Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
DHL AWB TRACKING DETAILS.exe

Overview

General Information

Sample Name:DHL AWB TRACKING DETAILS.exe
Analysis ID:562043
MD5:4e358b432ba956c13627beee054d68e5
SHA1:8791318da047e93f2a16cc6535eba5159228f832
SHA256:836696cddebff5d522acb2c105a404ceeb635df69b3c9544b5bebcef13bc3e86
Tags:DHLexeFormbook
Infos:

Detection

FormBook
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Multi AV Scanner detection for submitted file
Yara detected FormBook
Malicious sample detected (through community Yara rule)
Antivirus detection for URL or domain
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for dropped file
Sample uses process hollowing technique
Maps a DLL or memory area into another process
Machine Learning detection for sample
Self deletion via cmd delete
Injects a PE file into a foreign processes
Found evasive API chain (may stop execution after reading information in the PEB, e.g. number of processors)
Queues an APC in another process (thread injection)
Tries to detect virtualization through RDTSC time measurements
Modifies the context of a thread in another process (thread injection)
C2 URLs / IPs found in malware configuration
Uses 32bit PE files
Yara signature match
Antivirus or Machine Learning detection for unpacked file
Contains functionality to shutdown / reboot the system
Uses code obfuscation techniques (call, push, ret)
Detected potential crypto function
Found potential string decryption / allocating functions
Contains functionality to call native functions
Contains functionality to dynamically determine API calls
Contains functionality for execution timing, often used to detect debuggers
Enables debug privileges
Found inlined nop instructions (likely shell or obfuscated code)
Sample file is different than original file name gathered from version info
Drops PE files
Contains functionality to read the PEB
Checks if the current process is being debugged
Contains capabilities to detect virtual machines
Monitors certain registry keys / values for changes (often done to protect autostart functionality)
Found large amount of non-executed APIs
Creates a process in suspended mode (likely to inject code)
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains functionality for read data from the clipboard

Classification

  • System is w10x64
  • DHL AWB TRACKING DETAILS.exe (PID: 6228 cmdline: "C:\Users\user\Desktop\DHL AWB TRACKING DETAILS.exe" MD5: 4E358B432BA956C13627BEEE054D68E5)
    • DHL AWB TRACKING DETAILS.exe (PID: 6276 cmdline: "C:\Users\user\Desktop\DHL AWB TRACKING DETAILS.exe" MD5: 4E358B432BA956C13627BEEE054D68E5)
      • explorer.exe (PID: 3440 cmdline: C:\Windows\Explorer.EXE MD5: AD5296B280E8F522A8A897C96BAB0E1D)
        • wlanext.exe (PID: 6932 cmdline: C:\Windows\SysWOW64\wlanext.exe MD5: CD1ED9A48316D58513D8ECB2D55B5C04)
          • cmd.exe (PID: 7012 cmdline: /c del "C:\Users\user\Desktop\DHL AWB TRACKING DETAILS.exe" MD5: F3BDBE3BB6F734E357235F4D5898582D)
            • conhost.exe (PID: 7024 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
          • explorer.exe (PID: 4636 cmdline: "C:\Windows\explorer.exe" /LOADSAVEDWINDOWS MD5: AD5296B280E8F522A8A897C96BAB0E1D)
  • explorer.exe (PID: 5560 cmdline: "C:\Windows\explorer.exe" /LOADSAVEDWINDOWS MD5: AD5296B280E8F522A8A897C96BAB0E1D)
  • cleanup
{"C2 list": ["www.hdetpnipa.xyz/a34b/"], "decoy": ["mesonarte.com", "eksiwakun9.xyz", "dustcollectionconsultant.com", "heliosarchitecture.com", "chinaanalysisgroup.com", "nimbinhillshemp.com", "ychain.biz", "mountshastaart.com", "monstermangoloco.com", "bodhiandbear.com", "rootednft.xyz", "metayema.com", "zw21.xyz", "criccketworld.com", "segurobarato.net", "ananyacap.com", "momo-momo.xyz", "ezrealestatedeals.com", "ghrde.xyz", "idimol.com", "pcthspoe.xyz", "thewhiteswanharringworth.com", "che8760.com", "85111280.xyz", "apteka-magnolia.com", "proach.online", "portfolioabeckford.com", "affilinvest.com", "subspank.xyz", "odessamadrecoffeehouse.com", "onetrade.biz", "tianfuhg.com", "kibtitalikeniwenti.com", "terriblearttours.com", "saudirelief.com", "metacourting.xyz", "kimera.blue", "mgpsfm.com", "metawzrd.com", "veahhiodl.xyz", "alimasurfhotel.com", "sirensandiego.com", "gd-hxgg.com", "aurorarift.com", "clingbee.com", "zettavisor2021.xyz", "gregoryryankramer.art", "robertsonfandc.com", "sociedadgeograficacafe.com", "emilyhkeefer.com", "v-hush.com", "judithtuttle.xyz", "itbrandlink.com", "carrybicycles.com", "storge-evolution.com", "socnhhpa.xyz", "victorzark.com", "ghettoguy.com", "redtruckguy.com", "jeanmariewallendorf.com", "ocpdtel.xyz", "democracies.online", "bw529twonineh5.world", "chinhdohuyenthoai.xyz"]}
SourceRuleDescriptionAuthorStrings
0000000B.00000002.636107094.0000000000D80000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_FormBookYara detected FormBookJoe Security
    0000000B.00000002.636107094.0000000000D80000.00000004.00000800.00020000.00000000.sdmpFormbook_1autogenerated rule brought to you by yara-signatorFelix Bilstein - yara-signator at cocacoding dot com
    • 0x9908:$sequence_0: 03 C8 0F 31 2B C1 89 45 FC
    • 0x9b82:$sequence_0: 03 C8 0F 31 2B C1 89 45 FC
    • 0x156b5:$sequence_1: 3C 24 0F 84 76 FF FF FF 3C 25 74 94
    • 0x151a1:$sequence_2: 3B 4F 14 73 95 85 C9 74 91
    • 0x157b7:$sequence_3: 3C 69 75 44 8B 7D 18 8B 0F
    • 0x1592f:$sequence_4: 5D C3 8D 50 7C 80 FA 07
    • 0xa59a:$sequence_5: 0F BE 5C 0E 01 0F B6 54 0E 02 83 E3 0F C1 EA 06
    • 0x1441c:$sequence_6: 57 89 45 FC 89 45 F4 89 45 F8
    • 0xb293:$sequence_7: 66 89 0C 02 5B 8B E5 5D
    • 0x1b927:$sequence_8: 3C 54 74 04 3C 74 75 F4
    • 0x1c92a:$sequence_9: 56 68 03 01 00 00 8D 85 95 FE FF FF 6A 00
    0000000B.00000002.636107094.0000000000D80000.00000004.00000800.00020000.00000000.sdmpFormbookdetect Formbook in memoryJPCERT/CC Incident Response Group
    • 0x18849:$sqlite3step: 68 34 1C 7B E1
    • 0x1895c:$sqlite3step: 68 34 1C 7B E1
    • 0x18878:$sqlite3text: 68 38 2A 90 C5
    • 0x1899d:$sqlite3text: 68 38 2A 90 C5
    • 0x1888b:$sqlite3blob: 68 53 D8 7F 8C
    • 0x189b3:$sqlite3blob: 68 53 D8 7F 8C
    00000001.00000000.359424691.0000000000400000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_FormBookYara detected FormBookJoe Security
      00000001.00000000.359424691.0000000000400000.00000040.00000400.00020000.00000000.sdmpFormbook_1autogenerated rule brought to you by yara-signatorFelix Bilstein - yara-signator at cocacoding dot com
      • 0x9908:$sequence_0: 03 C8 0F 31 2B C1 89 45 FC
      • 0x9b82:$sequence_0: 03 C8 0F 31 2B C1 89 45 FC
      • 0x156b5:$sequence_1: 3C 24 0F 84 76 FF FF FF 3C 25 74 94
      • 0x151a1:$sequence_2: 3B 4F 14 73 95 85 C9 74 91
      • 0x157b7:$sequence_3: 3C 69 75 44 8B 7D 18 8B 0F
      • 0x1592f:$sequence_4: 5D C3 8D 50 7C 80 FA 07
      • 0xa59a:$sequence_5: 0F BE 5C 0E 01 0F B6 54 0E 02 83 E3 0F C1 EA 06
      • 0x1441c:$sequence_6: 57 89 45 FC 89 45 F4 89 45 F8
      • 0xb293:$sequence_7: 66 89 0C 02 5B 8B E5 5D
      • 0x1b927:$sequence_8: 3C 54 74 04 3C 74 75 F4
      • 0x1c92a:$sequence_9: 56 68 03 01 00 00 8D 85 95 FE FF FF 6A 00
      Click to see the 28 entries
      SourceRuleDescriptionAuthorStrings
      1.2.DHL AWB TRACKING DETAILS.exe.400000.0.unpackJoeSecurity_FormBookYara detected FormBookJoe Security
        1.2.DHL AWB TRACKING DETAILS.exe.400000.0.unpackFormbook_1autogenerated rule brought to you by yara-signatorFelix Bilstein - yara-signator at cocacoding dot com
        • 0x8b08:$sequence_0: 03 C8 0F 31 2B C1 89 45 FC
        • 0x8d82:$sequence_0: 03 C8 0F 31 2B C1 89 45 FC
        • 0x148b5:$sequence_1: 3C 24 0F 84 76 FF FF FF 3C 25 74 94
        • 0x143a1:$sequence_2: 3B 4F 14 73 95 85 C9 74 91
        • 0x149b7:$sequence_3: 3C 69 75 44 8B 7D 18 8B 0F
        • 0x14b2f:$sequence_4: 5D C3 8D 50 7C 80 FA 07
        • 0x979a:$sequence_5: 0F BE 5C 0E 01 0F B6 54 0E 02 83 E3 0F C1 EA 06
        • 0x1361c:$sequence_6: 57 89 45 FC 89 45 F4 89 45 F8
        • 0xa493:$sequence_7: 66 89 0C 02 5B 8B E5 5D
        • 0x1ab27:$sequence_8: 3C 54 74 04 3C 74 75 F4
        • 0x1bb2a:$sequence_9: 56 68 03 01 00 00 8D 85 95 FE FF FF 6A 00
        1.2.DHL AWB TRACKING DETAILS.exe.400000.0.unpackFormbookdetect Formbook in memoryJPCERT/CC Incident Response Group
        • 0x17a49:$sqlite3step: 68 34 1C 7B E1
        • 0x17b5c:$sqlite3step: 68 34 1C 7B E1
        • 0x17a78:$sqlite3text: 68 38 2A 90 C5
        • 0x17b9d:$sqlite3text: 68 38 2A 90 C5
        • 0x17a8b:$sqlite3blob: 68 53 D8 7F 8C
        • 0x17bb3:$sqlite3blob: 68 53 D8 7F 8C
        0.2.DHL AWB TRACKING DETAILS.exe.2f10000.3.unpackJoeSecurity_FormBookYara detected FormBookJoe Security
          0.2.DHL AWB TRACKING DETAILS.exe.2f10000.3.unpackFormbook_1autogenerated rule brought to you by yara-signatorFelix Bilstein - yara-signator at cocacoding dot com
          • 0x8b08:$sequence_0: 03 C8 0F 31 2B C1 89 45 FC
          • 0x8d82:$sequence_0: 03 C8 0F 31 2B C1 89 45 FC
          • 0x148b5:$sequence_1: 3C 24 0F 84 76 FF FF FF 3C 25 74 94
          • 0x143a1:$sequence_2: 3B 4F 14 73 95 85 C9 74 91
          • 0x149b7:$sequence_3: 3C 69 75 44 8B 7D 18 8B 0F
          • 0x14b2f:$sequence_4: 5D C3 8D 50 7C 80 FA 07
          • 0x979a:$sequence_5: 0F BE 5C 0E 01 0F B6 54 0E 02 83 E3 0F C1 EA 06
          • 0x1361c:$sequence_6: 57 89 45 FC 89 45 F4 89 45 F8
          • 0xa493:$sequence_7: 66 89 0C 02 5B 8B E5 5D
          • 0x1ab27:$sequence_8: 3C 54 74 04 3C 74 75 F4
          • 0x1bb2a:$sequence_9: 56 68 03 01 00 00 8D 85 95 FE FF FF 6A 00
          Click to see the 22 entries
          No Sigma rule has matched

          Click to jump to signature section

          Show All Signature Results

          AV Detection

          barindex
          Source: 0000000B.00000002.636107094.0000000000D80000.00000004.00000800.00020000.00000000.sdmpMalware Configuration Extractor: FormBook {"C2 list": ["www.hdetpnipa.xyz/a34b/"], "decoy": ["mesonarte.com", "eksiwakun9.xyz", "dustcollectionconsultant.com", "heliosarchitecture.com", "chinaanalysisgroup.com", "nimbinhillshemp.com", "ychain.biz", "mountshastaart.com", "monstermangoloco.com", "bodhiandbear.com", "rootednft.xyz", "metayema.com", "zw21.xyz", "criccketworld.com", "segurobarato.net", "ananyacap.com", "momo-momo.xyz", "ezrealestatedeals.com", "ghrde.xyz", "idimol.com", "pcthspoe.xyz", "thewhiteswanharringworth.com", "che8760.com", "85111280.xyz", "apteka-magnolia.com", "proach.online", "portfolioabeckford.com", "affilinvest.com", "subspank.xyz", "odessamadrecoffeehouse.com", "onetrade.biz", "tianfuhg.com", "kibtitalikeniwenti.com", "terriblearttours.com", "saudirelief.com", "metacourting.xyz", "kimera.blue", "mgpsfm.com", "metawzrd.com", "veahhiodl.xyz", "alimasurfhotel.com", "sirensandiego.com", "gd-hxgg.com", "aurorarift.com", "clingbee.com", "zettavisor2021.xyz", "gregoryryankramer.art", "robertsonfandc.com", "sociedadgeograficacafe.com", "emilyhkeefer.com", "v-hush.com", "judithtuttle.xyz", "itbrandlink.com", "carrybicycles.com", "storge-evolution.com", "socnhhpa.xyz", "victorzark.com", "ghettoguy.com", "redtruckguy.com", "jeanmariewallendorf.com", "ocpdtel.xyz", "democracies.online", "bw529twonineh5.world", "chinhdohuyenthoai.xyz"]}
          Source: DHL AWB TRACKING DETAILS.exeVirustotal: Detection: 43%Perma Link
          Source: DHL AWB TRACKING DETAILS.exeReversingLabs: Detection: 48%
          Source: Yara matchFile source: 1.2.DHL AWB TRACKING DETAILS.exe.400000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 0.2.DHL AWB TRACKING DETAILS.exe.2f10000.3.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 0.2.DHL AWB TRACKING DETAILS.exe.2f10000.3.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 1.0.DHL AWB TRACKING DETAILS.exe.400000.5.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 1.0.DHL AWB TRACKING DETAILS.exe.400000.5.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 1.0.DHL AWB TRACKING DETAILS.exe.400000.6.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 1.2.DHL AWB TRACKING DETAILS.exe.400000.0.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 1.0.DHL AWB TRACKING DETAILS.exe.400000.6.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 1.0.DHL AWB TRACKING DETAILS.exe.400000.4.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 0000000B.00000002.636107094.0000000000D80000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000001.00000000.359424691.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000000B.00000002.635990166.0000000000D50000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000001.00000000.360270037.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000001.00000002.435840268.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000004.00000000.409581872.000000000F123000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000000.00000002.362630153.0000000002F10000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000001.00000002.436793150.0000000000D10000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000004.00000000.394582472.000000000F123000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000000B.00000002.634911519.0000000000A00000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000001.00000002.436005605.00000000009A0000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
          Source: www.hdetpnipa.xyz/a34b/Avira URL Cloud: Label: phishing
          Source: www.hdetpnipa.xyz/a34b/Virustotal: Detection: 9%Perma Link
          Source: C:\Users\user\AppData\Local\Temp\nsr8F1B.tmp\vzhghptrhu.dllVirustotal: Detection: 37%Perma Link
          Source: C:\Users\user\AppData\Local\Temp\nsr8F1B.tmp\vzhghptrhu.dllReversingLabs: Detection: 25%
          Source: DHL AWB TRACKING DETAILS.exeJoe Sandbox ML: detected
          Source: 0.2.DHL AWB TRACKING DETAILS.exe.2f10000.3.unpackAvira: Label: TR/Crypt.ZPACK.Gen
          Source: 31.2.explorer.exe.f07f840.1.unpackAvira: Label: TR/Patched.Ren.Gen
          Source: 20.0.explorer.exe.ad0f840.6.unpackAvira: Label: TR/Patched.Ren.Gen
          Source: 1.2.DHL AWB TRACKING DETAILS.exe.400000.0.unpackAvira: Label: TR/Crypt.ZPACK.Gen
          Source: 1.0.DHL AWB TRACKING DETAILS.exe.400000.5.unpackAvira: Label: TR/Crypt.ZPACK.Gen
          Source: 1.0.DHL AWB TRACKING DETAILS.exe.400000.6.unpackAvira: Label: TR/Crypt.ZPACK.Gen
          Source: 1.0.DHL AWB TRACKING DETAILS.exe.400000.4.unpackAvira: Label: TR/Crypt.ZPACK.Gen
          Source: 11.2.wlanext.exe.382f840.4.unpackAvira: Label: TR/Patched.Ren.Gen
          Source: 11.2.wlanext.exe.deef30.0.unpackAvira: Label: TR/Patched.Ren.Gen
          Source: 20.0.explorer.exe.ad0f840.3.unpackAvira: Label: TR/Patched.Ren.Gen
          Source: 20.0.explorer.exe.ad0f840.0.unpackAvira: Label: TR/Patched.Ren.Gen
          Source: DHL AWB TRACKING DETAILS.exeStatic PE information: LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, RELOCS_STRIPPED
          Source: Binary string: wntdll.pdbUGP source: DHL AWB TRACKING DETAILS.exe, 00000000.00000003.360349373.0000000002F50000.00000004.00000800.00020000.00000000.sdmp, DHL AWB TRACKING DETAILS.exe, 00000000.00000003.360736432.00000000030E0000.00000004.00000800.00020000.00000000.sdmp, DHL AWB TRACKING DETAILS.exe, 00000001.00000002.436271704.0000000000AFF000.00000040.00000800.00020000.00000000.sdmp, DHL AWB TRACKING DETAILS.exe, 00000001.00000002.436124386.00000000009E0000.00000040.00000800.00020000.00000000.sdmp, wlanext.exe, 0000000B.00000002.636937480.0000000003300000.00000040.00000800.00020000.00000000.sdmp, wlanext.exe, 0000000B.00000002.637445370.000000000341F000.00000040.00000800.00020000.00000000.sdmp
          Source: Binary string: wntdll.pdb source: DHL AWB TRACKING DETAILS.exe, DHL AWB TRACKING DETAILS.exe, 00000001.00000002.436271704.0000000000AFF000.00000040.00000800.00020000.00000000.sdmp, DHL AWB TRACKING DETAILS.exe, 00000001.00000002.436124386.00000000009E0000.00000040.00000800.00020000.00000000.sdmp, wlanext.exe, wlanext.exe, 0000000B.00000002.636937480.0000000003300000.00000040.00000800.00020000.00000000.sdmp, wlanext.exe, 0000000B.00000002.637445370.000000000341F000.00000040.00000800.00020000.00000000.sdmp
          Source: Binary string: wlanext.pdb source: DHL AWB TRACKING DETAILS.exe, 00000001.00000002.437702980.00000000029F0000.00000040.10000000.00040000.00000000.sdmp
          Source: Binary string: wlanext.pdbGCTL source: DHL AWB TRACKING DETAILS.exe, 00000001.00000002.437702980.00000000029F0000.00000040.10000000.00040000.00000000.sdmp
          Source: C:\Users\user\Desktop\DHL AWB TRACKING DETAILS.exeCode function: 0_2_00405D7C FindFirstFileA,FindClose,
          Source: C:\Users\user\Desktop\DHL AWB TRACKING DETAILS.exeCode function: 0_2_004053AA CloseHandle,DeleteFileA,lstrcatA,lstrcatA,lstrlenA,FindFirstFileA,DeleteFileA,FindNextFileA,FindClose,RemoveDirectoryA,
          Source: C:\Users\user\Desktop\DHL AWB TRACKING DETAILS.exeCode function: 0_2_00402630 FindFirstFileA,
          Source: C:\Users\user\Desktop\DHL AWB TRACKING DETAILS.exeCode function: 4x nop then pop esi
          Source: C:\Users\user\Desktop\DHL AWB TRACKING DETAILS.exeCode function: 4x nop then pop esi
          Source: C:\Windows\SysWOW64\wlanext.exeCode function: 4x nop then pop esi
          Source: C:\Windows\SysWOW64\wlanext.exeCode function: 4x nop then pop esi

