&280b647&0&000000@v
          Source: explorer.exe, 0000000F.00000003.870475999.000000000FADC000.00000004.00000001.sdmpBinary or memory string: \\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000025700000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#000000001F400000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000026700000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000000100000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&280b647&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_Msft&Prod_Virtual_DVD-ROM#2&1f4adffe&0&000001#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}"
          Source: explorer.exe, 0000000F.00000003.870475999.000000000FADC000.00000004.00000001.sdmpBinary or memory string: \\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000025700000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#000000001F400000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000026700000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000000100000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&280b647&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_Msft&Prod_Virtual_DVD-ROM#2&1f4adffe&0&000001#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}$
          Source: explorer.exe, 0000000F.00000003.839675894.0000000006A36000.00000004.00000001.sdmpBinary or memory string: \\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000025700000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#000000001F400000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000026700000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000000100000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&280b647&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_Msft&Prod_Virtual_DVD-ROM#2&1f4adffe&0&000001#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}B}-
          Source: explorer.exe, 0000000F.00000003.870475999.000000000FADC000.00000004.00000001.sdmpBinary or memory string: \\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000025700000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#000000001F400000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000026700000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000000100000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&280b647&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_Msft&Prod_Virtual_DVD-ROM#2&1f4adffe&0&000001#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}(
          Source: explorer.exe, 0000000F.00000003.838239326.0000000006936000.00000004.00000001.sdmpBinary or memory string: \\?\scsi#cdrom&ven_necvmwar&prod_vmware_sata_cd00#5&280b647&0&000000#{53f56308-b6bf-11d0-94f2-00a0c91efb8b}\.
          Source: explorer.exe, 0000000F.00000003.834800963.00000000067D6000.00000004.00000001.sdmpBinary or memory string: SCSI\CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00\5&280b647&0&000000
          Source: explorer.exe, 0000000F.00000000.873245390.000000000FA69000.00000004.00000001.sdmpBinary or memory string: \\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000025700000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#000000001F400000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000026700000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000000100000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&280b647&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_Msft&Prod_Virtual_DVD-ROM#2&1f4adffe&0&000001#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}B,.
          Source: C:\Users\user\Desktop\DHL_AWB_NO#907853880911.exeCode function: 2_2_00409AA0 rdtsc
          Source: C:\Users\user\Desktop\DHL_AWB_NO#907853880911.exeProcess token adjusted: Debug
          Source: C:\Users\user\Desktop\DHL_AWB_NO#907853880911.exeProcess token adjusted: Debug
          Source: C:\Windows\SysWOW64\mstsc.exeProcess token adjusted: Debug
          Source: C:\Users\user\Desktop\DHL_AWB_NO#907853880911.exeCode function: 2_2_010C9100 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL_AWB_NO#907853880911.exeCode function: 2_2_010C9100 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL_AWB_NO#907853880911.exeCode function: 2_2_010C9100 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL_AWB_NO#907853880911.exeCode function: 2_2_010E4120 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL_AWB_NO#907853880911.exeCode function: 2_2_010E4120 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL_AWB_NO#907853880911.exeCode function: 2_2_010E4120 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL_AWB_NO#907853880911.exeCode function: 2_2_010E4120 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL_AWB_NO#907853880911.exeCode function: 2_2_010E4120 mov ecx, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL_AWB_NO#907853880911.exeCode function: 2_2_010F513A mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL_AWB_NO#907853880911.exeCode function: 2_2_010F513A mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL_AWB_NO#907853880911.exeCode function: 2_2_010EB944 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL_AWB_NO#907853880911.exeCode function: 2_2_010EB944 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL_AWB_NO#907853880911.exeCode function: 2_2_010CC962 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL_AWB_NO#907853880911.exeCode function: 2_2_010CB171 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL_AWB_NO#907853880911.exeCode function: 2_2_010CB171 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL_AWB_NO#907853880911.exeCode function: 2_2_010FA185 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL_AWB_NO#907853880911.exeCode function: 2_2_010EC182 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL_AWB_NO#907853880911.exeCode function: 2_2_010F2990 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL_AWB_NO#907853880911.exeCode function: 2_2_011451BE mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL_AWB_NO#907853880911.exeCode function: 2_2_011451BE mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL_AWB_NO#907853880911.exeCode function: 2_2_011451BE mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL_AWB_NO#907853880911.exeCode function: 2_2_011451BE mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL_AWB_NO#907853880911.exeCode function: 2_2_010F61A0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL_AWB_NO#907853880911.exeCode function: 2_2_010F61A0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL_AWB_NO#907853880911.exeCode function: 2_2_010E99BF mov ecx, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL_AWB_NO#907853880911.exeCode function: 2_2_010E99BF mov ecx, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL_AWB_NO#907853880911.exeCode function: 2_2_010E99BF mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL_AWB_NO#907853880911.exeCode function: 2_2_010E99BF mov ecx, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL_AWB_NO#907853880911.exeCode function: 2_2_010E99BF mov ecx, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL_AWB_NO#907853880911.exeCode function: 2_2_010E99BF mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL_AWB_NO#907853880911.exeCode function: 2_2_010E99BF mov ecx, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL_AWB_NO#907853880911.exeCode function: 2_2_010E99BF mov ecx, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL_AWB_NO#907853880911.exeCode function: 2_2_010E99BF mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL_AWB_NO#907853880911.exeCode function: 2_2_010E99BF mov ecx, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL_AWB_NO#907853880911.exeCode function: 2_2_010E99BF mov ecx, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL_AWB_NO#907853880911.exeCode function: 2_2_010E99BF mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL_AWB_NO#907853880911.exeCode function: 2_2_011469A6 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL_AWB_NO#907853880911.exeCode function: 2_2_011849A4 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL_AWB_NO#907853880911.exeCode function: 2_2_011849A4 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL_AWB_NO#907853880911.exeCode function: 2_2_011849A4 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL_AWB_NO#907853880911.exeCode function: 2_2_011849A4 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL_AWB_NO#907853880911.exeCode function: 2_2_010CB1E1 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL_AWB_NO#907853880911.exeCode function: 2_2_010CB1E1 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL_AWB_NO#907853880911.exeCode function: 2_2_010CB1E1 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL_AWB_NO#907853880911.exeCode function: 2_2_011541E8 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL_AWB_NO#907853880911.exeCode function: 2_2_01147016 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL_AWB_NO#907853880911.exeCode function: 2_2_01147016 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL_AWB_NO#907853880911.exeCode function: 2_2_01147016 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL_AWB_NO#907853880911.exeCode function: 2_2_01194015 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL_AWB_NO#907853880911.exeCode function: 2_2_01194015 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL_AWB_NO#907853880911.exeCode function: 2_2_010F002D mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL_AWB_NO#907853880911.exeCode function: 2_2_010F002D mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL_AWB_NO#907853880911.exeCode function: 2_2_010F002D mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL_AWB_NO#907853880911.exeCode function: 2_2_010F002D mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL_AWB_NO#907853880911.exeCode function: 2_2_010F002D mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL_AWB_NO#907853880911.exeCode function: 2_2_010DB02A mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL_AWB_NO#907853880911.exeCode function: 2_2_010DB02A mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL_AWB_NO#907853880911.exeCode function: 2_2_010DB02A mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL_AWB_NO#907853880911.exeCode function: 2_2_010DB02A mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL_AWB_NO#907853880911.exeCode function: 2_2_010EA830 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL_AWB_NO#907853880911.exeCode function: 2_2_010EA830 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL_AWB_NO#907853880911.exeCode function: 2_2_010EA830 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL_AWB_NO#907853880911.exeCode function: 2_2_010EA830 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL_AWB_NO#907853880911.exeCode function: 2_2_010E0050 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL_AWB_NO#907853880911.exeCode function: 2_2_010E0050 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL_AWB_NO#907853880911.exeCode function: 2_2_01182073 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL_AWB_NO#907853880911.exeCode function: 2_2_01191074 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL_AWB_NO#907853880911.exeCode function: 2_2_010C9080 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL_AWB_NO#907853880911.exeCode function: 2_2_01143884 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL_AWB_NO#907853880911.exeCode function: 2_2_01143884 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL_AWB_NO#907853880911.exeCode function: 2_2_010F20A0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL_AWB_NO#907853880911.exeCode function: 2_2_010F20A0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL_AWB_NO#907853880911.exeCode function: 2_2_010F20A0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL_AWB_NO#907853880911.exeCode function: 2_2_010F20A0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL_AWB_NO#907853880911.exeCode function: 2_2_010F20A0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL_AWB_NO#907853880911.exeCode function: 2_2_010F20A0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL_AWB_NO#907853880911.exeCode function: 2_2_010FF0BF mov ecx, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL_AWB_NO#907853880911.exeCode function: 2_2_010FF0BF mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL_AWB_NO#907853880911.exeCode function: 2_2_010FF0BF mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL_AWB_NO#907853880911.exeCode function: 2_2_011090AF mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL_AWB_NO#907853880911.exeCode function: 2_2_0115B8D0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL_AWB_NO#907853880911.exeCode function: 2_2_0115B8D0 mov ecx, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL_AWB_NO#907853880911.exeCode function: 2_2_0115B8D0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL_AWB_NO#907853880911.exeCode function: 2_2_0115B8D0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL_AWB_NO#907853880911.exeCode function: 2_2_0115B8D0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL_AWB_NO#907853880911.exeCode function: 2_2_0115B8D0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL_AWB_NO#907853880911.exeCode function: 2_2_010C58EC mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL_AWB_NO#907853880911.exeCode function: 2_2_010EB8E4 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL_AWB_NO#907853880911.exeCode function: 2_2_010EB8E4 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL_AWB_NO#907853880911.exeCode function: 2_2_010C40E1 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL_AWB_NO#907853880911.exeCode function: 2_2_010C40E1 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL_AWB_NO#907853880911.exeCode function: 2_2_010C40E1 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL_AWB_NO#907853880911.exeCode function: 2_2_0118131B mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL_AWB_NO#907853880911.exeCode function: 2_2_010EA309 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL_AWB_NO#907853880911.exeCode function: 2_2_010EA309 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL_AWB_NO#907853880911.exeCode function: 2_2_010EA309 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL_AWB_NO#907853880911.exeCode function: 2_2_010EA309 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL_AWB_NO#907853880911.exeCode function: 2_2_010EA309 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL_AWB_NO#907853880911.exeCode function: 2_2_010EA309 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL_AWB_NO#907853880911.exeCode function: 2_2_010EA309 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL_AWB_NO#907853880911.exeCode function: 2_2_010EA309 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL_AWB_NO#907853880911.exeCode function: 2_2_010EA309 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL_AWB_NO#907853880911.exeCode function: 2_2_010EA309 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL_AWB_NO#907853880911.exeCode function: 2_2_010EA309 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL_AWB_NO#907853880911.exeCode function: 2_2_010EA309 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL_AWB_NO#907853880911.exeCode function: 2_2_010EA309 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL_AWB_NO#907853880911.exeCode function: 2_2_010EA309 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL_AWB_NO#907853880911.exeCode function: 2_2_010EA309 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL_AWB_NO#907853880911.exeCode function: 2_2_010EA309 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL_AWB_NO#907853880911.exeCode function: 2_2_010EA309 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL_AWB_NO#907853880911.exeCode function: 2_2_010EA309 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL_AWB_NO#907853880911.exeCode function: 2_2_010EA309 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL_AWB_NO#907853880911.exeCode function: 2_2_010EA309 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL_AWB_NO#907853880911.exeCode function: 2_2_010EA309 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL_AWB_NO#907853880911.exeCode function: 2_2_01198B58 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL_AWB_NO#907853880911.exeCode function: 2_2_010CDB40 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL_AWB_NO#907853880911.exeCode function: 2_2_010CF358 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL_AWB_NO#907853880911.exeCode function: 2_2_010CDB60 mov ecx, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL_AWB_NO#907853880911.exeCode function: 2_2_010F3B7A mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL_AWB_NO#907853880911.exeCode function: 2_2_010F3B7A mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL_AWB_NO#907853880911.exeCode function: 2_2_010D1B8F mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL_AWB_NO#907853880911.exeCode function: 2_2_010D1B8F mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL_AWB_NO#907853880911.exeCode function: 2_2_0118138A mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL_AWB_NO#907853880911.exeCode function: 2_2_0117D380 mov ecx, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL_AWB_NO#907853880911.exeCode function: 2_2_010F2397 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL_AWB_NO#907853880911.exeCode function: 2_2_010FB390 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL_AWB_NO#907853880911.exeCode function: 