Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
DHL Document.exe

Overview

General Information

Sample Name:DHL Document.exe
Analysis ID:562453
MD5:c66df8b380d1db550cb5f0bc5ded67d7
SHA1:080556dec75ae3a4a844fcad0419d9c533c0c0d5
SHA256:6fc6d0526995ef4c7ab87e092759ef93e84495a8c71b9ec36b924bcf7c2fa75c
Tags:DHLexeFormbook
Infos:

Detection

FormBook
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Yara detected FormBook
Malicious sample detected (through community Yara rule)
Yara detected AntiVM3
Antivirus detection for URL or domain
Sample uses process hollowing technique
Maps a DLL or memory area into another process
Initial sample is a PE file and has a suspicious name
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Machine Learning detection for sample
Self deletion via cmd delete
.NET source code contains potential unpacker
Injects a PE file into a foreign processes
.NET source code contains method to dynamically call methods (often used by packers)
Queues an APC in another process (thread injection)
Tries to detect virtualization through RDTSC time measurements
Modifies the context of a thread in another process (thread injection)
C2 URLs / IPs found in malware configuration
Uses 32bit PE files
Queries the volume information (name, serial number etc) of a device
Yara signature match
Antivirus or Machine Learning detection for unpacked file
May sleep (evasive loops) to hinder dynamic analysis
Uses code obfuscation techniques (call, push, ret)
Detected potential crypto function
Found potential string decryption / allocating functions
Sample execution stops while process was sleeping (likely an evasion)
Contains functionality to call native functions
Contains functionality for execution timing, often used to detect debuggers
Contains long sleeps (>= 3 min)
Enables debug privileges
Creates a DirectInput object (often for capturing keystrokes)
Found inlined nop instructions (likely shell or obfuscated code)
Sample file is different than original file name gathered from version info
Contains functionality to read the PEB
Checks if the current process is being debugged
Contains capabilities to detect virtual machines
Contains functionality to detect virtual machines (SLDT)
Monitors certain registry keys / values for changes (often done to protect autostart functionality)
Found large amount of non-executed APIs
Creates a process in suspended mode (likely to inject code)
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)

Classification

  • System is w10x64
  • DHL Document.exe (PID: 6900 cmdline: "C:\Users\user\Desktop\DHL Document.exe" MD5: C66DF8B380D1DB550CB5F0BC5DED67D7)
    • DHL Document.exe (PID: 4692 cmdline: C:\Users\user\Desktop\DHL Document.exe MD5: C66DF8B380D1DB550CB5F0BC5DED67D7)
      • explorer.exe (PID: 3440 cmdline: C:\Windows\Explorer.EXE MD5: AD5296B280E8F522A8A897C96BAB0E1D)
        • colorcpl.exe (PID: 4416 cmdline: C:\Windows\SysWOW64\colorcpl.exe MD5: 746F3B5E7652EA0766BA10414D317981)
          • cmd.exe (PID: 6244 cmdline: /c del "C:\Users\user\Desktop\DHL Document.exe" MD5: F3BDBE3BB6F734E357235F4D5898582D)
            • conhost.exe (PID: 5676 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
          • explorer.exe (PID: 4192 cmdline: "C:\Windows\explorer.exe" /LOADSAVEDWINDOWS MD5: AD5296B280E8F522A8A897C96BAB0E1D)
  • cleanup
{"C2 list": ["www.floridanratraining.com/how6/"], "decoy": ["wealthcabana.com", "fourfortyfourcreations.com", "cqqcsy.com", "bhwzjd.com", "niftyfashionrewards.com", "andersongiftemporium.com", "smarttradingcoin.com", "ilarealty.com", "sherrywine.net", "fsecg.info", "xoti.top", "pirosconsulting.com", "fundapie.com", "bbgm4egda.xyz", "legalfortmyers.com", "improvizy.com", "yxdyhs.com", "lucky2balls.com", "panelmall.com", "davenportkartway.com", "springfieldlottery.com", "pentagonpublishers.com", "icanmakeyoufamous.com", "40m2k.com", "projectcentered.com", "webfactory.agency", "metronixmedical.com", "dalingtao.xyz", "functionalsoft.com", "klopert77.com", "cortepuroiberico.com", "viavelleiloes.online", "bamedia.online", "skolicalunjo.com", "kayhardy.com", "excellentappraisers.com", "sademakale.com", "zbycsb.com", "empirejewelss.com", "coached.info", "20215414.online", "dazzlehide.com", "swickstyle.com", "specialtyplastics.online", "noordinarysenior.com", "bluinfo.digital", "chuxiaoxin.xyz", "adwin-estate.com", "girlwithaglow.com", "auctions.email", "topekasecurestorage.com", "mountain-chicken.com", "lhdtrj.com", "mhtqph.club", "solatopotato.com", "mecitiris.com", "hotrodathangtrungquoc.com", "gapteknews.com", "mantraexchange.online", "cinematiccarpenter.com", "wozka.xyz", "car-tech.tech", "jssatchell.media", "joyokanji-cheer.com"]}
SourceRuleDescriptionAuthorStrings
00000005.00000000.409977263.0000000000400000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_FormBookYara detected FormBookJoe Security
    00000005.00000000.409977263.0000000000400000.00000040.00000400.00020000.00000000.sdmpFormbook_1autogenerated rule brought to you by yara-signatorFelix Bilstein - yara-signator at cocacoding dot com
    • 0x8618:$sequence_0: 03 C8 0F 31 2B C1 89 45 FC
    • 0x89b2:$sequence_0: 03 C8 0F 31 2B C1 89 45 FC
    • 0x146c5:$sequence_1: 3C 24 0F 84 76 FF FF FF 3C 25 74 94
    • 0x141b1:$sequence_2: 3B 4F 14 73 95 85 C9 74 91
    • 0x147c7:$sequence_3: 3C 69 75 44 8B 7D 18 8B 0F
    • 0x1493f:$sequence_4: 5D C3 8D 50 7C 80 FA 07
    • 0x93ca:$sequence_5: 0F BE 5C 0E 01 0F B6 54 0E 02 83 E3 0F C1 EA 06
    • 0x1342c:$sequence_6: 57 89 45 FC 89 45 F4 89 45 F8
    • 0xa142:$sequence_7: 66 89 0C 02 5B 8B E5 5D
    • 0x19bb7:$sequence_8: 3C 54 74 04 3C 74 75 F4
    • 0x1ac5a:$sequence_9: 56 68 03 01 00 00 8D 85 95 FE FF FF 6A 00
    00000005.00000000.409977263.0000000000400000.00000040.00000400.00020000.00000000.sdmpFormbookdetect Formbook in memoryJPCERT/CC Incident Response Group
    • 0x16ae9:$sqlite3step: 68 34 1C 7B E1
    • 0x16bfc:$sqlite3step: 68 34 1C 7B E1
    • 0x16b18:$sqlite3text: 68 38 2A 90 C5
    • 0x16c3d:$sqlite3text: 68 38 2A 90 C5
    • 0x16b2b:$sqlite3blob: 68 53 D8 7F 8C
    • 0x16c53:$sqlite3blob: 68 53 D8 7F 8C
    0000000F.00000002.639726248.0000000002EC0000.00000040.80000000.00040000.00000000.sdmpJoeSecurity_FormBookYara detected FormBookJoe Security
      0000000F.00000002.639726248.0000000002EC0000.00000040.80000000.00040000.00000000.sdmpFormbook_1autogenerated rule brought to you by yara-signatorFelix Bilstein - yara-signator at cocacoding dot com
      • 0x8618:$sequence_0: 03 C8 0F 31 2B C1 89 45 FC
      • 0x89b2:$sequence_0: 03 C8 0F 31 2B C1 89 45 FC
      • 0x146c5:$sequence_1: 3C 24 0F 84 76 FF FF FF 3C 25 74 94
      • 0x141b1:$sequence_2: 3B 4F 14 73 95 85 C9 74 91
      • 0x147c7:$sequence_3: 3C 69 75 44 8B 7D 18 8B 0F
      • 0x1493f:$sequence_4: 5D C3 8D 50 7C 80 FA 07
      • 0x93ca:$sequence_5: 0F BE 5C 0E 01 0F B6 54 0E 02 83 E3 0F C1 EA 06
      • 0x1342c:$sequence_6: 57 89 45 FC 89 45 F4 89 45 F8
      • 0xa142:$sequence_7: 66 89 0C 02 5B 8B E5 5D
      • 0x19bb7:$sequence_8: 3C 54 74 04 3C 74 75 F4
      • 0x1ac5a:$sequence_9: 56 68 03 01 00 00 8D 85 95 FE FF FF 6A 00
      Click to see the 31 entries
      SourceRuleDescriptionAuthorStrings
      5.0.DHL Document.exe.400000.8.raw.unpackJoeSecurity_FormBookYara detected FormBookJoe Security
        5.0.DHL Document.exe.400000.8.raw.unpackFormbook_1autogenerated rule brought to you by yara-signatorFelix Bilstein - yara-signator at cocacoding dot com
        • 0x8618:$sequence_0: 03 C8 0F 31 2B C1 89 45 FC
        • 0x89b2:$sequence_0: 03 C8 0F 31 2B C1 89 45 FC
        • 0x146c5:$sequence_1: 3C 24 0F 84 76 FF FF FF 3C 25 74 94
        • 0x141b1:$sequence_2: 3B 4F 14 73 95 85 C9 74 91
        • 0x147c7:$sequence_3: 3C 69 75 44 8B 7D 18 8B 0F
        • 0x1493f:$sequence_4: 5D C3 8D 50 7C 80 FA 07
        • 0x93ca:$sequence_5: 0F BE 5C 0E 01 0F B6 54 0E 02 83 E3 0F C1 EA 06
        • 0x1342c:$sequence_6: 57 89 45 FC 89 45 F4 89 45 F8
        • 0xa142:$sequence_7: 66 89 0C 02 5B 8B E5 5D
        • 0x19bb7:$sequence_8: 3C 54 74 04 3C 74 75 F4
        • 0x1ac5a:$sequence_9: 56 68 03 01 00 00 8D 85 95 FE FF FF 6A 00
        5.0.DHL Document.exe.400000.8.raw.unpackFormbookdetect Formbook in memoryJPCERT/CC Incident Response Group
        • 0x16ae9:$sqlite3step: 68 34 1C 7B E1
        • 0x16bfc:$sqlite3step: 68 34 1C 7B E1
        • 0x16b18:$sqlite3text: 68 38 2A 90 C5
        • 0x16c3d:$sqlite3text: 68 38 2A 90 C5
        • 0x16b2b:$sqlite3blob: 68 53 D8 7F 8C
        • 0x16c53:$sqlite3blob: 68 53 D8 7F 8C
        0.2.DHL Document.exe.2c9da00.1.raw.unpackJoeSecurity_AntiVM_3Yara detected AntiVM_3Joe Security
          0.2.DHL Document.exe.2c9da00.1.raw.unpackINDICATOR_SUSPICIOUS_EXE_Anti_OldCopyPasteDetects executables potentially checking for WinJail sandbox windowditekSHen
          • 0x8860:$v1: SbieDll.dll
          • 0x887a:$v2: USER
          • 0x8886:$v3: SANDBOX
          • 0x8898:$v4: VIRUS
          • 0x88e8:$v4: VIRUS
          • 0x88a6:$v5: MALWARE
          • 0x88b8:$v6: SCHMIDTI
          • 0x88cc:$v7: CURRENTUSER
          Click to see the 26 entries
          No Sigma rule has matched

          Click to jump to signature section

          Show All Signature Results

          AV Detection

          barindex
          Source: 00000000.00000002.413926760.0000000003C59000.00000004.00000800.00020000.00000000.sdmpMalware Configuration Extractor: FormBook {"C2 list": ["www.floridanratraining.com/how6/"], "decoy": ["wealthcabana.com", "fourfortyfourcreations.com", "cqqcsy.com", "bhwzjd.com", "niftyfashionrewards.com", "andersongiftemporium.com", "smarttradingcoin.com", "ilarealty.com", "sherrywine.net", "fsecg.info", "xoti.top", "pirosconsulting.com", "fundapie.com", "bbgm4egda.xyz", "legalfortmyers.com", "improvizy.com", "yxdyhs.com", "lucky2balls.com", "panelmall.com", "davenportkartway.com", "springfieldlottery.com", "pentagonpublishers.com", "icanmakeyoufamous.com", "40m2k.com", "projectcentered.com", "webfactory.agency", "metronixmedical.com", "dalingtao.xyz", "functionalsoft.com", "klopert77.com", "cortepuroiberico.com", "viavelleiloes.online", "bamedia.online", "skolicalunjo.com", "kayhardy.com", "excellentappraisers.com", "sademakale.com", "zbycsb.com", "empirejewelss.com", "coached.info", "20215414.online", "dazzlehide.com", "swickstyle.com", "specialtyplastics.online", "noordinarysenior.com", "bluinfo.digital", "chuxiaoxin.xyz", "adwin-estate.com", "girlwithaglow.com", "auctions.email", "topekasecurestorage.com", "mountain-chicken.com", "lhdtrj.com", "mhtqph.club", "solatopotato.com", "mecitiris.com", "hotrodathangtrungquoc.com", "gapteknews.com", "mantraexchange.online", "cinematiccarpenter.com", "wozka.xyz", "car-tech.tech", "jssatchell.media", "joyokanji-cheer.com"]}
          Source: Yara matchFile source: 5.0.DHL Document.exe.400000.8.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 5.0.DHL Document.exe.400000.6.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 5.2.DHL Document.exe.400000.0.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 5.2.DHL Document.exe.400000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 5.0.DHL Document.exe.400000.8.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 5.0.DHL Document.exe.400000.4.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 5.0.DHL Document.exe.400000.6.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 0.2.DHL Document.exe.3df45d0.4.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 0.2.DHL Document.exe.3d9ddb0.3.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 00000005.00000000.409977263.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000000F.00000002.639726248.0000000002EC0000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000005.00000002.487657383.0000000001390000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000000.00000002.413926760.0000000003C59000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000005.00000002.487435815.0000000001360000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000008.00000000.471020130.000000000DD11000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000005.00000000.409332272.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000008.00000000.450790503.000000000DD11000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000000F.00000002.638592382.0000000002BC0000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000000F.00000002.637724743.0000000000B60000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000005.00000002.485734016.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
          Source: www.floridanratraining.com/how6/Avira URL Cloud: Label: malware
          Source: DHL Document.exeJoe Sandbox ML: detected
          Source: 5.2.DHL Document.exe.400000.0.unpackAvira: Label: TR/Crypt.ZPACK.Gen
          Source: 5.0.DHL Document.exe.400000.8.unpackAvira: Label: TR/Crypt.ZPACK.Gen
          Source: 5.0.DHL Document.exe.400000.4.unpackAvira: Label: TR/Crypt.ZPACK.Gen
          Source: 5.0.DHL Document.exe.400000.6.unpackAvira: Label: TR/Crypt.ZPACK.Gen
          Source: DHL Document.exeStatic PE information: LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED
          Source: DHL Document.exeStatic PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
          Source: Binary string: CultureNameResourceSetPa.pdb source: DHL Document.exe
          Source: Binary string: colorcpl.pdbGCTL source: DHL Document.exe, 00000005.00000002.489364104.00000000033E0000.00000040.10000000.00040000.00000000.sdmp
          Source: Binary string: colorcpl.pdb source: DHL Document.exe, 00000005.00000002.489364104.00000000033E0000.00000040.10000000.00040000.00000000.sdmp
          Source: Binary string: wntdll.pdbUGP source: DHL Document.exe, 00000005.00000002.488054555.0000000001420000.00000040.00000800.00020000.00000000.sdmp, DHL Document.exe, 00000005.00000002.488674314.000000000153F000.00000040.00000800.00020000.00000000.sdmp, DHL Document.exe, 00000005.00000003.412367442.0000000001280000.00000004.00000800.00020000.00000000.sdmp, colorcpl.exe, 0000000F.00000002.644486032.0000000004F20000.00000040.00000800.00020000.00000000.sdmp, colorcpl.exe, 0000000F.00000002.645100478.000000000503F000.00000040.00000800.00020000.00000000.sdmp
          Source: Binary string: wntdll.pdb source: DHL Document.exe, 00000005.00000002.488054555.0000000001420000.00000040.00000800.00020000.00000000.sdmp, DHL Document.exe, 00000005.00000002.488674314.000000000153F000.00000040.00000800.00020000.00000000.sdmp, DHL Document.exe, 00000005.00000003.412367442.0000000001280000.00000004.00000800.00020000.00000000.sdmp, colorcpl.exe, colorcpl.exe, 0000000F.00000002.644486032.0000000004F20000.00000040.00000800.00020000.00000000.sdmp, colorcpl.exe, 0000000F.00000002.645100478.000000000503F000.00000040.00000800.00020000.00000000.sdmp
          Source: C:\Users\user\Desktop\DHL Document.exeCode function: 4x nop then jmp 07D6954Bh
          Source: C:\Users\user\Desktop\DHL Document.exeCode function: 4x nop then pop edi
          Source: C:\Users\user\Desktop\DHL Document.exeCode function: 4x nop then pop edi
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 4x nop then pop edi
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 4x nop then pop edi