          Networking

          barindex
          Source: Malware configuration extractorURLs: www.hdetpnipa.xyz/a34b/
          Source: explorer.exe, 00000014.00000003.578175539.0000000004EF7000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000014.00000003.543845759.0000000004EF8000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000014.00000003.550839224.0000000004EF8000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000014.00000003.555983128.0000000004EEC000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000014.00000003.553114910.0000000004EEC000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000014.00000000.566169156.0000000004ED2000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.globalsign.net/root-r2.crl0
          Source: explorer.exe, 00000014.00000003.556038613.0000000004F3A000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000014.00000003.553294057.0000000004F3A000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000014.00000000.566295637.0000000004F3A000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000014.00000003.578401411.0000000004F3A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.v
          Source: DHL AWB TRACKING DETAILS.exe, DHL AWB TRACKING DETAILS.exe, 00000000.00000002.361550279.0000000000409000.00000004.00000001.01000000.00000003.sdmp, DHL AWB TRACKING DETAILS.exe, 00000000.00000000.352121005.0000000000409000.00000008.00000001.01000000.00000003.sdmp, DHL AWB TRACKING DETAILS.exe, 00000001.00000000.355752258.0000000000409000.00000008.00000001.01000000.00000003.sdmpString found in binary or memory: http://nsis.sf.net/NSIS_Error
          Source: DHL AWB TRACKING DETAILS.exe, 00000000.00000002.361550279.0000000000409000.00000004.00000001.01000000.00000003.sdmp, DHL AWB TRACKING DETAILS.exe, 00000000.00000000.352121005.0000000000409000.00000008.00000001.01000000.00000003.sdmp, DHL AWB TRACKING DETAILS.exe, 00000001.00000000.355752258.0000000000409000.00000008.00000001.01000000.00000003.sdmpString found in binary or memory: http://nsis.sf.net/NSIS_ErrorError
          Source: explorer.exe, 00000004.00000000.379142678.000000000095C000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000004.00000000.366064196.000000000095C000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000004.00000000.398584347.000000000095C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.autoitscript.com/autoit3/J
          Source: unknownDNS traffic detected: queries for: www.chinaanalysisgroup.com
          Source: C:\Users\user\Desktop\DHL AWB TRACKING DETAILS.exeCode function: 0_2_00404F61 GetDlgItem,GetDlgItem,GetDlgItem,GetDlgItem,GetClientRect,GetSystemMetrics,SendMessageA,SendMessageA,SendMessageA,SendMessageA,SendMessageA,SendMessageA,ShowWindow,ShowWindow,GetDlgItem,SendMessageA,SendMessageA,SendMessageA,GetDlgItem,CreateThread,CloseHandle,ShowWindow,ShowWindow,ShowWindow,ShowWindow,SendMessageA,CreatePopupMenu,AppendMenuA,GetWindowRect,TrackPopupMenu,SendMessageA,OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,SendMessageA,GlobalUnlock,SetClipboardData,CloseClipboard,

          E-Banking Fraud

          barindex
          Source: Yara matchFile source: 1.2.DHL AWB TRACKING DETAILS.exe.400000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 0.2.DHL AWB TRACKING DETAILS.exe.2f10000.3.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 0.2.DHL AWB TRACKING DETAILS.exe.2f10000.3.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 1.0.DHL AWB TRACKING DETAILS.exe.400000.5.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 1.0.DHL AWB TRACKING DETAILS.exe.400000.5.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 1.0.DHL AWB TRACKING DETAILS.exe.400000.6.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 1.2.DHL AWB TRACKING DETAILS.exe.400000.0.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 1.0.DHL AWB TRACKING DETAILS.exe.400000.6.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 1.0.DHL AWB TRACKING DETAILS.exe.400000.4.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 0000000B.00000002.636107094.0000000000D80000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000001.00000000.359424691.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000000B.00000002.635990166.0000000000D50000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000001.00000000.360270037.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000001.00000002.435840268.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000004.00000000.409581872.000000000F123000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000000.00000002.362630153.0000000002F10000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000001.00000002.436793150.0000000000D10000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000004.00000000.394582472.000000000F123000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000000B.00000002.634911519.0000000000A00000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000001.00000002.436005605.00000000009A0000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY

          System Summary

          barindex
          Source: 1.2.DHL AWB TRACKING DETAILS.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 1.2.DHL AWB TRACKING DETAILS.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 0.2.DHL AWB TRACKING DETAILS.exe.2f10000.3.unpack, type: UNPACKEDPEMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 0.2.DHL AWB TRACKING DETAILS.exe.2f10000.3.unpack, type: UNPACKEDPEMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 0.2.DHL AWB TRACKING DETAILS.exe.2f10000.3.raw.unpack, type: UNPACKEDPEMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 0.2.DHL AWB TRACKING DETAILS.exe.2f10000.3.raw.unpack, type: UNPACKEDPEMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 1.0.DHL AWB TRACKING DETAILS.exe.400000.5.raw.unpack, type: UNPACKEDPEMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 1.0.DHL AWB TRACKING DETAILS.exe.400000.5.raw.unpack, type: UNPACKEDPEMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 1.0.DHL AWB TRACKING DETAILS.exe.400000.5.unpack, type: UNPACKEDPEMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 1.0.DHL AWB TRACKING DETAILS.exe.400000.5.unpack, type: UNPACKEDPEMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 1.0.DHL AWB TRACKING DETAILS.exe.400000.6.raw.unpack, type: UNPACKEDPEMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 1.0.DHL AWB TRACKING DETAILS.exe.400000.6.raw.unpack, type: UNPACKEDPEMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 1.2.DHL AWB TRACKING DETAILS.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 1.2.DHL AWB TRACKING DETAILS.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 1.0.DHL AWB TRACKING DETAILS.exe.400000.6.unpack, type: UNPACKEDPEMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 1.0.DHL AWB TRACKING DETAILS.exe.400000.6.unpack, type: UNPACKEDPEMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 1.0.DHL AWB TRACKING DETAILS.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 1.0.DHL AWB TRACKING DETAILS.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 0000000B.00000002.636107094.0000000000D80000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 0000000B.00000002.636107094.0000000000D80000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 00000001.00000000.359424691.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 00000001.00000000.359424691.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 0000000B.00000002.635990166.0000000000D50000.00000040.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 0000000B.00000002.635990166.0000000000D50000.00000040.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 00000001.00000000.360270037.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 00000001.00000000.360270037.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 00000001.00000002.435840268.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 00000001.00000002.435840268.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 00000004.00000000.409581872.000000000F123000.00000040.00000001.00040000.00000000.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 00000004.00000000.409581872.000000000F123000.00000040.00000001.00040000.00000000.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 00000000.00000002.362630153.0000000002F10000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 00000000.00000002.362630153.0000000002F10000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 00000001.00000002.436793150.0000000000D10000.00000040.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 00000001.00000002.436793150.0000000000D10000.00000040.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 00000004.00000000.394582472.000000000F123000.00000040.00000001.00040000.00000000.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 00000004.00000000.394582472.000000000F123000.00000040.00000001.00040000.00000000.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 0000000B.00000002.634911519.0000000000A00000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 0000000B.00000002.634911519.0000000000A00000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 00000001.00000002.436005605.00000000009A0000.00000040.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 00000001.00000002.436005605.00000000009A0000.00000040.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: DHL AWB TRACKING DETAILS.exeStatic PE information: LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, RELOCS_STRIPPED
          Source: 1.2.DHL AWB TRACKING DETAILS.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 1.2.DHL AWB TRACKING DETAILS.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 0.2.DHL AWB TRACKING DETAILS.exe.2f10000.3.unpack, type: UNPACKEDPEMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 0.2.DHL AWB TRACKING DETAILS.exe.2f10000.3.unpack, type: UNPACKEDPEMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 0.2.DHL AWB TRACKING DETAILS.exe.2f10000.3.raw.unpack, type: UNPACKEDPEMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 0.2.DHL AWB TRACKING DETAILS.exe.2f10000.3.raw.unpack, type: UNPACKEDPEMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 1.0.DHL AWB TRACKING DETAILS.exe.400000.5.raw.unpack, type: UNPACKEDPEMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 1.0.DHL AWB TRACKING DETAILS.exe.400000.5.raw.unpack, type: UNPACKEDPEMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 1.0.DHL AWB TRACKING DETAILS.exe.400000.5.unpack, type: UNPACKEDPEMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 1.0.DHL AWB TRACKING DETAILS.exe.400000.5.unpack, type: UNPACKEDPEMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 1.0.DHL AWB TRACKING DETAILS.exe.400000.6.raw.unpack, type: UNPACKEDPEMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 1.0.DHL AWB TRACKING DETAILS.exe.400000.6.raw.unpack, type: UNPACKEDPEMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 1.2.DHL AWB TRACKING DETAILS.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 1.2.DHL AWB TRACKING DETAILS.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 1.0.DHL AWB TRACKING DETAILS.exe.400000.6.unpack, type: UNPACKEDPEMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 1.0.DHL AWB TRACKING DETAILS.exe.400000.6.unpack, type: UNPACKEDPEMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 1.0.DHL AWB TRACKING DETAILS.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 1.0.DHL AWB TRACKING DETAILS.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 0000000B.00000002.636107094.0000000000D80000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 0000000B.00000002.636107094.0000000000D80000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 00000001.00000000.359424691.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 00000001.00000000.359424691.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 0000000B.00000002.635990166.0000000000D50000.00000040.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 0000000B.00000002.635990166.0000000000D50000.00000040.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 00000001.00000000.360270037.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 00000001.00000000.360270037.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 00000001.00000002.435840268.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 00000001.00000002.435840268.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 00000004.00000000.409581872.000000000F123000.00000040.00000001.00040000.00000000.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 00000004.00000000.409581872.000000000F123000.00000040.00000001.00040000.00000000.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 00000000.00000002.362630153.0000000002F10000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 00000000.00000002.362630153.0000000002F10000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 00000001.00000002.436793150.0000000000D10000.00000040.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 00000001.00000002.436793150.0000000000D10000.00000040.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 00000004.00000000.394582472.000000000F123000.00000040.00000001.00040000.00000000.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 00000004.00000000.394582472.000000000F123000.00000040.00000001.00040000.00000000.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 0000000B.00000002.634911519.0000000000A00000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 0000000B.00000002.634911519.0000000000A00000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 00000001.00000002.436005605.00000000009A0000.00000040.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 00000001.00000002.436005605.00000000009A0000.00000040.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: C:\Users\user\Desktop\DHL AWB TRACKING DETAILS.exeCode function: 0_2_00403225 EntryPoint,#17,SetErrorMode,OleInitialize,SHGetFileInfoA,GetCommandLineA,GetModuleHandleA,CharNextA,GetTempPathA,GetWindowsDirectoryA,lstrcatA,DeleteFileA,OleUninitialize,ExitProcess,lstrcatA,lstrcmpiA,CreateDirectoryA,SetCurrentDirectoryA,DeleteFileA,CopyFileA,CloseHandle,GetCurrentProcess,ExitWindowsEx,ExitProcess,
          Source: C:\Users\user\Desktop\DHL AWB TRACKING DETAILS.exeCode function: 0_2_0040604C
          Source: C:\Users\user\Desktop\DHL AWB TRACKING DETAILS.exeCode function: 0_2_00404772
          Source: C:\Users\user\Desktop\DHL AWB TRACKING DETAILS.exeCode function: 0_2_023809FB
          Source: C:\Users\user\Desktop\DHL AWB TRACKING DETAILS.exeCode function: 1_2_0041E072
          Source: C:\Users\user\Desktop\DHL AWB TRACKING DETAILS.exeCode function: 1_2_0041E819
          Source: C:\Users\user\Desktop\DHL AWB TRACKING DETAILS.exeCode function: 1_2_00401030
          Source: C:\Users\user\Desktop\DHL AWB TRACKING DETAILS.exeCode function: 1_2_0041D9E6
          Source: C:\Users\user\Desktop\DHL AWB TRACKING DETAILS.exeCode function: 1_2_0041EB61
          Source: C:\Users\user\Desktop\DHL AWB TRACKING DETAILS.exeCode function: 1_2_0041DB8A
          Source: C:\Users\user\Desktop\DHL AWB TRACKING DETAILS.exeCode function: 1_2_00402D87
          Source: C:\Users\user\Desktop\DHL AWB TRACKING DETAILS.exeCode function: 1_2_00402D90
          Source: C:\Users\user\Desktop\DHL AWB TRACKING DETAILS.exeCode function: 1_2_0041D5A3
          Source: C:\Users\user\Desktop\DHL AWB TRACKING DETAILS.exeCode function: 1_2_0041D5A6
          Source: C:\Users\user\Desktop\DHL AWB TRACKING DETAILS.exeCode function: 1_2_0041E5BD
          Source: C:\Users\user\Desktop\DHL AWB TRACKING DETAILS.exeCode function: 1_2_00409E5C
          Source: C:\Users\user\Desktop\DHL AWB TRACKING DETAILS.exeCode function: 1_2_00409E60
          Source: C:\Users\user\Desktop\DHL AWB TRACKING DETAILS.exeCode function: 1_2_00402FB0
          Source: C:\Users\user\Desktop\DHL AWB TRACKING DETAILS.exeCode function: 1_2_00A320A0
          Source: C:\Users\user\Desktop\DHL AWB TRACKING DETAILS.exeCode function: 1_2_00AD20A8
          Source: C:\Users\user\Desktop\DHL AWB TRACKING DETAILS.exeCode function: 1_2_00A1B090
          Source: C:\Users\user\Desktop\DHL AWB TRACKING DETAILS.exeCode function: 1_2_00AD28EC
          Source: C:\Users\user\Desktop\DHL AWB TRACKING DETAILS.exeCode function: 1_2_00ADE824
          Source: C:\Users\user\Desktop\DHL AWB TRACKING DETAILS.exeCode function: 1_2_00AC1002
          Source: C:\Users\user\Desktop\DHL AWB TRACKING DETAILS.exeCode function: 1_2_00A24120
          Source: C:\Users\user\Desktop\DHL AWB TRACKING DETAILS.exeCode function: 1_2_00A0F900
          Source: C:\Users\user\Desktop\DHL AWB TRACKING DETAILS.exeCode function: 1_2_00AD22AE
          Source: C:\Users\user\Desktop\DHL AWB TRACKING DETAILS.exeCode function: 1_2_00A3EBB0
          Source: C:\Users\user\Desktop\DHL AWB TRACKING DETAILS.exeCode function: 1_2_00ACDBD2
          Source: C:\Users\user\Desktop\DHL AWB TRACKING DETAILS.exeCode function: 1_2_00AD2B28
          Source: C:\Users\user\Desktop\DHL AWB TRACKING DETAILS.exeCode function: 1_2_00A1841F
          Source: C:\Users\user\Desktop\DHL AWB TRACKING DETAILS.exeCode function: 1_2_00ACD466
          Source: C:\Users\user\Desktop\DHL AWB TRACKING DETAILS.exeCode function: 1_2_00A32581
          Source: C:\Users\user\Desktop\DHL AWB TRACKING DETAILS.exeCode function: 1_2_00A1D5E0
          Source: C:\Users\user\Desktop\DHL AWB TRACKING DETAILS.exeCode function: 1_2_00AD25DD
          Source: C:\Users\user\Desktop\DHL AWB TRACKING DETAILS.exeCode function: 1_2_00A00D20
          Source: C:\Users\user\Desktop\DHL AWB TRACKING DETAILS.exeCode function: 1_2_00AD2D07
          Source: C:\Users\user\Desktop\DHL AWB TRACKING DETAILS.exeCode function: 1_2_00AD1D55
          Source: C:\Users\user\Desktop\DHL AWB TRACKING DETAILS.exeCode function: 1_2_00AD2EF7
          Source: C:\Users\user\Desktop\DHL AWB TRACKING DETAILS.exeCode function: 1_2_00A26E30
          Source: C:\Users\user\Desktop\DHL AWB TRACKING DETAILS.exeCode function: 1_2_00ACD616
          Source: C:\Users\user\Desktop\DHL AWB TRACKING DETAILS.exeCode function: 1_2_00AD1FF1
          Source: C:\Windows\SysWOW64\wlanext.exeCode function: 11_2_033F2B28
          Source: C:\Windows\SysWOW64\wlanext.exeCode function: 11_2_0335EBB0
          Source: C:\Windows\SysWOW64\wlanext.exeCode function: 11_2_033F1FF1
          Source: C:\Windows\SysWOW64\wlanext.exeCode function: 11_2_033EDBD2
          Source: C:\Windows\SysWOW64\wlanext.exeCode function: 11_2_03346E30
          Source: C:\Windows\SysWOW64\wlanext.exeCode function: 11_2_033F22AE
          Source: C:\Windows\SysWOW64\wlanext.exeCode function: 11_2_033F2EF7
          Source: C:\Windows\SysWOW64\wlanext.exeCode function: 11_2_03320D20
          Source: C:\Windows\SysWOW64\wlanext.exeCode function: 11_2_03344120
          Source: C:\Windows\SysWOW64\wlanext.exeCode function: 11_2_0332F900
          Source: C:\Windows\SysWOW64\wlanext.exeCode function: 11_2_033F2D07
          Source: C:\Windows\SysWOW64\wlanext.exeCode function: 11_2_033F1D55
          Source: C:\Windows\SysWOW64\wlanext.exeCode function: 11_2_03352581
          Source: C:\Windows\SysWOW64\wlanext.exeCode function: 11_2_0333D5E0
          Source: C:\Windows\SysWOW64\wlanext.exeCode function: 11_2_033F25DD
          Source: C:\Windows\SysWOW64\wlanext.exeCode function: 11_2_0333841F
          Source: C:\Windows\SysWOW64\wlanext.exeCode function: 11_2_033E1002
          Source: C:\Windows\SysWOW64\wlanext.exeCode function: 11_2_033520A0
          Source: C:\Windows\SysWOW64\wlanext.exeCode function: 11_2_033F20A8
          Source: C:\Windows\SysWOW64\wlanext.exeCode function: 11_2_0333B090
          Source: C:\Windows\SysWOW64\wlanext.exeCode function: 11_2_00A1E819
          Source: C:\Windows\SysWOW64\wlanext.exeCode function: 11_2_00A1E072
          Source: C:\Windows\SysWOW64\wlanext.exeCode function: 11_2_00A1D9E6
          Source: C:\Windows\SysWOW64\wlanext.exeCode function: 11_2_00A1EB61
          Source: C:\Windows\SysWOW64\wlanext.exeCode function: 11_2_00A1D5A3
          Source: C:\Windows\SysWOW64\wlanext.exeCode function: 11_2_00A1D5A6
          Source: C:\Windows\SysWOW64\wlanext.exeCode function: 11_2_00A1E5BD
          Source: C:\Windows\SysWOW64\wlanext.exeCode function: 11_2_00A02D87
          Source: C:\Windows\SysWOW64\wlanext.exeCode function: 11_2_00A02D90
          Source: C:\Windows\SysWOW64\wlanext.exeCode function: 11_2_00A09E60
          Source: C:\Windows\SysWOW64\wlanext.exeCode function: 11_2_00A09E5C
          Source: C:\Windows\SysWOW64\wlanext.exeCode function: 11_2_00A02FB0
          Source: C:\Windows\SysWOW64\wlanext.exeCode function: String function: 0332B150 appears 35 times
          Source: C:\Users\user\Desktop\DHL AWB TRACKING DETAILS.exeCode function: String function: 00A0B150 appears 35 times
          Source: C:\Users\user\Desktop\DHL AWB TRACKING DETAILS.exeCode function: 1_2_0041A360 NtCreateFile,
          Source: C:\Users\user\Desktop\DHL AWB TRACKING DETAILS.exeCode function: 1_2_0041A410 NtReadFile,
          Source: C:\Users\user\Desktop\DHL AWB TRACKING DETAILS.exeCode function: 1_2_0041A490 NtClose,
          Source: C:\Users\user\Desktop\DHL AWB TRACKING DETAILS.exeCode function: 1_2_0041A540 NtAllocateVirtualMemory,
          Source: C:\Users\user\Desktop\DHL AWB TRACKING DETAILS.exeCode function: 1_2_0041A35B NtCreateFile,
          Source: C:\Users\user\Desktop\DHL AWB TRACKING DETAILS.exeCode function: 1_2_0041A40A NtReadFile,
          Source: C:\Users\user\Desktop\DHL AWB TRACKING DETAILS.exeCode function: 1_2_0041A53A NtAllocateVirtualMemory,
          Source: C:\Users\user\Desktop\DHL AWB TRACKING DETAILS.exeCode function: 1_2_00A498F0 NtReadVirtualMemory,LdrInitializeThunk,
          Source: C:\Users\user\Desktop\DHL AWB TRACKING DETAILS.exeCode function: 1_2_00A49860 NtQuerySystemInformation,LdrInitializeThunk,
          Source: C:\Users\user\Desktop\DHL AWB TRACKING DETAILS.exeCode function: 1_2_00A49840 NtDelayExecution,LdrInitializeThunk,
          Source: C:\Users\user\Desktop\DHL AWB TRACKING DETAILS.exeCode function: 1_2_00A499A0 NtCreateSection,LdrInitializeThunk,
          Source: C:\Users\user\Desktop\DHL AWB TRACKING DETAILS.exeCode function: 1_2_00A49910 NtAdjustPrivilegesToken,LdrInitializeThunk,
          Source: C:\Users\user\Desktop\DHL AWB TRACKING DETAILS.exeCode function: 1_2_00A49A20 NtResumeThread,LdrInitializeThunk,
          Source: C:\Users\user\Desktop\DHL AWB TRACKING DETAILS.exeCode function: 1_2_00A49A00 NtProtectVirtualMemory,LdrInitializeThunk,
          Source: C:\Users\user\Desktop\DHL AWB TRACKING DETAILS.exeCode function: 1_2_00A49A50 NtCreateFile,LdrInitializeThunk,
          Source: C:\Users\user\Desktop\DHL AWB TRACKING DETAILS.exeCode function: 1_2_00A495D0 NtClose,LdrInitializeThunk,
          Source: C:\Users\user\Desktop\DHL AWB TRACKING DETAILS.exeCode function: 1_2_00A49540 NtReadFile,LdrInitializeThunk,
          Source: C:\Users\user\Desktop\DHL AWB TRACKING DETAILS.exeCode function: 1_2_00A496E0 NtFreeVirtualMemory,LdrInitializeThunk,
          Source: C:\Users\user\Desktop\DHL AWB TRACKING DETAILS.exeCode function: 1_2_00A49660 NtAllocateVirtualMemory,LdrInitializeThunk,
          Source: C:\Users\user\Desktop\DHL AWB TRACKING DETAILS.exeCode function: 1_2_00A497A0 NtUnmapViewOfSection,LdrInitializeThunk,
          Source: C:\Users\user\Desktop\DHL AWB TRACKING DETAILS.exeCode function: 1_2_00A49780 NtMapViewOfSection,LdrInitializeThunk,
          Source: C:\Users\user\Desktop\DHL AWB TRACKING DETAILS.exeCode function: 1_2_00A49710 NtQueryInformationToken,LdrInitializeThunk,
          Source: C:\Users\user\Desktop\DHL AWB TRACKING DETAILS.exeCode function: 1_2_00A498A0 NtWriteVirtualMemory,
          Source: C:\Users\user\Desktop\DHL AWB TRACKING DETAILS.exeCode function: 1_2_00A49820 NtEnumerateKey,
          Source: C:\Users\user\Desktop\DHL AWB TRACKING DETAILS.exeCode function: 1_2_00A4B040 NtSuspendThread,
          Source: C:\Users\user\Desktop\DHL AWB TRACKING DETAILS.exeCode function: 1_2_00A499D0 NtCreateProcessEx,
          Source: C:\Users\user\Desktop\DHL AWB TRACKING DETAILS.exeCode function: 1_2_00A49950 NtQueueApcThread,
          Source: C:\Users\user\Desktop\DHL AWB TRACKING DETAILS.exeCode function: 1_2_00A49A80 NtOpenDirectoryObject,
          Source: C:\Users\user\Desktop\DHL AWB TRACKING DETAILS.exeCode function: 1_2_00A49A10 NtQuerySection,
          Source: C:\Users\user\Desktop\DHL AWB TRACKING DETAILS.exeCode function: 1_2_00A4A3B0 NtGetContextThread,
          Source: C:\Users\user\Desktop\DHL AWB TRACKING DETAILS.exeCode function: 1_2_00A49B00 NtSetValueKey,
          Source: C:\Users\user\Desktop\DHL AWB TRACKING DETAILS.exeCode function: 1_2_00A495F0 NtQueryInformationFile,
          Source: C:\Users\user\Desktop\DHL AWB TRACKING DETAILS.exeCode function: 1_2_00A49520 NtWaitForSingleObject,
          Source: C:\Users\user\Desktop\DHL AWB TRACKING DETAILS.exeCode function: 1_2_00A4AD30 NtSetContextThread,
          Source: C:\Users\user\Desktop\DHL AWB TRACKING DETAILS.exeCode function: 1_2_00A49560 NtWriteFile,
          Source: C:\Users\user\Desktop\DHL AWB TRACKING DETAILS.exeCode function: 1_2_00A496D0 NtCreateKey,
          Source: C:\Users\user\Desktop\DHL AWB TRACKING DETAILS.exeCode function: 1_2_00A49610 NtEnumerateValueKey,
          Source: C:\Users\user\Desktop\DHL AWB TRACKING DETAILS.exeCode function: 1_2_00A49670 NtQueryInformationProcess,
          Source: C:\Users\user\Desktop\DHL AWB TRACKING DETAILS.exeCode function: 1_2_00A49650 NtQueryValueKey,
          Source: C:\Users\user\Desktop\DHL AWB TRACKING DETAILS.exeCode function: 1_2_00A49FE0 NtCreateMutant,
          Source: C:\Users\user\Desktop\DHL AWB TRACKING DETAILS.exeCode function: 1_2_00A49730 NtQueryVirtualMemory,
          Source: C:\Users\user\Desktop\DHL AWB TRACKING DETAILS.exeCode function: 1_2_00A4A710 NtOpenProcessToken,
          Source: C:\Users\user\Desktop\DHL AWB TRACKING DETAILS.exeCode function: 1_2_00A49760 NtOpenProcess,
          Source: C:\Users\user\Desktop\DHL AWB TRACKING DETAILS.exeCode function: 1_2_00A49770 NtSetInformationFile,
          Source: C:\Users\user\Desktop\DHL AWB TRACKING DETAILS.exeCode function: 1_2_00A4A770 NtOpenThread,
          Source: C:\Windows\SysWOW64\wlanext.exeCode function: 11_2_03369710 NtQueryInformationToken,LdrInitializeThunk,
          Source: C:\Windows\SysWOW64\wlanext.exeCode function: 11_2_03369780 NtMapViewOfSection,LdrInitializeThunk,
          Source: C:\Windows\SysWOW64\wlanext.exeCode function: 11_2_03369FE0 NtCreateMutant,LdrInitializeThunk,
          Source: C:\Windows\SysWOW64\wlanext.exeCode function: 11_2_03369660 NtAllocateVirtualMemory,LdrInitializeThunk,
          Source: C:\Windows\SysWOW64\wlanext.exeCode function: 11_2_03369650 NtQueryValueKey,LdrInitializeThunk,
          Source: C:\Windows\SysWOW64\wlanext.exeCode function: 11_2_03369A50 NtCreateFile,LdrInitializeThunk,
          Source: C:\Windows\SysWOW64\wlanext.exeCode function: 11_2_033696E0 NtFreeVirtualMemory,LdrInitializeThunk,
          Source: C:\Windows\SysWOW64\wlanext.exeCode function: 11_2_033696D0 NtCreateKey,LdrInitializeThunk,
          Source: C:\Windows\SysWOW64\wlanext.exeCode function: 11_2_03369910 NtAdjustPrivilegesToken,LdrInitializeThunk,
          Source: C:\Windows\SysWOW64\wlanext.exeCode function: 11_2_03369540 NtReadFile,LdrInitializeThunk,
          Source: C:\Windows\SysWOW64\wlanext.exeCode function: 11_2_033699A0 NtCreateSection,LdrInitializeThunk,
          Source: C:\Windows\SysWOW64\wlanext.exeCode function: 11_2_033695D0 NtClose,LdrInitializeThunk,
          Source: C:\Windows\SysWOW64\wlanext.exeCode function: 11_2_03369860 NtQuerySystemInformation,LdrInitializeThunk,
          Source: C:\Windows\SysWOW64\wlanext.exeCode function: 11_2_03369840 NtDelayExecution,LdrInitializeThunk,
          Source: C:\Windows\SysWOW64\wlanext.exeCode function: 11_2_03369730 NtQueryVirtualMemory,
          Source: C:\Windows\SysWOW64\wlanext.exeCode function: 11_2_0336A710 NtOpenProcessToken,
          Source: C:\Windows\SysWOW64\wlanext.exeCode function: 11_2_03369B00 NtSetValueKey,
          Source: C:\Windows\SysWOW64\wlanext.exeCode function: 11_2_03369770 NtSetInformationFile,
          Source: C:\Windows\SysWOW64\wlanext.exeCode function: 11_2_0336A770 NtOpenThread,
          Source: C:\Windows\SysWOW64\wlanext.exeCode function: 11_2_03369760 NtOpenProcess,
          Source: C:\Windows\SysWOW64\wlanext.exeCode function: 11_2_0336A3B0 NtGetContextThread,
          Source: C:\Windows\SysWOW64\wlanext.exeCode function: 11_2_033697A0 NtUnmapViewOfSection,
          Source: C:\Windows\SysWOW64\wlanext.exeCode function: 11_2_03369A20 NtResumeThread,
          Source: C:\Windows\SysWOW64\wlanext.exeCode function: 11_2_03369610 NtEnumerateValueKey,
          Source: C:\Windows\SysWOW64\wlanext.exeCode function: 11_2_03369A10 NtQuerySection,
          Source: C:\Windows\SysWOW64\wlanext.exeCode function: 11_2_03369A00 NtProtectVirtualMemory,
          Source: C:\Windows\SysWOW64\wlanext.exeCode function: 11_2_03369670 NtQueryInformationProcess,
          Source: C:\Windows\SysWOW64\wlanext.exeCode function: 11_2_03369A80 NtOpenDirectoryObject,
          Source: C:\Windows\SysWOW64\wlanext.exeCode function: 11_2_0336AD30 NtSetContextThread,
          Source: C:\Windows\SysWOW64\wlanext.exeCode function: 11_2_03369520 NtWaitForSingleObject,
          Source: C:\Windows\SysWOW64\wlanext.exeCode function: 11_2_03369560 NtWriteFile,
          Source: C:\Windows\SysWOW64\wlanext.exeCode function: 11_2_03369950 NtQueueApcThread,
          Source: C:\Windows\SysWOW64\wlanext.exeCode function: 11_2_033695F0 NtQueryInformationFile,
          Source: C:\Windows\SysWOW64\wlanext.exeCode function: 11_2_033699D0 NtCreateProcessEx,
          Source: C:\Windows\SysWOW64\wlanext.exeCode function: 11_2_03369820 NtEnumerateKey,
          Source: C:\Windows\SysWOW64\wlanext.exeCode function: 11_2_0336B040 NtSuspendThread,
          Source: C:\Windows\SysWOW64\wlanext.exeCode function: 11_2_033698A0 NtWriteVirtualMemory,
          Source: C:\Windows\SysWOW64\wlanext.exeCode function: 11_2_033698F0 NtReadVirtualMemory,
          Source: C:\Windows\SysWOW64\wlanext.exeCode function: 11_2_00A1A360 NtCreateFile,
          Source: C:\Windows\SysWOW64\wlanext.exeCode function: 11_2_00A1A490 NtClose,
          Source: C:\Windows\SysWOW64\wlanext.exeCode function: 11_2_00A1A410 NtReadFile,
          Source: C:\Windows\SysWOW64\wlanext.exeCode function: 11_2_00A1A540 NtAllocateVirtualMemory,
          Source: C:\Windows\SysWOW64\wlanext.exeCode function: 11_2_00A1A35B NtCreateFile,
          Source: C:\Windows\SysWOW64\wlanext.exeCode function: 11_2_00A1A40A NtReadFile,
          Source: C:\Windows\SysWOW64\wlanext.exeCode function: 11_2_00A1A53A NtAllocateVirtualMemory,
          Source: DHL AWB TRACKING DETAILS.exe, 00000000.00000003.360581864.0000000003066000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenamentdll.dllj% vs DHL AWB TRACKING DETAILS.exe
          Source: DHL AWB TRACKING DETAILS.exe, 00000000.00000003.359981345.00000000031FF000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenamentdll.dllj% vs DHL AWB TRACKING DETAILS.exe
          Source: DHL AWB TRACKING DETAILS.exe, 00000001.00000002.436567042.0000000000C8F000.00000040.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenamentdll.dllj% vs DHL AWB TRACKING DETAILS.exe
          Source: DHL AWB TRACKING DETAILS.exe, 00000001.00000002.437751802.0000000002A02000.00000040.10000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenamewlanext.exej% vs DHL AWB TRACKING DETAILS.exe
          Source: DHL AWB TRACKING DETAILS.exe, 00000001.00000002.436271704.0000000000AFF000.00000040.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenamentdll.dllj% vs DHL AWB TRACKING DETAILS.exe
          Source: DHL AWB TRACKING DETAILS.exeVirustotal: Detection: 43%
          Source: DHL AWB TRACKING DETAILS.exeReversingLabs: Detection: 48%
          Source: C:\Users\user\Desktop\DHL AWB TRACKING DETAILS.exeFile read: C:\Users\user\Desktop\DHL AWB TRACKING DETAILS.exeJump to behavior
          Source: DHL AWB TRACKING DETAILS.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
          Source: C:\Users\user\Desktop\DHL AWB TRACKING DETAILS.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
          Source: unknownProcess created: C:\Users\user\Desktop\DHL AWB TRACKING DETAILS.exe "C:\Users\user\Desktop\DHL AWB TRACKING DETAILS.exe"
          Source: C:\Users\user\Desktop\DHL AWB TRACKING DETAILS.exeProcess created: C:\Users\user\Desktop\DHL AWB TRACKING DETAILS.exe "C:\Users\user\Desktop\DHL AWB TRACKING DETAILS.exe"
          Source: C:\Windows\explorer.exeProcess created: C:\Windows\SysWOW64\wlanext.exe C:\Windows\SysWOW64\wlanext.exe
          Source: C:\Windows\SysWOW64\wlanext.exeProcess created: C:\Windows\SysWOW64\cmd.exe /c del "C:\Users\user\Desktop\DHL AWB TRACKING DETAILS.exe"
          Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
          Source: C:\Windows\SysWOW64\wlanext.exeProcess created: C:\Windows\explorer.exe "C:\Windows\explorer.exe" /LOADSAVEDWINDOWS
          Source: unknownProcess created: C:\Windows\explorer.exe "C:\Windows\explorer.exe" /LOADSAVEDWINDOWS
          Source: C:\Users\user\Desktop\DHL AWB TRACKING DETAILS.exeProcess created: C:\Users\user\Desktop\DHL AWB TRACKING DETAILS.exe "C:\Users\user\Desktop\DHL AWB TRACKING DETAILS.exe"
          Source: C:\Windows\SysWOW64\wlanext.exeProcess created: C:\Windows\SysWOW64\cmd.exe /c del "C:\Users\user\Desktop\DHL AWB TRACKING DETAILS.exe"
          Source: C:\Users\user\Desktop\DHL AWB TRACKING DETAILS.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{20D04FE0-3AEA-1069-A2D8-08002B30309D}\InProcServer32
          Source: C:\Windows\explorer.exeFile created: C:\Users\user\AppData\Local\Microsoft\Windows\Caches\{3DA71D5A-20CC-432F-A115-DFE92379E91F}.3.ver0x0000000000000015.dbJump to behavior
          Source: C:\Users\user\Desktop\DHL AWB TRACKING DETAILS.exeFile created: C:\Users\user\AppData\Local\Temp\nsr8F19.tmpJump to behavior
          Source: classification engineClassification label: mal100.troj.evad.winEXE@9/4@1/0
          Source: C:\Users\user\Desktop\DHL AWB TRACKING DETAILS.exeCode function: 0_2_00402012 CoCreateInstance,MultiByteToWideChar,
          Source: C:\Users\user\Desktop\DHL AWB TRACKING DETAILS.exeFile read: C:\Users\desktop.iniJump to behavior
          Source: C:\Users\user\Desktop\DHL AWB TRACKING DETAILS.exeCode function: 0_2_00404275 GetDlgItem,SetWindowTextA,SHBrowseForFolderA,CoTaskMemFree,lstrcmpiA,lstrcatA,SetDlgItemTextA,GetDiskFreeSpaceA,MulDiv,SetDlgItemTextA,
          Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7024:120:WilError_01
          Source: C:\Windows\SysWOW64\wlanext.exeProcess created: C:\Windows\explorer.exe
          Source: unknownProcess created: C:\Windows\explorer.exe
          Source: Window RecorderWindow detected: More than 3 window changes detected
          Source: Binary string: wntdll.pdbUGP source: DHL AWB TRACKING DETAILS.exe, 00000000.00000003.360349373.0000000002F50000.00000004.00000800.00020000.00000000.sdmp, DHL AWB TRACKING DETAILS.exe, 00000000.00000003.360736432.00000000030E0000.00000004.00000800.00020000.00000000.sdmp, DHL AWB TRACKING DETAILS.exe, 00000001.00000002.436271704.0000000000AFF000.00000040.00000800.00020000.00000000.sdmp, DHL AWB TRACKING DETAILS.exe, 00000001.00000002.436124386.00000000009E0000.00000040.00000800.00020000.00000000.sdmp, wlanext.exe, 0000000B.00000002.636937480.0000000003300000.00000040.00000800.00020000.00000000.sdmp, wlanext.exe, 0000000B.00000002.637445370.000000000341F000.00000040.00000800.00020000.00000000.sdmp
          Source: Binary string: wntdll.pdb source: DHL AWB TRACKING DETAILS.exe, DHL AWB TRACKING DETAILS.exe, 00000001.00000002.436271704.0000000000AFF000.00000040.00000800.00020000.00000000.sdmp, DHL AWB TRACKING DETAILS.exe, 00000001.00000002.436124386.00000000009E0000.00000040.00000800.00020000.00000000.sdmp, wlanext.exe, wlanext.exe, 0000000B.00000002.636937480.0000000003300000.00000040.00000800.00020000.00000000.sdmp, wlanext.exe, 0000000B.00000002.637445370.000000000341F000.00000040.00000800.00020000.00000000.sdmp
          Source: Binary string: wlanext.pdb source: DHL AWB TRACKING DETAILS.exe, 00000001.00000002.437702980.00000000029F0000.00000040.10000000.00040000.00000000.sdmp
          Source: Binary string: wlanext.pdbGCTL source: DHL AWB TRACKING DETAILS.exe, 00000001.00000002.437702980.00000000029F0000.00000040.10000000.00040000.00000000.sdmp
          Source: C:\Users\user\Desktop\DHL AWB TRACKING DETAILS.exeCode function: 1_2_00417853 push edx; retf
          Source: C:\Users\user\Desktop\DHL AWB TRACKING DETAILS.exeCode function: 1_2_00416978 push cs; retf
          Source: C:\Users\user\Desktop\DHL AWB TRACKING DETAILS.exeCode function: 1_2_0041D4B5 push eax; ret
          Source: C:\Users\user\Desktop\DHL AWB TRACKING DETAILS.exeCode function: 1_2_0041D56C push eax; ret
          Source: C:\Users\user\Desktop\DHL AWB TRACKING DETAILS.exeCode function: 1_2_0041D502 push eax; ret
          Source: C:\Users\user\Desktop\DHL AWB TRACKING DETAILS.exeCode function: 1_2_0041D50B push eax; ret
          Source: C:\Users\user\Desktop\DHL AWB TRACKING DETAILS.exeCode function: 1_2_00A5D0D1 push ecx; ret
          Source: C:\Windows\SysWOW64\wlanext.exeCode function: 11_2_0337D0D1 push ecx; ret
          Source: C:\Windows\SysWOW64\wlanext.exeCode function: 11_2_00A17853 push edx; retf
          Source: C:\Windows\SysWOW64\wlanext.exeCode function: 11_2_00A16978 push cs; retf
          Source: C:\Windows\SysWOW64\wlanext.exeCode function: 11_2_00A1D4B5 push eax; ret
          Source: C:\Windows\SysWOW64\wlanext.exeCode function: 11_2_00A1D502 push eax; ret
          Source: C:\Windows\SysWOW64\wlanext.exeCode function: 11_2_00A1D50B push eax; ret
          Source: C:\Windows\SysWOW64\wlanext.exeCode function: 11_2_00A1D56C push eax; ret
          Source: C:\Users\user\Desktop\DHL AWB TRACKING DETAILS.exeCode function: 0_2_00405DA3 GetModuleHandleA,LoadLibraryA,GetProcAddress,
          Source: C:\Users\user\Desktop\DHL AWB TRACKING DETAILS.exeFile created: C:\Users\user\AppData\Local\Temp\nsr8F1B.tmp\vzhghptrhu.dllJump to dropped file