2_2_010F4BAD mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL_AWB_NO#907853880911.exeCode function: 2_2_010F4BAD mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL_AWB_NO#907853880911.exeCode function: 2_2_010F4BAD mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL_AWB_NO#907853880911.exeCode function: 2_2_01195BA5 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL_AWB_NO#907853880911.exeCode function: 2_2_011453CA mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL_AWB_NO#907853880911.exeCode function: 2_2_011453CA mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL_AWB_NO#907853880911.exeCode function: 2_2_010EDBE9 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL_AWB_NO#907853880911.exeCode function: 2_2_010F03E2 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL_AWB_NO#907853880911.exeCode function: 2_2_010F03E2 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL_AWB_NO#907853880911.exeCode function: 2_2_010F03E2 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL_AWB_NO#907853880911.exeCode function: 2_2_010F03E2 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL_AWB_NO#907853880911.exeCode function: 2_2_010F03E2 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL_AWB_NO#907853880911.exeCode function: 2_2_010F03E2 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL_AWB_NO#907853880911.exeCode function: 2_2_011723E3 mov ecx, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL_AWB_NO#907853880911.exeCode function: 2_2_011723E3 mov ecx, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL_AWB_NO#907853880911.exeCode function: 2_2_011723E3 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL_AWB_NO#907853880911.exeCode function: 2_2_010D8A0A mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL_AWB_NO#907853880911.exeCode function: 2_2_0118AA16 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL_AWB_NO#907853880911.exeCode function: 2_2_0118AA16 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL_AWB_NO#907853880911.exeCode function: 2_2_010E3A1C mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL_AWB_NO#907853880911.exeCode function: 2_2_010CAA16 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL_AWB_NO#907853880911.exeCode function: 2_2_010CAA16 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL_AWB_NO#907853880911.exeCode function: 2_2_010C5210 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL_AWB_NO#907853880911.exeCode function: 2_2_010C5210 mov ecx, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL_AWB_NO#907853880911.exeCode function: 2_2_010C5210 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL_AWB_NO#907853880911.exeCode function: 2_2_010C5210 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL_AWB_NO#907853880911.exeCode function: 2_2_010EA229 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL_AWB_NO#907853880911.exeCode function: 2_2_010EA229 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL_AWB_NO#907853880911.exeCode function: 2_2_010EA229 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL_AWB_NO#907853880911.exeCode function: 2_2_010EA229 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL_AWB_NO#907853880911.exeCode function: 2_2_010EA229 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL_AWB_NO#907853880911.exeCode function: 2_2_010EA229 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL_AWB_NO#907853880911.exeCode function: 2_2_010EA229 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL_AWB_NO#907853880911.exeCode function: 2_2_010EA229 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL_AWB_NO#907853880911.exeCode function: 2_2_010EA229 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL_AWB_NO#907853880911.exeCode function: 2_2_01104A2C mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL_AWB_NO#907853880911.exeCode function: 2_2_01104A2C mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL_AWB_NO#907853880911.exeCode function: 2_2_01154257 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL_AWB_NO#907853880911.exeCode function: 2_2_010C9240 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL_AWB_NO#907853880911.exeCode function: 2_2_010C9240 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL_AWB_NO#907853880911.exeCode function: 2_2_010C9240 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL_AWB_NO#907853880911.exeCode function: 2_2_010C9240 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL_AWB_NO#907853880911.exeCode function: 2_2_0118EA55 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL_AWB_NO#907853880911.exeCode function: 2_2_0110927A mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL_AWB_NO#907853880911.exeCode function: 2_2_0117B260 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL_AWB_NO#907853880911.exeCode function: 2_2_0117B260 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL_AWB_NO#907853880911.exeCode function: 2_2_01198A62 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL_AWB_NO#907853880911.exeCode function: 2_2_010FD294 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL_AWB_NO#907853880911.exeCode function: 2_2_010FD294 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL_AWB_NO#907853880911.exeCode function: 2_2_010C52A5 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL_AWB_NO#907853880911.exeCode function: 2_2_010C52A5 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL_AWB_NO#907853880911.exeCode function: 2_2_010C52A5 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL_AWB_NO#907853880911.exeCode function: 2_2_010C52A5 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL_AWB_NO#907853880911.exeCode function: 2_2_010C52A5 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL_AWB_NO#907853880911.exeCode function: 2_2_010DAAB0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL_AWB_NO#907853880911.exeCode function: 2_2_010DAAB0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL_AWB_NO#907853880911.exeCode function: 2_2_010FFAB0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL_AWB_NO#907853880911.exeCode function: 2_2_010F2ACB mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL_AWB_NO#907853880911.exeCode function: 2_2_010F2AE4 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL_AWB_NO#907853880911.exeCode function: 2_2_01184AEF mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL_AWB_NO#907853880911.exeCode function: 2_2_01184AEF mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL_AWB_NO#907853880911.exeCode function: 2_2_01184AEF mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL_AWB_NO#907853880911.exeCode function: 2_2_01184AEF mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL_AWB_NO#907853880911.exeCode function: 2_2_01184AEF mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL_AWB_NO#907853880911.exeCode function: 2_2_01184AEF mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL_AWB_NO#907853880911.exeCode function: 2_2_01184AEF mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL_AWB_NO#907853880911.exeCode function: 2_2_01184AEF mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL_AWB_NO#907853880911.exeCode function: 2_2_01184AEF mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL_AWB_NO#907853880911.exeCode function: 2_2_01184AEF mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL_AWB_NO#907853880911.exeCode function: 2_2_01184AEF mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL_AWB_NO#907853880911.exeCode function: 2_2_01184AEF mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL_AWB_NO#907853880911.exeCode function: 2_2_01184AEF mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL_AWB_NO#907853880911.exeCode function: 2_2_01184AEF mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL_AWB_NO#907853880911.exeCode function: 2_2_0118E539 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL_AWB_NO#907853880911.exeCode function: 2_2_0114A537 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL_AWB_NO#907853880911.exeCode function: 2_2_01198D34 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL_AWB_NO#907853880911.exeCode function: 2_2_010F4D3B mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL_AWB_NO#907853880911.exeCode function: 2_2_010F4D3B mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL_AWB_NO#907853880911.exeCode function: 2_2_010F4D3B mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL_AWB_NO#907853880911.exeCode function: 2_2_010D3D34 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL_AWB_NO#907853880911.exeCode function: 2_2_010D3D34 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL_AWB_NO#907853880911.exeCode function: 2_2_010D3D34 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL_AWB_NO#907853880911.exeCode function: 2_2_010D3D34 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL_AWB_NO#907853880911.exeCode function: 2_2_010D3D34 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL_AWB_NO#907853880911.exeCode function: 2_2_010D3D34 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL_AWB_NO#907853880911.exeCode function: 2_2_010D3D34 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL_AWB_NO#907853880911.exeCode function: 2_2_010D3D34 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL_AWB_NO#907853880911.exeCode function: 2_2_010D3D34 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL_AWB_NO#907853880911.exeCode function: 2_2_010D3D34 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL_AWB_NO#907853880911.exeCode function: 2_2_010D3D34 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL_AWB_NO#907853880911.exeCode function: 2_2_010D3D34 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL_AWB_NO#907853880911.exeCode function: 2_2_010D3D34 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL_AWB_NO#907853880911.exeCode function: 2_2_010CAD30 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL_AWB_NO#907853880911.exeCode function: 2_2_01103D43 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL_AWB_NO#907853880911.exeCode function: 2_2_01143540 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL_AWB_NO#907853880911.exeCode function: 2_2_01173D40 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL_AWB_NO#907853880911.exeCode function: 2_2_010E7D50 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL_AWB_NO#907853880911.exeCode function: 2_2_010EC577 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL_AWB_NO#907853880911.exeCode function: 2_2_010EC577 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL_AWB_NO#907853880911.exeCode function: 2_2_010C2D8A mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL_AWB_NO#907853880911.exeCode function: 2_2_010C2D8A mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL_AWB_NO#907853880911.exeCode function: 2_2_010C2D8A mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL_AWB_NO#907853880911.exeCode function: 2_2_010C2D8A mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL_AWB_NO#907853880911.exeCode function: 2_2_010C2D8A mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL_AWB_NO#907853880911.exeCode function: 2_2_010FFD9B mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL_AWB_NO#907853880911.exeCode function: 2_2_010FFD9B mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL_AWB_NO#907853880911.exeCode function: 2_2_01182D82 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL_AWB_NO#907853880911.exeCode function: 2_2_01182D82 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL_AWB_NO#907853880911.exeCode function: 2_2_01182D82 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL_AWB_NO#907853880911.exeCode function: 2_2_01182D82 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL_AWB_NO#907853880911.exeCode function: 2_2_01182D82 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL_AWB_NO#907853880911.exeCode function: 2_2_01182D82 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL_AWB_NO#907853880911.exeCode function: 2_2_01182D82 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL_AWB_NO#907853880911.exeCode function: 2_2_010F35A1 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL_AWB_NO#907853880911.exeCode function: 2_2_011905AC mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL_AWB_NO#907853880911.exeCode function: 2_2_011905AC mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL_AWB_NO#907853880911.exeCode function: 2_2_010F1DB5 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL_AWB_NO#907853880911.exeCode function: 2_2_010F1DB5 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL_AWB_NO#907853880911.exeCode function: 2_2_010F1DB5 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL_AWB_NO#907853880911.exeCode function: 2_2_01146DC9 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL_AWB_NO#907853880911.exeCode function: 2_2_01146DC9 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL_AWB_NO#907853880911.exeCode function: 2_2_01146DC9 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL_AWB_NO#907853880911.exeCode function: 2_2_01146DC9 mov ecx, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL_AWB_NO#907853880911.exeCode function: 2_2_01146DC9 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL_AWB_NO#907853880911.exeCode function: 2_2_01146DC9 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL_AWB_NO#907853880911.exeCode function: 2_2_01178DF1 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL_AWB_NO#907853880911.exeCode function: 2_2_010DD5E0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL_AWB_NO#907853880911.exeCode function: 2_2_010DD5E0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL_AWB_NO#907853880911.exeCode function: 2_2_0118FDE2 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL_AWB_NO#907853880911.exeCode function: 2_2_0118FDE2 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL_AWB_NO#907853880911.exeCode function: 2_2_0118FDE2 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL_AWB_NO#907853880911.exeCode function: 2_2_0118FDE2 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL_AWB_NO#907853880911.exeCode function: 2_2_0119740D mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL_AWB_NO#907853880911.exeCode function: 2_2_0119740D mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL_AWB_NO#907853880911.exeCode function: 2_2_0119740D mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL_AWB_NO#907853880911.exeCode function: 2_2_01181C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL_AWB_NO#907853880911.exeCode function: 2_2_01181C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL_AWB_NO#907853880911.exeCode function: 2_2_01181C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL_AWB_NO#907853880911.exeCode function: 2_2_01181C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL_AWB_NO#907853880911.exeCode function: 2_2_01181C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL_AWB_NO#907853880911.exeCode function: 2_2_01181C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL_AWB_NO#907853880911.exeCode function: 2_2_01181C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL_AWB_NO#907853880911.exeCode function: 2_2_01181C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL_AWB_NO#907853880911.exeCode function: 2_2_01181C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL_AWB_NO#907853880911.exeCode function: 2_2_01181C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL_AWB_NO#907853880911.exeCode function: 2_2_01181C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL_AWB_NO#907853880911.exeCode function: 2_2_01181C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL_AWB_NO#907853880911.exeCode function: 2_2_01181C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL_AWB_NO#907853880911.exeCode function: 2_2_01181C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL_AWB_NO#907853880911.exeCode function: 2_2_01146C0A mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL_AWB_NO#907853880911.exeCode function: 2_2_01146C0A mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL_AWB_NO#907853880911.exeCode function: 2_2_01146C0A mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL_AWB_NO#907853880911.exeCode function: 2_2_01146C0A mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL_AWB_NO#907853880911.exeCode function: 2_2_010FBC2C mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL_AWB_NO#907853880911.exeCode function: 2_2_010FA44B mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL_AWB_NO#907853880911.exeCode function: 2_2_0115C450 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL_AWB_NO#907853880911.exeCode function: 2_2_0115C450 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL_AWB_NO#907853880911.exeCode function: 2_2_010E746D mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL_AWB_NO#907853880911.exeCode function: 2_2_010FAC7B mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL_AWB_NO#907853880911.exeCode function: 2_2_010FAC7B mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL_AWB_NO#907853880911.exeCode function: 2_2_010FAC7B mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL_AWB_NO#907853880911.exeCode function: 2_2_010FAC7B mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL_AWB_NO#907853880911.exeCode function: 2_2_010FAC7B mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL_AWB_NO#907853880911.exeCode function: 2_2_010FAC7B mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL_AWB_NO#907853880911.exeCode function: 2_2_010FAC7B mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL_AWB_NO#907853880911.exeCode function: 2_2_010FAC7B mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL_AWB_NO#907853880911.exeCode function: 2_2_010FAC7B mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL_AWB_NO#907853880911.exeCode function: 2_2_010FAC7B mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL_AWB_NO#907853880911.exeCode function: 2_2_010FAC7B mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL_AWB_NO#907853880911.exeCode function: 2_2_01184496 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL_AWB_NO#907853880911.exeCode function: 2_2_01184496 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL_AWB_NO#907853880911.exeCode function: 2_2_01184496 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL_AWB_NO#907853880911.exeCode function: 2_2_01184496 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL_AWB_NO#907853880911.exeCode function: 2_2_01184496 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL_AWB_NO#907853880911.exeCode function: 2_2_01184496 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL_AWB_NO#907853880911.exeCode function: 2_2_01184496 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL_AWB_NO#907853880911.exeCode function: 2_2_01184496 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL_AWB_NO#907853880911.exeCode function: 2_2_01184496 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL_AWB_NO#907853880911.exeCode function: 2_2_01184496 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL_AWB_NO#907853880911.exeCode function: 2_2_01184496 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL_AWB_NO#907853880911.exeCode function: 2_2_01184496 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL_AWB_NO#907853880911.exeCode function: 2_2_01184496 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL_AWB_NO#907853880911.exeCode function: 2_2_010D849B mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL_AWB_NO#907853880911.exeCode function: 2_2_01198CD6 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL_AWB_NO#907853880911.exeCode function: 2_2_011814FB mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL_AWB_NO#907853880911.exeCode function: 2_2_01146CF0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL_AWB_NO#907853880911.exeCode function: 2_2_01146CF0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL_AWB_NO#907853880911.exeCode function: 2_2_01146CF0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL_AWB_NO#907853880911.exeCode function: 2_2_010FA70E mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL_AWB_NO#907853880911.exeCode function: 2_2_010FA70E mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL_AWB_NO#907853880911.exeCode function: 2_2_0115FF10 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL_AWB_NO#907853880911.exeCode function: 2_2_0115FF10 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL_AWB_NO#907853880911.exeCode function: 2_2_0119070D mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL_AWB_NO#907853880911.exeCode function: 2_2_0119070D mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL_AWB_NO#907853880911.exeCode function: 2_2_010EF716 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL_AWB_NO#907853880911.exeCode function: 2_2_010C4F2E mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL_AWB_NO#907853880911.exeCode function: 2_2_010C4F2E mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL_AWB_NO#907853880911.exeCode function: 2_2_010EB73D mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL_AWB_NO#907853880911.exeCode function: 2_2_010EB73D mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL_AWB_NO#907853880911.exeCode function: 2_2_010FE730 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL_AWB_NO#907853880911.exeCode function: 2_2_010DEF40 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL_AWB_NO#907853880911.exeCode function: 2_2_010DFF60 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL_AWB_NO#907853880911.exeCode function: 2_2_01198F6A mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL_AWB_NO#907853880911.exeCode function: 2_2_01147794 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL_AWB_NO#907853880911.exeCode function: 2_2_01147794 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL_AWB_NO#907853880911.exeCode function: 2_2_01147794 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL_AWB_NO#907853880911.exeCode function: 2_2_010D8794 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL_AWB_NO#907853880911.exeCode function: 2_2_011037F5 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL_AWB_NO#907853880911.exeCode function: 2_2_010CC600 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL_AWB_NO#907853880911.exeCode function: 2_2_010CC600 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL_AWB_NO#907853880911.exeCode function: 2_2_010CC600 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL_AWB_NO#907853880911.exeCode function: 2_2_010F8E00 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL_AWB_NO#907853880911.exeCode function: 2_2_01181608 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL_AWB_NO#907853880911.exeCode function: 2_2_010FA61C mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL_AWB_NO#907853880911.exeCode function: 2_2_010FA61C mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL_AWB_NO#907853880911.exeCode function: 2_2_0117FE3F mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL_AWB_NO#907853880911.exeCode function: 2_2_010CE620 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL_AWB_NO#907853880911.exeCode function: 2_2_010D7E41 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL_AWB_NO#907853880911.exeCode function: 2_2_010D7E41 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL_AWB_NO#907853880911.exeCode function: 2_2_010D7E41 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL_AWB_NO#907853880911.exeCode function: 2_2_010D7E41 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL_AWB_NO#907853880911.exeCode function: 2_2_010D7E41 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL_AWB_NO#907853880911.exeCode function: 2_2_010D7E41 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL_AWB_NO#907853880911.exeCode function: 2_2_0118AE44 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL_AWB_NO#907853880911.exeCode function: 2_2_0118AE44 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL_AWB_NO#907853880911.exeCode function: 2_2_010D766D mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL_AWB_NO#907853880911.exeCode function: 2_2_010EAE73 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL_AWB_NO#907853880911.exeCode function: 2_2_010EAE73 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL_AWB_NO#907853880911.exeCode function: 2_2_010EAE73 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL_AWB_NO#907853880911.exeCode function: 2_2_010EAE73 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL_AWB_NO#907853880911.exeCode function: 2_2_010EAE73 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL_AWB_NO#907853880911.exeCode function: 2_2_0115FE87 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL_AWB_NO#907853880911.exeCode function: 2_2_011446A7 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL_AWB_NO#907853880911.exeCode function: 2_2_01190EA5 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL_AWB_NO#907853880911.exeCode function: 2_2_01190EA5 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL_AWB_NO#907853880911.exeCode function: 2_2_01190EA5 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL_AWB_NO#907853880911.exeCode function: 2_2_010F36CC mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL_AWB_NO#907853880911.exeCode function: 2_2_01198ED6 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL_AWB_NO#907853880911.exeCode function: 2_2_0117FEC0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL_AWB_NO#907853880911.exeCode function: 2_2_01108EC7 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL_AWB_NO#907853880911.exeCode function: 2_2_010F16E0 mov ecx, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL_AWB_NO#907853880911.exeCode function: 2_2_010D76E2 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 9_2_046E746D mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 9_2_046FA44B mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 9_2_0475C450 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 9_2_0475C450 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 9_2_046FBC2C mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 9_2_0479740D mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 9_2_0479740D mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 9_2_0479740D mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 9_2_04781C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 9_2_04781C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 9_2_04781C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 9_2_04781C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 9_2_04781C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 9_2_04781C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 9_2_04781C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 9_2_04781C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 9_2_04781C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 9_2_04781C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 9_2_04781C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 9_2_04781C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 9_2_04781C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 9_2_04781C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 9_2_04746C0A mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 9_2_04746C0A mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 9_2_04746C0A mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 9_2_04746C0A mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 9_2_047814FB mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 9_2_04746CF0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 9_2_04746CF0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 9_2_04746CF0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 9_2_04798CD6 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 9_2_046D849B mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 9_2_046EC577 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 9_2_046EC577 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 9_2_04703D43 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 9_2_04743540 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 9_2_046E7D50 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 9_2_0478E539 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 9_2_0474A537 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 9_2_04798D34 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 9_2_046F4D3B mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 9_2_046F4D3B mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 9_2_046F4D3B mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 9_2_046D3D34 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 9_2_046D3D34 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 9_2_046D3D34 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 9_2_046D3D34 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 9_2_046D3D34 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 9_2_046D3D34 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 9_2_046D3D34 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 9_2_046D3D34 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 9_2_046D3D34 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 9_2_046D3D34 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 9_2_046D3D34 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 9_2_046D3D34 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 9_2_046D3D34 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 9_2_046CAD30 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 9_2_04778DF1 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 9_2_046DD5E0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 9_2_046DD5E0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 9_2_0478FDE2 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 9_2_0478FDE2 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 9_2_0478FDE2 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 9_2_0478FDE2 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 9_2_04746DC9 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 9_2_04746DC9 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 9_2_04746DC9 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 9_2_04746DC9 mov ecx, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 9_2_04746DC9 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 9_2_04746DC9 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 9_2_046F35A1 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 9_2_047905AC mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 9_2_047905AC mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 9_2_046F1DB5 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 9_2_046F1DB5 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 9_2_046F1DB5 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 9_2_046C2D8A mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 9_2_046C2D8A mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 9_2_046C2D8A mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 9_2_046C2D8A mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 9_2_046C2D8A mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 9_2_046F2581 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 9_2_046F2581 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 9_2_046F2581 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 9_2_046F2581 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 9_2_046FFD9B mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 9_2_046FFD9B mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 9_2_046D766D mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 9_2_046EAE73 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 9_2_046EAE73 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 9_2_046EAE73 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 9_2_046EAE73 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 9_2_046EAE73 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 9_2_046D7E41 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 9_2_046D7E41 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 9_2_046D7E41 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 9_2_046D7E41 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 9_2_046D7E41 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 9_2_046D7E41 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 9_2_0478AE44 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 9_2_0478AE44 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 9_2_0477FE3F mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 9_2_046CE620 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 9_2_046CC600 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 9_2_046CC600 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 9_2_046CC600 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 9_2_046F8E00 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 9_2_04781608 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 9_2_046FA61C mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 9_2_046FA61C mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 9_2_046F16E0 mov ecx, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 9_2_046D76E2 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 9_2_046F36CC mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 9_2_04798ED6 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 9_2_0477FEC0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 9_2_04708EC7 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 9_2_047446A7 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 9_2_04790EA5 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 9_2_04790EA5 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 9_2_04790EA5 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 9_2_0475FE87 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 9_2_046DFF60 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 9_2_04798F6A mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 9_2_046DEF40 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 9_2_046C4F2E mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 9_2_046C4F2E mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 9_2_046FE730 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 9_2_046FA70E mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 9_2_046FA70E mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 9_2_0475FF10 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 9_2_0475FF10 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 9_2_0479070D mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL_AWB_NO#907853880911.exeProcess queried: DebugPort
          Source: C:\Windows\SysWOW64\mstsc.exeProcess queried: DebugPort
          Source: C:\Users\user\Desktop\DHL_AWB_NO#907853880911.exeCode function: 2_2_0040ACE0 LdrLoadDll,
          Source: C:\Users\user\Desktop\DHL_AWB_NO#907853880911.exeMemory allocated: page read and write | page guard