          Networking

          barindex
          Source: Malware configuration extractorURLs: www.floridanratraining.com/how6/
          Source: DHL Document.exe, 00000000.00000002.413281516.0000000002C51000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://blog.iandreev.com
          Source: DHL Document.exe, 00000000.00000002.413281516.0000000002C51000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://blog.iandreev.com/
          Source: DHL Document.exe, 00000000.00000003.364941552.0000000005B2B000.00000004.00000800.00020000.00000000.sdmp, DHL Document.exe, 00000000.00000003.365105939.0000000005B2B000.00000004.00000800.00020000.00000000.sdmp, DHL Document.exe, 00000000.00000003.365172175.0000000005B3A000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://en.w
          Source: DHL Document.exe, 00000000.00000003.364609073.0000000005B2B000.00000004.00000800.00020000.00000000.sdmp, DHL Document.exe, 00000000.00000003.364198577.0000000005B2B000.00000004.00000800.00020000.00000000.sdmp, DHL Document.exe, 00000000.00000003.364470211.0000000005B2B000.00000004.00000800.00020000.00000000.sdmp, DHL Document.exe, 00000000.00000002.417347780.0000000006D22000.00000004.00000800.00020000.00000000.sdmp, DHL Document.exe, 00000000.00000003.363467464.0000000005B2B000.00000004.00000800.00020000.00000000.sdmp, DHL Document.exe, 00000000.00000003.364020803.0000000005B2B000.00000004.00000800.00020000.00000000.sdmp, DHL Document.exe, 00000000.00000003.364331164.0000000005B2B000.00000004.00000800.00020000.00000000.sdmp, DHL Document.exe, 00000000.00000003.363729294.0000000005B2B000.00000004.00000800.00020000.00000000.sdmp, DHL Document.exe, 00000000.00000003.364941552.0000000005B2B000.00000004.00000800.00020000.00000000.sdmp, DHL Document.exe, 00000000.00000003.365105939.0000000005B2B000.00000004.00000800.00020000.00000000.sdmp, DHL Document.exe, 00000000.00000003.363650587.0000000005B2B000.00000004.00000800.00020000.00000000.sdmp, DHL Document.exe, 00000000.00000003.364736108.0000000005B2B000.00000004.00000800.00020000.00000000.sdmp, DHL Document.exe, 00000000.00000003.363877573.0000000005B2B000.00000004.00000800.00020000.00000000.sdmp, DHL Document.exe, 00000000.00000003.365324145.0000000005B2B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://fontfabrik.com
          Source: DHL Document.exe, 00000000.00000003.363650587.0000000005B2B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://fontfabrik.com(
          Source: DHL Document.exe, 00000000.00000002.417347780.0000000006D22000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0
          Source: DHL Document.exe, 00000000.00000003.375303832.0000000005B33000.00000004.00000800.00020000.00000000.sdmp, DHL Document.exe, 00000000.00000003.375879277.0000000005B33000.00000004.00000800.00020000.00000000.sdmp, DHL Document.exe, 00000000.00000003.375219441.0000000005B33000.00000004.00000800.00020000.00000000.sdmp, DHL Document.exe, 00000000.00000003.376228367.0000000005B33000.00000004.00000800.00020000.00000000.sdmp, DHL Document.exe, 00000000.00000003.375729842.0000000005B33000.00000004.00000800.00020000.00000000.sdmp, DHL Document.exe, 00000000.00000003.375122627.0000000005B33000.00000004.00000800.00020000.00000000.sdmp, DHL Document.exe, 00000000.00000003.376374655.0000000005B33000.00000004.00000800.00020000.00000000.sdmp, DHL Document.exe, 00000000.00000003.375522749.0000000005B33000.00000004.00000800.00020000.00000000.sdmp, DHL Document.exe, 00000000.00000003.376031091.0000000005B33000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.ascendercorp.com/typedesigners.html
          Source: DHL Document.exe, 00000000.00000003.375303832.0000000005B33000.00000004.00000800.00020000.00000000.sdmp, DHL Document.exe, 00000000.00000003.375219441.0000000005B33000.00000004.00000800.00020000.00000000.sdmp, DHL Document.exe, 00000000.00000003.375122627.0000000005B33000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.ascendercorp.com/typedesigners.html(
          Source: explorer.exe, 00000008.00000000.417336784.000000000095C000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000008.00000000.457066024.000000000095C000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000008.00000000.438988395.000000000095C000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000008.00000000.516000007.000000000095C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.autoitscript.com/autoit3/J
          Source: DHL Document.exe, 00000000.00000003.372366110.0000000005B2B000.00000004.00000800.00020000.00000000.sdmp, DHL Document.exe, 00000000.00000003.371185243.0000000005B2B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.carterandcone.com
          Source: DHL Document.exe, 00000000.00000003.370770475.0000000005B2B000.00000004.00000800.00020000.00000000.sdmp, DHL Document.exe, 00000000.00000003.371463007.0000000005B2B000.00000004.00000800.00020000.00000000.sdmp, DHL Document.exe, 00000000.00000003.371333722.0000000005B2B000.00000004.00000800.00020000.00000000.sdmp, DHL Document.exe, 00000000.00000003.371050045.0000000005B2B000.00000004.00000800.00020000.00000000.sdmp, DHL Document.exe, 00000000.00000003.370913501.0000000005B2B000.00000004.00000800.00020000.00000000.sdmp, DHL Document.exe, 00000000.00000003.371185243.0000000005B2B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.carterandcone.com(
          Source: DHL Document.exe, 00000000.00000003.371590968.0000000005B2B000.00000004.00000800.00020000.00000000.sdmp, DHL Document.exe, 00000000.00000003.371722553.0000000005B2B000.00000004.00000800.00020000.00000000.sdmp, DHL Document.exe, 00000000.00000003.371864694.0000000005B2B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.carterandcone.com.
          Source: DHL Document.exe, 00000000.00000003.370770475.0000000005B2B000.00000004.00000800.00020000.00000000.sdmp, DHL Document.exe, 00000000.00000003.371463007.0000000005B2B000.00000004.00000800.00020000.00000000.sdmp, DHL Document.exe, 00000000.00000003.371333722.0000000005B2B000.00000004.00000800.00020000.00000000.sdmp, DHL Document.exe, 00000000.00000003.371050045.0000000005B2B000.00000004.00000800.00020000.00000000.sdmp, DHL Document.exe, 00000000.00000003.370913501.0000000005B2B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.carterandcone.comL
          Source: DHL Document.exe, 00000000.00000003.372603205.0000000005B2B000.00000004.00000800.00020000.00000000.sdmp, DHL Document.exe, 00000000.00000003.372516308.0000000005B2B000.00000004.00000800.00020000.00000000.sdmp, DHL Document.exe, 00000000.00000003.372761903.0000000005B2B000.00000004.00000800.00020000.00000000.sdmp, DHL Document.exe, 00000000.00000003.372909291.0000000005B2B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.carterandcone.comal
          Source: DHL Document.exe, 00000000.00000003.371864694.0000000005B2B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.carterandcone.comatt
          Source: DHL Document.exe, 00000000.00000003.371590968.0000000005B2B000.00000004.00000800.00020000.00000000.sdmp, DHL Document.exe, 00000000.00000003.371463007.0000000005B2B000.00000004.00000800.00020000.00000000.sdmp, DHL Document.exe, 00000000.00000003.372069177.0000000005B2B000.00000004.00000800.00020000.00000000.sdmp, DHL Document.exe, 00000000.00000003.371722553.0000000005B2B000.00000004.00000800.00020000.00000000.sdmp, DHL Document.exe, 00000000.00000003.371333722.0000000005B2B000.00000004.00000800.00020000.00000000.sdmp, DHL Document.exe, 00000000.00000003.371050045.0000000005B2B000.00000004.00000800.00020000.00000000.sdmp, DHL Document.exe, 00000000.00000003.371864694.0000000005B2B000.00000004.00000800.00020000.00000000.sdmp, DHL Document.exe, 00000000.00000003.372227275.0000000005B2B000.00000004.00000800.00020000.00000000.sdmp, DHL Document.exe, 00000000.00000003.372366110.0000000005B2B000.00000004.00000800.00020000.00000000.sdmp, DHL Document.exe, 00000000.00000003.371185243.0000000005B2B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.carterandcone.comk
          Source: DHL Document.exe, 00000000.00000003.371463007.0000000005B2B000.00000004.00000800.00020000.00000000.sdmp, DHL Document.exe, 00000000.00000002.417347780.0000000006D22000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.carterandcone.coml
          Source: DHL Document.exe, 00000000.00000003.370770475.0000000005B2B000.00000004.00000800.00020000.00000000.sdmp, DHL Document.exe, 00000000.00000003.370629591.0000000005B2B000.00000004.00000800.00020000.00000000.sdmp, DHL Document.exe, 00000000.00000003.371050045.0000000005B2B000.00000004.00000800.00020000.00000000.sdmp, DHL Document.exe, 00000000.00000003.370913501.0000000005B2B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.carterandcone.comncyD
          Source: DHL Document.exe, 00000000.00000003.371590968.0000000005B2B000.00000004.00000800.00020000.00000000.sdmp, DHL Document.exe, 00000000.00000003.370770475.0000000005B2B000.00000004.00000800.00020000.00000000.sdmp, DHL Document.exe, 00000000.00000003.371463007.0000000005B2B000.00000004.00000800.00020000.00000000.sdmp, DHL Document.exe, 00000000.00000003.372069177.0000000005B2B000.00000004.00000800.00020000.00000000.sdmp, DHL Document.exe, 00000000.00000003.371722553.0000000005B2B000.00000004.00000800.00020000.00000000.sdmp, DHL Document.exe, 00000000.00000003.370629591.0000000005B2B000.00000004.00000800.00020000.00000000.sdmp, DHL Document.exe, 00000000.00000003.371333722.0000000005B2B000.00000004.00000800.00020000.00000000.sdmp, DHL Document.exe, 00000000.00000003.371050045.0000000005B2B000.00000004.00000800.00020000.00000000.sdmp, DHL Document.exe, 00000000.00000003.370913501.0000000005B2B000.00000004.00000800.00020000.00000000.sdmp, DHL Document.exe, 00000000.00000003.371864694.0000000005B2B000.00000004.00000800.00020000.00000000.sdmp, DHL Document.exe, 00000000.00000003.372227275.0000000005B2B000.00000004.00000800.00020000.00000000.sdmp, DHL Document.exe, 00000000.00000003.372366110.0000000005B2B000.00000004.00000800.00020000.00000000.sdmp, DHL Document.exe, 00000000.00000003.371185243.0000000005B2B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.carterandcone.como.
          Source: DHL Document.exe, 00000000.00000003.372603205.0000000005B2B000.00000004.00000800.00020000.00000000.sdmp, DHL Document.exe, 00000000.00000003.372069177.0000000005B2B000.00000004.00000800.00020000.00000000.sdmp, DHL Document.exe, 00000000.00000003.372227275.0000000005B2B000.00000004.00000800.00020000.00000000.sdmp, DHL Document.exe, 00000000.00000003.372366110.0000000005B2B000.00000004.00000800.00020000.00000000.sdmp, DHL Document.exe, 00000000.00000003.372516308.0000000005B2B000.00000004.00000800.00020000.00000000.sdmp, DHL Document.exe, 00000000.00000003.372761903.0000000005B2B000.00000004.00000800.00020000.00000000.sdmp, DHL Document.exe, 00000000.00000003.372909291.0000000005B2B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.carterandcone.comroa
          Source: DHL Document.exe, 00000000.00000003.371590968.0000000005B2B000.00000004.00000800.00020000.00000000.sdmp, DHL Document.exe, 00000000.00000003.371463007.0000000005B2B000.00000004.00000800.00020000.00000000.sdmp, DHL Document.exe, 00000000.00000003.371722553.0000000005B2B000.00000004.00000800.00020000.00000000.sdmp, DHL Document.exe, 00000000.00000003.371864694.0000000005B2B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.carterandcone.comva
          Source: DHL Document.exe, 00000000.00000002.417347780.0000000006D22000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com
          Source: DHL Document.exe, 00000000.00000003.400746887.0000000005B2B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers
          Source: DHL Document.exe, 00000000.00000003.379897961.0000000005B2B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/(
          Source: DHL Document.exe, 00000000.00000002.417347780.0000000006D22000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/?
          Source: DHL Document.exe, 00000000.00000003.389612639.0000000005B4E000.00000004.00000800.00020000.00000000.sdmp, DHL Document.exe, 00000000.00000003.389865490.0000000005B4E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/cabarga.html(
          Source: DHL Document.exe, 00000000.00000002.417347780.0000000006D22000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/cabarga.htmlN
          Source: DHL Document.exe, 00000000.00000003.389612639.0000000005B4E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/cabarga.htmlr
          Source: DHL Document.exe, 00000000.00000003.385584605.0000000005B4E000.00000004.00000800.00020000.00000000.sdmp, DHL Document.exe, 00000000.00000002.417347780.0000000006D22000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/frere-jones.html
          Source: DHL Document.exe, 00000000.00000003.385720678.0000000005B2B000.00000004.00000800.00020000.00000000.sdmp, DHL Document.exe, 00000000.00000003.388682645.0000000005B2B000.00000004.00000800.00020000.00000000.sdmp, DHL Document.exe, 00000000.00000003.388184932.0000000005B2B000.00000004.00000800.00020000.00000000.sdmp, DHL Document.exe, 00000000.00000003.388824941.0000000005B2B000.00000004.00000800.00020000.00000000.sdmp, DHL Document.exe, 00000000.00000003.388516231.0000000005B2B000.00000004.00000800.00020000.00000000.sdmp, DHL Document.exe, 00000000.00000003.388382396.0000000005B2B000.00000004.00000800.00020000.00000000.sdmp, DHL Document.exe, 00000000.00000003.387955236.0000000005B2B000.00000004.00000800.00020000.00000000.sdmp, DHL Document.exe, 00000000.00000003.385477021.0000000005B2B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/frere-jones.htmlgfa
          Source: DHL Document.exe, 00000000.00000002.417347780.0000000006D22000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers8
          Source: DHL Document.exe, 00000000.00000002.417347780.0000000006D22000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers?
          Source: DHL Document.exe, 00000000.00000002.417347780.0000000006D22000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designersG
          Source: DHL Document.exe, 00000000.00000003.383014501.0000000005B2B000.00000004.00000800.00020000.00000000.sdmp, DHL Document.exe, 00000000.00000003.384284843.0000000005B2B000.00000004.00000800.00020000.00000000.sdmp, DHL Document.exe, 00000000.00000003.382478395.0000000005B2B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designersO
          Source: DHL Document.exe, 00000000.00000003.382077223.0000000005B2B000.00000004.00000800.00020000.00000000.sdmp, DHL Document.exe, 00000000.00000003.382274635.0000000005B2B000.00000004.00000800.00020000.00000000.sdmp, DHL Document.exe, 00000000.00000003.382478395.0000000005B2B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designersn
          Source: DHL Document.exe, 00000000.00000003.380215559.0000000005B2B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designersp
          Source: DHL Document.exe, 00000000.00000003.382274635.0000000005B2B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designerss
          Source: DHL Document.exe, 00000000.00000002.413024823.0000000001287000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.coma
          Source: DHL Document.exe, 00000000.00000002.417347780.0000000006D22000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fonts.com
          Source: DHL Document.exe, 00000000.00000003.369779518.0000000005B2B000.00000004.00000800.00020000.00000000.sdmp, DHL Document.exe, 00000000.00000003.372761903.0000000005B2B000.00000004.00000800.00020000.00000000.sdmp, DHL Document.exe, 00000000.00000003.368790068.0000000005B2B000.00000004.00000800.00020000.00000000.sdmp, DHL Document.exe, 00000000.00000003.372909291.0000000005B2B000.00000004.00000800.00020000.00000000.sdmp, DHL Document.exe, 00000000.00000003.373449690.0000000005B2B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn
          Source: DHL Document.exe, 00000000.00000003.369287425.0000000005B2D000.00000004.00000800.00020000.00000000.sdmp, DHL Document.exe, 00000000.00000003.368254834.0000000005B2B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn/
          Source: DHL Document.exe, 00000000.00000002.417347780.0000000006D22000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn/bThe
          Source: DHL Document.exe, 00000000.00000002.417347780.0000000006D22000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn/cThe
          Source: DHL Document.exe, 00000000.00000003.369287425.0000000005B2D000.00000004.00000800.00020000.00000000.sdmp, DHL Document.exe, 00000000.00000003.369854837.0000000005B2B000.00000004.00000800.00020000.00000000.sdmp, DHL Document.exe, 00000000.00000003.369461001.0000000005B2D000.00000004.00000800.00020000.00000000.sdmp, DHL Document.exe, 00000000.00000003.369626308.0000000005B2B000.00000004.00000800.00020000.00000000.sdmp, DHL Document.exe, 00000000.00000003.369779518.0000000005B2B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn/lg
          Source: DHL Document.exe, 00000000.00000003.369287425.0000000005B2D000.00000004.00000800.00020000.00000000.sdmp, DHL Document.exe, 00000000.00000003.369854837.0000000005B2B000.00000004.00000800.00020000.00000000.sdmp, DHL Document.exe, 00000000.00000003.369461001.0000000005B2D000.00000004.00000800.00020000.00000000.sdmp, DHL Document.exe, 00000000.00000003.369626308.0000000005B2B000.00000004.00000800.00020000.00000000.sdmp, DHL Document.exe, 00000000.00000003.369779518.0000000005B2B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cna
          Source: DHL Document.exe, 00000000.00000003.368980515.0000000005B34000.00000004.00000800.00020000.00000000.sdmp, DHL Document.exe, 00000000.00000003.368790068.0000000005B2B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cnht
          Source: DHL Document.exe, 00000000.00000002.417347780.0000000006D22000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.galapagosdesign.com/DPlease
          Source: DHL Document.exe, 00000000.00000003.394503541.0000000005B2B000.00000004.00000800.00020000.00000000.sdmp, DHL Document.exe, 00000000.00000002.417347780.0000000006D22000.00000004.00000800.00020000.00000000.sdmp, DHL Document.exe, 00000000.00000003.394361753.0000000005B2B000.00000004.00000800.00020000.00000000.sdmp, DHL Document.exe, 00000000.00000003.394167536.0000000005B2B000.00000004.00000800.00020000.00000000.sdmp, DHL Document.exe, 00000000.00000003.394649020.0000000005B2B000.00000004.00000800.00020000.00000000.sdmp, DHL Document.exe, 00000000.00000003.394783374.0000000005B2B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.galapagosdesign.com/staff/dennis.htm
          Source: DHL Document.exe, 00000000.00000003.394503541.0000000005B2B000.00000004.00000800.00020000.00000000.sdmp, DHL Document.exe, 00000000.00000003.394361753.0000000005B2B000.00000004.00000800.00020000.00000000.sdmp, DHL Document.exe, 00000000.00000003.394167536.0000000005B2B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.galapagosdesign.com/staff/dennis.htm0
          Source: DHL Document.exe, 00000000.00000002.417347780.0000000006D22000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.goodfont.co.kr
          Source: DHL Document.exe, 00000000.00000003.368102080.0000000005B2B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.goodfont.co.krtp
          Source: DHL Document.exe, 00000000.00000002.417347780.0000000006D22000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/
          Source: DHL Document.exe, 00000000.00000003.360546997.0000000005B12000.00000004.00000800.00020000.00000000.sdmp, DHL Document.exe, 00000000.00000002.417347780.0000000006D22000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sajatypeworks.com
          Source: DHL Document.exe, 00000000.00000003.360546997.0000000005B12000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sajatypeworks.com2
          Source: DHL Document.exe, 00000000.00000002.417347780.0000000006D22000.00000004.00000800.00020000.00000000.sdmp, DHL Document.exe, 00000000.00000003.375219441.0000000005B33000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sakkal.com
          Source: DHL Document.exe, 00000000.00000003.368102080.0000000005B2B000.00000004.00000800.00020000.00000000.sdmp, DHL Document.exe, 00000000.00000003.367946380.0000000005B2B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sandoll.co.kr
          Source: DHL Document.exe, 00000000.00000003.368102080.0000000005B2B000.00000004.00000800.00020000.00000000.sdmp, DHL Document.exe, 00000000.00000003.367946380.0000000005B2B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sandoll.co.krFeN
          Source: DHL Document.exe, 00000000.00000003.368102080.0000000005B2B000.00000004.00000800.00020000.00000000.sdmp, DHL Document.exe, 00000000.00000003.368254834.0000000005B2B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sandoll.co.krO
          Source: DHL Document.exe, 00000000.00000003.368102080.0000000005B2B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sandoll.co.krormal
          Source: DHL Document.exe, 00000000.00000003.367946380.0000000005B2B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sandoll.co.krtp
          Source: DHL Document.exe, 00000000.00000002.417347780.0000000006D22000.00000004.00000800.00020000.00000000.sdmp, DHL Document.exe, 00000000.00000003.372603205.0000000005B2B000.00000004.00000800.00020000.00000000.sdmp, DHL Document.exe, 00000000.00000003.372516308.0000000005B2B000.00000004.00000800.00020000.00000000.sdmp, DHL Document.exe, 00000000.00000003.369779518.0000000005B2B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.tiro.com
          Source: DHL Document.exe, 00000000.00000003.372603205.0000000005B2B000.00000004.00000800.00020000.00000000.sdmp, DHL Document.exe, 00000000.00000003.373065712.0000000005B2B000.00000004.00000800.00020000.00000000.sdmp, DHL Document.exe, 00000000.00000003.372516308.0000000005B2B000.00000004.00000800.00020000.00000000.sdmp, DHL Document.exe, 00000000.00000003.369779518.0000000005B2B000.00000004.00000800.00020000.00000000.sdmp, DHL Document.exe, 00000000.00000003.372761903.0000000005B2B000.00000004.00000800.00020000.00000000.sdmp, DHL Document.exe, 00000000.00000003.372909291.0000000005B2B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.tiro.coms
          Source: DHL Document.exe, 00000000.00000002.417347780.0000000006D22000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.typography.netD
          Source: DHL Document.exe, 00000000.00000003.379576940.0000000005B2B000.00000004.00000800.00020000.00000000.sdmp, DHL Document.exe, 00000000.00000003.391081217.0000000005B38000.00000004.00000800.00020000.00000000.sdmp, DHL Document.exe, 00000000.00000003.379746296.0000000005B2B000.00000004.00000800.00020000.00000000.sdmp, DHL Document.exe, 00000000.00000003.391161700.0000000005B38000.00000004.00000800.00020000.00000000.sdmp, DHL Document.exe, 00000000.00000003.379221676.0000000005B2B000.00000004.00000800.00020000.00000000.sdmp, DHL Document.exe, 00000000.00000003.390737863.0000000005B2B000.00000004.00000800.00020000.00000000.sdmp, DHL Document.exe, 00000000.00000003.391283057.0000000005B2B000.00000004.00000800.00020000.00000000.sdmp, DHL Document.exe, 00000000.00000003.390882690.0000000005B37000.00000004.00000800.00020000.00000000.sdmp, DHL Document.exe, 00000000.00000003.390961983.0000000005B38000.00000004.00000800.00020000.00000000.sdmp, DHL Document.exe, 00000000.00000003.379399587.0000000005B2B000.00000004.00000800.00020000.00000000.sdmp, DHL Document.exe, 00000000.00000003.379897961.0000000005B2B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.urwpp.de
          Source: DHL Document.exe, 00000000.00000002.417347780.0000000006D22000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.urwpp.deDPlease
          Source: DHL Document.exe, 00000000.00000003.379576940.0000000005B2B000.00000004.00000800.00020000.00000000.sdmp, DHL Document.exe, 00000000.00000003.379746296.0000000005B2B000.00000004.00000800.00020000.00000000.sdmp, DHL Document.exe, 00000000.00000003.379221676.0000000005B2B000.00000004.00000800.00020000.00000000.sdmp, DHL Document.exe, 00000000.00000003.379399587.0000000005B2B000.00000004.00000800.00020000.00000000.sdmp, DHL Document.exe, 00000000.00000003.379897961.0000000005B2B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.urwpp.deoV
          Source: DHL Document.exe, 00000000.00000003.379576940.0000000005B2B000.00000004.00000800.00020000.00000000.sdmp, DHL Document.exe, 00000000.00000003.380052033.0000000005B2B000.00000004.00000800.00020000.00000000.sdmp, DHL Document.exe, 00000000.00000003.379746296.0000000005B2B000.00000004.00000800.00020000.00000000.sdmp, DHL Document.exe, 00000000.00000003.379221676.0000000005B2B000.00000004.00000800.00020000.00000000.sdmp, DHL Document.exe, 00000000.00000003.379399587.0000000005B2B000.00000004.00000800.00020000.00000000.sdmp, DHL Document.exe, 00000000.00000003.379897961.0000000005B2B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.urwpp.depko
          Source: DHL Document.exe, 00000000.00000003.370472567.0000000005B2B000.00000004.00000800.00020000.00000000.sdmp, DHL Document.exe, 00000000.00000002.417347780.0000000006D22000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.zhongyicts.com.cn
          Source: DHL Document.exe, 00000000.00000003.370472567.0000000005B2B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.zhongyicts.com.cn(
          Source: DHL Document.exe, 00000000.00000003.370472567.0000000005B2B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.zhongyicts.com.cnTC
          Source: DHL Document.exe, 00000000.00000003.370472567.0000000005B2B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.zhongyicts.com.cno.
          Source: DHL Document.exe, 00000000.00000002.412571459.0000000000EEB000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: <HOOK MODULE="DDRAW.DLL" FUNCTION="DirectDrawCreateEx"/>