          Hooking and other Techniques for Hiding and Protection

          barindex
          Source: C:\Windows\SysWOW64\wlanext.exeProcess created: /c del "C:\Users\user\Desktop\DHL AWB TRACKING DETAILS.exe"
          Source: C:\Windows\SysWOW64\wlanext.exeProcess created: /c del "C:\Users\user\Desktop\DHL AWB TRACKING DETAILS.exe"
          Source: C:\Windows\explorer.exeRegistry key monitored for changes: HKEY_CURRENT_USER_Classes
          Source: C:\Users\user\Desktop\DHL AWB TRACKING DETAILS.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\wlanext.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX
          Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX

          Malware Analysis System Evasion

          barindex
          Source: C:\Users\user\Desktop\DHL AWB TRACKING DETAILS.exeEvasive API call chain: GetPEB, DecisionNodes, ExitProcess
          Source: C:\Users\user\Desktop\DHL AWB TRACKING DETAILS.exeRDTSC instruction interceptor: First address: 0000000000409904 second address: 000000000040990A instructions: 0x00000000 rdtsc 0x00000002 xor ecx, ecx 0x00000004 add ecx, eax 0x00000006 rdtsc
          Source: C:\Users\user\Desktop\DHL AWB TRACKING DETAILS.exeRDTSC instruction interceptor: First address: 0000000000409B7E second address: 0000000000409B84 instructions: 0x00000000 rdtsc 0x00000002 xor ecx, ecx 0x00000004 add ecx, eax 0x00000006 rdtsc
          Source: C:\Windows\SysWOW64\wlanext.exeRDTSC instruction interceptor: First address: 0000000000A09904 second address: 0000000000A0990A instructions: 0x00000000 rdtsc 0x00000002 xor ecx, ecx 0x00000004 add ecx, eax 0x00000006 rdtsc
          Source: C:\Windows\SysWOW64\wlanext.exeRDTSC instruction interceptor: First address: 0000000000A09B7E second address: 0000000000A09B84 instructions: 0x00000000 rdtsc 0x00000002 xor ecx, ecx 0x00000004 add ecx, eax 0x00000006 rdtsc
          Source: C:\Users\user\Desktop\DHL AWB TRACKING DETAILS.exeCode function: 1_2_00409AB0 rdtsc
          Source: C:\Windows\explorer.exeFile opened / queried: SCSI#Disk&Ven_VMware&Prod_Virtual_disk#5&1ec51bf7&0&000000#{53f56307-b6bf-11d0-94f2-00a0c91efb8b}
          Source: C:\Users\user\Desktop\DHL AWB TRACKING DETAILS.exeAPI coverage: 8.7 %
          Source: C:\Windows\SysWOW64\wlanext.exeAPI coverage: 9.7 %
          Source: C:\Users\user\Desktop\DHL AWB TRACKING DETAILS.exeProcess information queried: ProcessInformation
          Source: C:\Users\user\Desktop\DHL AWB TRACKING DETAILS.exeCode function: 0_2_00405D7C FindFirstFileA,FindClose,
          Source: C:\Users\user\Desktop\DHL AWB TRACKING DETAILS.exeCode function: 0_2_004053AA CloseHandle,DeleteFileA,lstrcatA,lstrcatA,lstrlenA,FindFirstFileA,DeleteFileA,FindNextFileA,FindClose,RemoveDirectoryA,
          Source: C:\Users\user\Desktop\DHL AWB TRACKING DETAILS.exeCode function: 0_2_00402630 FindFirstFileA,
          Source: C:\Users\user\Desktop\DHL AWB TRACKING DETAILS.exeAPI call chain: ExitProcess graph end node
          Source: C:\Users\user\Desktop\DHL AWB TRACKING DETAILS.exeAPI call chain: ExitProcess graph end node
          Source: explorer.exe, 00000014.00000000.563664219.0000000004560000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: SCSI\Disk&Ven_VMware&Prod_Virtual_disk\5&1ec51bf7&0&000000
          Source: explorer.exe, 00000004.00000000.391671803.00000000083EB000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: VMware SATA CD00dRom0
          Source: explorer.exe, 00000014.00000000.537602479.00000000052A0000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: SCSI\CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00\5&280b647&0&000000Z
          Source: explorer.exe, 00000014.00000003.550839224.0000000004EF8000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: AGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000025700000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#000000001F400000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000026700000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000000100000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&280b647&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_Msft&Prod_Virtual_DVD-ROM#2&1f4adffe&0&000001#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}efb8b}'
          Source: explorer.exe, 00000014.00000003.577172496.000000000F39D000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000025700000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#000000001F400000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000026700000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000000100000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&280b647&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_Msft&Prod_Virtual_DVD-ROM#2&1f4adffe&0&000001#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}
          Source: explorer.exe, 00000014.00000003.553294057.0000000004F3A000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000025700000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#000000001F400000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000026700000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000000100000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&280b647&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_Msft&Prod_Virtual_DVD-ROM#2&1f4adffe&0&000001#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}x
          Source: explorer.exe, 00000014.00000003.551706537.0000000004F83000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000025700000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#000000001F400000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000026700000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000000100000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&280b647&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_Msft&Prod_Virtual_DVD-ROM#2&1f4adffe&0&000001#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}j
          Source: explorer.exe, 00000004.00000000.401670731.00000000062E0000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: \\?\scsi#cdrom&ven_necvmwar&prod_vmware_sata_cd00#5&280b647&0&000000#{53f56308-b6bf-11d0-94f2-00a0c91efb8b}
          Source: explorer.exe, 00000014.00000003.553476304.0000000004F93000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: #cdrom&ven_necvmwar&prod_vmware_sata_cd00#5&
          Source: explorer.exe, 00000014.00000003.577172496.000000000F39D000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000025700000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#000000001F400000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000026700000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000000100000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&280b647&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_Msft&Prod_Virtual_DVD-ROM#2&1f4adffe&0&000001#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}B
          Source: explorer.exe, 00000014.00000000.566169156.0000000004ED2000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: SCSI\CDROM&VEN_NECVMWAR&PROD_VMWARE_SATA_CD00\5&280B647&0&000000
          Source: explorer.exe, 00000014.00000003.577172496.000000000F39D000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: FE2Xc6-98f2-11e9-90ce-806e6f6e6963}#0000000000100000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&280b647&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_Msft&Prod_Virtual_DVD-ROM#2&1f4adffe&0&000001#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}B
          Source: explorer.exe, 00000004.00000000.401670731.00000000062E0000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: \\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000025700000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#000000001F400000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000026700000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000000100000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&280b647&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_Msft&Prod_Virtual_DVD-ROM#2&1f4adffe&0&000001#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}oft.Mic
          Source: explorer.exe, 00000014.00000003.577172496.000000000F39D000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: War&Prod_VMware_SATA_CD00#5&Ms
          Source: explorer.exe, 00000014.00000003.578401411.0000000004F3A000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000025700000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#000000001F400000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000026700000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000000100000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&280b647&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_Msft&Prod_Virtual_DVD-ROM#2&1f4adffe&0&000001#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}}
          Source: explorer.exe, 00000014.00000003.578401411.0000000004F3A000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000025700000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#000000001F400000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000026700000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000000100000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&280b647&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_Msft&Prod_Virtual_DVD-ROM#2&1f4adffe&0&000001#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}~
          Source: explorer.exe, 00000014.00000000.566169156.0000000004ED2000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: _VMware_SATA
          Source: explorer.exe, 00000014.00000003.538230272.0000000004D99000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: SCSI\Disk&Ven_VMware&Prod_Virtual_disk\5&1ec51bf7&0&000000@v
          Source: explorer.exe, 00000014.00000003.577172496.000000000F39D000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000025700000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#000000001F400000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000026700000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000000100000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&280b647&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_Msft&Prod_Virtual_DVD-ROM#2&1f4adffe&0&000001#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}bq
          Source: explorer.exe, 00000004.00000000.400458604.000000000461E000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: AGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000025700000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#000000001F400000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000026700000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000000100000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&280b647&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_Msft&Prod_Virtual_DVD-ROM#2&1f4adffe&0&000001#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}
          Source: explorer.exe, 00000014.00000003.595705023.0000000005005000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: _VMware_SATA_CD00#5&280b647&
          Source: explorer.exe, 00000014.00000003.553476304.0000000004F93000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \\?\scsi#cdrom&ven_necvmwar&prod_vmware_sata_cd00#5&280b647&0&000000#{53f56308-b6bf-11d0-94f2-00a0c91efb8b}
          Source: explorer.exe, 00000014.00000000.537602479.00000000052A0000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: SCSI\CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00\5&280b647&0&000000~
          Source: explorer.exe, 00000014.00000003.578870629.0000000004F84000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: VMware SATA CD00
          Source: explorer.exe, 00000014.00000003.571574240.000000000F4E1000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000025700000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#000000001F400000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000026700000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000000100000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&280b647&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_Msft&Prod_Virtual_DVD-ROM#2&1f4adffe&0&000001#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}
          Source: explorer.exe, 00000004.00000000.372241858.00000000082E2000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: 00#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000000100000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&+
          Source: explorer.exe, 00000014.00000003.577172496.000000000F39D000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA}
          Source: explorer.exe, 00000014.00000003.552559008.0000000004FCF000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000025700000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#000000001F400000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000026700000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000000100000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&280b647&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_Msft&Prod_Virtual_DVD-ROM#2&1f4adffe&0&000001#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}M
          Source: explorer.exe, 00000014.00000003.553476304.0000000004F93000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \\?\scsi#cdrom&ven_necvmwar&prod_vmware_sata_cd00#5&280b647&0&000000#{53f56308-b6bf-11d0-94f2-00a0c91efb8b}A
          Source: explorer.exe, 00000014.00000003.544779988.0000000004F18000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: 9Tm\Device\HarddiskVolume2\??\Volume{ef47ea26-ec76-4a6e-8680-9e53b539546d}\??\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&280b647&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\Device\CdRom0\??\Volume{e6e9dfd8-98f2-11e9-90ce-806e6f6e6963}\DosDevices\D:
          Source: explorer.exe, 00000014.00000003.558001527.000000000F43B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000025700000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#000000001F400000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000026700000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000000100000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&280b647&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_Msft&Prod_Virtual_DVD-ROM#2&1f4adffe&0&000001#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}tentDeliveryManager_cw5n1h2txyewy
          Source: explorer.exe, 00000014.00000003.558001527.000000000F43B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000025700000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#000000001F400000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000026700000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000000100000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&280b647&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_Msft&Prod_Virtual_DVD-ROM#2&1f4adffe&0&000001#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}Local<
          Source: explorer.exe, 00000014.00000003.551487673.0000000004F94000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000025700000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#000000001F400000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000026700000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000000100000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&280b647&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_Msft&Prod_Virtual_DVD-ROM#2&1f4adffe&0&000001#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}
          Source: explorer.exe, 00000014.00000003.551200673.0000000004F3F000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000025700000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#000000001F400000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000026700000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000000100000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&280b647&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_Msft&Prod_Virtual_DVD-ROM#2&1f4adffe&0&000001#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}"
          Source: explorer.exe, 00000004.00000000.372241858.00000000082E2000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: \\?\scsi#cdrom&ven_necvmwar&prod_vmware_sata_cd00#5&280b647&0&000000#{53f56308-b6bf-11d0-94f2-00a0c91efb8b}>
          Source: explorer.exe, 00000014.00000003.571183562.000000000507F000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000025700000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#000000001F400000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000026700000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000000100000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&280b647&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_Msft&Prod_Virtual_DVD-ROM#2&1f4adffe&0&000001#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}BKX~
          Source: explorer.exe, 00000014.00000003.551200673.0000000004F3F000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: VMware SATA CD00s
          Source: explorer.exe, 00000014.00000003.553294057.0000000004F3A000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: #{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&280b647&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_Msft&Prod_Virtual_DVD-ROM#2&1f4adffe&0&000001#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}"
          Source: explorer.exe, 00000014.00000003.595515909.000000000F4E1000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: War&Prod_VMware_SATA_CD00#5&280b647&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_Msft&Prod_Virtual_DVD-ROM#2&1f4adffe&0&000001#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}
          Source: explorer.exe, 00000014.00000003.558334108.000000000508E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000025700000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#000000001F400000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000026700000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000000100000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&280b647&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c9
          Source: explorer.exe, 00000014.00000000.607327645.0000000004E34000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: SCSI\CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00\5&280b647&0&000000
          Source: explorer.exe, 00000004.00000000.391707126.0000000008430000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: SCSI\CDROM&VEN_NECVMWAR&PROD_VMWARE_SATA_CD00\5&280B647&0&000000-;
          Source: explorer.exe, 00000004.00000000.398584347.000000000095C000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&280b647&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}G
          Source: C:\Users\user\Desktop\DHL AWB TRACKING DETAILS.exeCode function: 0_2_00405DA3 GetModuleHandleA,LoadLibraryA,GetProcAddress,
          Source: C:\Users\user\Desktop\DHL AWB TRACKING DETAILS.exeCode function: 1_2_00409AB0 rdtsc
          Source: C:\Users\user\Desktop\DHL AWB TRACKING DETAILS.exeProcess token adjusted: Debug
          Source: C:\Windows\SysWOW64\wlanext.exeProcess token adjusted: Debug
          Source: C:\Users\user\Desktop\DHL AWB TRACKING DETAILS.exeCode function: 0_2_02380402 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL AWB TRACKING DETAILS.exeCode function: 0_2_02380616 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL AWB TRACKING DETAILS.exeCode function: 0_2_02380706 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL AWB TRACKING DETAILS.exeCode function: 0_2_02380744 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL AWB TRACKING DETAILS.exeCode function: 0_2_023806C7 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL AWB TRACKING DETAILS.exeCode function: 1_2_00A320A0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL AWB TRACKING DETAILS.exeCode function: 1_2_00A320A0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL AWB TRACKING DETAILS.exeCode function: 1_2_00A320A0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL AWB TRACKING DETAILS.exeCode function: 1_2_00A320A0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL AWB TRACKING DETAILS.exeCode function: 1_2_00A320A0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL AWB TRACKING DETAILS.exeCode function: 1_2_00A320A0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL AWB TRACKING DETAILS.exeCode function: 1_2_00A490AF mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL AWB TRACKING DETAILS.exeCode function: 1_2_00A3F0BF mov ecx, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL AWB TRACKING DETAILS.exeCode function: 1_2_00A3F0BF mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL AWB TRACKING DETAILS.exeCode function: 1_2_00A3F0BF mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL AWB TRACKING DETAILS.exeCode function: 1_2_00A09080 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL AWB TRACKING DETAILS.exeCode function: 1_2_00A83884 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL AWB TRACKING DETAILS.exeCode function: 1_2_00A83884 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL AWB TRACKING DETAILS.exeCode function: 1_2_00A058EC mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL AWB TRACKING DETAILS.exeCode function: 1_2_00A9B8D0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL AWB TRACKING DETAILS.exeCode function: 1_2_00A9B8D0 mov ecx, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL AWB TRACKING DETAILS.exeCode function: 1_2_00A9B8D0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL AWB TRACKING DETAILS.exeCode function: 1_2_00A9B8D0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL AWB TRACKING DETAILS.exeCode function: 1_2_00A9B8D0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL AWB TRACKING DETAILS.exeCode function: 1_2_00A9B8D0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL AWB TRACKING DETAILS.exeCode function: 1_2_00A1B02A mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL AWB TRACKING DETAILS.exeCode function: 1_2_00A1B02A mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL AWB TRACKING DETAILS.exeCode function: 1_2_00A1B02A mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL AWB TRACKING DETAILS.exeCode function: 1_2_00A1B02A mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL AWB TRACKING DETAILS.exeCode function: 1_2_00A3002D mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL AWB TRACKING DETAILS.exeCode function: 1_2_00A3002D mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL AWB TRACKING DETAILS.exeCode function: 1_2_00A3002D mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL AWB TRACKING DETAILS.exeCode function: 1_2_00A3002D mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL AWB TRACKING DETAILS.exeCode function: 1_2_00A3002D mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL AWB TRACKING DETAILS.exeCode function: 1_2_00AD4015 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL AWB TRACKING DETAILS.exeCode function: 1_2_00AD4015 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL AWB TRACKING DETAILS.exeCode function: 1_2_00A87016 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL AWB TRACKING DETAILS.exeCode function: 1_2_00A87016 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL AWB TRACKING DETAILS.exeCode function: 1_2_00A87016 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL AWB TRACKING DETAILS.exeCode function: 1_2_00AD1074 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL AWB TRACKING DETAILS.exeCode function: 1_2_00AC2073 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL AWB TRACKING DETAILS.exeCode function: 1_2_00A20050 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL AWB TRACKING DETAILS.exeCode function: 1_2_00A20050 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL AWB TRACKING DETAILS.exeCode function: 1_2_00A361A0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL AWB TRACKING DETAILS.exeCode function: 1_2_00A361A0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL AWB TRACKING DETAILS.exeCode function: 1_2_00A869A6 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL AWB TRACKING DETAILS.exeCode function: 1_2_00A851BE mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL AWB TRACKING DETAILS.exeCode function: 1_2_00A851BE mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL AWB TRACKING DETAILS.exeCode function: 1_2_00A851BE mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL AWB TRACKING DETAILS.exeCode function: 1_2_00A851BE mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL AWB TRACKING DETAILS.exeCode function: 1_2_00A2C182 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL AWB TRACKING DETAILS.exeCode function: 1_2_00A3A185 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL AWB TRACKING DETAILS.exeCode function: 1_2_00A32990 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL AWB TRACKING DETAILS.exeCode function: 1_2_00A0B1E1 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL AWB TRACKING DETAILS.exeCode function: 1_2_00A0B1E1 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL AWB TRACKING DETAILS.exeCode function: 1_2_00A0B1E1 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL AWB TRACKING DETAILS.exeCode function: 1_2_00A941E8 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL AWB TRACKING DETAILS.exeCode function: 1_2_00A24120 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL AWB TRACKING DETAILS.exeCode function: 1_2_00A24120 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL AWB TRACKING DETAILS.exeCode function: 1_2_00A24120 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL AWB TRACKING DETAILS.exeCode function: 1_2_00A24120 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL AWB TRACKING DETAILS.exeCode function: 1_2_00A24120 mov ecx, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL AWB TRACKING DETAILS.exeCode function: 1_2_00A3513A mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL AWB TRACKING DETAILS.exeCode function: 1_2_00A3513A mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL AWB TRACKING DETAILS.exeCode function: 1_2_00A09100 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL AWB TRACKING DETAILS.exeCode function: 1_2_00A09100 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL AWB TRACKING DETAILS.exeCode function: 1_2_00A09100 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL AWB TRACKING DETAILS.exeCode function: 1_2_00A0C962 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL AWB TRACKING DETAILS.exeCode function: 1_2_00A0B171 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL AWB TRACKING DETAILS.exeCode function: 1_2_00A0B171 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL AWB TRACKING DETAILS.exeCode function: 1_2_00A2B944 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL AWB TRACKING DETAILS.exeCode function: 1_2_00A2B944 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL AWB TRACKING DETAILS.exeCode function: 1_2_00A052A5 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL AWB TRACKING DETAILS.exeCode function: 1_2_00A052A5 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL AWB TRACKING DETAILS.exeCode function: 1_2_00A052A5 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL AWB TRACKING DETAILS.exeCode function: 1_2_00A052A5 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL AWB TRACKING DETAILS.exeCode function: 1_2_00A052A5 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL AWB TRACKING DETAILS.exeCode function: 1_2_00A1AAB0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL AWB TRACKING DETAILS.exeCode function: 1_2_00A1AAB0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL AWB TRACKING DETAILS.exeCode function: 1_2_00A3FAB0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL AWB TRACKING DETAILS.exeCode function: 1_2_00A3D294 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL AWB TRACKING DETAILS.exeCode function: 1_2_00A3D294 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL AWB TRACKING DETAILS.exeCode function: 1_2_00A32AE4 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL AWB TRACKING DETAILS.exeCode function: 1_2_00A32ACB mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL AWB TRACKING DETAILS.exeCode function: 1_2_00A44A2C mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL AWB TRACKING DETAILS.exeCode function: 1_2_00A44A2C mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL AWB TRACKING DETAILS.exeCode function: 1_2_00A18A0A mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL AWB TRACKING DETAILS.exeCode function: 1_2_00A05210 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL AWB TRACKING DETAILS.exeCode function: 1_2_00A05210 mov ecx, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL AWB TRACKING DETAILS.exeCode function: 1_2_00A05210 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL AWB TRACKING DETAILS.exeCode function: 1_2_00A05210 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL AWB TRACKING DETAILS.exeCode function: 1_2_00A0AA16 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL AWB TRACKING DETAILS.exeCode function: 1_2_00A0AA16 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL AWB TRACKING DETAILS.exeCode function: 1_2_00ACAA16 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL AWB TRACKING DETAILS.exeCode function: 1_2_00ACAA16 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL AWB TRACKING DETAILS.exeCode function: 1_2_00A23A1C mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL AWB TRACKING DETAILS.exeCode function: 1_2_00ABB260 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL AWB TRACKING DETAILS.exeCode function: 1_2_00ABB260 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL AWB TRACKING DETAILS.exeCode function: 1_2_00AD8A62 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL AWB TRACKING DETAILS.exeCode function: 1_2_00A4927A mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL AWB TRACKING DETAILS.exeCode function: 1_2_00A09240 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL AWB TRACKING DETAILS.exeCode function: 1_2_00A09240 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL AWB TRACKING DETAILS.exeCode function: 1_2_00A09240 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL AWB TRACKING DETAILS.exeCode function: 1_2_00A09240 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL AWB TRACKING DETAILS.exeCode function: 1_2_00ACEA55 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL AWB TRACKING DETAILS.exeCode function: 1_2_00A94257 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL AWB TRACKING DETAILS.exeCode function: 1_2_00AD5BA5 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL AWB TRACKING DETAILS.exeCode function: 1_2_00A34BAD mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL AWB TRACKING DETAILS.exeCode function: 1_2_00A34BAD mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL AWB TRACKING DETAILS.exeCode function: 1_2_00A34BAD mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL AWB TRACKING DETAILS.exeCode function: 1_2_00AC138A mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL AWB TRACKING DETAILS.exeCode function: 1_2_00ABD380 mov ecx, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL AWB TRACKING DETAILS.exeCode function: 1_2_00A11B8F mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL AWB TRACKING DETAILS.exeCode function: 1_2_00A11B8F mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL AWB TRACKING DETAILS.exeCode function: 1_2_00A3B390 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL AWB TRACKING DETAILS.exeCode function: 1_2_00A32397 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL AWB TRACKING DETAILS.exeCode function: 1_2_00A303E2 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL AWB TRACKING DETAILS.exeCode function: 1_2_00A303E2 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL AWB TRACKING DETAILS.exeCode function: 1_2_00A303E2 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL AWB TRACKING DETAILS.exeCode function: 1_2_00A303E2 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL AWB TRACKING DETAILS.exeCode function: 1_2_00A303E2 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL AWB TRACKING DETAILS.exeCode function: 1_2_00A303E2 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL AWB TRACKING DETAILS.exeCode function: 1_2_00A2DBE9 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL AWB TRACKING DETAILS.exeCode function: 1_2_00A853CA mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL AWB TRACKING DETAILS.exeCode function: 1_2_00A853CA mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL AWB TRACKING DETAILS.exeCode function: 1_2_00AC131B mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL AWB TRACKING DETAILS.exeCode function: 1_2_00A0DB60 mov ecx, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL AWB TRACKING DETAILS.exeCode function: 1_2_00A33B7A mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL AWB TRACKING DETAILS.exeCode function: 1_2_00A33B7A mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL AWB TRACKING DETAILS.exeCode function: 1_2_00A0DB40 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL AWB TRACKING DETAILS.exeCode function: 1_2_00AD8B58 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL AWB TRACKING DETAILS.exeCode function: 1_2_00A0F358 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL AWB TRACKING DETAILS.exeCode function: 1_2_00A1849B mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL AWB TRACKING DETAILS.exeCode function: 1_2_00AC14FB mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL AWB TRACKING DETAILS.exeCode function: 1_2_00A86CF0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL AWB TRACKING DETAILS.exeCode function: 1_2_00A86CF0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL AWB TRACKING DETAILS.exeCode function: 1_2_00A86CF0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL AWB TRACKING DETAILS.exeCode function: 1_2_00AD8CD6 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL AWB TRACKING DETAILS.exeCode function: 1_2_00A3BC2C mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL AWB TRACKING DETAILS.exeCode function: 1_2_00AD740D mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL AWB TRACKING DETAILS.exeCode function: 1_2_00AD740D mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL AWB TRACKING DETAILS.exeCode function: 1_2_00AD740D mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL AWB TRACKING DETAILS.exeCode function: 1_2_00A86C0A mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL AWB TRACKING DETAILS.exeCode function: 1_2_00A86C0A mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL AWB TRACKING DETAILS.exeCode function: 1_2_00A86C0A mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL AWB TRACKING DETAILS.exeCode function: 1_2_00A86C0A mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL AWB TRACKING DETAILS.exeCode function: 1_2_00AC1C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL AWB TRACKING DETAILS.exeCode