          HIPS / PFW / Operating System Protection Evasion:

          barindex
          Sample uses process hollowing techniqueShow sources
          Source: C:\Users\user\Desktop\DHL_AWB_NO#907853880911.exeSection unmapped: C:\Windows\SysWOW64\mstsc.exe base address: F40000
          Maps a DLL or memory area into another processShow sources
          Source: C:\Users\user\Desktop\DHL_AWB_NO#907853880911.exeSection loaded: unknown target: C:\Windows\explorer.exe protection: execute and read and write
          Source: C:\Users\user\Desktop\DHL_AWB_NO#907853880911.exeSection loaded: unknown target: C:\Windows\SysWOW64\mstsc.exe protection: execute and read and write
          Source: C:\Users\user\Desktop\DHL_AWB_NO#907853880911.exeSection loaded: unknown target: C:\Windows\SysWOW64\mstsc.exe protection: execute and read and write
          Source: C:\Windows\SysWOW64\mstsc.exeSection loaded: unknown target: C:\Windows\explorer.exe protection: read write
          Source: C:\Windows\SysWOW64\mstsc.exeSection loaded: unknown target: C:\Windows\explorer.exe protection: execute and read and write
          Source: C:\Windows\SysWOW64\mstsc.exeSection loaded: unknown target: unknown protection: read write
          Source: C:\Windows\SysWOW64\mstsc.exeSection loaded: unknown target: C:\Windows\explorer.exe protection: read write
          Source: C:\Windows\SysWOW64\mstsc.exeSection loaded: unknown target: C:\Windows\explorer.exe protection: execute and read and write
          Injects a PE file into a foreign processesShow sources
          Source: C:\Users\user\Desktop\DHL_AWB_NO#907853880911.exeMemory written: C:\Users\user\Desktop\DHL_AWB_NO#907853880911.exe base: 400000 value starts with: 4D5A
          Queues an APC in another process (thread injection)Show sources
          Source: C:\Users\user\Desktop\DHL_AWB_NO#907853880911.exeThread APC queued: target process: C:\Windows\explorer.exe
          Modifies the context of a thread in another process (thread injection)Show sources
          Source: C:\Users\user\Desktop\DHL_AWB_NO#907853880911.exeThread register set: target process: 3424
          Source: C:\Windows\SysWOW64\mstsc.exeThread register set: target process: 3424
          Source: C:\Windows\SysWOW64\mstsc.exeThread register set: target process: 980
          Source: C:\Users\user\Desktop\DHL_AWB_NO#907853880911.exeProcess created: C:\Users\user\Desktop\DHL_AWB_NO#907853880911.exe C:\Users\user\Desktop\DHL_AWB_NO#907853880911.exe
          Source: C:\Windows\SysWOW64\mstsc.exeProcess created: C:\Windows\SysWOW64\cmd.exe /c del "C:\Users\user\Desktop\DHL_AWB_NO#907853880911.exe"
          Source: explorer.exe, 00000005.00000000.690126195.0000000000AD8000.00000004.00000020.sdmp, explorer.exe, 00000005.00000000.762897989.0000000000AD8000.00000004.00000020.sdmp, explorer.exe, 00000005.00000000.710094418.0000000000AD8000.00000004.00000020.sdmp, explorer.exe, 00000005.00000000.676686097.0000000000AD8000.00000004.00000020.sdmpBinary or memory string: ProgmanMD6
          Source: explorer.exe, 00000005.00000000.676904433.0000000001080000.00000002.00020000.sdmp, explorer.exe, 00000005.00000000.710332411.0000000001080000.00000002.00020000.sdmp, explorer.exe, 00000005.00000000.690493980.0000000001080000.00000002.00020000.sdmpBinary or memory string: Program Manager
          Source: explorer.exe, 00000005.00000000.714196503.0000000005E50000.00000004.00000001.sdmp, explorer.exe, 00000005.00000000.676904433.0000000001080000.00000002.00020000.sdmp, explorer.exe, 00000005.00000000.710332411.0000000001080000.00000002.00020000.sdmp, explorer.exe, 00000005.00000000.690493980.0000000001080000.00000002.00020000.sdmp, mstsc.exe, 00000009.00000002.932373199.0000000003290000.00000002.00020000.sdmp, explorer.exe, 0000000F.00000000.838070687.00000000019A0000.00000002.00020000.sdmp, explorer.exe, 0000000F.00000000.844348630.00000000055E0000.00000004.00000001.sdmp, explorer.exe, 0000000F.00000000.894331795.00000000055E0000.00000004.00000001.sdmp, explorer.exe, 0000000F.00000000.891581397.00000000019A0000.00000002.00020000.sdmpBinary or memory string: Shell_TrayWnd
          Source: explorer.exe, 00000005.00000000.676904433.0000000001080000.00000002.00020000.sdmp, explorer.exe, 00000005.00000000.710332411.0000000001080000.00000002.00020000.sdmp, explorer.exe, 00000005.00000000.690493980.0000000001080000.00000002.00020000.sdmp, mstsc.exe, 00000009.00000002.932373199.0000000003290000.00000002.00020000.sdmp, explorer.exe, 0000000F.00000000.838070687.00000000019A0000.00000002.00020000.sdmp, explorer.exe, 0000000F.00000000.844348630.00000000055E0000.00000004.00000001.sdmp, explorer.exe, 0000000F.00000000.890780958.0000000001348000.00000004.00000020.sdmp, explorer.exe, 0000000F.00000000.894331795.00000000055E0000.00000004.00000001.sdmp, explorer.exe, 0000000F.00000000.842406756.00000000052F1000.00000004.00000001.sdmp, explorer.exe, 0000000F.00000000.891581397.00000000019A0000.00000002.00020000.sdmp, explorer.exe, 0000000F.00000000.893829123.00000000052F1000.00000004.00000001.sdmp, explorer.exe, 0000000F.00000000.833432064.0000000001348000.00000004.00000020.sdmpBinary or memory string: Progman
          Source: explorer.exe, 0000000F.00000000.890780958.0000000001348000.00000004.00000020.sdmp, explorer.exe, 0000000F.00000000.833432064.0000000001348000.00000004.00000020.sdmpBinary or memory string: Shell_TrayWndg
          Source: explorer.exe, 00000005.00000000.676904433.0000000001080000.00000002.00020000.sdmp, explorer.exe, 00000005.00000000.710332411.0000000001080000.00000002.00020000.sdmp, explorer.exe, 00000005.00000000.690493980.0000000001080000.00000002.00020000.sdmp, explorer.exe, 0000000F.00000000.838070687.00000000019A0000.00000002.00020000.sdmpBinary or memory string: Progmanlock
          Source: explorer.exe, 00000005.00000000.702459113.000000000A716000.00000004.00000001.sdmp, explorer.exe, 00000005.00000000.717243634.000000000A716000.00000004.00000001.sdmp, explorer.exe, 00000005.00000000.684528225.000000000A716000.00000004.00000001.sdmpBinary or memory string: Shell_TrayWnd5D
          Source: mstsc.exe, 00000009.00000002.932373199.0000000003290000.00000002.00020000.sdmp, explorer.exe, 0000000F.00000000.838070687.00000000019A0000.00000002.00020000.sdmp, explorer.exe, 0000000F.00000000.891581397.00000000019A0000.00000002.00020000.sdmpBinary or memory string: Program Manager;
          Source: C:\Users\user\Desktop\DHL_AWB_NO#907853880911.exeQueries volume information: C:\Users\user\Desktop\DHL_AWB_NO#907853880911.exe VolumeInformation
          Source: C:\Users\user\Desktop\DHL_AWB_NO#907853880911.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
          Source: C:\Users\user\Desktop\DHL_AWB_NO#907853880911.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
          Source: C:\Users\user\Desktop\DHL_AWB_NO#907853880911.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
          Source: C:\Users\user\Desktop\DHL_AWB_NO#907853880911.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
          Source: C:\Users\user\Desktop\DHL_AWB_NO#907853880911.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid

          Stealing of Sensitive Information:

          barindex
          Yara detected FormBookShow sources
          Source: Yara matchFile source: 2.0.DHL_AWB_NO#907853880911.exe.400000.8.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 2.0.DHL_AWB_NO#907853880911.exe.400000.8.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 2.0.DHL_AWB_NO#907853880911.exe.400000.6.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 2.0.DHL_AWB_NO#907853880911.exe.400000.4.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 2.0.DHL_AWB_NO#907853880911.exe.400000.6.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 2.2.DHL_AWB_NO#907853880911.exe.400000.0.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 2.2.DHL_AWB_NO#907853880911.exe.400000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 00000005.00000000.719427940.000000000E898000.00000040.00020000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000002.00000000.672669530.0000000000400000.00000040.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000000.00000002.676498068.0000000003ED9000.00000004.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000009.00000002.930477185.0000000000D20000.00000004.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000000.00000002.677126052.000000000414A000.00000004.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000009.00000002.929049449.0000000000780000.00000040.00020000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000002.00000000.673053998.0000000000400000.00000040.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000009.00000002.928132789.0000000000150000.00000040.00020000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000002.00000002.736134377.0000000001060000.00000040.00020000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000002.00000002.732545477.0000000000400000.00000040.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000002.00000002.734719303.0000000000C30000.00000040.00020000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000005.00000000.705738120.000000000E898000.00000040.00020000.sdmp, type: MEMORY

          Remote Access Functionality:

          barindex
          Yara detected FormBookShow sources
          Source: Yara matchFile source: 2.0.DHL_AWB_NO#907853880911.exe.400000.8.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 2.0.DHL_AWB_NO#907853880911.exe.400000.8.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 2.0.DHL_AWB_NO#907853880911.exe.400000.6.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 2.0.DHL_AWB_NO#907853880911.exe.400000.4.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 2.0.DHL_AWB_NO#907853880911.exe.400000.6.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 2.2.DHL_AWB_NO#907853880911.exe.400000.0.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 2.2.DHL_AWB_NO#907853880911.exe.400000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 00000005.00000000.719427940.000000000E898000.00000040.00020000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000002.00000000.672669530.0000000000400000.00000040.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000000.00000002.676498068.0000000003ED9000.00000004.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000009.00000002.930477185.0000000000D20000.00000004.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000000.00000002.677126052.000000000414A000.00000004.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000009.00000002.929049449.0000000000780000.00000040.00020000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000002.00000000.673053998.0000000000400000.00000040.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000009.00000002.928132789.0000000000150000.00000040.00020000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000002.00000002.736134377.0000000001060000.00000040.00020000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000002.00000002.732545477.0000000000400000.00000040.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000002.00000002.734719303.0000000000C30000.00000040.00020000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000005.00000000.705738120.000000000E898000.00000040.00020000.sdmp, type: MEMORY