          E-Banking Fraud

          barindex
          Source: Yara matchFile source: 5.0.DHL Document.exe.400000.8.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 5.0.DHL Document.exe.400000.6.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 5.2.DHL Document.exe.400000.0.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 5.2.DHL Document.exe.400000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 5.0.DHL Document.exe.400000.8.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 5.0.DHL Document.exe.400000.4.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 5.0.DHL Document.exe.400000.6.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 0.2.DHL Document.exe.3df45d0.4.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 0.2.DHL Document.exe.3d9ddb0.3.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 00000005.00000000.409977263.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000000F.00000002.639726248.0000000002EC0000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000005.00000002.487657383.0000000001390000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000000.00000002.413926760.0000000003C59000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000005.00000002.487435815.0000000001360000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000008.00000000.471020130.000000000DD11000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000005.00000000.409332272.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000008.00000000.450790503.000000000DD11000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000000F.00000002.638592382.0000000002BC0000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000000F.00000002.637724743.0000000000B60000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000005.00000002.485734016.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY

          System Summary

          barindex
          Source: 5.0.DHL Document.exe.400000.8.raw.unpack, type: UNPACKEDPEMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 5.0.DHL Document.exe.400000.8.raw.unpack, type: UNPACKEDPEMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 0.2.DHL Document.exe.2c9da00.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables potentially checking for WinJail sandbox window Author: ditekSHen
          Source: 5.0.DHL Document.exe.400000.6.raw.unpack, type: UNPACKEDPEMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 5.0.DHL Document.exe.400000.6.raw.unpack, type: UNPACKEDPEMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 5.2.DHL Document.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 5.2.DHL Document.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 5.2.DHL Document.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 5.2.DHL Document.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 5.0.DHL Document.exe.400000.8.unpack, type: UNPACKEDPEMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 5.0.DHL Document.exe.400000.8.unpack, type: UNPACKEDPEMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 0.2.DHL Document.exe.2d1d508.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables potentially checking for WinJail sandbox window Author: ditekSHen
          Source: 5.0.DHL Document.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 5.0.DHL Document.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 5.0.DHL Document.exe.400000.6.unpack, type: UNPACKEDPEMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 5.0.DHL Document.exe.400000.6.unpack, type: UNPACKEDPEMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 0.2.DHL Document.exe.3df45d0.4.raw.unpack, type: UNPACKEDPEMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 0.2.DHL Document.exe.3df45d0.4.raw.unpack, type: UNPACKEDPEMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 0.2.DHL Document.exe.3d9ddb0.3.raw.unpack, type: UNPACKEDPEMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 0.2.DHL Document.exe.3d9ddb0.3.raw.unpack, type: UNPACKEDPEMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 00000005.00000000.409977263.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 00000005.00000000.409977263.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 0000000F.00000002.639726248.0000000002EC0000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 0000000F.00000002.639726248.0000000002EC0000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 00000005.00000002.487657383.0000000001390000.00000040.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 00000005.00000002.487657383.0000000001390000.00000040.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 00000000.00000002.413926760.0000000003C59000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 00000000.00000002.413926760.0000000003C59000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 00000005.00000002.487435815.0000000001360000.00000040.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 00000005.00000002.487435815.0000000001360000.00000040.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 00000008.00000000.471020130.000000000DD11000.00000040.00000001.00040000.00000000.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 00000008.00000000.471020130.000000000DD11000.00000040.00000001.00040000.00000000.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 00000005.00000000.409332272.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 00000005.00000000.409332272.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 00000008.00000000.450790503.000000000DD11000.00000040.00000001.00040000.00000000.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 00000008.00000000.450790503.000000000DD11000.00000040.00000001.00040000.00000000.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 0000000F.00000002.638592382.0000000002BC0000.00000040.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 0000000F.00000002.638592382.0000000002BC0000.00000040.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 0000000F.00000002.637724743.0000000000B60000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 0000000F.00000002.637724743.0000000000B60000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 00000005.00000002.485734016.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 00000005.00000002.485734016.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: initial sampleStatic PE information: Filename: DHL Document.exe
          Source: DHL Document.exeStatic PE information: LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED
          Source: 5.0.DHL Document.exe.400000.8.raw.unpack, type: UNPACKEDPEMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 5.0.DHL Document.exe.400000.8.raw.unpack, type: UNPACKEDPEMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 0.2.DHL Document.exe.2c9da00.1.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_Anti_OldCopyPaste author = ditekSHen, description = Detects executables potentially checking for WinJail sandbox window
          Source: 5.0.DHL Document.exe.400000.6.raw.unpack, type: UNPACKEDPEMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 5.0.DHL Document.exe.400000.6.raw.unpack, type: UNPACKEDPEMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 5.2.DHL Document.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 5.2.DHL Document.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 5.2.DHL Document.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 5.2.DHL Document.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 5.0.DHL Document.exe.400000.8.unpack, type: UNPACKEDPEMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 5.0.DHL Document.exe.400000.8.unpack, type: UNPACKEDPEMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 0.2.DHL Document.exe.2d1d508.2.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_Anti_OldCopyPaste author = ditekSHen, description = Detects executables potentially checking for WinJail sandbox window
          Source: 5.0.DHL Document.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 5.0.DHL Document.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 5.0.DHL Document.exe.400000.6.unpack, type: UNPACKEDPEMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 5.0.DHL Document.exe.400000.6.unpack, type: UNPACKEDPEMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 0.2.DHL Document.exe.3df45d0.4.raw.unpack, type: UNPACKEDPEMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 0.2.DHL Document.exe.3df45d0.4.raw.unpack, type: UNPACKEDPEMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 0.2.DHL Document.exe.3d9ddb0.3.raw.unpack, type: UNPACKEDPEMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 0.2.DHL Document.exe.3d9ddb0.3.raw.unpack, type: UNPACKEDPEMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 00000005.00000000.409977263.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 00000005.00000000.409977263.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 0000000F.00000002.639726248.0000000002EC0000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 0000000F.00000002.639726248.0000000002EC0000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 00000005.00000002.487657383.0000000001390000.00000040.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 00000005.00000002.487657383.0000000001390000.00000040.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 00000000.00000002.413926760.0000000003C59000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 00000000.00000002.413926760.0000000003C59000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 00000005.00000002.487435815.0000000001360000.00000040.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 00000005.00000002.487435815.0000000001360000.00000040.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 00000008.00000000.471020130.000000000DD11000.00000040.00000001.00040000.00000000.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 00000008.00000000.471020130.000000000DD11000.00000040.00000001.00040000.00000000.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 00000005.00000000.409332272.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 00000005.00000000.409332272.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 00000008.00000000.450790503.000000000DD11000.00000040.00000001.00040000.00000000.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 00000008.00000000.450790503.000000000DD11000.00000040.00000001.00040000.00000000.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 0000000F.00000002.638592382.0000000002BC0000.00000040.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 0000000F.00000002.638592382.0000000002BC0000.00000040.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 0000000F.00000002.637724743.0000000000B60000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 0000000F.00000002.637724743.0000000000B60000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 00000005.00000002.485734016.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 00000005.00000002.485734016.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: C:\Users\user\Desktop\DHL Document.exeCode function: 0_2_01277268
          Source: C:\Users\user\Desktop\DHL Document.exeCode function: 0_2_01277278
          Source: C:\Users\user\Desktop\DHL Document.exeCode function: 0_2_012774BA
          Source: C:\Users\user\Desktop\DHL Document.exeCode function: 0_2_012774C8
          Source: C:\Users\user\Desktop\DHL Document.exeCode function: 5_2_00401030
          Source: C:\Users\user\Desktop\DHL Document.exeCode function: 5_2_00408C8B
          Source: C:\Users\user\Desktop\DHL Document.exeCode function: 5_2_00408C90
          Source: C:\Users\user\Desktop\DHL Document.exeCode function: 5_2_00402D87
          Source: C:\Users\user\Desktop\DHL Document.exeCode function: 5_2_00402D90
          Source: C:\Users\user\Desktop\DHL Document.exeCode function: 5_2_00402FB0
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 15_2_05012D07
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 15_2_05011D55
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 15_2_04F720A0
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 15_2_04F5B090
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 15_2_04F5841F
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 15_2_05001002
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 15_2_04F5D5E0
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 15_2_04F72581
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 15_2_050120A8
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 15_2_04F40D20
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 15_2_04F64120
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 15_2_04F4F900
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 15_2_05012B28
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 15_2_04F66E30
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 15_2_0500DBD2
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 15_2_05011FF1
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 15_2_04F7EBB0
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 15_2_050122AE
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 15_2_05012EF7
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 15_2_02EC2FB0
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 15_2_02EC8C8B
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 15_2_02EC8C90
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 15_2_02EC2D87
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 15_2_02EC2D90
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: String function: 04F4B150 appears 35 times
          Source: C:\Users\user\Desktop\DHL Document.exeCode function: 5_2_004185F0 NtCreateFile,
          Source: C:\Users\user\Desktop\DHL Document.exeCode function: 5_2_004186A0 NtReadFile,
          Source: C:\Users\user\Desktop\DHL Document.exeCode function: 5_2_00418720 NtClose,
          Source: C:\Users\user\Desktop\DHL Document.exeCode function: 5_2_004187D0 NtAllocateVirtualMemory,
          Source: C:\Users\user\Desktop\DHL Document.exeCode function: 5_2_004185EA NtCreateFile,
          Source: C:\Users\user\Desktop\DHL Document.exeCode function: 5_2_00418642 NtReadFile,
          Source: C:\Users\user\Desktop\DHL Document.exeCode function: 5_2_0041869A NtReadFile,
          Source: C:\Users\user\Desktop\DHL Document.exeCode function: 5_2_004187CB NtAllocateVirtualMemory,
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 15_2_04F89860 NtQuerySystemInformation,LdrInitializeThunk,
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 15_2_04F89840 NtDelayExecution,LdrInitializeThunk,
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 15_2_04F895D0 NtClose,LdrInitializeThunk,
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 15_2_04F899A0 NtCreateSection,LdrInitializeThunk,
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 15_2_04F89540 NtReadFile,LdrInitializeThunk,
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 15_2_04F89910 NtAdjustPrivilegesToken,LdrInitializeThunk,
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 15_2_04F896E0 NtFreeVirtualMemory,LdrInitializeThunk,
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 15_2_04F896D0 NtCreateKey,LdrInitializeThunk,
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 15_2_04F89660 NtAllocateVirtualMemory,LdrInitializeThunk,
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 15_2_04F89650 NtQueryValueKey,LdrInitializeThunk,
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 15_2_04F89A50 NtCreateFile,LdrInitializeThunk,
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 15_2_04F89FE0 NtCreateMutant,LdrInitializeThunk,
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 15_2_04F89780 NtMapViewOfSection,LdrInitializeThunk,
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 15_2_04F89710 NtQueryInformationToken,LdrInitializeThunk,
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 15_2_04F898F0 NtReadVirtualMemory,
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 15_2_04F898A0 NtWriteVirtualMemory,
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 15_2_04F8B040 NtSuspendThread,
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 15_2_04F89820 NtEnumerateKey,
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 15_2_04F895F0 NtQueryInformationFile,
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 15_2_04F899D0 NtCreateProcessEx,
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 15_2_04F89560 NtWriteFile,
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 15_2_04F89950 NtQueueApcThread,
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 15_2_04F8AD30 NtSetContextThread,
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 15_2_04F89520 NtWaitForSingleObject,
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 15_2_04F89A80 NtOpenDirectoryObject,
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 15_2_04F89670 NtQueryInformationProcess,
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 15_2_04F89A20 NtResumeThread,
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 15_2_04F89610 NtEnumerateValueKey,
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 15_2_04F89A10 NtQuerySection,
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 15_2_04F89A00 NtProtectVirtualMemory,
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 15_2_04F8A3B0 NtGetContextThread,
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 15_2_04F897A0 NtUnmapViewOfSection,
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 15_2_04F89770 NtSetInformationFile,
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 15_2_04F8A770 NtOpenThread,
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 15_2_04F89760 NtOpenProcess,
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 15_2_04F89730 NtQueryVirtualMemory,
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 15_2_04F8A710 NtOpenProcessToken,
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 15_2_04F89B00 NtSetValueKey,
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 15_2_02ED86A0 NtReadFile,
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 15_2_02ED87D0 NtAllocateVirtualMemory,
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 15_2_02ED8720 NtClose,
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 15_2_02ED85F0 NtCreateFile,
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 15_2_02ED869A NtReadFile,
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 15_2_02ED8642 NtReadFile,
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 15_2_02ED87CB NtAllocateVirtualMemory,
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 15_2_02ED85EA NtCreateFile,
          Source: DHL Document.exe, 00000000.00000002.413926760.0000000003C59000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameUI.dllF vs DHL Document.exe
          Source: DHL Document.exe, 00000000.00000002.412348477.00000000007D8000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameCultureNameResourceSetPa.exe4 vs DHL Document.exe
          Source: DHL Document.exe, 00000000.00000002.418429951.0000000007C00000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameUI.dllF vs DHL Document.exe
          Source: DHL Document.exe, 00000000.00000002.413494042.0000000002D09000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameSafeSerializationManager.dll: vs DHL Document.exe
          Source: DHL Document.exe, 00000000.00000002.413281516.0000000002C51000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilename vs DHL Document.exe
          Source: DHL Document.exe, 00000000.00000002.413281516.0000000002C51000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameSafeSerializationManager.dll: vs DHL Document.exe
          Source: DHL Document.exe, 00000000.00000002.412571459.0000000000EEB000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameclr.dllT vs DHL Document.exe
          Source: DHL Document.exe, 00000000.00000002.413419907.0000000002CAA000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameCultureNameResourceSetPa.exe4 vs DHL Document.exe
          Source: DHL Document.exe, 00000000.00000002.413419907.0000000002CAA000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilename vs DHL Document.exe
          Source: DHL Document.exe, 00000000.00000002.413419907.0000000002CAA000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: i,\\StringFileInfo\\000004B0\\OriginalFilename vs DHL Document.exe
          Source: DHL Document.exe, 00000005.00000000.410179466.0000000000AB8000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameCultureNameResourceSetPa.exe4 vs DHL Document.exe
          Source: DHL Document.exe, 00000005.00000002.489403088.00000000033E3000.00000040.10000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenamecolorcpl.exej% vs DHL Document.exe
          Source: DHL Document.exe, 00000005.00000003.412733392.000000000139F000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenamentdll.dllj% vs DHL Document.exe
          Source: DHL Document.exe, 00000005.00000002.488936752.00000000016CF000.00000040.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenamentdll.dllj% vs DHL Document.exe
          Source: DHL Document.exe, 00000005.00000002.488674314.000000000153F000.00000040.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenamentdll.dllj% vs DHL Document.exe
          Source: C:\Users\user\Desktop\DHL Document.exeFile read: C:\Users\user\Desktop\DHL Document.exe:Zone.IdentifierJump to behavior
          Source: DHL Document.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
          Source: C:\Users\user\Desktop\DHL Document.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
          Source: unknownProcess created: C:\Users\user\Desktop\DHL Document.exe "C:\Users\user\Desktop\DHL Document.exe"
          Source: C:\Users\user\Desktop\DHL Document.exeProcess created: C:\Users\user\Desktop\DHL Document.exe C:\Users\user\Desktop\DHL Document.exe
          Source: C:\Windows\explorer.exeProcess created: C:\Windows\SysWOW64\colorcpl.exe C:\Windows\SysWOW64\colorcpl.exe
          Source: C:\Windows\SysWOW64\colorcpl.exeProcess created: C:\Windows\SysWOW64\cmd.exe /c del "C:\Users\user\Desktop\DHL Document.exe"
          Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
          Source: C:\Windows\SysWOW64\colorcpl.exeProcess created: C:\Windows\explorer.exe "C:\Windows\explorer.exe" /LOADSAVEDWINDOWS
          Source: C:\Users\user\Desktop\DHL Document.exeProcess created: C:\Users\user\Desktop\DHL Document.exe C:\Users\user\Desktop\DHL Document.exe
          Source: C:\Windows\SysWOW64\colorcpl.exeProcess created: C:\Windows\SysWOW64\cmd.exe /c del "C:\Users\user\Desktop\DHL Document.exe"
          Source: C:\Windows\explorer.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{6C3EE638-B588-4D7D-B30A-E7E36759305D}\InprocServer32
          Source: C:\Users\user\Desktop\DHL Document.exeFile created: C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\DHL Document.exe.logJump to behavior
          Source: classification engineClassification label: mal100.troj.evad.winEXE@8/2@0/0
          Source: C:\Windows\explorer.exeFile read: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\desktop.iniJump to behavior
          Source: C:\Users\user\Desktop\DHL Document.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
          Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5676:120:WilError_01
          Source: C:\Windows\SysWOW64\colorcpl.exeProcess created: C:\Windows\explorer.exe
          Source: DHL Document.exe, oz/RT.csCryptographic APIs: 'CreateDecryptor'
          Source: DHL Document.exe, oz/RT.csCryptographic APIs: 'CreateDecryptor'
          Source: 0.2.DHL Document.exe.710000.0.unpack, oz/RT.csCryptographic APIs: 'CreateDecryptor'
          Source: 0.2.DHL Document.exe.710000.0.unpack, oz/RT.csCryptographic APIs: 'CreateDecryptor'
          Source: 0.0.DHL Document.exe.710000.0.unpack, oz/RT.csCryptographic APIs: 'CreateDecryptor'
          Source: 0.0.DHL Document.exe.710000.0.unpack, oz/RT.csCryptographic APIs: 'CreateDecryptor'
          Source: 5.0.DHL Document.exe.9f0000.1.unpack, oz/RT.csCryptographic APIs: 'CreateDecryptor'
          Source: 5.0.DHL Document.exe.9f0000.1.unpack, oz/RT.csCryptographic APIs: 'CreateDecryptor'
          Source: 5.0.DHL Document.exe.9f0000.9.unpack, oz/RT.csCryptographic APIs: 'CreateDecryptor'
          Source: 5.0.DHL Document.exe.9f0000.9.unpack, oz/RT.csCryptographic APIs: 'CreateDecryptor'
          Source: 5.0.DHL Document.exe.9f0000.3.unpack, oz/RT.csCryptographic APIs: 'CreateDecryptor'
          Source: 5.0.DHL Document.exe.9f0000.3.unpack, oz/RT.csCryptographic APIs: 'CreateDecryptor'
          Source: Window RecorderWindow detected: More than 3 window changes detected
          Source: C:\Users\user\Desktop\DHL Document.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dll
          Source: DHL Document.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
          Source: DHL Document.exeStatic PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
          Source: DHL Document.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
          Source: Binary string: CultureNameResourceSetPa.pdb source: DHL Document.exe
          Source: Binary string: colorcpl.pdbGCTL source: DHL Document.exe, 00000005.00000002.489364104.00000000033E0000.00000040.10000000.00040000.00000000.sdmp
          Source: Binary string: colorcpl.pdb source: DHL Document.exe, 00000005.00000002.489364104.00000000033E0000.00000040.10000000.00040000.00000000.sdmp
          Source: Binary string: wntdll.pdbUGP source: DHL Document.exe, 00000005.00000002.488054555.0000000001420000.00000040.00000800.00020000.00000000.sdmp, DHL Document.exe, 00000005.00000002.488674314.000000000153F000.00000040.00000800.00020000.00000000.sdmp, DHL Document.exe, 00000005.00000003.412367442.0000000001280000.00000004.00000800.00020000.00000000.sdmp, colorcpl.exe, 0000000F.00000002.644486032.0000000004F20000.00000040.00000800.00020000.00000000.sdmp, colorcpl.exe, 0000000F.00000002.645100478.000000000503F000.00000040.00000800.00020000.00000000.sdmp
          Source: Binary string: wntdll.pdb source: DHL Document.exe, 00000005.00000002.488054555.0000000001420000.00000040.00000800.00020000.00000000.sdmp, DHL Document.exe, 00000005.00000002.488674314.000000000153F000.00000040.00000800.00020000.00000000.sdmp, DHL Document.exe, 00000005.00000003.412367442.0000000001280000.00000004.00000800.00020000.00000000.sdmp, colorcpl.exe, colorcpl.exe, 0000000F.00000002.644486032.0000000004F20000.00000040.00000800.00020000.00000000.sdmp, colorcpl.exe, 0000000F.00000002.645100478.000000000503F000.00000040.00000800.00020000.00000000.sdmp