function: 1_2_00AC1C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL AWB TRACKING DETAILS.exeCode function: 1_2_00AC1C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL AWB TRACKING DETAILS.exeCode function: 1_2_00AC1C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL AWB TRACKING DETAILS.exeCode function: 1_2_00AC1C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL AWB TRACKING DETAILS.exeCode function: 1_2_00AC1C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL AWB TRACKING DETAILS.exeCode function: 1_2_00AC1C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL AWB TRACKING DETAILS.exeCode function: 1_2_00AC1C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL AWB TRACKING DETAILS.exeCode function: 1_2_00AC1C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL AWB TRACKING DETAILS.exeCode function: 1_2_00AC1C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL AWB TRACKING DETAILS.exeCode function: 1_2_00AC1C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL AWB TRACKING DETAILS.exeCode function: 1_2_00AC1C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL AWB TRACKING DETAILS.exeCode function: 1_2_00AC1C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL AWB TRACKING DETAILS.exeCode function: 1_2_00AC1C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL AWB TRACKING DETAILS.exeCode function: 1_2_00A2746D mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL AWB TRACKING DETAILS.exeCode function: 1_2_00A3A44B mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL AWB TRACKING DETAILS.exeCode function: 1_2_00A9C450 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL AWB TRACKING DETAILS.exeCode function: 1_2_00A9C450 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL AWB TRACKING DETAILS.exeCode function: 1_2_00AD05AC mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL AWB TRACKING DETAILS.exeCode function: 1_2_00AD05AC mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL AWB TRACKING DETAILS.exeCode function: 1_2_00A335A1 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL AWB TRACKING DETAILS.exeCode function: 1_2_00A31DB5 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL AWB TRACKING DETAILS.exeCode function: 1_2_00A31DB5 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL AWB TRACKING DETAILS.exeCode function: 1_2_00A31DB5 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL AWB TRACKING DETAILS.exeCode function: 1_2_00A32581 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL AWB TRACKING DETAILS.exeCode function: 1_2_00A32581 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL AWB TRACKING DETAILS.exeCode function: 1_2_00A32581 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL AWB TRACKING DETAILS.exeCode function: 1_2_00A32581 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL AWB TRACKING DETAILS.exeCode function: 1_2_00A02D8A mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL AWB TRACKING DETAILS.exeCode function: 1_2_00A02D8A mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL AWB TRACKING DETAILS.exeCode function: 1_2_00A02D8A mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL AWB TRACKING DETAILS.exeCode function: 1_2_00A02D8A mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL AWB TRACKING DETAILS.exeCode function: 1_2_00A02D8A mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL AWB TRACKING DETAILS.exeCode function: 1_2_00A3FD9B mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL AWB TRACKING DETAILS.exeCode function: 1_2_00A3FD9B mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL AWB TRACKING DETAILS.exeCode function: 1_2_00A1D5E0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL AWB TRACKING DETAILS.exeCode function: 1_2_00A1D5E0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL AWB TRACKING DETAILS.exeCode function: 1_2_00ACFDE2 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL AWB TRACKING DETAILS.exeCode function: 1_2_00ACFDE2 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL AWB TRACKING DETAILS.exeCode function: 1_2_00ACFDE2 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL AWB TRACKING DETAILS.exeCode function: 1_2_00ACFDE2 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL AWB TRACKING DETAILS.exeCode function: 1_2_00AB8DF1 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL AWB TRACKING DETAILS.exeCode function: 1_2_00A86DC9 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL AWB TRACKING DETAILS.exeCode function: 1_2_00A86DC9 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL AWB TRACKING DETAILS.exeCode function: 1_2_00A86DC9 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL AWB TRACKING DETAILS.exeCode function: 1_2_00A86DC9 mov ecx, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL AWB TRACKING DETAILS.exeCode function: 1_2_00A86DC9 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL AWB TRACKING DETAILS.exeCode function: 1_2_00A86DC9 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL AWB TRACKING DETAILS.exeCode function: 1_2_00A0AD30 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL AWB TRACKING DETAILS.exeCode function: 1_2_00A13D34 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL AWB TRACKING DETAILS.exeCode function: 1_2_00A13D34 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL AWB TRACKING DETAILS.exeCode function: 1_2_00A13D34 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL AWB TRACKING DETAILS.exeCode function: 1_2_00A13D34 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL AWB TRACKING DETAILS.exeCode function: 1_2_00A13D34 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL AWB TRACKING DETAILS.exeCode function: 1_2_00A13D34 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL AWB TRACKING DETAILS.exeCode function: 1_2_00A13D34 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL AWB TRACKING DETAILS.exeCode function: 1_2_00A13D34 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL AWB TRACKING DETAILS.exeCode function: 1_2_00A13D34 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL AWB TRACKING DETAILS.exeCode function: 1_2_00A13D34 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL AWB TRACKING DETAILS.exeCode function: 1_2_00A13D34 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL AWB TRACKING DETAILS.exeCode function: 1_2_00A13D34 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL AWB TRACKING DETAILS.exeCode function: 1_2_00A13D34 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL AWB TRACKING DETAILS.exeCode function: 1_2_00ACE539 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL AWB TRACKING DETAILS.exeCode function: 1_2_00A34D3B mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL AWB TRACKING DETAILS.exeCode function: 1_2_00A34D3B mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL AWB TRACKING DETAILS.exeCode function: 1_2_00A34D3B mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL AWB TRACKING DETAILS.exeCode function: 1_2_00AD8D34 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL AWB TRACKING DETAILS.exeCode function: 1_2_00A8A537 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL AWB TRACKING DETAILS.exeCode function: 1_2_00A2C577 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL AWB TRACKING DETAILS.exeCode function: 1_2_00A2C577 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL AWB TRACKING DETAILS.exeCode function: 1_2_00A43D43 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL AWB TRACKING DETAILS.exeCode function: 1_2_00A83540 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL AWB TRACKING DETAILS.exeCode function: 1_2_00A27D50 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL AWB TRACKING DETAILS.exeCode function: 1_2_00AD0EA5 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL AWB TRACKING DETAILS.exeCode function: 1_2_00AD0EA5 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL AWB TRACKING DETAILS.exeCode function: 1_2_00AD0EA5 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL AWB TRACKING DETAILS.exeCode function: 1_2_00A846A7 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL AWB TRACKING DETAILS.exeCode function: 1_2_00A9FE87 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL AWB TRACKING DETAILS.exeCode function: 1_2_00A316E0 mov ecx, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL AWB TRACKING DETAILS.exeCode function: 1_2_00A176E2 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL AWB TRACKING DETAILS.exeCode function: 1_2_00A48EC7 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL AWB TRACKING DETAILS.exeCode function: 1_2_00ABFEC0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL AWB TRACKING DETAILS.exeCode function: 1_2_00A336CC mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL AWB TRACKING DETAILS.exeCode function: 1_2_00AD8ED6 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL AWB TRACKING DETAILS.exeCode function: 1_2_00A0E620 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL AWB TRACKING DETAILS.exeCode function: 1_2_00ABFE3F mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL AWB TRACKING DETAILS.exeCode function: 1_2_00A0C600 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL AWB TRACKING DETAILS.exeCode function: 1_2_00A0C600 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL AWB TRACKING DETAILS.exeCode function: 1_2_00A0C600 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL AWB TRACKING DETAILS.exeCode function: 1_2_00A38E00 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL AWB TRACKING DETAILS.exeCode function: 1_2_00AC1608 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL AWB TRACKING DETAILS.exeCode function: 1_2_00A3A61C mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL AWB TRACKING DETAILS.exeCode function: 1_2_00A3A61C mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL AWB TRACKING DETAILS.exeCode function: 1_2_00A1766D mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL AWB TRACKING DETAILS.exeCode function: 1_2_00A2AE73 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL AWB TRACKING DETAILS.exeCode function: 1_2_00A2AE73 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL AWB TRACKING DETAILS.exeCode function: 1_2_00A2AE73 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL AWB TRACKING DETAILS.exeCode function: 1_2_00A2AE73 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL AWB TRACKING DETAILS.exeCode function: 1_2_00A2AE73 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL AWB TRACKING DETAILS.exeCode function: 1_2_00A17E41 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL AWB TRACKING DETAILS.exeCode function: 1_2_00A17E41 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL AWB TRACKING DETAILS.exeCode function: 1_2_00A17E41 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL AWB TRACKING DETAILS.exeCode function: 1_2_00A17E41 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL AWB TRACKING DETAILS.exeCode function: 1_2_00A17E41 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL AWB TRACKING DETAILS.exeCode function: 1_2_00A17E41 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL AWB TRACKING DETAILS.exeCode function: 1_2_00ACAE44 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL AWB TRACKING DETAILS.exeCode function: 1_2_00ACAE44 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL AWB TRACKING DETAILS.exeCode function: 1_2_00A18794 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL AWB TRACKING DETAILS.exeCode function: 1_2_00A87794 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL AWB TRACKING DETAILS.exeCode function: 1_2_00A87794 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL AWB TRACKING DETAILS.exeCode function: 1_2_00A87794 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL AWB TRACKING DETAILS.exeCode function: 1_2_00A437F5 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL AWB TRACKING DETAILS.exeCode function: 1_2_00A04F2E mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL AWB TRACKING DETAILS.exeCode function: 1_2_00A04F2E mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL AWB TRACKING DETAILS.exeCode function: 1_2_00A3E730 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL AWB TRACKING DETAILS.exeCode function: 1_2_00AD070D mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL AWB TRACKING DETAILS.exeCode function: 1_2_00AD070D mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL AWB TRACKING DETAILS.exeCode function: 1_2_00A3A70E mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL AWB TRACKING DETAILS.exeCode function: 1_2_00A3A70E mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL AWB TRACKING DETAILS.exeCode function: 1_2_00A2F716 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL AWB TRACKING DETAILS.exeCode function: 1_2_00A9FF10 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL AWB TRACKING DETAILS.exeCode function: 1_2_00A9FF10 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL AWB TRACKING DETAILS.exeCode function: 1_2_00A1FF60 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL AWB TRACKING DETAILS.exeCode function: 1_2_00AD8F6A mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL AWB TRACKING DETAILS.exeCode function: 1_2_00A1EF40 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\wlanext.exeCode function: 11_2_0335E730 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\wlanext.exeCode function: 11_2_03324F2E mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\wlanext.exeCode function: 11_2_03324F2E mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\wlanext.exeCode function: 11_2_0334F716 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\wlanext.exeCode function: 11_2_033E131B mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\wlanext.exeCode function: 11_2_033BFF10 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\wlanext.exeCode function: 11_2_033BFF10 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\wlanext.exeCode function: 11_2_033F070D mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\wlanext.exeCode function: 11_2_033F070D mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\wlanext.exeCode function: 11_2_0335A70E mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\wlanext.exeCode function: 11_2_0335A70E mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\wlanext.exeCode function: 11_2_03353B7A mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\wlanext.exeCode function: 11_2_03353B7A mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\wlanext.exeCode function: 11_2_0332DB60 mov ecx, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\wlanext.exeCode function: 11_2_0333FF60 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\wlanext.exeCode function: 11_2_033F8F6A mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\wlanext.exeCode function: 11_2_033F8B58 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\wlanext.exeCode function: 11_2_0332F358 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\wlanext.exeCode function: 11_2_0332DB40 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\wlanext.exeCode function: 11_2_0333EF40 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\wlanext.exeCode function: 11_2_03354BAD mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\wlanext.exeCode function: 11_2_03354BAD mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\wlanext.exeCode function: 11_2_03354BAD mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\wlanext.exeCode function: 11_2_033F5BA5 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\wlanext.exeCode function: 11_2_03352397 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\wlanext.exeCode function: 11_2_0335B390 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\wlanext.exeCode function: 11_2_03338794 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\wlanext.exeCode function: 11_2_033A7794 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\wlanext.exeCode function: 11_2_033A7794 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\wlanext.exeCode function: 11_2_033A7794 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\wlanext.exeCode function: 11_2_033E138A mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\wlanext.exeCode function: 11_2_03331B8F mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\wlanext.exeCode function: 11_2_03331B8F mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\wlanext.exeCode function: 11_2_033DD380 mov ecx, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\wlanext.exeCode function: 11_2_033637F5 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\wlanext.exeCode function: 11_2_033503E2 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\wlanext.exeCode function: 11_2_033503E2 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\wlanext.exeCode function: 11_2_033503E2 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\wlanext.exeCode function: 11_2_033503E2 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\wlanext.exeCode function: 11_2_033503E2 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\wlanext.exeCode function: 11_2_033503E2 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\wlanext.exeCode function: 11_2_0334DBE9 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\wlanext.exeCode function: 11_2_033A53CA mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\wlanext.exeCode function: 11_2_033A53CA mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\wlanext.exeCode function: 11_2_033DFE3F mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\wlanext.exeCode function: 11_2_0332E620 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\wlanext.exeCode function: 11_2_03364A2C mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\wlanext.exeCode function: 11_2_03364A2C mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\wlanext.exeCode function: 11_2_03325210 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\wlanext.exeCode function: 11_2_03325210 mov ecx, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\wlanext.exeCode function: 11_2_03325210 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\wlanext.exeCode function: 11_2_03325210 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\wlanext.exeCode function: 11_2_0332AA16 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\wlanext.exeCode function: 11_2_0332AA16 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\wlanext.exeCode function: 11_2_03343A1C mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\wlanext.exeCode function: 11_2_0335A61C mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\wlanext.exeCode function: 11_2_0335A61C mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\wlanext.exeCode function: 11_2_0332C600 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\wlanext.exeCode function: 11_2_0332C600 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\wlanext.exeCode function: 11_2_0332C600 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\wlanext.exeCode function: 11_2_03358E00 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\wlanext.exeCode function: 11_2_033E1608 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\wlanext.exeCode function: 11_2_03338A0A mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\wlanext.exeCode function: 11_2_0334AE73 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\wlanext.exeCode function: 11_2_0334AE73 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\wlanext.exeCode function: 11_2_0334AE73 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\wlanext.exeCode function: 11_2_0334AE73 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\wlanext.exeCode function: 11_2_0334AE73 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\wlanext.exeCode function: 11_2_0336927A mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\wlanext.exeCode function: 11_2_033DB260 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\wlanext.exeCode function: 11_2_033DB260 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\wlanext.exeCode function: 11_2_033F8A62 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\wlanext.exeCode function: 11_2_0333766D mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\wlanext.exeCode function: 11_2_033EEA55 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\wlanext.exeCode function: 11_2_033B4257 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\wlanext.exeCode function: 11_2_03329240 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\wlanext.exeCode function: 11_2_03329240 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\wlanext.exeCode function: 11_2_03329240 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\wlanext.exeCode function: 11_2_03329240 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\wlanext.exeCode function: 11_2_03337E41 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\wlanext.exeCode function: 11_2_03337E41 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\wlanext.exeCode function: 11_2_03337E41 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\wlanext.exeCode function: 11_2_03337E41 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\wlanext.exeCode function: 11_2_03337E41 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\wlanext.exeCode function: 11_2_03337E41 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\wlanext.exeCode function: 11_2_033EAE44 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\wlanext.exeCode function: 11_2_033EAE44 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\wlanext.exeCode function: 11_2_0333AAB0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\wlanext.exeCode function: 11_2_0333AAB0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\wlanext.exeCode function: 11_2_0335FAB0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\wlanext.exeCode function: 11_2_033252A5 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\wlanext.exeCode function: 11_2_033252A5 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\wlanext.exeCode function: 11_2_033252A5 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\wlanext.exeCode function: 11_2_033252A5 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\wlanext.exeCode function: 11_2_033252A5 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\wlanext.exeCode function: 11_2_033F0EA5 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\wlanext.exeCode function: 11_2_033F0EA5 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\wlanext.exeCode function: 11_2_033F0EA5 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\wlanext.exeCode function: 11_2_033A46A7 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\wlanext.exeCode function: 11_2_0335D294 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\wlanext.exeCode function: 11_2_0335D294 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\wlanext.exeCode function: 11_2_033BFE87 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\wlanext.exeCode function: 11_2_033376E2 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\wlanext.exeCode function: 11_2_03352AE4 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\wlanext.exeCode function: 11_2_033516E0 mov ecx, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\wlanext.exeCode function: 11_2_033F8ED6 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\wlanext.exeCode function: 11_2_03368EC7 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\wlanext.exeCode function: 11_2_033536CC mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\wlanext.exeCode function: 11_2_033DFEC0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\wlanext.exeCode function: 11_2_03352ACB mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\wlanext.exeCode function: 11_2_0332AD30 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\wlanext.exeCode function: 11_2_03333D34 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\wlanext.exeCode function: 11_2_03333D34 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\wlanext.exeCode function: 11_2_03333D34 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\wlanext.exeCode function: 11_2_03333D34 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\wlanext.exeCode function: 11_2_03333D34 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\wlanext.exeCode function: 11_2_03333D34 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\wlanext.exeCode function: 11_2_03333D34 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\wlanext.exeCode function: 11_2_03333D34 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\wlanext.exeCode function: 11_2_03333D34 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\wlanext.exeCode function: 11_2_03333D34 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\wlanext.exeCode function: 11_2_03333D34 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\wlanext.exeCode function: 11_2_03333D34 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\wlanext.exeCode function: 11_2_03333D34 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\wlanext.exeCode function: 11_2_033EE539 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\wlanext.exeCode function: 11_2_033F8D34 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\wlanext.exeCode function: 11_2_033AA537 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\wlanext.exeCode function: 11_2_03354D3B mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\wlanext.exeCode function: 11_2_03354D3B mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\wlanext.exeCode function: 11_2_03354D3B mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\wlanext.exeCode function: 11_2_0335513A mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\wlanext.exeCode function: 11_2_0335513A mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\wlanext.exeCode function: 11_2_03344120 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\wlanext.exeCode function: 11_2_03344120 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\wlanext.exeCode function: 11_2_03344120 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\wlanext.exeCode function: 11_2_03344120 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\wlanext.exeCode function: 11_2_03344120 mov ecx, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\wlanext.exeCode function: 11_2_03329100 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\wlanext.exeCode function: 11_2_03329100 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\wlanext.exeCode function: 11_2_03329100 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\wlanext.exeCode function: 11_2_0332B171 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\wlanext.exeCode function: 11_2_0332B171 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\wlanext.exeCode function: 11_2_0334C577 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\wlanext.exeCode function: 11_2_0334C577 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\wlanext.exeCode function: 11_2_0332C962 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\wlanext.exeCode function: 11_2_03347D50 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\wlanext.exeCode function: 11_2_0334B944 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\wlanext.exeCode function: 11_2_0334B944 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\wlanext.exeCode function: 11_2_03363D43 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\wlanext.exeCode function: 11_2_033A3540 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\wlanext.exeCode function: 11_2_03351DB5 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\wlanext.exeCode function: 11_2_03351DB5 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\wlanext.exeCode function: 11_2_03351DB5 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\wlanext.exeCode function: 11_2_033A51BE mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\wlanext.exeCode function: 11_2_033A51BE mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\wlanext.exeCode function: 11_2_033A51BE mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\wlanext.exeCode function: 11_2_033A51BE mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\wlanext.exeCode function: 11_2_033F05AC mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\wlanext.exeCode function: 11_2_033F05AC mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\wlanext.exeCode function: 11_2_033535A1 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\wlanext.exeCode function: 11_2_033561A0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\wlanext.exeCode function: 11_2_033561A0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\wlanext.exeCode function: 11_2_033A69A6 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\wlanext.exeCode function: 11_2_03352990 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\wlanext.exeCode function: 11_2_0335FD9B mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\wlanext.exeCode function: 11_2_0335FD9B mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\wlanext.exeCode function: 11_2_0335A185 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\wlanext.exeCode function: 11_2_03352581 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\wlanext.exeCode function: 11_2_03352581 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\wlanext.exeCode function: 11_2_03352581 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\wlanext.exeCode function: 11_2_03352581 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\wlanext.exeCode function: 11_2_0334C182 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\wlanext.exeCode function: 11_2_03322D8A mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\wlanext.exeCode function: 11_2_03322D8A mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\wlanext.exeCode function: 11_2_03322D8A mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\wlanext.exeCode function: 11_2_03322D8A mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\wlanext.exeCode function: 11_2_03322D8A mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\wlanext.exeCode function: 11_2_033D8DF1 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\wlanext.exeCode function: 11_2_0332B1E1 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\wlanext.exeCode function: 11_2_0332B1E1 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\wlanext.exeCode function: 11_2_0332B1E1 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\wlanext.exeCode function: 11_2_033B41E8 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\wlanext.exeCode function: 11_2_0333D5E0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\wlanext.exeCode function: 11_2_0333D5E0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\wlanext.exeCode function: 11_2_033EFDE2 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\wlanext.exeCode function: 11_2_033EFDE2 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\wlanext.exeCode function: 11_2_033EFDE2 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\wlanext.exeCode function: 11_2_033EFDE2 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\wlanext.exeCode function: 11_2_033A6DC9 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\wlanext.exeCode function: 11_2_033A6DC9 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\wlanext.exeCode function: 11_2_033A6DC9 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\wlanext.exeCode function: 11_2_033A6DC9 mov ecx, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\wlanext.exeCode function: 11_2_033A6DC9 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\wlanext.exeCode function: 11_2_033A6DC9 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\wlanext.exeCode function: 11_2_0335002D mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\wlanext.exeCode function: 11_2_0335002D mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\wlanext.exeCode function: 11_2_0335002D mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\wlanext.exeCode function: 11_2_0335002D mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\wlanext.exeCode function: 11_2_0335002D mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\wlanext.exeCode function: 11_2_0333B02A mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\wlanext.exeCode function: 11_2_0333B02A mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\wlanext.exeCode function: 11_2_0333B02A mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\wlanext.exeCode function: 11_2_0333B02A mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\wlanext.exeCode function: 11_2_0335BC2C mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\wlanext.exeCode function: 11_2_033F4015 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\wlanext.exeCode function: 11_2_033F4015 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\wlanext.exeCode function: 11_2_033A7016 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\wlanext.exeCode function: 11_2_033A7016 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\wlanext.exeCode function: 11_2_033A7016 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\wlanext.exeCode function: 11_2_033A6C0A mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\wlanext.exeCode function: 11_2_033A6C0A mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\wlanext.exeCode function: 11_2_033A6C0A mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\wlanext.exeCode function: 11_2_033A6C0A mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\wlanext.exeCode function: 11_2_033F740D mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\wlanext.exeCode function: 11_2_033F740D mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\wlanext.exeCode function: 11_2_033F740D mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\wlanext.exeCode function: 11_2_033E1C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\wlanext.exeCode function: 11_2_033E1C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\wlanext.exeCode function: 11_2_033E1C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\wlanext.exeCode function: 11_2_033E1C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\wlanext.exeCode function: 11_2_033E1C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\wlanext.exeCode function: 11_2_033E1C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\wlanext.exeCode function: 11_2_033E1C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\wlanext.exeCode function: 11_2_033E1C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\wlanext.exeCode function: 11_2_033E1C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\wlanext.exeCode function: 11_2_033E1C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\wlanext.exeCode function: 11_2_033E1C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\wlanext.exeCode function: 11_2_033E1C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\wlanext.exeCode function: 11_2_033E1C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL AWB TRACKING DETAILS.exeProcess queried: DebugPort
          Source: C:\Windows\SysWOW64\wlanext.exeProcess queried: DebugPort
          Source: C:\Users\user\Desktop\DHL AWB TRACKING DETAILS.exeCode function: 1_2_0040ACF0 LdrLoadDll,