          Mitre Att&ck Matrix

          Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
          Valid AccountsShared Modules1Path InterceptionProcess Injection512Masquerading1OS Credential DumpingQuery Registry1Remote ServicesArchive Collected Data1Exfiltration Over Other Network MediumEncrypted Channel1Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
          Default AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization ScriptsDisable or Modify Tools1LSASS MemorySecurity Software Discovery231Remote Desktop ProtocolData from Removable MediaExfiltration Over BluetoothNon-Application Layer Protocol1Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
          Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)Virtualization/Sandbox Evasion41Security Account ManagerProcess Discovery2SMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationApplication Layer Protocol11Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
          Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)Process Injection512NTDSVirtualization/Sandbox Evasion41Distributed Component Object ModelInput CaptureScheduled TransferProtocol ImpersonationSIM Card SwapCarrier Billing Fraud
          Cloud AccountsCronNetwork Logon ScriptNetwork Logon ScriptDeobfuscate/Decode Files or Information1LSA SecretsFile and Directory Discovery1SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
          Replication Through Removable MediaLaunchdRc.commonRc.commonObfuscated Files or Information4Cached Domain CredentialsSystem Information Discovery112VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
          External Remote ServicesScheduled TaskStartup ItemsStartup ItemsSoftware Packing13DCSyncNetwork SniffingWindows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
          Drive-by CompromiseCommand and Scripting InterpreterScheduled Task/JobScheduled Task/JobFile Deletion1Proc FilesystemNetwork Service ScanningShared WebrootCredential API HookingExfiltration Over Symmetric Encrypted Non-C2 ProtocolApplication Layer ProtocolDowngrade to Insecure ProtocolsGenerate Fraudulent Advertising Revenue

          Behavior Graph

          Hide Legend

          Legend:

          • Process
          • Signature
          • Created File
          • DNS/IP Info
          • Is Dropped
          • Is Windows Process
          • Number of created Registry Values
          • Number of created Files
          • Visual Basic
          • Delphi
          • Java
          • .Net C# or VB.NET
          • C, C++ or other language
          • Is malicious
          • Internet
          behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 532893 Sample: DHL_AWB_NO#907853880911.exe Startdate: 02/12/2021 Architecture: WINDOWS Score: 100 31 www.ibew-neca.com 2->31 33 Multi AV Scanner detection for domain / URL 2->33 35 Found malware configuration 2->35 37 Malicious sample detected (through community Yara rule) 2->37 39 6 other signatures 2->39 11 DHL_AWB_NO#907853880911.exe 3 2->11         started        signatures3 process4 file5 29 C:\Users\...\DHL_AWB_NO#907853880911.exe.log, ASCII 11->29 dropped 49 Tries to detect virtualization through RDTSC time measurements 11->49 51 Injects a PE file into a foreign processes 11->51 15 DHL_AWB_NO#907853880911.exe 11->15         started        signatures6 process7 signatures8 53 Modifies the context of a thread in another process (thread injection) 15->53 55 Maps a DLL or memory area into another process 15->55 57 Sample uses process hollowing technique 15->57 59 Queues an APC in another process (thread injection) 15->59 18 explorer.exe 15->18 injected process9 process10 20 mstsc.exe 18->20         started        signatures11 41 Self deletion via cmd delete 20->41 43 Modifies the context of a thread in another process (thread injection) 20->43 45 Maps a DLL or memory area into another process 20->45 47 Tries to detect virtualization through RDTSC time measurements 20->47 23 cmd.exe 1 20->23         started        25 explorer.exe 1 151 20->25         started        process12 process13 27 conhost.exe 23->27         started       

          Screenshots

          Thumbnails

          This section contains all screenshots as thumbnails, including those not shown in the slideshow.

          windows-stand

          Antivirus, Machine Learning and Genetic Malware Detection

          Initial Sample

          SourceDetectionScannerLabelLink
          DHL_AWB_NO#907853880911.exe26%VirustotalBrowse
          DHL_AWB_NO#907853880911.exe31%MetadefenderBrowse
          DHL_AWB_NO#907853880911.exe51%ReversingLabsByteCode-MSIL.Trojan.AgentTesla

          Dropped Files

          No Antivirus matches

          Unpacked PE Files

          SourceDetectionScannerLabelLinkDownload
          2.0.DHL_AWB_NO#907853880911.exe.400000.8.unpack100%AviraTR/Crypt.ZPACK.GenDownload File
          2.0.DHL_AWB_NO#907853880911.exe.400000.4.unpack100%AviraTR/Crypt.ZPACK.GenDownload File
          2.0.DHL_AWB_NO#907853880911.exe.400000.6.unpack100%AviraTR/Crypt.ZPACK.GenDownload File
          2.2.DHL_AWB_NO#907853880911.exe.400000.0.unpack100%AviraTR/Crypt.ZPACK.GenDownload File

          Domains

          No Antivirus matches

          URLs

          SourceDetectionScannerLabelLink
          www.makheads.com/fl9w/10%VirustotalBrowse
          www.makheads.com/fl9w/0%Avira URL Cloudsafe

          Domains and IPs

          Contacted Domains

          NameIPActiveMaliciousAntivirus DetectionReputation
          www.ibew-neca.com
          66.96.147.103
          truefalse
            unknown

            Contacted URLs

            NameMaliciousAntivirus DetectionReputation
            www.makheads.com/fl9w/true
            • 10%, Virustotal, Browse
            • Avira URL Cloud: safe
            low

            Contacted IPs

            No contacted IP infos

            General Information

            Joe Sandbox Version:34.0.0 Boulder Opal
            Analysis ID:532893
            Start date:02.12.2021
            Start time:19:30:44
            Joe Sandbox Product:CloudBasic
            Overall analysis duration:0h 11m 35s
            Hypervisor based Inspection enabled:false
            Report type:light
            Sample file name:DHL_AWB_NO#907853880911.exe
            Cookbook file name:default.jbs
            Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
            Number of analysed new started processes analysed:26
            Number of new started drivers analysed:0
            Number of existing processes analysed:0
            Number of existing drivers analysed:0
            Number of injected processes analysed:1
            Technologies:
            • HCA enabled
            • EGA enabled
            • HDC enabled
            • AMSI enabled
            Analysis Mode:default
            Analysis stop reason:Timeout
            Detection:MAL
            Classification:mal100.troj.evad.winEXE@8/1@1/0
            EGA Information:Failed
            HDC Information:
            • Successful, ratio: 16.8% (good quality ratio 14.7%)
            • Quality average: 71.6%
            • Quality standard deviation: 33%
            HCA Information:
            • Successful, ratio: 98%
            • Number of executed functions: 0
            • Number of non-executed functions: 0
            Cookbook Comments:
            • Adjust boot time
            • Enable AMSI
            • Found application associated with file extension: .exe
            Warnings:
            Show All
            • Exclude process from analysis (whitelisted): SearchUI.exe, BackgroundTransferHost.exe, WerFault.exe, ShellExperienceHost.exe, backgroundTaskHost.exe, svchost.exe, mobsync.exe, wuapihost.exe
            • Excluded IPs from analysis (whitelisted): 92.122.145.220
            • Excluded domains from analysis (whitelisted): www.bing.com, ris.api.iris.microsoft.com, e12564.dspb.akamaiedge.net, store-images.s-microsoft.com, ctldl.windowsupdate.com, store-images.s-microsoft.com-c.edgekey.net, displaycatalog.mp.microsoft.com, img-prod-cms-rt-microsoft-com.akamaized.net, arc.msn.com
            • Not all processes where analyzed, report is missing behavior information
            • Report size exceeded maximum capacity and may have missing behavior information.
            • Report size getting too big, too many NtAllocateVirtualMemory calls found.
            • Report size getting too big, too many NtCreateFile calls found.
            • Report size getting too big, too many NtEnumerateKey calls found.
            • Report size getting too big, too many NtEnumerateValueKey calls found.
            • Report size getting too big, too many NtOpenFile calls found.
            • Report size getting too big, too many NtOpenKey calls found.
            • Report size getting too big, too many NtOpenKeyEx calls found.
            • Report size getting too big, too many NtProtectVirtualMemory calls found.
            • Report size getting too big, too many NtQueryAttributesFile calls found.
            • Report size getting too big, too many NtQueryValueKey calls found.