          Data Obfuscation

          barindex
          Source: DHL Document.exe, Xk/H7.cs.Net Code: bON System.Reflection.Assembly System.AppDomain::Load(System.Byte[])
          Source: 0.2.DHL Document.exe.710000.0.unpack, Xk/H7.cs.Net Code: bON System.Reflection.Assembly System.AppDomain::Load(System.Byte[])
          Source: 0.0.DHL Document.exe.710000.0.unpack, Xk/H7.cs.Net Code: bON System.Reflection.Assembly System.AppDomain::Load(System.Byte[])
          Source: 5.0.DHL Document.exe.9f0000.1.unpack, Xk/H7.cs.Net Code: bON System.Reflection.Assembly System.AppDomain::Load(System.Byte[])
          Source: 5.0.DHL Document.exe.9f0000.9.unpack, Xk/H7.cs.Net Code: bON System.Reflection.Assembly System.AppDomain::Load(System.Byte[])
          Source: 5.0.DHL Document.exe.9f0000.3.unpack, Xk/H7.cs.Net Code: bON System.Reflection.Assembly System.AppDomain::Load(System.Byte[])
          Source: 5.0.DHL Document.exe.9f0000.5.unpack, Xk/H7.cs.Net Code: bON System.Reflection.Assembly System.AppDomain::Load(System.Byte[])
          Source: 5.0.DHL Document.exe.9f0000.0.unpack, Xk/H7.cs.Net Code: bON System.Reflection.Assembly System.AppDomain::Load(System.Byte[])
          Source: 5.2.DHL Document.exe.9f0000.1.unpack, Xk/H7.cs.Net Code: bON System.Reflection.Assembly System.AppDomain::Load(System.Byte[])
          Source: 5.0.DHL Document.exe.9f0000.2.unpack, Xk/H7.cs.Net Code: bON System.Reflection.Assembly System.AppDomain::Load(System.Byte[])
          Source: 5.0.DHL Document.exe.9f0000.7.unpack, Xk/H7.cs.Net Code: bON System.Reflection.Assembly System.AppDomain::Load(System.Byte[])
          Source: DHL Document.exe, oz/RT.cs.Net Code: stackVariable1.GetMethod("GetDelegateForFunctionPointer", V_0)
          Source: 0.2.DHL Document.exe.710000.0.unpack, oz/RT.cs.Net Code: stackVariable1.GetMethod("GetDelegateForFunctionPointer", V_0)
          Source: 0.0.DHL Document.exe.710000.0.unpack, oz/RT.cs.Net Code: stackVariable1.GetMethod("GetDelegateForFunctionPointer", V_0)
          Source: 5.0.DHL Document.exe.9f0000.1.unpack, oz/RT.cs.Net Code: stackVariable1.GetMethod("GetDelegateForFunctionPointer", V_0)
          Source: 5.0.DHL Document.exe.9f0000.9.unpack, oz/RT.cs.Net Code: stackVariable1.GetMethod("GetDelegateForFunctionPointer", V_0)
          Source: 5.0.DHL Document.exe.9f0000.3.unpack, oz/RT.cs.Net Code: stackVariable1.GetMethod("GetDelegateForFunctionPointer", V_0)
          Source: 5.0.DHL Document.exe.9f0000.5.unpack, oz/RT.cs.Net Code: stackVariable1.GetMethod("GetDelegateForFunctionPointer", V_0)
          Source: 5.0.DHL Document.exe.9f0000.0.unpack, oz/RT.cs.Net Code: stackVariable1.GetMethod("GetDelegateForFunctionPointer", V_0)
          Source: 5.2.DHL Document.exe.9f0000.1.unpack, oz/RT.cs.Net Code: stackVariable1.GetMethod("GetDelegateForFunctionPointer", V_0)
          Source: 5.0.DHL Document.exe.9f0000.2.unpack, oz/RT.cs.Net Code: stackVariable1.GetMethod("GetDelegateForFunctionPointer", V_0)
          Source: 5.0.DHL Document.exe.9f0000.7.unpack, oz/RT.cs.Net Code: stackVariable1.GetMethod("GetDelegateForFunctionPointer", V_0)
          Source: C:\Users\user\Desktop\DHL Document.exeCode function: 0_2_07D6BAF5 push FFFFFF8Bh; iretd
          Source: C:\Users\user\Desktop\DHL Document.exeCode function: 5_2_0041B832 push eax; ret
          Source: C:\Users\user\Desktop\DHL Document.exeCode function: 5_2_0041B83B push eax; ret
          Source: C:\Users\user\Desktop\DHL Document.exeCode function: 5_2_0041B89C push eax; ret
          Source: C:\Users\user\Desktop\DHL Document.exeCode function: 5_2_0040825A push ecx; retf
          Source: C:\Users\user\Desktop\DHL Document.exeCode function: 5_2_0040C38A pushfd ; ret
          Source: C:\Users\user\Desktop\DHL Document.exeCode function: 5_2_00415CC4 push FFFFFFDFh; iretd
          Source: C:\Users\user\Desktop\DHL Document.exeCode function: 5_2_0041B7E5 push eax; ret
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 15_2_04F9D0D1 push ecx; ret
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 15_2_02EC825A push ecx; retf
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 15_2_02ECC38A pushfd ; ret
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 15_2_02EDB89C push eax; ret
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 15_2_02EDB83B push eax; ret
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 15_2_02EDB832 push eax; ret
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 15_2_02EDB7E5 push eax; ret
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 15_2_02ED5CC4 push FFFFFFDFh; iretd

          Hooking and other Techniques for Hiding and Protection

          barindex
          Source: C:\Windows\SysWOW64\colorcpl.exeProcess created: /c del "C:\Users\user\Desktop\DHL Document.exe"
          Source: C:\Windows\SysWOW64\colorcpl.exeProcess created: /c del "C:\Users\user\Desktop\DHL Document.exe"
          Source: C:\Windows\explorer.exeRegistry key monitored for changes: HKEY_CURRENT_USER_Classes
          Source: C:\Users\user\Desktop\DHL Document.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\DHL Document.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\DHL Document.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\DHL Document.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\DHL Document.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\DHL Document.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\DHL Document.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\DHL Document.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\DHL Document.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\DHL Document.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\DHL Document.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\DHL Document.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\DHL Document.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\DHL Document.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\DHL Document.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\DHL Document.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\DHL Document.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\DHL Document.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\DHL Document.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\DHL Document.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\DHL Document.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\DHL Document.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\DHL Document.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\DHL Document.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\DHL Document.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\DHL Document.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\DHL Document.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\DHL Document.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\DHL Document.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\DHL Document.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\DHL Document.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\DHL Document.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\DHL Document.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\DHL Document.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\DHL Document.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\DHL Document.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\DHL Document.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\DHL Document.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\DHL Document.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\colorcpl.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX
          Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX

          Malware Analysis System Evasion

          barindex
          Source: Yara matchFile source: 0.2.DHL Document.exe.2c9da00.1.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 0.2.DHL Document.exe.2d1d508.2.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 00000000.00000002.413494042.0000000002D09000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000000.00000002.413281516.0000000002C51000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: Process Memory Space: DHL Document.exe PID: 6900, type: MEMORYSTR
          Source: DHL Document.exe, 00000000.00000002.413494042.0000000002D09000.00000004.00000800.00020000.00000000.sdmp, DHL Document.exe, 00000000.00000002.413281516.0000000002C51000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: SBIEDLL.DLL
          Source: DHL Document.exe, 00000000.00000002.413494042.0000000002D09000.00000004.00000800.00020000.00000000.sdmp, DHL Document.exe, 00000000.00000002.413281516.0000000002C51000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: KERNEL32.DLL.WINE_GET_UNIX_FILE_NAME
          Source: C:\Users\user\Desktop\DHL Document.exeRDTSC instruction interceptor: First address: 0000000000408614 second address: 000000000040861A instructions: 0x00000000 rdtsc 0x00000002 xor ecx, ecx 0x00000004 add ecx, eax 0x00000006 rdtsc
          Source: C:\Users\user\Desktop\DHL Document.exeRDTSC instruction interceptor: First address: 00000000004089AE second address: 00000000004089B4 instructions: 0x00000000 rdtsc 0x00000002 xor ecx, ecx 0x00000004 add ecx, eax 0x00000006 rdtsc
          Source: C:\Windows\SysWOW64\colorcpl.exeRDTSC instruction interceptor: First address: 0000000002EC8614 second address: 0000000002EC861A instructions: 0x00000000 rdtsc 0x00000002 xor ecx, ecx 0x00000004 add ecx, eax 0x00000006 rdtsc
          Source: C:\Windows\SysWOW64\colorcpl.exeRDTSC instruction interceptor: First address: 0000000002EC89AE second address: 0000000002EC89B4 instructions: 0x00000000 rdtsc 0x00000002 xor ecx, ecx 0x00000004 add ecx, eax 0x00000006 rdtsc
          Source: C:\Users\user\Desktop\DHL Document.exe TID: 6904Thread sleep time: -41116s >= -30000s
          Source: C:\Users\user\Desktop\DHL Document.exe TID: 6948Thread sleep time: -922337203685477s >= -30000s
          Source: C:\Windows\SysWOW64\colorcpl.exeLast function: Thread delayed
          Source: C:\Users\user\Desktop\DHL Document.exeCode function: 5_2_004088E0 rdtsc
          Source: C:\Users\user\Desktop\DHL Document.exeThread delayed: delay time: 922337203685477
          Source: C:\Windows\explorer.exeFile opened / queried: SCSI#Disk&Ven_VMware&Prod_Virtual_disk#5&1ec51bf7&0&000000#{53f56307-b6bf-11d0-94f2-00a0c91efb8b}
          Source: C:\Users\user\Desktop\DHL Document.exeCode function: 0_2_00718B05 sldt word ptr [eax]
          Source: C:\Windows\SysWOW64\colorcpl.exeAPI coverage: 9.7 %
          Source: C:\Users\user\Desktop\DHL Document.exeProcess information queried: ProcessInformation
          Source: C:\Users\user\Desktop\DHL Document.exeThread delayed: delay time: 41116
          Source: C:\Users\user\Desktop\DHL Document.exeThread delayed: delay time: 922337203685477
          Source: DHL Document.exe, 00000000.00000002.413281516.0000000002C51000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: VMware SVGA IIBAdd-MpPreference -ExclusionPath "
          Source: explorer.exe, 00000008.00000000.447637801.00000000083E0000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: VMware SATA CD00dRom0
          Source: explorer.exe, 0000001B.00000000.623961064.000000000697B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: SCSI\Disk&Ven_VMware&Prod_Virtual_disk\5&1ec51bf7&0&000000
          Source: explorer.exe, 0000001B.00000003.611640671.000000000697B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: SCSI\CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00\5&280b647&0&000000Z
          Source: DHL Document.exe, 00000000.00000002.413281516.0000000002C51000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: InstallPathJC:\PROGRAM FILES\VMWARE\VMWARE TOOLS\
          Source: explorer.exe, 0000001B.00000003.586610331.0000000006DF9000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000025700000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#000000001F400000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000026700000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000000100000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&280b647&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_Msft&Prod_Virtual_DVD-ROM#2&1f4adffe&0&000001#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}
          Source: explorer.exe, 0000001B.00000000.626703720.0000000006B57000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \\?\scsi#cdrom&ven_necvmwar&prod_vmware_sata_cd00#5&280b647&0&000000#{53f56308-b6bf-11d0-94f2-00a0c91efb8b}
          Source: DHL Document.exe, 00000000.00000002.413281516.0000000002C51000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: vmware
          Source: explorer.exe, 0000001B.00000000.626112232.0000000006B19000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: VMware SATA CD00
          Source: explorer.exe, 0000001B.00000000.626703720.0000000006B57000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \\?\scsi#cdrom&ven_necvmwar&prod_vmware_sata_cd00#5&280b647&0&000000#{53f56308-b6bf-11d0-94f2-00a0c91efb8b}
          Source: explorer.exe, 0000001B.00000000.628126302.0000000006DA7000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000025700000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#000000001F400000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000026700000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000000100000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&280b647&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_Msft&Prod_Virtual_DVD-ROM#2&1f4adffe&0&000001#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}/
          Source: explorer.exe, 0000001B.00000000.628126302.0000000006DA7000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000025700000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#000000001F400000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000026700000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000000100000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&280b647&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_Msft&Prod_Virtual_DVD-ROM#2&1f4adffe&0&000001#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}'g
          Source: explorer.exe, 00000008.00000000.447469758.00000000082E2000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: \\?\scsi#cdrom&ven_necvmwar&prod_vmware_sata_cd00#5&280b647&0&000000#{53f56308-b6bf-11d0-94f2-00a0c91efb8b}>
          Source: explorer.exe, 0000001B.00000003.586646860.0000000006E0F000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \??\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&280b647&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\Device\CdRom0\??\Volume{e6e9dfd8-98f2-11e9-90ce-806e
          Source: explorer.exe, 0000001B.00000000.628126302.0000000006DA7000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000025700000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#000000001F400000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000026700000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000000100000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&280b647&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_Msft&Prod_Virtual_DVD-ROM#2&1f4adffe&0&000001#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}57
          Source: explorer.exe, 0000001B.00000000.625850311.0000000006AD3000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: od_vmware_sata_cd00#5&280b647&0&000000#{53f563f-8
          Source: explorer.exe, 0000001B.00000000.616115408.0000000000A58000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: SCSI\CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00\5&280b647&0&000000
          Source: explorer.exe, 00000008.00000000.468364541.0000000008430000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: SCSI\CDROM&VEN_NECVMWAR&PROD_VMWARE_SATA_CD00\5&280B647&0&000000-;
          Source: DHL Document.exe, 00000000.00000002.413281516.0000000002C51000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: VMWAREDSOFTWARE\VMware, Inc.\VMware Tools
          Source: explorer.exe, 00000008.00000000.516000007.000000000095C000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&280b647&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}G
          Source: explorer.exe, 0000001B.00000003.611589319.0000000006956000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: SCSI\Disk&Ven_VMware&Prod_Virtual_disk\5&1ec51bf7&0&000000@v
          Source: C:\Users\user\Desktop\DHL Document.exeCode function: 5_2_004088E0 rdtsc
          Source: C:\Users\user\Desktop\DHL Document.exeProcess token adjusted: Debug
          Source: C:\Windows\SysWOW64\colorcpl.exeProcess token adjusted: Debug
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 15_2_04FC6CF0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 15_2_04FC6CF0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 15_2_04FC6CF0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 15_2_04F458EC mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 15_2_04FDB8D0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 15_2_04FDB8D0 mov ecx, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 15_2_04FDB8D0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 15_2_04FDB8D0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 15_2_04FDB8D0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 15_2_04FDB8D0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 15_2_05018D34 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 15_2_04F7F0BF mov ecx, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 15_2_04F7F0BF mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 15_2_04F7F0BF mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 15_2_04F890AF mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 15_2_04F720A0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 15_2_04F720A0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 15_2_04F720A0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 15_2_04F720A0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 15_2_04F720A0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 15_2_04F720A0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 15_2_04F5849B mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 15_2_04F49080 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 15_2_04FC3884 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 15_2_04FC3884 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 15_2_04F6746D mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 15_2_04F60050 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 15_2_04F60050 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 15_2_04FDC450 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 15_2_04FDC450 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 15_2_050105AC mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 15_2_050105AC mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 15_2_04F7A44B mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 15_2_04F7002D mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 15_2_04F7002D mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 15_2_04F7002D mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 15_2_04F7002D mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 15_2_04F7002D mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 15_2_04F7BC2C mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 15_2_04F5B02A mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 15_2_04F5B02A mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 15_2_04F5B02A mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 15_2_04F5B02A mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 15_2_0500FDE2 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 15_2_0500FDE2 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 15_2_0500FDE2 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 15_2_0500FDE2 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 15_2_04FC7016 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 15_2_04FC7016 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 15_2_04FC7016 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 15_2_04FC6C0A mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 15_2_04FC6C0A mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 15_2_04FC6C0A mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 15_2_04FC6C0A mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 15_2_05001C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 15_2_05001C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 15_2_05001C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 15_2_05001C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 15_2_05001C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 15_2_05001C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 15_2_05001C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 15_2_05001C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 15_2_05001C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 15_2_05001C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 15_2_05001C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 15_2_05001C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 15_2_05001C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 15_2_05001C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 15_2_0501740D mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 15_2_0501740D mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 15_2_0501740D mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 15_2_04FF8DF1 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 15_2_05014015 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 15_2_05014015 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 15_2_04F4B1E1 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 15_2_04F4B1E1 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 15_2_04F4B1E1 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 15_2_04FD41E8 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 15_2_04F5D5E0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 15_2_04F5D5E0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 15_2_04FC6DC9 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 15_2_04FC6DC9 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 15_2_04FC6DC9 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 15_2_04FC6DC9 mov ecx, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 15_2_04FC6DC9 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 15_2_04FC6DC9 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 15_2_04F71DB5 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 15_2_04F71DB5 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 15_2_04F71DB5 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 15_2_04FC51BE mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 15_2_04FC51BE mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 15_2_04FC51BE mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 15_2_04FC51BE mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 15_2_04F735A1 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 15_2_04F761A0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 15_2_04F761A0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 15_2_04FC69A6 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 15_2_04F72990 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 15_2_04F7FD9B mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 15_2_04F7FD9B mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 15_2_04F7A185 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 15_2_05002073 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 15_2_04F6C182 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 15_2_05011074 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 15_2_04F72581 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 15_2_04F72581 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 15_2_04F72581 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 15_2_04F72581 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 15_2_04F42D8A mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 15_2_04F42D8A mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 15_2_04F42D8A mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 15_2_04F42D8A mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 15_2_04F42D8A mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 15_2_04F6C577 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 15_2_04F6C577 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 15_2_04F4B171 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 15_2_04F4B171 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 15_2_04F4C962 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 15_2_04F67D50 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 15_2_04F6B944 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 15_2_04F6B944 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 15_2_04F83D43 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 15_2_04FC3540 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 15_2_04F53D34 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 15_2_04F53D34 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 15_2_04F53D34 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 15_2_04F53D34 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 15_2_04F53D34 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 15_2_04F53D34 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 15_2_04F53D34 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 15_2_04F53D34 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 15_2_04F53D34 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 15_2_04F53D34 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 15_2_04F53D34 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 15_2_04F53D34 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 15_2_04F53D34 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 15_2_04F4AD30 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 15_2_04FCA537 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 15_2_04F74D3B mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 15_2_04F74D3B mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 15_2_04F74D3B mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 15_2_04F7513A mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 15_2_04F7513A mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 15_2_04F64120 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 15_2_04F64120 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 15_2_04F64120 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 15_2_04F64120 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 15_2_04F64120 mov ecx, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 15_2_05018CD6 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 15_2_04F49100 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 15_2_04F49100 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 15_2_04F49100 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 15_2_050014FB mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 15_2_0501070D mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 15_2_0501070D mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 15_2_04F72AE4 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 15_2_04F716E0 mov ecx, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 15_2_04F576E2 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 15_2_0500131B mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 15_2_04F736CC mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 15_2_04F72ACB mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 15_2_04FFFEC0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 15_2_04F88EC7 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 15_2_04F5AAB0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 15_2_04F5AAB0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 15_2_04F7FAB0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 15_2_04F452A5 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 15_2_04F452A5 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 15_2_04F452A5 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 15_2_04F452A5 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 15_2_04F452A5 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 15_2_05018B58 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 15_2_04FC46A7 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 15_2_04F7D294 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 15_2_04F7D294 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 15_2_05018F6A mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 15_2_04FDFE87 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 15_2_04F8927A mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 15_2_04F6AE73 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 15_2_04F6AE73 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 15_2_04F6AE73 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 15_2_04F6AE73 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 15_2_04F6AE73 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 15_2_0500138A mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 15_2_04F5766D mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 15_2_04FFB260 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 15_2_04FFB260 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 15_2_05015BA5 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 15_2_04FD4257 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 15_2_04F49240 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 15_2_04F49240 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 15_2_04F49240 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 15_2_04F49240 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 15_2_04F57E41 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 15_2_04F57E41 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 15_2_04F57E41 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 15_2_04F57E41 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 15_2_04F57E41 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 15_2_04F57E41 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 15_2_04FFFE3F mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 15_2_04F4E620 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 15_2_04F84A2C mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 15_2_04F84A2C mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 15_2_04F4AA16 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 15_2_04F4AA16 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 15_2_04F45210 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 15_2_04F45210 mov ecx, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 15_2_04F45210 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 15_2_04F45210 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 15_2_04F63A1C mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 15_2_04F7A61C mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 15_2_04F7A61C mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 15_2_04F4C600 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 15_2_04F4C600 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 15_2_04F4C600 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 15_2_04F78E00 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 15_2_04F58A0A mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 15_2_05001608 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 15_2_04F837F5 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 15_2_04F703E2 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 15_2_04F703E2 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 15_2_04F703E2 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 15_2_04F703E2 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 15_2_04F703E2 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 15_2_04F703E2 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 15_2_04F6DBE9 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 15_2_04FC53CA mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 15_2_04FC53CA mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 15_2_0500EA55 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 15_2_04F74BAD mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 15_2_04F74BAD mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 15_2_04F74BAD mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 15_2_04F72397 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 15_2_04F58794 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 15_2_05018A62 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 15_2_04F7B390 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 15_2_04FC7794 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 15_2_04FC7794 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 15_2_04FC7794 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 15_2_04F51B8F mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 15_2_04F51B8F mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 15_2_04FFD380 mov ecx, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 15_2_04F73B7A mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 15_2_04F73B7A mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 15_2_04F4DB60 mov ecx, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 15_2_04F5FF60 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 15_2_05010EA5 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 15_2_05010EA5 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 15_2_05010EA5 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 15_2_04F4F358 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 15_2_04F4DB40 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 15_2_04F5EF40 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 15_2_04F7E730 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 15_2_05018ED6 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 15_2_04F44F2E mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 15_2_04F44F2E mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 15_2_04F6F716 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 15_2_04FDFF10 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 15_2_04FDFF10 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 15_2_04F7A70E mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 15_2_04F7A70E mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL Document.exeProcess queried: DebugPort
          Source: C:\Windows\SysWOW64\colorcpl.exeProcess queried: DebugPort
          Source: C:\Users\user\Desktop\DHL Document.exeCode function: 5_2_00409B50 LdrLoadDll,
          Source: C:\Users\user\Desktop\DHL Document.exeMemory allocated: page read and write | page guard