          HIPS / PFW / Operating System Protection Evasion

          barindex
          Source: C:\Users\user\Desktop\DHL AWB TRACKING DETAILS.exeSection unmapped: C:\Windows\SysWOW64\wlanext.exe base address: FA0000
          Source: C:\Users\user\Desktop\DHL AWB TRACKING DETAILS.exeSection loaded: unknown target: C:\Windows\explorer.exe protection: execute and read and write
          Source: C:\Users\user\Desktop\DHL AWB TRACKING DETAILS.exeSection loaded: unknown target: C:\Windows\explorer.exe protection: execute and read and write
          Source: C:\Users\user\Desktop\DHL AWB TRACKING DETAILS.exeSection loaded: unknown target: C:\Windows\SysWOW64\wlanext.exe protection: execute and read and write
          Source: C:\Users\user\Desktop\DHL AWB TRACKING DETAILS.exeSection loaded: unknown target: C:\Windows\SysWOW64\wlanext.exe protection: execute and read and write
          Source: C:\Windows\SysWOW64\wlanext.exeSection loaded: unknown target: C:\Windows\explorer.exe protection: read write
          Source: C:\Windows\SysWOW64\wlanext.exeSection loaded: unknown target: C:\Windows\explorer.exe protection: execute and read and write
          Source: C:\Windows\SysWOW64\wlanext.exeSection loaded: unknown target: unknown protection: read write
          Source: C:\Windows\SysWOW64\wlanext.exeSection loaded: unknown target: C:\Windows\explorer.exe protection: read write
          Source: C:\Windows\SysWOW64\wlanext.exeSection loaded: unknown target: C:\Windows\explorer.exe protection: execute and read and write
          Source: C:\Users\user\Desktop\DHL AWB TRACKING DETAILS.exeMemory written: C:\Users\user\Desktop\DHL AWB TRACKING DETAILS.exe base: 400000 value starts with: 4D5A
          Source: C:\Users\user\Desktop\DHL AWB TRACKING DETAILS.exeThread APC queued: target process: C:\Windows\explorer.exe
          Source: C:\Users\user\Desktop\DHL AWB TRACKING DETAILS.exeThread register set: target process: 3440
          Source: C:\Users\user\Desktop\DHL AWB TRACKING DETAILS.exeThread register set: target process: 3440
          Source: C:\Windows\SysWOW64\wlanext.exeThread register set: target process: 3440
          Source: C:\Windows\SysWOW64\wlanext.exeThread register set: target process: 4636
          Source: C:\Users\user\Desktop\DHL AWB TRACKING DETAILS.exeProcess created: C:\Users\user\Desktop\DHL AWB TRACKING DETAILS.exe "C:\Users\user\Desktop\DHL AWB TRACKING DETAILS.exe"
          Source: C:\Windows\SysWOW64\wlanext.exeProcess created: C:\Windows\SysWOW64\cmd.exe /c del "C:\Users\user\Desktop\DHL AWB TRACKING DETAILS.exe"
          Source: explorer.exe, 00000004.00000000.400933847.0000000004F80000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000000.372434615.00000000083EB000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000000.379442047.0000000000EE0000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 00000004.00000000.406682717.00000000083EB000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000000.366258257.0000000000EE0000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 00000004.00000000.391671803.00000000083EB000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000000.398942795.0000000000EE0000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: Shell_TrayWnd
          Source: explorer.exe, 00000004.00000000.398387239.00000000008B8000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000004.00000000.365948444.00000000008B8000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000004.00000000.379442047.0000000000EE0000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 00000004.00000000.378992987.00000000008B8000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000004.00000000.366258257.0000000000EE0000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 00000004.00000000.398942795.0000000000EE0000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 00000014.00000000.569698157.0000000005680000.00000004.00000800.00020000.00000000.sdmp, explorer.exe, 00000014.00000000.601472852.0000000000A8D000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000014.00000000.609013928.0000000005680000.00000004.00000800.00020000.00000000.sdmp, explorer.exe, 00000014.00000000.562272116.0000000000A8D000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000014.00000000.538860385.0000000005680000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Progman
          Source: explorer.exe, 00000004.00000000.379442047.0000000000EE0000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 00000004.00000000.366258257.0000000000EE0000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 00000004.00000000.398942795.0000000000EE0000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: &Program Manager
          Source: explorer.exe, 00000004.00000000.379442047.0000000000EE0000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 00000004.00000000.366258257.0000000000EE0000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 00000004.00000000.398942795.0000000000EE0000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: Progmanlock
          Source: explorer.exe, 00000014.00000000.603455559.0000000004560000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000014.00000000.563664219.0000000004560000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Progmanng
          Source: C:\Users\user\Desktop\DHL AWB TRACKING DETAILS.exeCode function: 0_2_00405AA7 GetVersion,GetSystemDirectoryA,GetWindowsDirectoryA,SHGetSpecialFolderLocation,SHGetPathFromIDListA,CoTaskMemFree,lstrcatA,lstrlenA,

          Stealing of Sensitive Information

          barindex
          Source: Yara matchFile source: 1.2.DHL AWB TRACKING DETAILS.exe.400000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 0.2.DHL AWB TRACKING DETAILS.exe.2f10000.3.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 0.2.DHL AWB TRACKING DETAILS.exe.2f10000.3.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 1.0.DHL AWB TRACKING DETAILS.exe.400000.5.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 1.0.DHL AWB TRACKING DETAILS.exe.400000.5.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 1.0.DHL AWB TRACKING DETAILS.exe.400000.6.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 1.2.DHL AWB TRACKING DETAILS.exe.400000.0.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 1.0.DHL AWB TRACKING DETAILS.exe.400000.6.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 1.0.DHL AWB TRACKING DETAILS.exe.400000.4.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 0000000B.00000002.636107094.0000000000D80000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000001.00000000.359424691.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000000B.00000002.635990166.0000000000D50000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000001.00000000.360270037.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000001.00000002.435840268.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000004.00000000.409581872.000000000F123000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000000.00000002.362630153.0000000002F10000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000001.00000002.436793150.0000000000D10000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000004.00000000.394582472.000000000F123000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000000B.00000002.634911519.0000000000A00000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000001.00000002.436005605.00000000009A0000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY

          Remote Access Functionality

          barindex
          Source: Yara matchFile source: 1.2.DHL AWB TRACKING DETAILS.exe.400000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 0.2.DHL AWB TRACKING DETAILS.exe.2f10000.3.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 0.2.DHL AWB TRACKING DETAILS.exe.2f10000.3.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 1.0.DHL AWB TRACKING DETAILS.exe.400000.5.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 1.0.DHL AWB TRACKING DETAILS.exe.400000.5.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 1.0.DHL AWB TRACKING DETAILS.exe.400000.6.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 1.2.DHL AWB TRACKING DETAILS.exe.400000.0.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 1.0.DHL AWB TRACKING DETAILS.exe.400000.6.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 1.0.DHL AWB TRACKING DETAILS.exe.400000.4.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 0000000B.00000002.636107094.0000000000D80000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000001.00000000.359424691.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000000B.00000002.635990166.0000000000D50000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000001.00000000.360270037.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000001.00000002.435840268.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000004.00000000.409581872.000000000F123000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000000.00000002.362630153.0000000002F10000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000001.00000002.436793150.0000000000D10000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000004.00000000.394582472.000000000F123000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000000B.00000002.634911519.0000000000A00000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000001.00000002.436005605.00000000009A0000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
          Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
          Valid Accounts11
          Native API
          Path Interception512
          Process Injection
          1
          Masquerading
          OS Credential Dumping1
          Query Registry
          Remote Services1
          Archive Collected Data
          Exfiltration Over Other Network Medium1
          Encrypted Channel
          Eavesdrop on Insecure Network CommunicationRemotely Track Device Without Authorization1
          System Shutdown/Reboot
          Default Accounts1
          Shared Modules
          Boot or Logon Initialization ScriptsBoot or Logon Initialization Scripts2
          Virtualization/Sandbox Evasion
          LSASS Memory231
          Security Software Discovery
          Remote Desktop Protocol1
          Clipboard Data
          Exfiltration Over Bluetooth1
          Non-Application Layer Protocol
          Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
          Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)512
          Process Injection
          Security Account Manager2
          Virtualization/Sandbox Evasion
          SMB/Windows Admin SharesData from Network Shared DriveAutomated Exfiltration11
          Application Layer Protocol
          Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
          Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)1
          Deobfuscate/Decode Files or Information
          NTDS2
          Process Discovery
          Distributed Component Object ModelInput CaptureScheduled TransferProtocol ImpersonationSIM Card SwapCarrier Billing Fraud
          Cloud AccountsCronNetwork Logon ScriptNetwork Logon Script3
          Obfuscated Files or Information
          LSA Secrets2
          File and Directory Discovery
          SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
          Replication Through Removable MediaLaunchdRc.commonRc.common1
          Software Packing
          Cached Domain Credentials13
          System Information Discovery
          VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
          External Remote ServicesScheduled TaskStartup ItemsStartup Items1
          File Deletion
          DCSyncNetwork SniffingWindows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
          Hide Legend