            Simulations

            Behavior and APIs

            TimeTypeDescription
            19:31:42API Interceptor2x Sleep call for process: DHL_AWB_NO#907853880911.exe modified
            19:32:49API Interceptor345x Sleep call for process: explorer.exe modified

            Joe Sandbox View / Context

            IPs

            No context

            Domains

            MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
            www.ibew-neca.comDHL_AWB_NO#907853880911.exeGet hashmaliciousBrowse
            • 66.96.147.103
            AWB_NO_9284730932.exeGet hashmaliciousBrowse
            • 66.96.147.103

            ASN

            No context

            JA3 Fingerprints

            No context

            Dropped Files

            No context

            Created / dropped Files

            C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\DHL_AWB_NO#907853880911.exe.log
            Process:C:\Users\user\Desktop\DHL_AWB_NO#907853880911.exe
            File Type:ASCII text, with CRLF line terminators
            Category:dropped
            Size (bytes):1216
            Entropy (8bit):5.355304211458859
            Encrypted:false
            SSDEEP:24:MLUE4K5E4Ks2E1qE4qXKDE4KhK3VZ9pKhPKIE4oKFKHKoZAE4Kzr7FE4x84j:MIHK5HKXE1qHiYHKhQnoPtHoxHhAHKzr
            MD5:FED34146BF2F2FA59DCF8702FCC8232E
            SHA1:B03BFEA175989D989850CF06FE5E7BBF56EAA00A
            SHA-256:123BE4E3590609A008E85501243AF5BC53FA0C26C82A92881B8879524F8C0D5C
            SHA-512:1CC89F2ED1DBD70628FA1DC41A32BA0BFA3E81EAE1A1CF3C5F6A48F2DA0BF1F21A5001B8A18B04043C5B8FE4FBE663068D86AA8C4BD8E17933F75687C3178FF6
            Malicious:true
            Reputation:high, very likely benign file
            Preview: 1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\4f0a7eefa3cd3e0ba98b5ebddbbc72e6\System.ni.dll",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\f1d8480152e0da9a60ad49c6d16a3b6d\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\8d67d92724ba494b6c7fd089d6f25b48\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Xml\b219d4630d26b88041b59c21

            Static File Info

            General

            File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
            Entropy (8bit):7.707890502429745
            TrID:
            • Win32 Executable (generic) Net Framework (10011505/4) 49.83%
            • Win32 Executable (generic) a (10002005/4) 49.78%
            • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
            • Generic Win/DOS Executable (2004/3) 0.01%
            • DOS Executable Generic (2002/1) 0.01%
            File name:DHL_AWB_NO#907853880911.exe
            File size:650240
            MD5:37340b33801b049ca07055a4bcca5f27
            SHA1:f742cbc4772f88bcc3e98b3a1f2396d813cc0ff5
            SHA256:ea87186f72f8963ae73aaa33ab50634f83f945cdef2b73e7bef08dce61807c56
            SHA512:f3fcfce3d242f9afe4f890d80f3860fb9b53172ff1dc22fa927c595959d5d2a1f5023493d0e4feb01d9fc2b032fbc1ecc40cedd4dcd8c1a8c8c4cf50771581ff
            SSDEEP:12288:zOjwBJ1zIBzzuY2gPaOHmidzkqR6yHnaz5SG+BJ1:zXBJRIxzuY2EaQ5LaoBJ
            File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L......a..............0..`...........~... ........@.. .......................@............@................................

            File Icon

            Icon Hash:8ce8acc4e071f0e4

            Static PE Info

            General

            Entrypoint:0x487efa
            Entrypoint Section:.text
            Digitally signed:false
            Imagebase:0x400000
            Subsystem:windows gui
            Image File Characteristics:32BIT_MACHINE, EXECUTABLE_IMAGE
            DLL Characteristics:NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
            Time Stamp:0x61A6C4AC [Wed Dec 1 00:41:16 2021 UTC]
            TLS Callbacks:
            CLR (.Net) Version:v4.0.30319
            OS Version Major:4
            OS Version Minor:0
            File Version Major:4
            File Version Minor:0
            Subsystem Version Major:4
            Subsystem Version Minor:0
            Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744

            Entrypoint Preview

            Instruction
            jmp dword ptr [00402000h]
            or dword ptr [eax], eax
            add byte ptr [eax], al
            push es
            add byte ptr [eax], al
            add byte ptr [esi], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [edx], cl
            adc al, 1Eh
            sub byte ptr [edx], dh
            cmp al, 46h
            push eax
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al

            Data Directories

            NameVirtual AddressVirtual Size Is in Section
            IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
            IMAGE_DIRECTORY_ENTRY_IMPORT0x87ea80x4f.text
            IMAGE_DIRECTORY_ENTRY_RESOURCE0x880000x18768.rsrc
            IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
            IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
            IMAGE_DIRECTORY_ENTRY_BASERELOC0xa20000xc.reloc
            IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
            IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
            IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
            IMAGE_DIRECTORY_ENTRY_TLS0x00x0
            IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
            IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
            IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
            IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
            IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
            IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0

            Sections

            NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
            .text0x20000x85f180x86000False0.860710485658data7.7277719097IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
            .rsrc0x880000x187680x18800False0.889817841199data7.58504983745IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
            .reloc0xa20000xc0x200False0.044921875data0.101910425663IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ

            Resources

            NameRVASizeTypeLanguageCountry
            RT_ICON0x881e00xea8data
            RT_ICON0x890980x8a8data
            RT_ICON0x899500x568GLS_BINARY_LSB_FIRST
            RT_ICON0x89ec80x25a8data
            RT_ICON0x8c4800x10a8data
            RT_ICON0x8d5380x468GLS_BINARY_LSB_FIRST
            RT_ICON0x8d9b00x54ecPNG image data, 256 x 256, 8-bit colormap, non-interlaced
            RT_ICON0x92eac0xce27PNG image data, 256 x 256, 8-bit/color RGBA, non-interlaced
            RT_GROUP_ICON0x9fce40x76data
            RT_VERSION0x9fd6c0x424data
            RT_MANIFEST0xa01a00x5c1XML 1.0 document, UTF-8 Unicode (with BOM) text

            Imports

            DLLImport
            mscoree.dll_CorExeMain

            Version Infos

            DescriptionData
            Translation0x0000 0x04b0
            LegalCopyrightMagnus Ellinge 2009, Bastian Damman 2011
            Assembly Version0.2.1.0
            InternalNameITypeLibExporterNameProvid.exe
            FileVersion0.2.1.0
            CompanyNameMagnus Ellinge, Bastian Damman
            LegalTrademarks
            CommentsUSB to MIDI translation
            ProductNamePS360 MIDI Drummer
            ProductVersion0.2.1.0
            FileDescriptionPS360 MIDI Drummer
            OriginalFilenameITypeLibExporterNameProvid.exe

            Network Behavior

            Network Port Distribution

            UDP Packets

            TimestampSource PortDest PortSource IPDest IP
            Dec 2, 2021 19:33:48.028042078 CET5679453192.168.2.48.8.8.8
            Dec 2, 2021 19:33:48.142942905 CET53567948.8.8.8192.168.2.4

            DNS Queries

            TimestampSource IPDest IPTrans IDOP CodeNameTypeClass
            Dec 2, 2021 19:33:48.028042078 CET192.168.2.48.8.8.80xe56cStandard query (0)www.ibew-neca.comA (IP address)IN (0x0001)

            DNS Answers

            TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClass
            Dec 2, 2021 19:33:48.142942905 CET8.8.8.8192.168.2.40xe56cNo error (0)www.ibew-neca.com66.96.147.103A (IP address)IN (0x0001)

            Code Manipulations

            Statistics

            Behavior

            Click to jump to process

            System Behavior

            General

            Start time:19:31:40
            Start date:02/12/2021
            Path:C:\Users\user\Desktop\DHL_AWB_NO#907853880911.exe
            Wow64 process (32bit):true
            Commandline:"C:\Users\user\Desktop\DHL_AWB_NO#907853880911.exe"
            Imagebase:0xb30000
            File size:650240 bytes
            MD5 hash:37340B33801B049CA07055A4BCCA5F27
            Has elevated privileges:true
            Has administrator privileges:true
            Programmed in:.Net C# or VB.NET
            Yara matches:
            • Rule: JoeSecurity_FormBook, Description: Yara detected FormBook, Source: 00000000.00000002.676498068.0000000003ED9000.00000004.00000001.sdmp, Author: Joe Security
            • Rule: Formbook_1, Description: autogenerated rule brought to you by yara-signator, Source: 00000000.00000002.676498068.0000000003ED9000.00000004.00000001.sdmp, Author: Felix Bilstein - yara-signator at cocacoding dot com
            • Rule: Formbook, Description: detect Formbook in memory, Source: 00000000.00000002.676498068.0000000003ED9000.00000004.00000001.sdmp, Author: JPCERT/CC Incident Response Group
            • Rule: JoeSecurity_FormBook, Description: Yara detected FormBook, Source: 00000000.00000002.677126052.000000000414A000.00000004.00000001.sdmp, Author: Joe Security
            • Rule: Formbook_1, Description: autogenerated rule brought to you by yara-signator, Source: 00000000.00000002.677126052.000000000414A000.00000004.00000001.sdmp, Author: Felix Bilstein - yara-signator at cocacoding dot com
            • Rule: Formbook, Description: detect Formbook in memory, Source: 00000000.00000002.677126052.000000000414A000.00000004.00000001.sdmp, Author: JPCERT/CC Incident Response Group
            • Rule: JoeSecurity_AntiVM_3, Description: Yara detected AntiVM_3, Source: 00000000.00000002.676134512.0000000002ED1000.00000004.00000001.sdmp, Author: Joe Security
            Reputation:low