          HIPS / PFW / Operating System Protection Evasion

          barindex
          Source: C:\Users\user\Desktop\DHL Document.exeSection unmapped: C:\Windows\SysWOW64\colorcpl.exe base address: A90000
          Source: C:\Users\user\Desktop\DHL Document.exeSection loaded: unknown target: C:\Windows\explorer.exe protection: execute and read and write
          Source: C:\Users\user\Desktop\DHL Document.exeSection loaded: unknown target: C:\Windows\SysWOW64\colorcpl.exe protection: execute and read and write
          Source: C:\Users\user\Desktop\DHL Document.exeSection loaded: unknown target: C:\Windows\SysWOW64\colorcpl.exe protection: execute and read and write
          Source: C:\Windows\SysWOW64\colorcpl.exeSection loaded: unknown target: C:\Windows\explorer.exe protection: read write
          Source: C:\Windows\SysWOW64\colorcpl.exeSection loaded: unknown target: C:\Windows\explorer.exe protection: execute and read and write
          Source: C:\Windows\SysWOW64\colorcpl.exeSection loaded: unknown target: unknown protection: read write
          Source: C:\Windows\SysWOW64\colorcpl.exeSection loaded: unknown target: C:\Windows\explorer.exe protection: read write
          Source: C:\Windows\SysWOW64\colorcpl.exeSection loaded: unknown target: C:\Windows\explorer.exe protection: execute and read and write
          Source: C:\Users\user\Desktop\DHL Document.exeMemory written: C:\Users\user\Desktop\DHL Document.exe base: 400000 value starts with: 4D5A
          Source: C:\Users\user\Desktop\DHL Document.exeThread APC queued: target process: C:\Windows\explorer.exe
          Source: C:\Users\user\Desktop\DHL Document.exeThread register set: target process: 3440
          Source: C:\Windows\SysWOW64\colorcpl.exeThread register set: target process: 3440
          Source: C:\Users\user\Desktop\DHL Document.exeProcess created: C:\Users\user\Desktop\DHL Document.exe C:\Users\user\Desktop\DHL Document.exe
          Source: C:\Windows\SysWOW64\colorcpl.exeProcess created: C:\Windows\SysWOW64\cmd.exe /c del "C:\Users\user\Desktop\DHL Document.exe"
          Source: explorer.exe, 00000008.00000000.442073157.0000000004F80000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000008.00000000.430435016.00000000083E0000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000008.00000000.467254632.00000000083E0000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000008.00000000.457392051.0000000000EE0000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 00000008.00000000.417812385.0000000000EE0000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 00000008.00000000.447637801.00000000083E0000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000008.00000000.439449004.0000000000EE0000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 00000008.00000000.516286747.0000000000EE0000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: Shell_TrayWnd
          Source: explorer.exe, 00000008.00000000.416826676.00000000008B8000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000008.00000000.457392051.0000000000EE0000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 00000008.00000000.515897066.00000000008B8000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000008.00000000.417812385.0000000000EE0000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 00000008.00000000.456927922.00000000008B8000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000008.00000000.439449004.0000000000EE0000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 00000008.00000000.438839855.00000000008B8000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000008.00000000.516286747.0000000000EE0000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 0000001B.00000000.591089923.00000000059E0000.00000004.00000800.00020000.00000000.sdmp, explorer.exe, 0000001B.00000000.623101920.00000000059E0000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Progman
          Source: explorer.exe, 00000008.00000000.457392051.0000000000EE0000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 00000008.00000000.417812385.0000000000EE0000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 00000008.00000000.439449004.0000000000EE0000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 00000008.00000000.516286747.0000000000EE0000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: &Program Manager
          Source: explorer.exe, 00000008.00000000.457392051.0000000000EE0000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 00000008.00000000.417812385.0000000000EE0000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 00000008.00000000.439449004.0000000000EE0000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 00000008.00000000.516286747.0000000000EE0000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: Progmanlock
          Source: explorer.exe, 0000001B.00000000.616115408.0000000000A58000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Progman7
          Source: explorer.exe, 0000001B.00000003.581864878.0000000004B41000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000001B.00000003.581966454.0000000004B4B000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000001B.00000003.586230135.0000000004B4B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: ProgmanP
          Source: C:\Users\user\Desktop\DHL Document.exeQueries volume information: C:\Users\user\Desktop\DHL Document.exe VolumeInformation
          Source: C:\Users\user\Desktop\DHL Document.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
          Source: C:\Users\user\Desktop\DHL Document.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
          Source: C:\Users\user\Desktop\DHL Document.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
          Source: C:\Users\user\Desktop\DHL Document.exeQueries volume information: C:\Windows\Fonts\arial.ttf VolumeInformation
          Source: C:\Users\user\Desktop\DHL Document.exeQueries volume information: C:\Windows\Fonts\ariali.ttf VolumeInformation
          Source: C:\Users\user\Desktop\DHL Document.exeQueries volume information: C:\Windows\Fonts\arialbd.ttf VolumeInformation
          Source: C:\Users\user\Desktop\DHL Document.exeQueries volume information: C:\Windows\Fonts\arialbi.ttf VolumeInformation
          Source: C:\Users\user\Desktop\DHL Document.exeQueries volume information: C:\Windows\Fonts\ARIALN.TTF VolumeInformation
          Source: C:\Users\user\Desktop\DHL Document.exeQueries volume information: C:\Windows\Fonts\ariblk.ttf VolumeInformation
          Source: C:\Users\user\Desktop\DHL Document.exeQueries volume information: C:\Windows\Fonts\ARIALNI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\DHL Document.exeQueries volume information: C:\Windows\Fonts\ARIALNB.TTF VolumeInformation
          Source: C:\Users\user\Desktop\DHL Document.exeQueries volume information: C:\Windows\Fonts\ARIALNBI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\DHL Document.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformation
          Source: C:\Users\user\Desktop\DHL Document.exeQueries volume information: C:\Windows\Fonts\calibri.ttf VolumeInformation
          Source: C:\Users\user\Desktop\DHL Document.exeQueries volume information: C:\Windows\Fonts\calibril.ttf VolumeInformation
          Source: C:\Users\user\Desktop\DHL Document.exeQueries volume information: C:\Windows\Fonts\calibrii.ttf VolumeInformation
          Source: C:\Users\user\Desktop\DHL Document.exeQueries volume information: C:\Windows\Fonts\calibrili.ttf VolumeInformation
          Source: C:\Users\user\Desktop\DHL Document.exeQueries volume information: C:\Windows\Fonts\calibrib.ttf VolumeInformation
          Source: C:\Users\user\Desktop\DHL Document.exeQueries volume information: C:\Windows\Fonts\calibriz.ttf VolumeInformation
          Source: C:\Users\user\Desktop\DHL Document.exeQueries volume information: C:\Windows\Fonts\cambria.ttc VolumeInformation
          Source: C:\Users\user\Desktop\DHL Document.exeQueries volume information: C:\Windows\Fonts\cambriai.ttf VolumeInformation
          Source: C:\Users\user\Desktop\DHL Document.exeQueries volume information: C:\Windows\Fonts\cambriab.ttf VolumeInformation
          Source: C:\Users\user\Desktop\DHL Document.exeQueries volume information: C:\Windows\Fonts\cambriaz.ttf VolumeInformation
          Source: C:\Users\user\Desktop\DHL Document.exeQueries volume information: C:\Windows\Fonts\Candara.ttf VolumeInformation
          Source: C:\Users\user\Desktop\DHL Document.exeQueries volume information: C:\Windows\Fonts\Candarai.ttf VolumeInformation
          Source: C:\Users\user\Desktop\DHL Document.exeQueries volume information: C:\Windows\Fonts\Candarab.ttf VolumeInformation
          Source: C:\Users\user\Desktop\DHL Document.exeQueries volume information: C:\Windows\Fonts\Candaraz.ttf VolumeInformation
          Source: C:\Users\user\Desktop\DHL Document.exeQueries volume information: C:\Windows\Fonts\comic.ttf VolumeInformation
          Source: C:\Users\user\Desktop\DHL Document.exeQueries volume information: C:\Windows\Fonts\comici.ttf VolumeInformation
          Source: C:\Users\user\Desktop\DHL Document.exeQueries volume information: C:\Windows\Fonts\comicbd.ttf VolumeInformation
          Source: C:\Users\user\Desktop\DHL Document.exeQueries volume information: C:\Windows\Fonts\comicz.ttf VolumeInformation
          Source: C:\Users\user\Desktop\DHL Document.exeQueries volume information: C:\Windows\Fonts\consola.ttf VolumeInformation
          Source: C:\Users\user\Desktop\DHL Document.exeQueries volume information: C:\Windows\Fonts\consolai.ttf VolumeInformation
          Source: C:\Users\user\Desktop\DHL Document.exeQueries volume information: C:\Windows\Fonts\consolab.ttf VolumeInformation
          Source: C:\Users\user\Desktop\DHL Document.exeQueries volume information: C:\Windows\Fonts\consolaz.ttf VolumeInformation
          Source: C:\Users\user\Desktop\DHL Document.exeQueries volume information: C:\Windows\Fonts\constan.ttf VolumeInformation
          Source: C:\Users\user\Desktop\DHL Document.exeQueries volume information: C:\Windows\Fonts\constani.ttf VolumeInformation
          Source: C:\Users\user\Desktop\DHL Document.exeQueries volume information: C:\Windows\Fonts\constanb.ttf VolumeInformation
          Source: C:\Users\user\Desktop\DHL Document.exeQueries volume information: C:\Windows\Fonts\constanz.ttf VolumeInformation
          Source: C:\Users\user\Desktop\DHL Document.exeQueries volume information: C:\Windows\Fonts\corbel.ttf VolumeInformation
          Source: C:\Users\user\Desktop\DHL Document.exeQueries volume information: C:\Windows\Fonts\corbeli.ttf VolumeInformation
          Source: C:\Users\user\Desktop\DHL Document.exeQueries volume information: C:\Windows\Fonts\corbelb.ttf VolumeInformation
          Source: C:\Users\user\Desktop\DHL Document.exeQueries volume information: C:\Windows\Fonts\corbelz.ttf VolumeInformation
          Source: C:\Users\user\Desktop\DHL Document.exeQueries volume information: C:\Windows\Fonts\cour.ttf VolumeInformation
          Source: C:\Users\user\Desktop\DHL Document.exeQueries volume information: C:\Windows\Fonts\couri.ttf VolumeInformation
          Source: C:\Users\user\Desktop\DHL Document.exeQueries volume information: C:\Windows\Fonts\courbd.ttf VolumeInformation
          Source: C:\Users\user\Desktop\DHL Document.exeQueries volume information: C:\Windows\Fonts\courbi.ttf VolumeInformation
          Source: C:\Users\user\Desktop\DHL Document.exeQueries volume information: C:\Windows\Fonts\ebrima.ttf VolumeInformation
          Source: C:\Users\user\Desktop\DHL Document.exeQueries volume information: C:\Windows\Fonts\ebrimabd.ttf VolumeInformation
          Source: C:\Users\user\Desktop\DHL Document.exeQueries volume information: C:\Windows\Fonts\framd.ttf VolumeInformation
          Source: C:\Users\user\Desktop\DHL Document.exeQueries volume information: C:\Windows\Fonts\FRADM.TTF VolumeInformation
          Source: C:\Users\user\Desktop\DHL Document.exeQueries volume information: C:\Windows\Fonts\framdit.ttf VolumeInformation
          Source: C:\Users\user\Desktop\DHL Document.exeQueries volume information: C:\Windows\Fonts\FRADMIT.TTF VolumeInformation
          Source: C:\Users\user\Desktop\DHL Document.exeQueries volume information: C:\Windows\Fonts\FRAMDCN.TTF VolumeInformation
          Source: C:\Users\user\Desktop\DHL Document.exeQueries volume information: C:\Windows\Fonts\FRADMCN.TTF VolumeInformation
          Source: C:\Users\user\Desktop\DHL Document.exeQueries volume information: C:\Windows\Fonts\FRAHV.TTF VolumeInformation
          Source: C:\Users\user\Desktop\DHL Document.exeQueries volume information: C:\Windows\Fonts\FRAHVIT.TTF VolumeInformation
          Source: C:\Users\user\Desktop\DHL Document.exeQueries volume information: C:\Windows\Fonts\Gabriola.ttf VolumeInformation
          Source: C:\Users\user\Desktop\DHL Document.exeQueries volume information: C:\Windows\Fonts\gadugi.ttf VolumeInformation
          Source: C:\Users\user\Desktop\DHL Document.exeQueries volume information: C:\Windows\Fonts\gadugib.ttf VolumeInformation
          Source: C:\Users\user\Desktop\DHL Document.exeQueries volume information: C:\Windows\Fonts\georgia.ttf VolumeInformation
          Source: C:\Users\user\Desktop\DHL Document.exeQueries volume information: C:\Windows\Fonts\georgiai.ttf VolumeInformation
          Source: C:\Users\user\Desktop\DHL Document.exeQueries volume information: C:\Windows\Fonts\georgiab.ttf VolumeInformation
          Source: C:\Users\user\Desktop\DHL Document.exeQueries volume information: C:\Windows\Fonts\georgiaz.ttf VolumeInformation
          Source: C:\Users\user\Desktop\DHL Document.exeQueries volume information: C:\Windows\Fonts\impact.ttf VolumeInformation
          Source: C:\Users\user\Desktop\DHL Document.exeQueries volume information: C:\Windows\Fonts\Inkfree.ttf VolumeInformation
          Source: C:\Users\user\Desktop\DHL Document.exeQueries volume information: C:\Windows\Fonts\javatext.ttf VolumeInformation
          Source: C:\Users\user\Desktop\DHL Document.exeQueries volume information: C:\Windows\Fonts\LeelawUI.ttf VolumeInformation
          Source: C:\Users\user\Desktop\DHL Document.exeQueries volume information: C:\Windows\Fonts\LeelUIsl.ttf VolumeInformation
          Source: C:\Users\user\Desktop\DHL Document.exeQueries volume information: C:\Windows\Fonts\LeelaUIb.ttf VolumeInformation
          Source: C:\Users\user\Desktop\DHL Document.exeQueries volume information: C:\Windows\Fonts\lucon.ttf VolumeInformation
          Source: C:\Users\user\Desktop\DHL Document.exeQueries volume information: C:\Windows\Fonts\l_10646.ttf VolumeInformation
          Source: C:\Users\user\Desktop\DHL Document.exeQueries volume information: C:\Windows\Fonts\malgun.ttf VolumeInformation
          Source: C:\Users\user\Desktop\DHL Document.exeQueries volume information: C:\Windows\Fonts\malgunsl.ttf VolumeInformation
          Source: C:\Users\user\Desktop\DHL Document.exeQueries volume information: C:\Windows\Fonts\malgunbd.ttf VolumeInformation
          Source: C:\Users\user\Desktop\DHL Document.exeQueries volume information: C:\Windows\Fonts\himalaya.ttf VolumeInformation
          Source: C:\Users\user\Desktop\DHL Document.exeQueries volume information: C:\Windows\Fonts\msjh.ttc VolumeInformation
          Source: C:\Users\user\Desktop\DHL Document.exeQueries volume information: C:\Windows\Fonts\msjhl.ttc VolumeInformation
          Source: C:\Users\user\Desktop\DHL Document.exeQueries volume information: C:\Windows\Fonts\msjhbd.ttc VolumeInformation
          Source: C:\Users\user\Desktop\DHL Document.exeQueries volume information: C:\Windows\Fonts\ntailu.ttf VolumeInformation
          Source: C:\Users\user\Desktop\DHL Document.exeQueries volume information: C:\Windows\Fonts\ntailub.ttf VolumeInformation
          Source: C:\Users\user\Desktop\DHL Document.exeQueries volume information: C:\Windows\Fonts\phagspa.ttf VolumeInformation
          Source: C:\Users\user\Desktop\DHL Document.exeQueries volume information: C:\Windows\Fonts\phagspab.ttf VolumeInformation
          Source: C:\Users\user\Desktop\DHL Document.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformation
          Source: C:\Users\user\Desktop\DHL Document.exeQueries volume information: C:\Windows\Fonts\taile.ttf VolumeInformation
          Source: C:\Users\user\Desktop\DHL Document.exeQueries volume information: C:\Windows\Fonts\taileb.ttf VolumeInformation
          Source: C:\Users\user\Desktop\DHL Document.exeQueries volume information: C:\Windows\Fonts\msyh.ttc VolumeInformation
          Source: C:\Users\user\Desktop\DHL Document.exeQueries volume information: C:\Windows\Fonts\msyhl.ttc VolumeInformation
          Source: C:\Users\user\Desktop\DHL Document.exeQueries volume information: C:\Windows\Fonts\msyhbd.ttc VolumeInformation
          Source: C:\Users\user\Desktop\DHL Document.exeQueries volume information: C:\Windows\Fonts\msyi.ttf VolumeInformation
          Source: C:\Users\user\Desktop\DHL Document.exeQueries volume information: C:\Windows\Fonts\mingliub.ttc VolumeInformation
          Source: C:\Users\user\Desktop\DHL Document.exeQueries volume information: C:\Windows\Fonts\monbaiti.ttf VolumeInformation
          Source: C:\Users\user\Desktop\DHL Document.exeQueries volume information: C:\Windows\Fonts\msgothic.ttc VolumeInformation
          Source: C:\Users\user\Desktop\DHL Document.exeQueries volume information: C:\Windows\Fonts\mvboli.ttf VolumeInformation
          Source: C:\Users\user\Desktop\DHL Document.exeQueries volume information: C:\Windows\Fonts\mmrtext.ttf VolumeInformation
          Source: C:\Users\user\Desktop\DHL Document.exeQueries volume information: C:\Windows\Fonts\mmrtextb.ttf VolumeInformation
          Source: C:\Users\user\Desktop\DHL Document.exeQueries volume information: C:\Windows\Fonts\Nirmala.ttf VolumeInformation
          Source: C:\Users\user\Desktop\DHL Document.exeQueries volume information: C:\Windows\Fonts\NirmalaS.ttf VolumeInformation
          Source: C:\Users\user\Desktop\DHL Document.exeQueries volume information: C:\Windows\Fonts\NirmalaB.ttf VolumeInformation
          Source: C:\Users\user\Desktop\DHL Document.exeQueries volume information: C:\Windows\Fonts\pala.ttf VolumeInformation
          Source: C:\Users\user\Desktop\DHL Document.exeQueries volume information: C:\Windows\Fonts\palai.ttf VolumeInformation
          Source: C:\Users\user\Desktop\DHL Document.exeQueries volume information: C:\Windows\Fonts\palab.ttf VolumeInformation
          Source: C:\Users\user\Desktop\DHL Document.exeQueries volume information: C:\Windows\Fonts\palabi.ttf VolumeInformation
          Source: C:\Users\user\Desktop\DHL Document.exeQueries volume information: C:\Windows\Fonts\segoepr.ttf VolumeInformation
          Source: C:\Users\user\Desktop\DHL Document.exeQueries volume information: C:\Windows\Fonts\segoeprb.ttf VolumeInformation
          Source: C:\Users\user\Desktop\DHL Document.exeQueries volume information: C:\Windows\Fonts\segoesc.ttf VolumeInformation
          Source: C:\Users\user\Desktop\DHL Document.exeQueries volume information: C:\Windows\Fonts\segoescb.ttf VolumeInformation
          Source: C:\Users\user\Desktop\DHL Document.exeQueries volume information: C:\Windows\Fonts\seguiemj.ttf VolumeInformation
          Source: C:\Users\user\Desktop\DHL Document.exeQueries volume information: C:\Windows\Fonts\seguihis.ttf VolumeInformation
          Source: C:\Users\user\Desktop\DHL Document.exeQueries volume information: C:\Windows\Fonts\seguisym.ttf VolumeInformation
          Source: C:\Users\user\Desktop\DHL Document.exeQueries volume information: C:\Windows\Fonts\simsun.ttc VolumeInformation
          Source: C:\Users\user\Desktop\DHL Document.exeQueries volume information: C:\Windows\Fonts\simsunb.ttf VolumeInformation
          Source: C:\Users\user\Desktop\DHL Document.exeQueries volume information: C:\Windows\Fonts\Sitka.ttc VolumeInformation
          Source: C:\Users\user\Desktop\DHL Document.exeQueries volume information: C:\Windows\Fonts\SitkaI.ttc VolumeInformation
          Source: C:\Users\user\Desktop\DHL Document.exeQueries volume information: C:\Windows\Fonts\SitkaB.ttc VolumeInformation
          Source: C:\Users\user\Desktop\DHL Document.exeQueries volume information: C:\Windows\Fonts\SitkaZ.ttc VolumeInformation
          Source: C:\Users\user\Desktop\DHL Document.exeQueries volume information: C:\Windows\Fonts\sylfaen.ttf VolumeInformation
          Source: C:\Users\user\Desktop\DHL Document.exeQueries volume information: C:\Windows\Fonts\symbol.ttf VolumeInformation
          Source: C:\Users\user\Desktop\DHL Document.exeQueries volume information: C:\Windows\Fonts\tahoma.ttf VolumeInformation
          Source: C:\Users\user\Desktop\DHL Document.exeQueries volume information: C:\Windows\Fonts\tahomabd.ttf VolumeInformation
          Source: C:\Users\user\Desktop\DHL Document.exeQueries volume information: C:\Windows\Fonts\trebuc.ttf VolumeInformation
          Source: C:\Users\user\Desktop\DHL Document.exeQueries volume information: C:\Windows\Fonts\trebucit.ttf VolumeInformation
          Source: C:\Users\user\Desktop\DHL Document.exeQueries volume information: C:\Windows\Fonts\trebucbd.ttf VolumeInformation
          Source: C:\Users\user\Desktop\DHL Document.exeQueries volume information: C:\Windows\Fonts\trebucbi.ttf VolumeInformation
          Source: C:\Users\user\Desktop\DHL Document.exeQueries volume information: C:\Windows\Fonts\verdana.ttf VolumeInformation
          Source: C:\Users\user\Desktop\DHL Document.exeQueries volume information: C:\Windows\Fonts\verdanai.ttf VolumeInformation
          Source: C:\Users\user\Desktop\DHL Document.exeQueries volume information: C:\Windows\Fonts\verdanab.ttf VolumeInformation
          Source: C:\Users\user\Desktop\DHL Document.exeQueries volume information: C:\Windows\Fonts\verdanaz.ttf VolumeInformation
          Source: C:\Users\user\Desktop\DHL Document.exeQueries volume information: C:\Windows\Fonts\webdings.ttf VolumeInformation
          Source: C:\Users\user\Desktop\DHL Document.exeQueries volume information: C:\Windows\Fonts\wingding.ttf VolumeInformation
          Source: C:\Users\user\Desktop\DHL Document.exeQueries volume information: C:\Windows\Fonts\YuGothR.ttc VolumeInformation
          Source: C:\Users\user\Desktop\DHL Document.exeQueries volume information: C:\Windows\Fonts\YuGothM.ttc VolumeInformation
          Source: C:\Users\user\Desktop\DHL Document.exeQueries volume information: C:\Windows\Fonts\YuGothL.ttc VolumeInformation
          Source: C:\Users\user\Desktop\DHL Document.exeQueries volume information: C:\Windows\Fonts\YuGothB.ttc VolumeInformation
          Source: C:\Users\user\Desktop\DHL Document.exeQueries volume information: C:\Windows\Fonts\holomdl2.ttf VolumeInformation
          Source: C:\Users\user\Desktop\DHL Document.exeQueries volume information: C:\Windows\Fonts\CENTURY.TTF VolumeInformation
          Source: C:\Users\user\Desktop\DHL Document.exeQueries volume information: C:\Windows\Fonts\LEELAWAD.TTF VolumeInformation
          Source: C:\Users\user\Desktop\DHL Document.exeQueries volume information: C:\Windows\Fonts\LEELAWDB.TTF VolumeInformation
          Source: C:\Users\user\Desktop\DHL Document.exeQueries volume information: C:\Windows\Fonts\MSUIGHUR.TTF VolumeInformation