          Legend:

          • Process
          • Signature
          • Created File
          • DNS/IP Info
          • Is Dropped
          • Is Windows Process
          • Number of created Registry Values
          • Number of created Files
          • Visual Basic
          • Delphi
          • Java
          • .Net C# or VB.NET
          • C, C++ or other language
          • Is malicious
          • Internet
          behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 562043 Sample: DHL AWB TRACKING DETAILS.exe Startdate: 28/01/2022 Architecture: WINDOWS Score: 100 33 www.chinaanalysisgroup.com 2->33 43 Multi AV Scanner detection for domain / URL 2->43 45 Found malware configuration 2->45 47 Malicious sample detected (through community Yara rule) 2->47 49 8 other signatures 2->49 11 DHL AWB TRACKING DETAILS.exe 19 2->11         started        15 explorer.exe 10 2->15         started        signatures3 process4 file5 31 C:\Users\user\AppData\...\vzhghptrhu.dll, PE32 11->31 dropped 59 Injects a PE file into a foreign processes 11->59 17 DHL AWB TRACKING DETAILS.exe 11->17         started        signatures6 process7 signatures8 35 Modifies the context of a thread in another process (thread injection) 17->35 37 Maps a DLL or memory area into another process 17->37 39 Sample uses process hollowing technique 17->39 41 Queues an APC in another process (thread injection) 17->41 20 explorer.exe 17->20 injected process9 process10 22 wlanext.exe 20->22         started        signatures11 51 Self deletion via cmd delete 22->51 53 Modifies the context of a thread in another process (thread injection) 22->53 55 Maps a DLL or memory area into another process 22->55 57 Tries to detect virtualization through RDTSC time measurements 22->57 25 cmd.exe 1 22->25         started        27 explorer.exe 2 153 22->27         started        process12 process13 29 conhost.exe 25->29         started       

          This section contains all screenshots as thumbnails, including those not shown in the slideshow.


          windows-stand
          SourceDetectionScannerLabelLink
          DHL AWB TRACKING DETAILS.exe43%VirustotalBrowse
          DHL AWB TRACKING DETAILS.exe9%MetadefenderBrowse
          DHL AWB TRACKING DETAILS.exe49%ReversingLabsWin32.Trojan.FormBook
          DHL AWB TRACKING DETAILS.exe100%Joe Sandbox ML
          SourceDetectionScannerLabelLink
          C:\Users\user\AppData\Local\Temp\nsr8F1B.tmp\vzhghptrhu.dll37%VirustotalBrowse
          C:\Users\user\AppData\Local\Temp\nsr8F1B.tmp\vzhghptrhu.dll26%ReversingLabsWin32.Trojan.InjectorX
          SourceDetectionScannerLabelLinkDownload
          0.2.DHL AWB TRACKING DETAILS.exe.2f10000.3.unpack100%AviraTR/Crypt.ZPACK.GenDownload File
          31.2.explorer.exe.f07f840.1.unpack100%AviraTR/Patched.Ren.GenDownload File
          20.0.explorer.exe.ad0f840.6.unpack100%AviraTR/Patched.Ren.GenDownload File
          1.2.DHL AWB TRACKING DETAILS.exe.400000.0.unpack100%AviraTR/Crypt.ZPACK.GenDownload File
          1.0.DHL AWB TRACKING DETAILS.exe.400000.5.unpack100%AviraTR/Crypt.ZPACK.GenDownload File
          1.0.DHL AWB TRACKING DETAILS.exe.400000.6.unpack100%AviraTR/Crypt.ZPACK.GenDownload File
          1.0.DHL AWB TRACKING DETAILS.exe.400000.4.unpack100%AviraTR/Crypt.ZPACK.GenDownload File
          11.2.wlanext.exe.382f840.4.unpack100%AviraTR/Patched.Ren.GenDownload File
          11.2.wlanext.exe.deef30.0.unpack100%AviraTR/Patched.Ren.GenDownload File
          20.0.explorer.exe.ad0f840.3.unpack100%AviraTR/Patched.Ren.GenDownload File
          20.0.explorer.exe.ad0f840.0.unpack100%AviraTR/Patched.Ren.GenDownload File
          No Antivirus matches
          SourceDetectionScannerLabelLink
          www.hdetpnipa.xyz/a34b/10%VirustotalBrowse
          www.hdetpnipa.xyz/a34b/100%Avira URL Cloudphishing
          http://crl.v0%URL Reputationsafe
          NameIPActiveMaliciousAntivirus DetectionReputation
          www.chinaanalysisgroup.com
          94.136.40.51
          truefalse
            unknown
            NameMaliciousAntivirus DetectionReputation
            www.hdetpnipa.xyz/a34b/true
            • 10%, Virustotal, Browse
            • Avira URL Cloud: phishing
            low
            NameSourceMaliciousAntivirus DetectionReputation
            http://www.autoitscript.com/autoit3/Jexplorer.exe, 00000004.00000000.379142678.000000000095C000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000004.00000000.366064196.000000000095C000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000004.00000000.398584347.000000000095C000.00000004.00000020.00020000.00000000.sdmpfalse
              high
              http://nsis.sf.net/NSIS_ErrorDHL AWB TRACKING DETAILS.exe, DHL AWB TRACKING DETAILS.exe, 00000000.00000002.361550279.0000000000409000.00000004.00000001.01000000.00000003.sdmp, DHL AWB TRACKING DETAILS.exe, 00000000.00000000.352121005.0000000000409000.00000008.00000001.01000000.00000003.sdmp, DHL AWB TRACKING DETAILS.exe, 00000001.00000000.355752258.0000000000409000.00000008.00000001.01000000.00000003.sdmpfalse
                high
                http://nsis.sf.net/NSIS_ErrorErrorDHL AWB TRACKING DETAILS.exe, 00000000.00000002.361550279.0000000000409000.00000004.00000001.01000000.00000003.sdmp, DHL AWB TRACKING DETAILS.exe, 00000000.00000000.352121005.0000000000409000.00000008.00000001.01000000.00000003.sdmp, DHL AWB TRACKING DETAILS.exe, 00000001.00000000.355752258.0000000000409000.00000008.00000001.01000000.00000003.sdmpfalse
                  high
                  http://crl.vexplorer.exe, 00000014.00000003.556038613.0000000004F3A000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000014.00000003.553294057.0000000004F3A000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000014.00000000.566295637.0000000004F3A000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000014.00000003.578401411.0000000004F3A000.00000004.00000020.00020000.00000000.sdmpfalse
                  • URL Reputation: safe
                  unknown
                  No contacted IP infos
                  Joe Sandbox Version:34.0.0 Boulder Opal
                  Analysis ID:562043
                  Start date:28.01.2022
                  Start time:10:53:30
                  Joe Sandbox Product:CloudBasic
                  Overall analysis duration:0h 11m 57s
                  Hypervisor based Inspection enabled:false
                  Report type:light
                  Sample file name:DHL AWB TRACKING DETAILS.exe
                  Cookbook file name:default.jbs
                  Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
                  Number of analysed new started processes analysed:32
                  Number of new started drivers analysed:0
                  Number of existing processes analysed:0
                  Number of existing drivers analysed:0
                  Number of injected processes analysed:1
                  Technologies:
                  • HCA enabled
                  • EGA enabled
                  • HDC enabled
                  • AMSI enabled
                  Analysis Mode:default
                  Analysis stop reason:Timeout
                  Detection:MAL
                  Classification:mal100.troj.evad.winEXE@9/4@1/0
                  EGA Information:
                  • Successful, ratio: 100%
                  HDC Information:
                  • Successful, ratio: 60.3% (good quality ratio 55.5%)
                  • Quality average: 73.6%
                  • Quality standard deviation: 30.6%
                  HCA Information:
                  • Successful, ratio: 100%
                  • Number of executed functions: 0
                  • Number of non-executed functions: 0
                  Cookbook Comments:
                  • Adjust boot time
                  • Enable AMSI
                  • Found application associated with file extension: .exe
                  • Exclude process from analysis (whitelisted): MpCmdRun.exe, SearchUI.exe, backgroundTaskHost.exe, audiodg.exe, BackgroundTransferHost.exe, WerFault.exe, ShellExperienceHost.exe, WMIADAP.exe, conhost.exe, svchost.exe, mobsync.exe, wuapihost.exe
                  • Excluded domains from analysis (whitelisted): www.bing.com, ris.api.iris.microsoft.com, client.wns.windows.com, fs.microsoft.com, store-images.s-microsoft.com, ctldl.windowsupdate.com, displaycatalog.mp.microsoft.com, img-prod-cms-rt-microsoft-com.akamaized.net, arc.msn.com
                  • Not all processes where analyzed, report is missing behavior information
                  • Report size exceeded maximum capacity and may have missing behavior information.
                  • Report size getting too big, too many NtAllocateVirtualMemory calls found.
                  • Report size getting too big, too many NtCreateFile calls found.
                  • Report size getting too big, too many NtEnumerateKey calls found.
                  • Report size getting too big, too many NtEnumerateValueKey calls found.
                  • Report size getting too big, too many NtOpenFile calls found.
                  • Report size getting too big, too many NtOpenKeyEx calls found.
                  • Report size getting too big, too many NtProtectVirtualMemory calls found.
                  • Report size getting too big, too many NtQueryAttributesFile calls found.
                  • Report size getting too big, too many NtQueryValueKey calls found.
                  TimeTypeDescription
                  10:55:45API Interceptor145x Sleep call for process: explorer.exe modified
                  No context
                  No context
                  No context
                  No context
                  No context
                  Process:C:\Users\user\Desktop\DHL AWB TRACKING DETAILS.exe
                  File Type:data
                  Category:dropped
                  Size (bytes):216745
                  Entropy (8bit):7.992452492387805
                  Encrypted:true
                  SSDEEP:6144:i7Bqt/rlMOOtvd7vIeYMD0dNT+V/w1Vc5S:Oqt/rlMOURXYMAdl+VI1wS
                  MD5:D711B91073A1EF5C228C8C73240F3385
                  SHA1:E032D0778986830C322964AEBFB8E870BC7F2ADC
                  SHA-256:A445B0B8F8A9D002C4196DB12F455ACBA30FDF9A59679227B414E478450C8620
                  SHA-512:9246B31146551D240878F47592074E9C26F022B4ADDF89FE11B1CD4F1AF30EE991C0E8D42FA5B7C610C748553B7D52626105C7BD56EF7E01BD9B33B717270156
                  Malicious:false
                  Reputation:low
                  Preview:.<...2.HW-L.A..w. ."...1p..1...B4a.U....l.ev.............W.Z...X1...m.$....^E.8..6.Wa9..1fxN$.0.a.X.|`..F...Kb..T.H^..8tf&..8...7&:br.....Y....aG...M.N;.P?`..j.R9Q.>....?...Wv...=~%D6.k.*6c..\.~pu.~......d.Y...^.*pj..4S.`.MJ....a......b...@..."S .2.t.Z....#....3.*...O.*aU..4a.U...P..;.ev...m.........W...o)X.Z....^..3+4.^..5.]..B.6(.9.#.......h!p..^..C..[^..8tf....5Iu]..6..5.>.......a..X1/F.;(v..k.yW..h..n...?...0%..=~%..k..cB._.~4u.~...p.2...v.....pj..4S.`.5n....aC.....b...@...T". .2.H......#...3[*...O..a...B4a.U....l.ev.............W...o)X.Z....^..3+4.^..5.]..B.6(.9.#.......h!p..^..C..[^..8tf....5Iu]..6..5.>.......a..X1/F.;(v..k.yW..h..n...?...Wv...=~%A~.k.,.cB.4.~pu.~...p.2...v....*pj..4S.`.5n....aC.....b...@...T". .2.H......#...3[*...O..a...B4a.U....l.ev.............W...o)X.Z....^..3+4.^..5.]..B.6(.9.#.......h!p..^..C..[^..8tf....5Iu]..6..5.>.......a..X1/F.;(v..k.yW..h..n...?...Wv...=~%A~.k.,.cB.4.~pu.~...p.2...v....*pj..4S.`
                  Process:C:\Users\user\Desktop\DHL AWB TRACKING DETAILS.exe
                  File Type:data
                  Category:dropped
                  Size (bytes):268956
                  Entropy (8bit):7.643688780936791
                  Encrypted:false
                  SSDEEP:6144:u57Bqt/rlMOOtvd7vIeYMD0dNT+V/w1Vc5i:yqt/rlMOURXYMAdl+VI1w
                  MD5:5671EF7FB29C27877E71184714A1C0F6
                  SHA1:3CE9961EC8B7F820E58AF0EA56ABEA8DB18F2E1C
                  SHA-256:D3DA5949B1EA253A18E0B684EC6EE1B355E9FA0C3B81C847119602D6AFBE459A
                  SHA-512:6C835BFAAA83F01BF276BA42ADDDC8AE3C6F0C43C059A6AA713F5D382E8FC5115A09FEDD98F29A95FA7615CF15CD58475ED1DC321F410CECC4B38EDA5D2544F3
                  Malicious:false
                  Reputation:low
                  Preview:]q......,........................U......wp......Eq..............................................................k...........................................................................................................................................................................J...............k...j.......................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                  Process:C:\Users\user\Desktop\DHL AWB TRACKING DETAILS.exe
                  File Type:PE32 executable (DLL) (console) Intel 80386, for MS Windows
                  Category:dropped
                  Size (bytes):17920
                  Entropy (8bit):5.732490075773449
                  Encrypted:false
                  SSDEEP:384:45EhhSL3A0xOfQy1zCsF0oavew2PFVP6zx22Y0We4omL/:4+hSLwWOIy1Wtoa2wNQo
                  MD5:D2B96D84DF88876D02820CA05C8254E2
                  SHA1:66C575874197ACE26E2D77C408154891C1C2A464
                  SHA-256:AC4F4FC273432D090B87CC740B2668BB105AEA12D35B9F48BE82885607172708
                  SHA-512:123B2255F5598BC7D51872CB2E0CBA58367B22AD638DF786AAEFA4CFDDDA11A0DAEC36002559CD9A2BDCD74CC78F903642595E0438FDD82681A938B9CB1B97F1
                  Malicious:true
                  Antivirus:
                  • Antivirus: Virustotal, Detection: 37%, Browse
                  • Antivirus: ReversingLabs, Detection: 26%
                  Reputation:low
                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........L..O-.EO-.EO-.E[F.D@-.EO-.EU-.E.s.DN-.E.s.DN-.E.s.EN-.E.s.DN-.ERichO-.E........PE..L......a...........!.....8...................P............................................@..........................P..H....P.......`.......................p..D....................................................P...............................text....7.......8.................. ..`.rdata..L....P.......<..............@..@.rsrc........`.......B..............@..@.reloc..D....p.......D..............@..B................................................................................................................................................................................................................................................................................................................................................................................................
                  Process:C:\Users\user\Desktop\DHL AWB TRACKING DETAILS.exe
                  File Type:data
                  Category:dropped
                  Size (bytes):5254
                  Entropy (8bit):6.083971719042361
                  Encrypted:false
                  SSDEEP:96:0MhH9rpQHfV685JLXeDCjxxB6qoX+hmKQuKFvIVyOF7SCWO2z5lOfdHM+KQ0yBdq:0Gw6YL3xxItn62z3wHM0fwvT
                  MD5:CF29025B5A29863F95888CC5EAE59F80
                  SHA1:707E98B72D945FBB32D5A9CA282FF74A117FF648
                  SHA-256:C7333C69C05C4BF3D325ADA4EFBB8F1641108B21211BA729F90DA95923867955
                  SHA-512:DB5E6E866077CB8DC597BF2E033A2DE3D46DDAFD0E82E2956E2840A757902F66A36A87830214E6D77668BF53F53FF08AAD62A7234AD84E5148B30BB7969BA45F
                  Malicious:false
                  Reputation:low
                  Preview:@?nWW..C.C......GWf...fz.7f...fz.O.._W..S.WWW..[WV.cV.g._.OTWWW.?.3V.cV.g._.OOWWW.'.;V.cV.g._.O:WWW./.#V.cV.g._.O.WWW...+..gk..o...jj.c..7.K.g.Ok. .O.C.O.S.k(.9.g.^X.Oj.S.k).S....[.KG..OWWWW.k.l"..SV.?.V.'.V./..V....V.7.V.O..].g..c^..[w.Eh.GV.?...ofl.Gj.SOWWWW...k.WWW.k.d"..[...G....L.)cW..C..f...fz._.o.W..c.w.o.W.g.{(._.(k.S.o.W..o.h._.S.L.)cW.}Q-.O.iWWO.iWW){W..V6.O.iWWO.iWW)oW.d...O.iWWO.iWW)oW..C.C.f...fz.O.._gWWW.?.S.._W.}.S-WW.S..S._.._BKO{lWW....o..o.. W.d?.d3.O..o.(HW.d?.d3.i.o...W.l?...V6.O8hWW.O%TVV.[Bf.O.V.oO.VVV.[..[W.m..GWBn..GhWWW.G.L.)kW..C.C.f...fz.O.._.WWW...S.._W.}.S-WW.S..S._.._BKO.kWW..f..WWW.o..o.. W.d..d+.c..o.(HW.d..d+.g..o.8H.d..d+.{. .o..9j.|..|+.O..o.(Hi.d..d+.l.o...W.l...}Q-.OMWWW.OJSVV.[...W.o.O...hB~V..V.{V.gV.cV.oO.UVV.[..[W.m..GWBn..GhWWW.G.L.){W..C.Cs.._gWWW.K.S.._W.}.S-WW.S..S._.._BKO.jWW....o..o.. W.dK.dO.c..o.(HW.dK.dO.i.o...W.lK..d...O.WWW.O.SVV.[BeV.
                  File type:PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
                  Entropy (8bit):7.929574935862176
                  TrID:
                  • Win32 Executable (generic) a (10002005/4) 92.16%
                  • NSIS - Nullsoft Scriptable Install System (846627/2) 7.80%
                  • Generic Win/DOS Executable (2004/3) 0.02%
                  • DOS Executable Generic (2002/1) 0.02%
                  • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                  File name:DHL AWB TRACKING DETAILS.exe
                  File size:254216
                  MD5:4e358b432ba956c13627beee054d68e5
                  SHA1:8791318da047e93f2a16cc6535eba5159228f832
                  SHA256:836696cddebff5d522acb2c105a404ceeb635df69b3c9544b5bebcef13bc3e86
                  SHA512:a251f2f3e4fe9b0b44b3537983b406e9eb2d5e22298129ba9548f626c3657410adf23b50d0dd69f4601d7c873056e545ca7be0d808f8f0db3f9a38609b82dcff
                  SSDEEP:6144:ownv8jZAg8ZjqsPExIRaX+kK9WPvCH+tIvz:D8jZUVRaukK9kvCH+aL
                  File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........uJ...$...$...$./.{...$...%.:.$.".y...$..7....$.f."...$.Rich..$.................PE..L......H.................Z..........%2.....
                  Icon Hash:b2a88c96b2ca6a72
                  Entrypoint:0x403225
                  Entrypoint Section:.text
                  Digitally signed:false
                  Imagebase:0x400000
                  Subsystem:windows gui
                  Image File Characteristics:LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, RELOCS_STRIPPED
                  DLL Characteristics:
                  Time Stamp:0x48EFCDC9 [Fri Oct 10 21:48:57 2008 UTC]
                  TLS Callbacks:
                  CLR (.Net) Version:
                  OS Version Major:4
                  OS Version Minor:0
                  File Version Major:4
                  File Version Minor:0
                  Subsystem Version Major:4
                  Subsystem Version Minor:0
                  Import Hash:099c0646ea7282d232219f8807883be0
                  Instruction
                  sub esp, 00000180h
                  push ebx
                  push ebp
                  push esi
                  xor ebx, ebx
                  push edi
                  mov dword ptr [esp+18h], ebx
                  mov dword ptr [esp+10h], 00409128h
                  xor esi, esi
                  mov byte ptr [esp+14h], 00000020h
                  call dword ptr [00407030h]
                  push 00008001h
                  call dword ptr [004070B4h]
                  push ebx
                  call dword ptr [0040727Ch]
                  push 00000008h
                  mov dword ptr [00423F58h], eax
                  call 00007F42389B1E60h
                  mov dword ptr [00423EA4h], eax
                  push ebx
                  lea eax, dword ptr [esp+34h]
                  push 00000160h
                  push eax
                  push ebx
                  push 0041F450h
                  call dword ptr [00407158h]
                  push 004091B0h
                  push 004236A0h
                  call 00007F42389B1B17h
                  call dword ptr [004070B0h]
                  mov edi, 00429000h
                  push eax
                  push edi
                  call 00007F42389B1B05h
                  push ebx
                  call dword ptr [0040710Ch]
                  cmp byte ptr [00429000h], 00000022h
                  mov dword ptr [00423EA0h], eax
                  mov eax, edi
                  jne 00007F42389AF32Ch
                  mov byte ptr [esp+14h], 00000022h
                  mov eax, 00429001h
                  push dword ptr [esp+14h]
                  push eax
                  call 00007F42389B15F8h
                  push eax
                  call dword ptr [0040721Ch]
                  mov dword ptr [esp+1Ch], eax
                  jmp 00007F42389AF385h
                  cmp cl, 00000020h
                  jne 00007F42389AF328h
                  inc eax
                  cmp byte ptr [eax], 00000020h
                  je 00007F42389AF31Ch
                  cmp byte ptr [eax], 00000022h
                  mov byte ptr [eax+eax+00h], 00000000h
                  Programming Language:
                  • [EXP] VC++ 6.0 SP5 build 8804
                  NameVirtual AddressVirtual Size Is in Section
                  IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                  IMAGE_DIRECTORY_ENTRY_IMPORT0x73a40xb4.rdata
                  IMAGE_DIRECTORY_ENTRY_RESOURCE0x2c0000x900.rsrc
                  IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                  IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                  IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                  IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                  IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                  IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                  IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                  IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                  IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                  IMAGE_DIRECTORY_ENTRY_IAT0x70000x28c.rdata
                  IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                  IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                  IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                  NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                  .text0x10000x59760x5a00False0.668619791667data6.46680044621IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                  .rdata0x70000x11900x1200False0.444878472222data5.17796812871IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                  .data0x90000x1af980x400False0.55078125data4.68983486809IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_WRITE, IMAGE_SCN_MEM_READ
                  .ndata0x240000x80000x0False0empty0.0IMAGE_SCN_MEM_WRITE, IMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_MEM_READ
                  .rsrc0x2c0000x9000xa00False0.409375data3.94693169534IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                  NameRVASizeTypeLanguageCountry
                  RT_ICON0x2c1900x2e8dataEnglishUnited States
                  RT_DIALOG0x2c4780x100dataEnglishUnited States
                  RT_DIALOG0x2c5780x11cdataEnglishUnited States
                  RT_DIALOG0x2c6980x60dataEnglishUnited States
                  RT_GROUP_ICON0x2c6f80x14dataEnglishUnited States
                  RT_MANIFEST0x2c7100x1ebXML 1.0 document, ASCII text, with very long lines, with no line terminatorsEnglishUnited States
                  DLLImport
                  KERNEL32.dllCompareFileTime, SearchPathA, GetShortPathNameA, GetFullPathNameA, MoveFileA, SetCurrentDirectoryA, GetFileAttributesA, GetLastError, CreateDirectoryA, SetFileAttributesA, Sleep, GetTickCount, CreateFileA, GetFileSize, GetModuleFileNameA, GetCurrentProcess, CopyFileA, ExitProcess, SetFileTime, GetTempPathA, GetCommandLineA, SetErrorMode, LoadLibraryA, lstrcpynA, GetDiskFreeSpaceA, GlobalUnlock, GlobalLock, CreateThread, CreateProcessA, RemoveDirectoryA, GetTempFileNameA, lstrlenA, lstrcatA, GetSystemDirectoryA, GetVersion, CloseHandle, lstrcmpiA, lstrcmpA, ExpandEnvironmentStringsA, GlobalFree, GlobalAlloc, WaitForSingleObject, GetExitCodeProcess, GetModuleHandleA, LoadLibraryExA, GetProcAddress, FreeLibrary, MultiByteToWideChar, WritePrivateProfileStringA, GetPrivateProfileStringA, WriteFile, ReadFile, MulDiv, SetFilePointer, FindClose, FindNextFileA, FindFirstFileA, DeleteFileA, GetWindowsDirectoryA
                  USER32.dllEndDialog, ScreenToClient, GetWindowRect, EnableMenuItem, GetSystemMenu, SetClassLongA, IsWindowEnabled, SetWindowPos, GetSysColor, GetWindowLongA, SetCursor, LoadCursorA, CheckDlgButton, GetMessagePos, LoadBitmapA, CallWindowProcA, IsWindowVisible, CloseClipboard, SetClipboardData, EmptyClipboard, RegisterClassA, TrackPopupMenu, AppendMenuA, CreatePopupMenu, GetSystemMetrics, SetDlgItemTextA, GetDlgItemTextA, MessageBoxIndirectA, CharPrevA, DispatchMessageA, PeekMessageA, DestroyWindow, CreateDialogParamA, SetTimer, SetWindowTextA, PostQuitMessage, SetForegroundWindow, wsprintfA, SendMessageTimeoutA, FindWindowExA, SystemParametersInfoA, CreateWindowExA, GetClassInfoA, DialogBoxParamA, CharNextA, OpenClipboard, ExitWindowsEx, IsWindow, GetDlgItem, SetWindowLongA, LoadImageA, GetDC, EnableWindow, InvalidateRect, SendMessageA, DefWindowProcA, BeginPaint, GetClientRect, FillRect, DrawTextA, EndPaint, ShowWindow
                  GDI32.dllSetBkColor, GetDeviceCaps, DeleteObject, CreateBrushIndirect, CreateFontIndirectA, SetBkMode, SetTextColor, SelectObject
                  SHELL32.dllSHGetPathFromIDListA, SHBrowseForFolderA, SHGetFileInfoA, ShellExecuteA, SHFileOperationA, SHGetSpecialFolderLocation
                  ADVAPI32.dllRegQueryValueExA, RegSetValueExA, RegEnumKeyA, RegEnumValueA, RegOpenKeyExA, RegDeleteKeyA, RegDeleteValueA, RegCloseKey, RegCreateKeyExA
                  COMCTL32.dllImageList_AddMasked, ImageList_Destroy, ImageList_Create
                  ole32.dllCoTaskMemFree, OleInitialize, OleUninitialize, CoCreateInstance
                  VERSION.dllGetFileVersionInfoSizeA, GetFileVersionInfoA, VerQueryValueA
                  Language of compilation systemCountry where language is spokenMap
                  EnglishUnited States
                  TimestampSource PortDest PortSource IPDest IP
                  Jan 28, 2022 10:56:53.209121943 CET5498253192.168.2.68.8.8.8
                  Jan 28, 2022 10:56:53.241837978 CET53549828.8.8.8192.168.2.6
                  TimestampSource IPDest IPTrans IDOP CodeNameTypeClass
                  Jan 28, 2022 10:56:53.209121943 CET192.168.2.68.8.8.80x775bStandard query (0)www.chinaanalysisgroup.comA (IP address)IN (0x0001)
                  TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClass
                  Jan 28, 2022 10:56:53.241837978 CET8.8.8.8192.168.2.60x775bNo error (0)www.chinaanalysisgroup.com94.136.40.51A (IP address)IN (0x0001)