            General

            Start time:19:31:44
            Start date:02/12/2021
            Path:C:\Users\user\Desktop\DHL_AWB_NO#907853880911.exe
            Wow64 process (32bit):true
            Commandline:C:\Users\user\Desktop\DHL_AWB_NO#907853880911.exe
            Imagebase:0x600000
            File size:650240 bytes
            MD5 hash:37340B33801B049CA07055A4BCCA5F27
            Has elevated privileges:true
            Has administrator privileges:true
            Programmed in:C, C++ or other language
            Yara matches:
            • Rule: JoeSecurity_FormBook, Description: Yara detected FormBook, Source: 00000002.00000000.672669530.0000000000400000.00000040.00000001.sdmp, Author: Joe Security
            • Rule: Formbook_1, Description: autogenerated rule brought to you by yara-signator, Source: 00000002.00000000.672669530.0000000000400000.00000040.00000001.sdmp, Author: Felix Bilstein - yara-signator at cocacoding dot com
            • Rule: Formbook, Description: detect Formbook in memory, Source: 00000002.00000000.672669530.0000000000400000.00000040.00000001.sdmp, Author: JPCERT/CC Incident Response Group
            • Rule: JoeSecurity_FormBook, Description: Yara detected FormBook, Source: 00000002.00000000.673053998.0000000000400000.00000040.00000001.sdmp, Author: Joe Security
            • Rule: Formbook_1, Description: autogenerated rule brought to you by yara-signator, Source: 00000002.00000000.673053998.0000000000400000.00000040.00000001.sdmp, Author: Felix Bilstein - yara-signator at cocacoding dot com
            • Rule: Formbook, Description: detect Formbook in memory, Source: 00000002.00000000.673053998.0000000000400000.00000040.00000001.sdmp, Author: JPCERT/CC Incident Response Group
            • Rule: JoeSecurity_FormBook, Description: Yara detected FormBook, Source: 00000002.00000002.736134377.0000000001060000.00000040.00020000.sdmp, Author: Joe Security
            • Rule: Formbook_1, Description: autogenerated rule brought to you by yara-signator, Source: 00000002.00000002.736134377.0000000001060000.00000040.00020000.sdmp, Author: Felix Bilstein - yara-signator at cocacoding dot com
            • Rule: Formbook, Description: detect Formbook in memory, Source: 00000002.00000002.736134377.0000000001060000.00000040.00020000.sdmp, Author: JPCERT/CC Incident Response Group
            • Rule: JoeSecurity_FormBook, Description: Yara detected FormBook, Source: 00000002.00000002.732545477.0000000000400000.00000040.00000001.sdmp, Author: Joe Security
            • Rule: Formbook_1, Description: autogenerated rule brought to you by yara-signator, Source: 00000002.00000002.732545477.0000000000400000.00000040.00000001.sdmp, Author: Felix Bilstein - yara-signator at cocacoding dot com
            • Rule: Formbook, Description: detect Formbook in memory, Source: 00000002.00000002.732545477.0000000000400000.00000040.00000001.sdmp, Author: JPCERT/CC Incident Response Group
            • Rule: JoeSecurity_FormBook, Description: Yara detected FormBook, Source: 00000002.00000002.734719303.0000000000C30000.00000040.00020000.sdmp, Author: Joe Security
            • Rule: Formbook_1, Description: autogenerated rule brought to you by yara-signator, Source: 00000002.00000002.734719303.0000000000C30000.00000040.00020000.sdmp, Author: Felix Bilstein - yara-signator at cocacoding dot com
            • Rule: Formbook, Description: detect Formbook in memory, Source: 00000002.00000002.734719303.0000000000C30000.00000040.00020000.sdmp, Author: JPCERT/CC Incident Response Group
            Reputation:low

            General

            Start time:19:31:46
            Start date:02/12/2021
            Path:C:\Windows\explorer.exe
            Wow64 process (32bit):false
            Commandline:C:\Windows\Explorer.EXE
            Imagebase:0x7ff6fee60000
            File size:3933184 bytes
            MD5 hash:AD5296B280E8F522A8A897C96BAB0E1D
            Has elevated privileges:true
            Has administrator privileges:true
            Programmed in:C, C++ or other language
            Yara matches:
            • Rule: JoeSecurity_FormBook, Description: Yara detected FormBook, Source: 00000005.00000000.719427940.000000000E898000.00000040.00020000.sdmp, Author: Joe Security
            • Rule: Formbook_1, Description: autogenerated rule brought to you by yara-signator, Source: 00000005.00000000.719427940.000000000E898000.00000040.00020000.sdmp, Author: Felix Bilstein - yara-signator at cocacoding dot com
            • Rule: Formbook, Description: detect Formbook in memory, Source: 00000005.00000000.719427940.000000000E898000.00000040.00020000.sdmp, Author: JPCERT/CC Incident Response Group
            • Rule: JoeSecurity_FormBook, Description: Yara detected FormBook, Source: 00000005.00000000.705738120.000000000E898000.00000040.00020000.sdmp, Author: Joe Security
            • Rule: Formbook_1, Description: autogenerated rule brought to you by yara-signator, Source: 00000005.00000000.705738120.000000000E898000.00000040.00020000.sdmp, Author: Felix Bilstein - yara-signator at cocacoding dot com
            • Rule: Formbook, Description: detect Formbook in memory, Source: 00000005.00000000.705738120.000000000E898000.00000040.00020000.sdmp, Author: JPCERT/CC Incident Response Group
            Reputation:high

            General

            Start time:19:32:09
            Start date:02/12/2021
            Path:C:\Windows\SysWOW64\mstsc.exe
            Wow64 process (32bit):true
            Commandline:C:\Windows\SysWOW64\mstsc.exe
            Imagebase:0xf40000
            File size:3444224 bytes
            MD5 hash:2412003BE253A515C620CE4890F3D8F3
            Has elevated privileges:true
            Has administrator privileges:true
            Programmed in:C, C++ or other language
            Yara matches:
            • Rule: JoeSecurity_FormBook, Description: Yara detected FormBook, Source: 00000009.00000002.930477185.0000000000D20000.00000004.00000001.sdmp, Author: Joe Security
            • Rule: Formbook_1, Description: autogenerated rule brought to you by yara-signator, Source: 00000009.00000002.930477185.0000000000D20000.00000004.00000001.sdmp, Author: Felix Bilstein - yara-signator at cocacoding dot com
            • Rule: Formbook, Description: detect Formbook in memory, Source: 00000009.00000002.930477185.0000000000D20000.00000004.00000001.sdmp, Author: JPCERT/CC Incident Response Group
            • Rule: JoeSecurity_FormBook, Description: Yara detected FormBook, Source: 00000009.00000002.929049449.0000000000780000.00000040.00020000.sdmp, Author: Joe Security
            • Rule: Formbook_1, Description: autogenerated rule brought to you by yara-signator, Source: 00000009.00000002.929049449.0000000000780000.00000040.00020000.sdmp, Author: Felix Bilstein - yara-signator at cocacoding dot com
            • Rule: Formbook, Description: detect Formbook in memory, Source: 00000009.00000002.929049449.0000000000780000.00000040.00020000.sdmp, Author: JPCERT/CC Incident Response Group
            • Rule: JoeSecurity_FormBook, Description: Yara detected FormBook, Source: 00000009.00000002.928132789.0000000000150000.00000040.00020000.sdmp, Author: Joe Security
            • Rule: Formbook_1, Description: autogenerated rule brought to you by yara-signator, Source: 00000009.00000002.928132789.0000000000150000.00000040.00020000.sdmp, Author: Felix Bilstein - yara-signator at cocacoding dot com
            • Rule: Formbook, Description: detect Formbook in memory, Source: 00000009.00000002.928132789.0000000000150000.00000040.00020000.sdmp, Author: JPCERT/CC Incident Response Group
            Reputation:moderate

            General

            Start time:19:32:15
            Start date:02/12/2021
            Path:C:\Windows\SysWOW64\cmd.exe
            Wow64 process (32bit):true
            Commandline:/c del "C:\Users\user\Desktop\DHL_AWB_NO#907853880911.exe"
            Imagebase:0x11d0000
            File size:232960 bytes
            MD5 hash:F3BDBE3BB6F734E357235F4D5898582D
            Has elevated privileges:true
            Has administrator privileges:true
            Programmed in:C, C++ or other language
            Reputation:high

            General

            Start time:19:32:17
            Start date:02/12/2021
            Path:C:\Windows\System32\conhost.exe
            Wow64 process (32bit):false
            Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
            Imagebase:0x7ff724c50000
            File size:625664 bytes
            MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
            Has elevated privileges:true
            Has administrator privileges:true
            Programmed in:C, C++ or other language
            Reputation:high

            General

            Start time:19:32:48
            Start date:02/12/2021
            Path:C:\Windows\explorer.exe
            Wow64 process (32bit):false
            Commandline:"C:\Windows\explorer.exe" /LOADSAVEDWINDOWS
            Imagebase:0x7ff6fee60000
            File size:3933184 bytes
            MD5 hash:AD5296B280E8F522A8A897C96BAB0E1D
            Has elevated privileges:true
            Has administrator privileges:true
            Programmed in:C, C++ or other language
            Reputation:high

            Disassembly

            Code Analysis

            Reset < >