          Source: C:\Users\user\Desktop\DHL Document.exeQueries volume information: C:\Windows\Fonts\MSUIGHUB.TTF VolumeInformation
          Source: C:\Users\user\Desktop\DHL Document.exeQueries volume information: C:\Windows\Fonts\WINGDNG2.TTF VolumeInformation
          Source: C:\Users\user\Desktop\DHL Document.exeQueries volume information: C:\Windows\Fonts\WINGDNG3.TTF VolumeInformation
          Source: C:\Users\user\Desktop\DHL Document.exeQueries volume information: C:\Windows\Fonts\TEMPSITC.TTF VolumeInformation
          Source: C:\Users\user\Desktop\DHL Document.exeQueries volume information: C:\Windows\Fonts\PRISTINA.TTF VolumeInformation
          Source: C:\Users\user\Desktop\DHL Document.exeQueries volume information: C:\Windows\Fonts\PAPYRUS.TTF VolumeInformation
          Source: C:\Users\user\Desktop\DHL Document.exeQueries volume information: C:\Windows\Fonts\MISTRAL.TTF VolumeInformation
          Source: C:\Users\user\Desktop\DHL Document.exeQueries volume information: C:\Windows\Fonts\LHANDW.TTF VolumeInformation
          Source: C:\Users\user\Desktop\DHL Document.exeQueries volume information: C:\Windows\Fonts\ITCKRIST.TTF VolumeInformation
          Source: C:\Users\user\Desktop\DHL Document.exeQueries volume information: C:\Windows\Fonts\JUICE___.TTF VolumeInformation
          Source: C:\Users\user\Desktop\DHL Document.exeQueries volume information: C:\Windows\Fonts\FRSCRIPT.TTF VolumeInformation
          Source: C:\Users\user\Desktop\DHL Document.exeQueries volume information: C:\Windows\Fonts\FREESCPT.TTF VolumeInformation
          Source: C:\Users\user\Desktop\DHL Document.exeQueries volume information: C:\Windows\Fonts\BRADHITC.TTF VolumeInformation
          Source: C:\Users\user\Desktop\DHL Document.exeQueries volume information: C:\Windows\Fonts\OUTLOOK.TTF VolumeInformation
          Source: C:\Users\user\Desktop\DHL Document.exeQueries volume information: C:\Windows\Fonts\BKANT.TTF VolumeInformation
          Source: C:\Users\user\Desktop\DHL Document.exeQueries volume information: C:\Windows\Fonts\ANTQUAI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\DHL Document.exeQueries volume information: C:\Windows\Fonts\ANTQUAB.TTF VolumeInformation
          Source: C:\Users\user\Desktop\DHL Document.exeQueries volume information: C:\Windows\Fonts\ANTQUABI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\DHL Document.exeQueries volume information: C:\Windows\Fonts\GARA.TTF VolumeInformation
          Source: C:\Users\user\Desktop\DHL Document.exeQueries volume information: C:\Windows\Fonts\GARAIT.TTF VolumeInformation
          Source: C:\Users\user\Desktop\DHL Document.exeQueries volume information: C:\Windows\Fonts\GARABD.TTF VolumeInformation
          Source: C:\Users\user\Desktop\DHL Document.exeQueries volume information: C:\Windows\Fonts\MTCORSVA.TTF VolumeInformation
          Source: C:\Users\user\Desktop\DHL Document.exeQueries volume information: C:\Windows\Fonts\GOTHIC.TTF VolumeInformation
          Source: C:\Users\user\Desktop\DHL Document.exeQueries volume information: C:\Windows\Fonts\GOTHICI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\DHL Document.exeQueries volume information: C:\Windows\Fonts\GOTHICB.TTF VolumeInformation
          Source: C:\Users\user\Desktop\DHL Document.exeQueries volume information: C:\Windows\Fonts\GOTHICBI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\DHL Document.exeQueries volume information: C:\Windows\Fonts\ALGER.TTF VolumeInformation
          Source: C:\Users\user\Desktop\DHL Document.exeQueries volume information: C:\Windows\Fonts\BASKVILL.TTF VolumeInformation
          Source: C:\Users\user\Desktop\DHL Document.exeQueries volume information: C:\Windows\Fonts\BAUHS93.TTF VolumeInformation
          Source: C:\Users\user\Desktop\DHL Document.exeQueries volume information: C:\Windows\Fonts\BELL.TTF VolumeInformation
          Source: C:\Users\user\Desktop\DHL Document.exeQueries volume information: C:\Windows\Fonts\BELLI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\DHL Document.exeQueries volume information: C:\Windows\Fonts\BELLB.TTF VolumeInformation
          Source: C:\Users\user\Desktop\DHL Document.exeQueries volume information: C:\Windows\Fonts\BRLNSR.TTF VolumeInformation
          Source: C:\Users\user\Desktop\DHL Document.exeQueries volume information: C:\Windows\Fonts\BRLNSDB.TTF VolumeInformation
          Source: C:\Users\user\Desktop\DHL Document.exeQueries volume information: C:\Windows\Fonts\BRLNSB.TTF VolumeInformation
          Source: C:\Users\user\Desktop\DHL Document.exeQueries volume information: C:\Windows\Fonts\BERNHC.TTF VolumeInformation
          Source: C:\Users\user\Desktop\DHL Document.exeQueries volume information: C:\Windows\Fonts\BOD_PSTC.TTF VolumeInformation
          Source: C:\Users\user\Desktop\DHL Document.exeQueries volume information: C:\Windows\Fonts\BRITANIC.TTF VolumeInformation
          Source: C:\Users\user\Desktop\DHL Document.exeQueries volume information: C:\Windows\Fonts\BROADW.TTF VolumeInformation
          Source: C:\Users\user\Desktop\DHL Document.exeQueries volume information: C:\Windows\Fonts\BRUSHSCI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\DHL Document.exeQueries volume information: C:\Windows\Fonts\CALIFR.TTF VolumeInformation
          Source: C:\Users\user\Desktop\DHL Document.exeQueries volume information: C:\Windows\Fonts\CALIFI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\DHL Document.exeQueries volume information: C:\Windows\Fonts\CALIFB.TTF VolumeInformation
          Source: C:\Users\user\Desktop\DHL Document.exeQueries volume information: C:\Windows\Fonts\CENTAUR.TTF VolumeInformation
          Source: C:\Users\user\Desktop\DHL Document.exeQueries volume information: C:\Windows\Fonts\CHILLER.TTF VolumeInformation
          Source: C:\Users\user\Desktop\DHL Document.exeQueries volume information: C:\Windows\Fonts\COLONNA.TTF VolumeInformation
          Source: C:\Users\user\Desktop\DHL Document.exeQueries volume information: C:\Windows\Fonts\COOPBL.TTF VolumeInformation
          Source: C:\Users\user\Desktop\DHL Document.exeQueries volume information: C:\Windows\Fonts\FTLTLT.TTF VolumeInformation
          Source: C:\Users\user\Desktop\DHL Document.exeQueries volume information: C:\Windows\Fonts\HARLOWSI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\DHL Document.exeQueries volume information: C:\Windows\Fonts\HARNGTON.TTF VolumeInformation
          Source: C:\Users\user\Desktop\DHL Document.exeQueries volume information: C:\Windows\Fonts\HTOWERT.TTF VolumeInformation
          Source: C:\Users\user\Desktop\DHL Document.exeQueries volume information: C:\Windows\Fonts\HTOWERTI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\DHL Document.exeQueries volume information: C:\Windows\Fonts\JOKERMAN.TTF VolumeInformation
          Source: C:\Users\user\Desktop\DHL Document.exeQueries volume information: C:\Windows\Fonts\KUNSTLER.TTF VolumeInformation
          Source: C:\Users\user\Desktop\DHL Document.exeQueries volume information: C:\Windows\Fonts\LBRITE.TTF VolumeInformation
          Source: C:\Users\user\Desktop\DHL Document.exeQueries volume information: C:\Windows\Fonts\LBRITED.TTF VolumeInformation
          Source: C:\Users\user\Desktop\DHL Document.exeQueries volume information: C:\Windows\Fonts\LBRITEI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\DHL Document.exeQueries volume information: C:\Windows\Fonts\LBRITEDI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\DHL Document.exeQueries volume information: C:\Windows\Fonts\LCALLIG.TTF VolumeInformation
          Source: C:\Users\user\Desktop\DHL Document.exeQueries volume information: C:\Windows\Fonts\LFAX.TTF VolumeInformation
          Source: C:\Users\user\Desktop\DHL Document.exeQueries volume information: C:\Windows\Fonts\LFAXD.TTF VolumeInformation
          Source: C:\Users\user\Desktop\DHL Document.exeQueries volume information: C:\Windows\Fonts\LFAXI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\DHL Document.exeQueries volume information: C:\Windows\Fonts\LFAXDI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\DHL Document.exeQueries volume information: C:\Windows\Fonts\MAGNETOB.TTF VolumeInformation
          Source: C:\Users\user\Desktop\DHL Document.exeQueries volume information: C:\Windows\Fonts\MATURASC.TTF VolumeInformation
          Source: C:\Users\user\Desktop\DHL Document.exeQueries volume information: C:\Windows\Fonts\MOD20.TTF VolumeInformation
          Source: C:\Users\user\Desktop\DHL Document.exeQueries volume information: C:\Windows\Fonts\NIAGENG.TTF VolumeInformation
          Source: C:\Users\user\Desktop\DHL Document.exeQueries volume information: C:\Windows\Fonts\NIAGSOL.TTF VolumeInformation
          Source: C:\Users\user\Desktop\DHL Document.exeQueries volume information: C:\Windows\Fonts\OLDENGL.TTF VolumeInformation
          Source: C:\Users\user\Desktop\DHL Document.exeQueries volume information: C:\Windows\Fonts\ONYX.TTF VolumeInformation
          Source: C:\Users\user\Desktop\DHL Document.exeQueries volume information: C:\Windows\Fonts\PARCHM.TTF VolumeInformation
          Source: C:\Users\user\Desktop\DHL Document.exeQueries volume information: C:\Windows\Fonts\PLAYBILL.TTF VolumeInformation
          Source: C:\Users\user\Desktop\DHL Document.exeQueries volume information: C:\Windows\Fonts\POORICH.TTF VolumeInformation
          Source: C:\Users\user\Desktop\DHL Document.exeQueries volume information: C:\Windows\Fonts\RAVIE.TTF VolumeInformation
          Source: C:\Users\user\Desktop\DHL Document.exeQueries volume information: C:\Windows\Fonts\INFROMAN.TTF VolumeInformation
          Source: C:\Users\user\Desktop\DHL Document.exeQueries volume information: C:\Windows\Fonts\SHOWG.TTF VolumeInformation
          Source: C:\Users\user\Desktop\DHL Document.exeQueries volume information: C:\Windows\Fonts\SNAP____.TTF VolumeInformation
          Source: C:\Users\user\Desktop\DHL Document.exeQueries volume information: C:\Windows\Fonts\STENCIL.TTF VolumeInformation
          Source: C:\Users\user\Desktop\DHL Document.exeQueries volume information: C:\Windows\Fonts\VINERITC.TTF VolumeInformation
          Source: C:\Users\user\Desktop\DHL Document.exeQueries volume information: C:\Windows\Fonts\VIVALDII.TTF VolumeInformation
          Source: C:\Users\user\Desktop\DHL Document.exeQueries volume information: C:\Windows\Fonts\VLADIMIR.TTF VolumeInformation
          Source: C:\Users\user\Desktop\DHL Document.exeQueries volume information: C:\Windows\Fonts\LATINWD.TTF VolumeInformation
          Source: C:\Users\user\Desktop\DHL Document.exeQueries volume information: C:\Windows\Fonts\TCM_____.TTF VolumeInformation
          Source: C:\Users\user\Desktop\DHL Document.exeQueries volume information: C:\Windows\Fonts\TCMI____.TTF VolumeInformation
          Source: C:\Users\user\Desktop\DHL Document.exeQueries volume information: C:\Windows\Fonts\TCB_____.TTF VolumeInformation
          Source: C:\Users\user\Desktop\DHL Document.exeQueries volume information: C:\Windows\Fonts\TCBI____.TTF VolumeInformation
          Source: C:\Users\user\Desktop\DHL Document.exeQueries volume information: C:\Windows\Fonts\TCCM____.TTF VolumeInformation
          Source: C:\Users\user\Desktop\DHL Document.exeQueries volume information: C:\Windows\Fonts\TCCB____.TTF VolumeInformation
          Source: C:\Users\user\Desktop\DHL Document.exeQueries volume information: C:\Windows\Fonts\TCCEB.TTF VolumeInformation
          Source: C:\Users\user\Desktop\DHL Document.exeQueries volume information: C:\Windows\Fonts\SCRIPTBL.TTF VolumeInformation
          Source: C:\Users\user\Desktop\DHL Document.exeQueries volume information: C:\Windows\Fonts\ROCK.TTF VolumeInformation
          Source: C:\Users\user\Desktop\DHL Document.exeQueries volume information: C:\Windows\Fonts\ROCKI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\DHL Document.exeQueries volume information: C:\Windows\Fonts\ROCKB.TTF VolumeInformation
          Source: C:\Users\user\Desktop\DHL Document.exeQueries volume information: C:\Windows\Fonts\ROCKEB.TTF VolumeInformation
          Source: C:\Users\user\Desktop\DHL Document.exeQueries volume information: C:\Windows\Fonts\ROCKBI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\DHL Document.exeQueries volume information: C:\Windows\Fonts\ROCC____.TTF VolumeInformation
          Source: C:\Users\user\Desktop\DHL Document.exeQueries volume information: C:\Windows\Fonts\ROCCB___.TTF VolumeInformation
          Source: C:\Users\user\Desktop\DHL Document.exeQueries volume information: C:\Windows\Fonts\RAGE.TTF VolumeInformation
          Source: C:\Users\user\Desktop\DHL Document.exeQueries volume information: C:\Windows\Fonts\PERTILI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\DHL Document.exeQueries volume information: C:\Windows\Fonts\PERTIBD.TTF VolumeInformation
          Source: C:\Users\user\Desktop\DHL Document.exeQueries volume information: C:\Windows\Fonts\PER_____.TTF VolumeInformation
          Source: C:\Users\user\Desktop\DHL Document.exeQueries volume information: C:\Windows\Fonts\PERI____.TTF VolumeInformation
          Source: C:\Users\user\Desktop\DHL Document.exeQueries volume information: C:\Windows\Fonts\PERB____.TTF VolumeInformation
          Source: C:\Users\user\Desktop\DHL Document.exeQueries volume information: C:\Windows\Fonts\PERBI___.TTF VolumeInformation
          Source: C:\Users\user\Desktop\DHL Document.exeQueries volume information: C:\Windows\Fonts\PALSCRI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\DHL Document.exeQueries volume information: C:\Windows\Fonts\OCRAEXT.TTF VolumeInformation
          Source: C:\Users\user\Desktop\DHL Document.exeQueries volume information: C:\Windows\Fonts\MAIAN.TTF VolumeInformation
          Source: C:\Users\user\Desktop\DHL Document.exeQueries volume information: C:\Windows\Fonts\LTYPE.TTF VolumeInformation
          Source: C:\Users\user\Desktop\DHL Document.exeQueries volume information: C:\Windows\Fonts\LTYPEO.TTF VolumeInformation
          Source: C:\Users\user\Desktop\DHL Document.exeQueries volume information: C:\Windows\Fonts\LTYPEB.TTF VolumeInformation
          Source: C:\Users\user\Desktop\DHL Document.exeQueries volume information: C:\Windows\Fonts\LTYPEBO.TTF VolumeInformation
          Source: C:\Users\user\Desktop\DHL Document.exeQueries volume information: C:\Windows\Fonts\LSANS.TTF VolumeInformation
          Source: C:\Users\user\Desktop\DHL Document.exeQueries volume information: C:\Windows\Fonts\LSANSD.TTF VolumeInformation
          Source: C:\Users\user\Desktop\DHL Document.exeQueries volume information: C:\Windows\Fonts\LSANSI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\DHL Document.exeQueries volume information: C:\Windows\Fonts\LSANSDI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\DHL Document.exeQueries volume information: C:\Windows\Fonts\IMPRISHA.TTF VolumeInformation
          Source: C:\Users\user\Desktop\DHL Document.exeQueries volume information: C:\Windows\Fonts\HATTEN.TTF VolumeInformation
          Source: C:\Users\user\Desktop\DHL Document.exeQueries volume information: C:\Windows\Fonts\GOUDYSTO.TTF VolumeInformation
          Source: C:\Users\user\Desktop\DHL Document.exeQueries volume information: C:\Windows\Fonts\GOUDOS.TTF VolumeInformation
          Source: C:\Users\user\Desktop\DHL Document.exeQueries volume information: C:\Windows\Fonts\GOUDOSI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\DHL Document.exeQueries volume information: C:\Windows\Fonts\GOUDOSB.TTF VolumeInformation
          Source: C:\Users\user\Desktop\DHL Document.exeQueries volume information: C:\Windows\Fonts\GLECB.TTF VolumeInformation
          Source: C:\Users\user\Desktop\DHL Document.exeQueries volume information: C:\Windows\Fonts\GIL_____.TTF VolumeInformation
          Source: C:\Users\user\Desktop\DHL Document.exeQueries volume information: C:\Windows\Fonts\GILI____.TTF VolumeInformation
          Source: C:\Users\user\Desktop\DHL Document.exeQueries volume information: C:\Windows\Fonts\GILB____.TTF VolumeInformation
          Source: C:\Users\user\Desktop\DHL Document.exeQueries volume information: C:\Windows\Fonts\GILBI___.TTF VolumeInformation
          Source: C:\Users\user\Desktop\DHL Document.exeQueries volume information: C:\Windows\Fonts\GILC____.TTF VolumeInformation
          Source: C:\Users\user\Desktop\DHL Document.exeQueries volume information: C:\Windows\Fonts\GLSNECB.TTF VolumeInformation
          Source: C:\Users\user\Desktop\DHL Document.exeQueries volume information: C:\Windows\Fonts\GIGI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\DHL Document.exeQueries volume information: C:\Windows\Fonts\FRABK.TTF VolumeInformation
          Source: C:\Users\user\Desktop\DHL Document.exeQueries volume information: C:\Windows\Fonts\FRABKIT.TTF VolumeInformation
          Source: C:\Users\user\Desktop\DHL Document.exeQueries volume information: C:\Windows\Fonts\FORTE.TTF VolumeInformation
          Source: C:\Users\user\Desktop\DHL Document.exeQueries volume information: C:\Windows\Fonts\FELIXTI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\DHL Document.exeQueries volume information: C:\Windows\Fonts\ERASMD.TTF VolumeInformation
          Source: C:\Users\user\Desktop\DHL Document.exeQueries volume information: C:\Windows\Fonts\ERASLGHT.TTF VolumeInformation
          Source: C:\Users\user\Desktop\DHL Document.exeQueries volume information: C:\Windows\Fonts\ERASDEMI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\DHL Document.exeQueries volume information: C:\Windows\Fonts\ERASBD.TTF VolumeInformation
          Source: C:\Users\user\Desktop\DHL Document.exeQueries volume information: C:\Windows\Fonts\ENGR.TTF VolumeInformation
          Source: C:\Users\user\Desktop\DHL Document.exeQueries volume information: C:\Windows\Fonts\ELEPHNT.TTF VolumeInformation
          Source: C:\Users\user\Desktop\DHL Document.exeQueries volume information: C:\Windows\Fonts\ELEPHNTI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\DHL Document.exeQueries volume information: C:\Windows\Fonts\ITCEDSCR.TTF VolumeInformation
          Source: C:\Users\user\Desktop\DHL Document.exeQueries volume information: C:\Windows\Fonts\CURLZ___.TTF VolumeInformation
          Source: C:\Users\user\Desktop\DHL Document.exeQueries volume information: C:\Windows\Fonts\COPRGTL.TTF VolumeInformation
          Source: C:\Users\user\Desktop\DHL Document.exeQueries volume information: C:\Windows\Fonts\COPRGTB.TTF VolumeInformation
          Source: C:\Users\user\Desktop\DHL Document.exeQueries volume information: C:\Windows\Fonts\CENSCBK.TTF VolumeInformation
          Source: C:\Users\user\Desktop\DHL Document.exeQueries volume information: C:\Windows\Fonts\SCHLBKI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\DHL Document.exeQueries volume information: C:\Windows\Fonts\SCHLBKB.TTF VolumeInformation
          Source: C:\Users\user\Desktop\DHL Document.exeQueries volume information: C:\Windows\Fonts\SCHLBKBI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\DHL Document.exeQueries volume information: C:\Windows\Fonts\CASTELAR.TTF VolumeInformation
          Source: C:\Users\user\Desktop\DHL Document.exeQueries volume information: C:\Windows\Fonts\CALIST.TTF VolumeInformation
          Source: C:\Users\user\Desktop\DHL Document.exeQueries volume information: C:\Windows\Fonts\CALISTI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\DHL Document.exeQueries volume information: C:\Windows\Fonts\CALISTB.TTF VolumeInformation
          Source: C:\Users\user\Desktop\DHL Document.exeQueries volume information: C:\Windows\Fonts\CALISTBI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\DHL Document.exeQueries volume information: C:\Windows\Fonts\BOOKOS.TTF VolumeInformation
          Source: C:\Users\user\Desktop\DHL Document.exeQueries volume information: C:\Windows\Fonts\BOOKOSB.TTF VolumeInformation
          Source: C:\Users\user\Desktop\DHL Document.exeQueries volume information: C:\Windows\Fonts\BOOKOSI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\DHL Document.exeQueries volume information: C:\Windows\Fonts\BOOKOSBI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\DHL Document.exeQueries volume information: C:\Windows\Fonts\BOD_R.TTF VolumeInformation
          Source: C:\Users\user\Desktop\DHL Document.exeQueries volume information: C:\Windows\Fonts\BOD_I.TTF VolumeInformation
          Source: C:\Users\user\Desktop\DHL Document.exeQueries volume information: C:\Windows\Fonts\BOD_B.TTF VolumeInformation
          Source: C:\Users\user\Desktop\DHL Document.exeQueries volume information: C:\Windows\Fonts\BOD_BI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\DHL Document.exeQueries volume information: C:\Windows\Fonts\BOD_CR.TTF VolumeInformation
          Source: C:\Users\user\Desktop\DHL Document.exeQueries volume information: C:\Windows\Fonts\BOD_BLAR.TTF VolumeInformation
          Source: C:\Users\user\Desktop\DHL Document.exeQueries volume information: C:\Windows\Fonts\BOD_CI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\DHL Document.exeQueries volume information: C:\Windows\Fonts\BOD_CB.TTF VolumeInformation
          Source: C:\Users\user\Desktop\DHL Document.exeQueries volume information: C:\Windows\Fonts\BOD_BLAI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\DHL Document.exeQueries volume information: C:\Windows\Fonts\BOD_CBI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\DHL Document.exeQueries volume information: C:\Windows\Fonts\ITCBLKAD.TTF VolumeInformation
          Source: C:\Users\user\Desktop\DHL Document.exeQueries volume information: C:\Windows\Fonts\ARLRDBD.TTF VolumeInformation
          Source: C:\Users\user\Desktop\DHL Document.exeQueries volume information: C:\Windows\Fonts\AGENCYR.TTF VolumeInformation
          Source: C:\Users\user\Desktop\DHL Document.exeQueries volume information: C:\Windows\Fonts\AGENCYB.TTF VolumeInformation
          Source: C:\Users\user\Desktop\DHL Document.exeQueries volume information: C:\Windows\Fonts\BSSYM7.TTF VolumeInformation
          Source: C:\Users\user\Desktop\DHL Document.exeQueries volume information: C:\Windows\Fonts\REFSAN.TTF VolumeInformation
          Source: C:\Users\user\Desktop\DHL Document.exeQueries volume information: C:\Windows\Fonts\REFSPCL.TTF VolumeInformation
          Source: C:\Users\user\Desktop\DHL Document.exeQueries volume information: C:\Windows\Fonts\MTEXTRA.TTF VolumeInformation
          Source: C:\Users\user\Desktop\DHL Document.exeQueries volume information: C:\Windows\Fonts\marlett.ttf VolumeInformation
          Source: C:\Users\user\Desktop\DHL Document.exeQueries volume information: C:\Windows\Fonts\cour.ttf VolumeInformation
          Source: C:\Users\user\Desktop\DHL Document.exeQueries volume information: C:\Windows\Fonts\couri.ttf VolumeInformation
          Source: C:\Users\user\Desktop\DHL Document.exeQueries volume information: C:\Windows\Fonts\courbd.ttf VolumeInformation
          Source: C:\Users\user\Desktop\DHL Document.exeQueries volume information: C:\Windows\Fonts\courbi.ttf VolumeInformation
          Source: C:\Users\user\Desktop\DHL Document.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformation
          Source: C:\Users\user\Desktop\DHL Document.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
          Source: C:\Users\user\Desktop\DHL Document.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid

          Stealing of Sensitive Information

          barindex
          Source: Yara matchFile source: 5.0.DHL Document.exe.400000.8.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 5.0.DHL Document.exe.400000.6.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 5.2.DHL Document.exe.400000.0.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 5.2.DHL Document.exe.400000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 5.0.DHL Document.exe.400000.8.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 5.0.DHL Document.exe.400000.4.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 5.0.DHL Document.exe.400000.6.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 0.2.DHL Document.exe.3df45d0.4.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 0.2.DHL Document.exe.3d9ddb0.3.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 00000005.00000000.409977263.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000000F.00000002.639726248.0000000002EC0000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000005.00000002.487657383.0000000001390000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000000.00000002.413926760.0000000003C59000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000005.00000002.487435815.0000000001360000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000008.00000000.471020130.000000000DD11000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000005.00000000.409332272.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000008.00000000.450790503.000000000DD11000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000000F.00000002.638592382.0000000002BC0000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000000F.00000002.637724743.0000000000B60000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000005.00000002.485734016.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY

          Remote Access Functionality

          barindex
          Source: Yara matchFile source: 5.0.DHL Document.exe.400000.8.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 5.0.DHL Document.exe.400000.6.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 5.2.DHL Document.exe.400000.0.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 5.2.DHL Document.exe.400000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 5.0.DHL Document.exe.400000.8.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 5.0.DHL Document.exe.400000.4.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 5.0.DHL Document.exe.400000.6.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 0.2.DHL Document.exe.3df45d0.4.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 0.2.DHL Document.exe.3d9ddb0.3.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 00000005.00000000.409977263.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000000F.00000002.639726248.0000000002EC0000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000005.00000002.487657383.0000000001390000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000000.00000002.413926760.0000000003C59000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000005.00000002.487435815.0000000001360000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000008.00000000.471020130.000000000DD11000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000005.00000000.409332272.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000008.00000000.450790503.000000000DD11000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000000F.00000002.638592382.0000000002BC0000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000000F.00000002.637724743.0000000000B60000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000005.00000002.485734016.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
          Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
          Valid Accounts1
          Shared Modules
          Path Interception512
          Process Injection
          1
          Masquerading
          1
          Input Capture
          1
          Query Registry
          Remote Services1
          Input Capture
          Exfiltration Over Other Network Medium1
          Encrypted Channel
          Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
          Default AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization Scripts1
          Disable or Modify Tools
          LSASS Memory231
          Security Software Discovery
          Remote Desktop Protocol11
          Archive Collected Data
          Exfiltration Over Bluetooth1
          Application Layer Protocol
          Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
          Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)51
          Virtualization/Sandbox Evasion
          Security Account Manager2
          Process Discovery
          SMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationSteganographyExploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
          Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)512
          Process Injection
          NTDS51
          Virtualization/Sandbox Evasion
          Distributed Component Object ModelInput CaptureScheduled TransferProtocol ImpersonationSIM Card SwapCarrier Billing Fraud
          Cloud AccountsCronNetwork Logon ScriptNetwork Logon Script11
          Deobfuscate/Decode Files or Information
          LSA Secrets1
          File and Directory Discovery
          SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
          Replication Through Removable MediaLaunchdRc.commonRc.common3
          Obfuscated Files or Information
          Cached Domain Credentials112
          System Information Discovery
          VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
          External Remote ServicesScheduled TaskStartup ItemsStartup Items21
          Software Packing
          DCSyncNetwork SniffingWindows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
          Drive-by CompromiseCommand and Scripting InterpreterScheduled Task/JobScheduled Task/Job1
          File Deletion
          Proc FilesystemNetwork Service ScanningShared WebrootCredential API HookingExfiltration Over Symmetric Encrypted Non-C2 ProtocolApplication Layer ProtocolDowngrade to Insecure ProtocolsGenerate Fraudulent Advertising Revenue
          Hide Legend

          Legend:

          • Process
          • Signature
          • Created File
          • DNS/IP Info
          • Is Dropped
          • Is Windows Process
          • Number of created Registry Values
          • Number of created Files
          • Visual Basic
          • Delphi
          • Java
          • .Net C# or VB.NET
          • C, C++ or other language
          • Is malicious
          • Internet

          This section contains all screenshots as thumbnails, including those not shown in the slideshow.