                  Click to jump to process

                  Target ID:0
                  Start time:10:54:31
                  Start date:28/01/2022
                  Path:C:\Users\user\Desktop\DHL AWB TRACKING DETAILS.exe
                  Wow64 process (32bit):true
                  Commandline:"C:\Users\user\Desktop\DHL AWB TRACKING DETAILS.exe"
                  Imagebase:0x400000
                  File size:254216 bytes
                  MD5 hash:4E358B432BA956C13627BEEE054D68E5
                  Has elevated privileges:true
                  Has administrator privileges:true
                  Programmed in:C, C++ or other language
                  Yara matches:
                  • Rule: JoeSecurity_FormBook, Description: Yara detected FormBook, Source: 00000000.00000002.362630153.0000000002F10000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                  • Rule: Formbook_1, Description: autogenerated rule brought to you by yara-signator, Source: 00000000.00000002.362630153.0000000002F10000.00000004.00000800.00020000.00000000.sdmp, Author: Felix Bilstein - yara-signator at cocacoding dot com
                  • Rule: Formbook, Description: detect Formbook in memory, Source: 00000000.00000002.362630153.0000000002F10000.00000004.00000800.00020000.00000000.sdmp, Author: JPCERT/CC Incident Response Group
                  Reputation:low

                  Target ID:1
                  Start time:10:54:33
                  Start date:28/01/2022
                  Path:C:\Users\user\Desktop\DHL AWB TRACKING DETAILS.exe
                  Wow64 process (32bit):true
                  Commandline:"C:\Users\user\Desktop\DHL AWB TRACKING DETAILS.exe"
                  Imagebase:0x400000
                  File size:254216 bytes
                  MD5 hash:4E358B432BA956C13627BEEE054D68E5
                  Has elevated privileges:true
                  Has administrator privileges:true
                  Programmed in:C, C++ or other language
                  Yara matches:
                  • Rule: JoeSecurity_FormBook, Description: Yara detected FormBook, Source: 00000001.00000000.359424691.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                  • Rule: Formbook_1, Description: autogenerated rule brought to you by yara-signator, Source: 00000001.00000000.359424691.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Felix Bilstein - yara-signator at cocacoding dot com
                  • Rule: Formbook, Description: detect Formbook in memory, Source: 00000001.00000000.359424691.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: JPCERT/CC Incident Response Group
                  • Rule: JoeSecurity_FormBook, Description: Yara detected FormBook, Source: 00000001.00000000.360270037.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                  • Rule: Formbook_1, Description: autogenerated rule brought to you by yara-signator, Source: 00000001.00000000.360270037.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Felix Bilstein - yara-signator at cocacoding dot com
                  • Rule: Formbook, Description: detect Formbook in memory, Source: 00000001.00000000.360270037.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: JPCERT/CC Incident Response Group
                  • Rule: JoeSecurity_FormBook, Description: Yara detected FormBook, Source: 00000001.00000002.435840268.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                  • Rule: Formbook_1, Description: autogenerated rule brought to you by yara-signator, Source: 00000001.00000002.435840268.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Felix Bilstein - yara-signator at cocacoding dot com
                  • Rule: Formbook, Description: detect Formbook in memory, Source: 00000001.00000002.435840268.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: JPCERT/CC Incident Response Group
                  • Rule: JoeSecurity_FormBook, Description: Yara detected FormBook, Source: 00000001.00000002.436793150.0000000000D10000.00000040.10000000.00040000.00000000.sdmp, Author: Joe Security
                  • Rule: Formbook_1, Description: autogenerated rule brought to you by yara-signator, Source: 00000001.00000002.436793150.0000000000D10000.00000040.10000000.00040000.00000000.sdmp, Author: Felix Bilstein - yara-signator at cocacoding dot com
                  • Rule: Formbook, Description: detect Formbook in memory, Source: 00000001.00000002.436793150.0000000000D10000.00000040.10000000.00040000.00000000.sdmp, Author: JPCERT/CC Incident Response Group
                  • Rule: JoeSecurity_FormBook, Description: Yara detected FormBook, Source: 00000001.00000002.436005605.00000000009A0000.00000040.10000000.00040000.00000000.sdmp, Author: Joe Security
                  • Rule: Formbook_1, Description: autogenerated rule brought to you by yara-signator, Source: 00000001.00000002.436005605.00000000009A0000.00000040.10000000.00040000.00000000.sdmp, Author: Felix Bilstein - yara-signator at cocacoding dot com
                  • Rule: Formbook, Description: detect Formbook in memory, Source: 00000001.00000002.436005605.00000000009A0000.00000040.10000000.00040000.00000000.sdmp, Author: JPCERT/CC Incident Response Group
                  Reputation:low

                  Target ID:4
                  Start time:10:54:38
                  Start date:28/01/2022
                  Path:C:\Windows\explorer.exe
                  Wow64 process (32bit):false
                  Commandline:C:\Windows\Explorer.EXE
                  Imagebase:0x7ff6f22f0000
                  File size:3933184 bytes
                  MD5 hash:AD5296B280E8F522A8A897C96BAB0E1D
                  Has elevated privileges:true
                  Has administrator privileges:true
                  Programmed in:C, C++ or other language
                  Yara matches:
                  • Rule: JoeSecurity_FormBook, Description: Yara detected FormBook, Source: 00000004.00000000.409581872.000000000F123000.00000040.00000001.00040000.00000000.sdmp, Author: Joe Security
                  • Rule: Formbook_1, Description: autogenerated rule brought to you by yara-signator, Source: 00000004.00000000.409581872.000000000F123000.00000040.00000001.00040000.00000000.sdmp, Author: Felix Bilstein - yara-signator at cocacoding dot com
                  • Rule: Formbook, Description: detect Formbook in memory, Source: 00000004.00000000.409581872.000000000F123000.00000040.00000001.00040000.00000000.sdmp, Author: JPCERT/CC Incident Response Group
                  • Rule: JoeSecurity_FormBook, Description: Yara detected FormBook, Source: 00000004.00000000.394582472.000000000F123000.00000040.00000001.00040000.00000000.sdmp, Author: Joe Security
                  • Rule: Formbook_1, Description: autogenerated rule brought to you by yara-signator, Source: 00000004.00000000.394582472.000000000F123000.00000040.00000001.00040000.00000000.sdmp, Author: Felix Bilstein - yara-signator at cocacoding dot com
                  • Rule: Formbook, Description: detect Formbook in memory, Source: 00000004.00000000.394582472.000000000F123000.00000040.00000001.00040000.00000000.sdmp, Author: JPCERT/CC Incident Response Group
                  Reputation:high

                  Target ID:11
                  Start time:10:55:07
                  Start date:28/01/2022
                  Path:C:\Windows\SysWOW64\wlanext.exe
                  Wow64 process (32bit):true
                  Commandline:C:\Windows\SysWOW64\wlanext.exe
                  Imagebase:0xfa0000
                  File size:78848 bytes
                  MD5 hash:CD1ED9A48316D58513D8ECB2D55B5C04
                  Has elevated privileges:true
                  Has administrator privileges:true
                  Programmed in:C, C++ or other language
                  Yara matches:
                  • Rule: JoeSecurity_FormBook, Description: Yara detected FormBook, Source: 0000000B.00000002.636107094.0000000000D80000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                  • Rule: Formbook_1, Description: autogenerated rule brought to you by yara-signator, Source: 0000000B.00000002.636107094.0000000000D80000.00000004.00000800.00020000.00000000.sdmp, Author: Felix Bilstein - yara-signator at cocacoding dot com
                  • Rule: Formbook, Description: detect Formbook in memory, Source: 0000000B.00000002.636107094.0000000000D80000.00000004.00000800.00020000.00000000.sdmp, Author: JPCERT/CC Incident Response Group
                  • Rule: JoeSecurity_FormBook, Description: Yara detected FormBook, Source: 0000000B.00000002.635990166.0000000000D50000.00000040.10000000.00040000.00000000.sdmp, Author: Joe Security
                  • Rule: Formbook_1, Description: autogenerated rule brought to you by yara-signator, Source: 0000000B.00000002.635990166.0000000000D50000.00000040.10000000.00040000.00000000.sdmp, Author: Felix Bilstein - yara-signator at cocacoding dot com
                  • Rule: Formbook, Description: detect Formbook in memory, Source: 0000000B.00000002.635990166.0000000000D50000.00000040.10000000.00040000.00000000.sdmp, Author: JPCERT/CC Incident Response Group
                  • Rule: JoeSecurity_FormBook, Description: Yara detected FormBook, Source: 0000000B.00000002.634911519.0000000000A00000.00000040.80000000.00040000.00000000.sdmp, Author: Joe Security
                  • Rule: Formbook_1, Description: autogenerated rule brought to you by yara-signator, Source: 0000000B.00000002.634911519.0000000000A00000.00000040.80000000.00040000.00000000.sdmp, Author: Felix Bilstein - yara-signator at cocacoding dot com
                  • Rule: Formbook, Description: detect Formbook in memory, Source: 0000000B.00000002.634911519.0000000000A00000.00000040.80000000.00040000.00000000.sdmp, Author: JPCERT/CC Incident Response Group
                  Reputation:moderate

                  Target ID:12
                  Start time:10:55:13
                  Start date:28/01/2022
                  Path:C:\Windows\SysWOW64\cmd.exe
                  Wow64 process (32bit):true
                  Commandline:/c del "C:\Users\user\Desktop\DHL AWB TRACKING DETAILS.exe"
                  Imagebase:0x2a0000
                  File size:232960 bytes
                  MD5 hash:F3BDBE3BB6F734E357235F4D5898582D
                  Has elevated privileges:true
                  Has administrator privileges:true
                  Programmed in:C, C++ or other language
                  Reputation:high

                  Target ID:13
                  Start time:10:55:14
                  Start date:28/01/2022
                  Path:C:\Windows\System32\conhost.exe
                  Wow64 process (32bit):false
                  Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                  Imagebase:0x7ff61de10000
                  File size:625664 bytes
                  MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                  Has elevated privileges:true
                  Has administrator privileges:true
                  Programmed in:C, C++ or other language
                  Reputation:high

                  Target ID:20
                  Start time:10:55:43
                  Start date:28/01/2022
                  Path:C:\Windows\explorer.exe
                  Wow64 process (32bit):false
                  Commandline:"C:\Windows\explorer.exe" /LOADSAVEDWINDOWS
                  Imagebase:0x7ff7ebed0000
                  File size:3933184 bytes
                  MD5 hash:AD5296B280E8F522A8A897C96BAB0E1D
                  Has elevated privileges:true
                  Has administrator privileges:true
                  Programmed in:C, C++ or other language
                  Reputation:high

                  Target ID:31
                  Start time:10:56:35
                  Start date:28/01/2022
                  Path:C:\Windows\explorer.exe
                  Wow64 process (32bit):false
                  Commandline:"C:\Windows\explorer.exe" /LOADSAVEDWINDOWS
                  Imagebase:0x7ff6f22f0000
                  File size:3933184 bytes
                  MD5 hash:AD5296B280E8F522A8A897C96BAB0E1D
                  Has elevated privileges:true
                  Has administrator privileges:true
                  Programmed in:C, C++ or other language
                  Reputation:high

                  No disassembly