          windows-stand
          SourceDetectionScannerLabelLink
          DHL Document.exe100%Joe Sandbox ML
          No Antivirus matches
          SourceDetectionScannerLabelLinkDownload
          5.2.DHL Document.exe.400000.0.unpack100%AviraTR/Crypt.ZPACK.GenDownload File
          5.0.DHL Document.exe.400000.8.unpack100%AviraTR/Crypt.ZPACK.GenDownload File
          5.0.DHL Document.exe.400000.4.unpack100%AviraTR/Crypt.ZPACK.GenDownload File
          5.0.DHL Document.exe.400000.6.unpack100%AviraTR/Crypt.ZPACK.GenDownload File
          No Antivirus matches
          SourceDetectionScannerLabelLink
          http://blog.iandreev.com/0%VirustotalBrowse
          http://blog.iandreev.com/0%Avira URL Cloudsafe
          http://www.sajatypeworks.com20%URL Reputationsafe
          http://www.founder.com.cn/cn/bThe0%URL Reputationsafe
          http://www.carterandcone.comal0%URL Reputationsafe
          http://www.carterandcone.comva0%URL Reputationsafe
          http://www.tiro.com0%URL Reputationsafe
          http://www.carterandcone.comroa0%URL Reputationsafe
          http://www.galapagosdesign.com/staff/dennis.htm00%Avira URL Cloudsafe
          http://www.goodfont.co.kr0%URL Reputationsafe
          http://www.carterandcone.com0%URL Reputationsafe
          http://www.carterandcone.com(0%Avira URL Cloudsafe
          http://www.zhongyicts.com.cn(0%Avira URL Cloudsafe
          http://www.carterandcone.com.0%URL Reputationsafe
          http://www.founder.com.cn/cn/lg0%Avira URL Cloudsafe
          http://www.sajatypeworks.com0%URL Reputationsafe
          www.floridanratraining.com/how6/100%Avira URL Cloudmalware
          http://www.founder.com.cn/cnht0%URL Reputationsafe
          http://www.typography.netD0%URL Reputationsafe
          http://www.zhongyicts.com.cnTC0%URL Reputationsafe
          http://www.founder.com.cn/cn/cThe0%URL Reputationsafe
          http://www.galapagosdesign.com/staff/dennis.htm0%URL Reputationsafe
          http://fontfabrik.com0%URL Reputationsafe
          http://www.carterandcone.comncyD0%Avira URL Cloudsafe
          http://www.sandoll.co.krO0%Avira URL Cloudsafe
          http://www.galapagosdesign.com/DPlease0%URL Reputationsafe
          http://www.ascendercorp.com/typedesigners.html(0%Avira URL Cloudsafe
          http://www.carterandcone.comatt0%Avira URL Cloudsafe
          http://www.founder.com.cn/cna0%URL Reputationsafe
          http://www.ascendercorp.com/typedesigners.html0%URL Reputationsafe
          http://www.sandoll.co.kr0%URL Reputationsafe
          http://www.urwpp.deDPlease0%URL Reputationsafe
          http://www.sandoll.co.krormal0%Avira URL Cloudsafe
          http://www.sandoll.co.krtp0%Avira URL Cloudsafe
          http://www.urwpp.de0%URL Reputationsafe
          http://www.zhongyicts.com.cn0%URL Reputationsafe
          http://www.carterandcone.como.0%URL Reputationsafe
          http://www.sakkal.com0%URL Reputationsafe
          http://www.urwpp.deoV0%Avira URL Cloudsafe
          http://www.carterandcone.comL0%URL Reputationsafe
          http://www.tiro.coms0%URL Reputationsafe
          http://blog.iandreev.com0%Avira URL Cloudsafe
          http://www.fontbureau.coma0%URL Reputationsafe
          http://en.w0%URL Reputationsafe
          http://www.carterandcone.comk0%URL Reputationsafe
          http://www.founder.com.cn/cn/0%URL Reputationsafe
          http://www.founder.com.cn/cn0%URL Reputationsafe
          http://www.goodfont.co.krtp0%Avira URL Cloudsafe
          http://www.jiyu-kobo.co.jp/0%URL Reputationsafe
          http://www.zhongyicts.com.cno.0%URL Reputationsafe
          http://fontfabrik.com(0%Avira URL Cloudsafe
          http://www.sandoll.co.krFeN0%Avira URL Cloudsafe
          http://www.urwpp.depko0%Avira URL Cloudsafe
          No contacted domains info
          NameMaliciousAntivirus DetectionReputation
          www.floridanratraining.com/how6/true
          • Avira URL Cloud: malware
          low
          NameSourceMaliciousAntivirus DetectionReputation
          http://www.fontbureau.com/designersGDHL Document.exe, 00000000.00000002.417347780.0000000006D22000.00000004.00000800.00020000.00000000.sdmpfalse
            high
            http://blog.iandreev.com/DHL Document.exe, 00000000.00000002.413281516.0000000002C51000.00000004.00000800.00020000.00000000.sdmpfalse
            • 0%, Virustotal, Browse
            • Avira URL Cloud: safe
            unknown
            http://www.sajatypeworks.com2DHL Document.exe, 00000000.00000003.360546997.0000000005B12000.00000004.00000800.00020000.00000000.sdmpfalse
            • URL Reputation: safe
            unknown
            http://www.fontbureau.com/designers/?DHL Document.exe, 00000000.00000002.417347780.0000000006D22000.00000004.00000800.00020000.00000000.sdmpfalse
              high
              http://www.founder.com.cn/cn/bTheDHL Document.exe, 00000000.00000002.417347780.0000000006D22000.00000004.00000800.00020000.00000000.sdmpfalse
              • URL Reputation: safe
              unknown
              http://www.fontbureau.com/designers?DHL Document.exe, 00000000.00000002.417347780.0000000006D22000.00000004.00000800.00020000.00000000.sdmpfalse
                high
                http://www.carterandcone.comalDHL Document.exe, 00000000.00000003.372603205.0000000005B2B000.00000004.00000800.00020000.00000000.sdmp, DHL Document.exe, 00000000.00000003.372516308.0000000005B2B000.00000004.00000800.00020000.00000000.sdmp, DHL Document.exe, 00000000.00000003.372761903.0000000005B2B000.00000004.00000800.00020000.00000000.sdmp, DHL Document.exe, 00000000.00000003.372909291.0000000005B2B000.00000004.00000800.00020000.00000000.sdmpfalse
                • URL Reputation: safe
                unknown
                http://www.carterandcone.comvaDHL Document.exe, 00000000.00000003.371590968.0000000005B2B000.00000004.00000800.00020000.00000000.sdmp, DHL Document.exe, 00000000.00000003.371463007.0000000005B2B000.00000004.00000800.00020000.00000000.sdmp, DHL Document.exe, 00000000.00000003.371722553.0000000005B2B000.00000004.00000800.00020000.00000000.sdmp, DHL Document.exe, 00000000.00000003.371864694.0000000005B2B000.00000004.00000800.00020000.00000000.sdmpfalse
                • URL Reputation: safe
                unknown
                http://www.tiro.comDHL Document.exe, 00000000.00000002.417347780.0000000006D22000.00000004.00000800.00020000.00000000.sdmp, DHL Document.exe, 00000000.00000003.372603205.0000000005B2B000.00000004.00000800.00020000.00000000.sdmp, DHL Document.exe, 00000000.00000003.372516308.0000000005B2B000.00000004.00000800.00020000.00000000.sdmp, DHL Document.exe, 00000000.00000003.369779518.0000000005B2B000.00000004.00000800.00020000.00000000.sdmpfalse
                • URL Reputation: safe
                unknown
                http://www.fontbureau.com/designersDHL Document.exe, 00000000.00000003.400746887.0000000005B2B000.00000004.00000800.00020000.00000000.sdmpfalse
                  high
                  http://www.carterandcone.comroaDHL Document.exe, 00000000.00000003.372603205.0000000005B2B000.00000004.00000800.00020000.00000000.sdmp, DHL Document.exe, 00000000.00000003.372069177.0000000005B2B000.00000004.00000800.00020000.00000000.sdmp, DHL Document.exe, 00000000.00000003.372227275.0000000005B2B000.00000004.00000800.00020000.00000000.sdmp, DHL Document.exe, 00000000.00000003.372366110.0000000005B2B000.00000004.00000800.00020000.00000000.sdmp, DHL Document.exe, 00000000.00000003.372516308.0000000005B2B000.00000004.00000800.00020000.00000000.sdmp, DHL Document.exe, 00000000.00000003.372761903.0000000005B2B000.00000004.00000800.00020000.00000000.sdmp, DHL Document.exe, 00000000.00000003.372909291.0000000005B2B000.00000004.00000800.00020000.00000000.sdmpfalse
                  • URL Reputation: safe
                  unknown
                  http://www.galapagosdesign.com/staff/dennis.htm0DHL Document.exe, 00000000.00000003.394503541.0000000005B2B000.00000004.00000800.00020000.00000000.sdmp, DHL Document.exe, 00000000.00000003.394361753.0000000005B2B000.00000004.00000800.00020000.00000000.sdmp, DHL Document.exe, 00000000.00000003.394167536.0000000005B2B000.00000004.00000800.00020000.00000000.sdmpfalse
                  • Avira URL Cloud: safe
                  unknown
                  http://www.goodfont.co.krDHL Document.exe, 00000000.00000002.417347780.0000000006D22000.00000004.00000800.00020000.00000000.sdmpfalse
                  • URL Reputation: safe
                  unknown
                  http://www.carterandcone.comDHL Document.exe, 00000000.00000003.372366110.0000000005B2B000.00000004.00000800.00020000.00000000.sdmp, DHL Document.exe, 00000000.00000003.371185243.0000000005B2B000.00000004.00000800.00020000.00000000.sdmpfalse
                  • URL Reputation: safe
                  unknown
                  http://www.carterandcone.com(DHL Document.exe, 00000000.00000003.370770475.0000000005B2B000.00000004.00000800.00020000.00000000.sdmp, DHL Document.exe, 00000000.00000003.371463007.0000000005B2B000.00000004.00000800.00020000.00000000.sdmp, DHL Document.exe, 00000000.00000003.371333722.0000000005B2B000.00000004.00000800.00020000.00000000.sdmp, DHL Document.exe, 00000000.00000003.371050045.0000000005B2B000.00000004.00000800.00020000.00000000.sdmp, DHL Document.exe, 00000000.00000003.370913501.0000000005B2B000.00000004.00000800.00020000.00000000.sdmp, DHL Document.exe, 00000000.00000003.371185243.0000000005B2B000.00000004.00000800.00020000.00000000.sdmpfalse
                  • Avira URL Cloud: safe
                  low
                  http://www.fontbureau.com/designersODHL Document.exe, 00000000.00000003.383014501.0000000005B2B000.00000004.00000800.00020000.00000000.sdmp, DHL Document.exe, 00000000.00000003.384284843.0000000005B2B000.00000004.00000800.00020000.00000000.sdmp, DHL Document.exe, 00000000.00000003.382478395.0000000005B2B000.00000004.00000800.00020000.00000000.sdmpfalse
                    high
                    http://www.zhongyicts.com.cn(DHL Document.exe, 00000000.00000003.370472567.0000000005B2B000.00000004.00000800.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: safe
                    low
                    http://www.carterandcone.com.DHL Document.exe, 00000000.00000003.371590968.0000000005B2B000.00000004.00000800.00020000.00000000.sdmp, DHL Document.exe, 00000000.00000003.371722553.0000000005B2B000.00000004.00000800.00020000.00000000.sdmp, DHL Document.exe, 00000000.00000003.371864694.0000000005B2B000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://www.founder.com.cn/cn/lgDHL Document.exe, 00000000.00000003.369287425.0000000005B2D000.00000004.00000800.00020000.00000000.sdmp, DHL Document.exe, 00000000.00000003.369854837.0000000005B2B000.00000004.00000800.00020000.00000000.sdmp, DHL Document.exe, 00000000.00000003.369461001.0000000005B2D000.00000004.00000800.00020000.00000000.sdmp, DHL Document.exe, 00000000.00000003.369626308.0000000005B2B000.00000004.00000800.00020000.00000000.sdmp, DHL Document.exe, 00000000.00000003.369779518.0000000005B2B000.00000004.00000800.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    http://www.fontbureau.com/designers/cabarga.html(DHL Document.exe, 00000000.00000003.389612639.0000000005B4E000.00000004.00000800.00020000.00000000.sdmp, DHL Document.exe, 00000000.00000003.389865490.0000000005B4E000.00000004.00000800.00020000.00000000.sdmpfalse
                      high
                      http://www.sajatypeworks.comDHL Document.exe, 00000000.00000003.360546997.0000000005B12000.00000004.00000800.00020000.00000000.sdmp, DHL Document.exe, 00000000.00000002.417347780.0000000006D22000.00000004.00000800.00020000.00000000.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      http://www.founder.com.cn/cnhtDHL Document.exe, 00000000.00000003.368980515.0000000005B34000.00000004.00000800.00020000.00000000.sdmp, DHL Document.exe, 00000000.00000003.368790068.0000000005B2B000.00000004.00000800.00020000.00000000.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      http://www.typography.netDDHL Document.exe, 00000000.00000002.417347780.0000000006D22000.00000004.00000800.00020000.00000000.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      http://www.zhongyicts.com.cnTCDHL Document.exe, 00000000.00000003.370472567.0000000005B2B000.00000004.00000800.00020000.00000000.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      http://www.founder.com.cn/cn/cTheDHL Document.exe, 00000000.00000002.417347780.0000000006D22000.00000004.00000800.00020000.00000000.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      http://www.galapagosdesign.com/staff/dennis.htmDHL Document.exe, 00000000.00000003.394503541.0000000005B2B000.00000004.00000800.00020000.00000000.sdmp, DHL Document.exe, 00000000.00000002.417347780.0000000006D22000.00000004.00000800.00020000.00000000.sdmp, DHL Document.exe, 00000000.00000003.394361753.0000000005B2B000.00000004.00000800.00020000.00000000.sdmp, DHL Document.exe, 00000000.00000003.394167536.0000000005B2B000.00000004.00000800.00020000.00000000.sdmp, DHL Document.exe, 00000000.00000003.394649020.0000000005B2B000.00000004.00000800.00020000.00000000.sdmp, DHL Document.exe, 00000000.00000003.394783374.0000000005B2B000.00000004.00000800.00020000.00000000.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      http://fontfabrik.comDHL Document.exe, 00000000.00000003.364609073.0000000005B2B000.00000004.00000800.00020000.00000000.sdmp, DHL Document.exe, 00000000.00000003.364198577.0000000005B2B000.00000004.00000800.00020000.00000000.sdmp, DHL Document.exe, 00000000.00000003.364470211.0000000005B2B000.00000004.00000800.00020000.00000000.sdmp, DHL Document.exe, 00000000.00000002.417347780.0000000006D22000.00000004.00000800.00020000.00000000.sdmp, DHL Document.exe, 00000000.00000003.363467464.0000000005B2B000.00000004.00000800.00020000.00000000.sdmp, DHL Document.exe, 00000000.00000003.364020803.0000000005B2B000.00000004.00000800.00020000.00000000.sdmp, DHL Document.exe, 00000000.00000003.364331164.0000000005B2B000.00000004.00000800.00020000.00000000.sdmp, DHL Document.exe, 00000000.00000003.363729294.0000000005B2B000.00000004.00000800.00020000.00000000.sdmp, DHL Document.exe, 00000000.00000003.364941552.0000000005B2B000.00000004.00000800.00020000.00000000.sdmp, DHL Document.exe, 00000000.00000003.365105939.0000000005B2B000.00000004.00000800.00020000.00000000.sdmp, DHL Document.exe, 00000000.00000003.363650587.0000000005B2B000.00000004.00000800.00020000.00000000.sdmp, DHL Document.exe, 00000000.00000003.364736108.0000000005B2B000.00000004.00000800.00020000.00000000.sdmp, DHL Document.exe, 00000000.00000003.363877573.0000000005B2B000.00000004.00000800.00020000.00000000.sdmp, DHL Document.exe, 00000000.00000003.365324145.0000000005B2B000.00000004.00000800.00020000.00000000.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      http://www.carterandcone.comncyDDHL Document.exe, 00000000.00000003.370770475.0000000005B2B000.00000004.00000800.00020000.00000000.sdmp, DHL Document.exe, 00000000.00000003.370629591.0000000005B2B000.00000004.00000800.00020000.00000000.sdmp, DHL Document.exe, 00000000.00000003.371050045.0000000005B2B000.00000004.00000800.00020000.00000000.sdmp, DHL Document.exe, 00000000.00000003.370913501.0000000005B2B000.00000004.00000800.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      http://www.sandoll.co.krODHL Document.exe, 00000000.00000003.368102080.0000000005B2B000.00000004.00000800.00020000.00000000.sdmp, DHL Document.exe, 00000000.00000003.368254834.0000000005B2B000.00000004.00000800.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      http://www.galapagosdesign.com/DPleaseDHL Document.exe, 00000000.00000002.417347780.0000000006D22000.00000004.00000800.00020000.00000000.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      http://www.ascendercorp.com/typedesigners.html(DHL Document.exe, 00000000.00000003.375303832.0000000005B33000.00000004.00000800.00020000.00000000.sdmp, DHL Document.exe, 00000000.00000003.375219441.0000000005B33000.00000004.00000800.00020000.00000000.sdmp, DHL Document.exe, 00000000.00000003.375122627.0000000005B33000.00000004.00000800.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      http://www.carterandcone.comattDHL Document.exe, 00000000.00000003.371864694.0000000005B2B000.00000004.00000800.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      http://www.founder.com.cn/cnaDHL Document.exe, 00000000.00000003.369287425.0000000005B2D000.00000004.00000800.00020000.00000000.sdmp, DHL Document.exe, 00000000.00000003.369854837.0000000005B2B000.00000004.00000800.00020000.00000000.sdmp, DHL Document.exe, 00000000.00000003.369461001.0000000005B2D000.00000004.00000800.00020000.00000000.sdmp, DHL Document.exe, 00000000.00000003.369626308.0000000005B2B000.00000004.00000800.00020000.00000000.sdmp, DHL Document.exe, 00000000.00000003.369779518.0000000005B2B000.00000004.00000800.00020000.00000000.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      http://www.ascendercorp.com/typedesigners.htmlDHL Document.exe, 00000000.00000003.375303832.0000000005B33000.00000004.00000800.00020000.00000000.sdmp, DHL Document.exe, 00000000.00000003.375879277.0000000005B33000.00000004.00000800.00020000.00000000.sdmp, DHL Document.exe, 00000000.00000003.375219441.0000000005B33000.00000004.00000800.00020000.00000000.sdmp, DHL Document.exe, 00000000.00000003.376228367.0000000005B33000.00000004.00000800.00020000.00000000.sdmp, DHL Document.exe, 00000000.00000003.375729842.0000000005B33000.00000004.00000800.00020000.00000000.sdmp, DHL Document.exe, 00000000.00000003.375122627.0000000005B33000.00000004.00000800.00020000.00000000.sdmp, DHL Document.exe, 00000000.00000003.376374655.0000000005B33000.00000004.00000800.00020000.00000000.sdmp, DHL Document.exe, 00000000.00000003.375522749.0000000005B33000.00000004.00000800.00020000.00000000.sdmp, DHL Document.exe, 00000000.00000003.376031091.0000000005B33000.00000004.00000800.00020000.00000000.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      http://www.fonts.comDHL Document.exe, 00000000.00000002.417347780.0000000006D22000.00000004.00000800.00020000.00000000.sdmpfalse
                        high
                        http://www.sandoll.co.krDHL Document.exe, 00000000.00000003.368102080.0000000005B2B000.00000004.00000800.00020000.00000000.sdmp, DHL Document.exe, 00000000.00000003.367946380.0000000005B2B000.00000004.00000800.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        http://www.urwpp.deDPleaseDHL Document.exe, 00000000.00000002.417347780.0000000006D22000.00000004.00000800.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        http://www.sandoll.co.krormalDHL Document.exe, 00000000.00000003.368102080.0000000005B2B000.00000004.00000800.00020000.00000000.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        http://www.sandoll.co.krtpDHL Document.exe, 00000000.00000003.367946380.0000000005B2B000.00000004.00000800.00020000.00000000.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        http://www.urwpp.deDHL Document.exe, 00000000.00000003.379576940.0000000005B2B000.00000004.00000800.00020000.00000000.sdmp, DHL Document.exe, 00000000.00000003.391081217.0000000005B38000.00000004.00000800.00020000.00000000.sdmp, DHL Document.exe, 00000000.00000003.379746296.0000000005B2B000.00000004.00000800.00020000.00000000.sdmp, DHL Document.exe, 00000000.00000003.391161700.0000000005B38000.00000004.00000800.00020000.00000000.sdmp, DHL Document.exe, 00000000.00000003.379221676.0000000005B2B000.00000004.00000800.00020000.00000000.sdmp, DHL Document.exe, 00000000.00000003.390737863.0000000005B2B000.00000004.00000800.00020000.00000000.sdmp, DHL Document.exe, 00000000.00000003.391283057.0000000005B2B000.00000004.00000800.00020000.00000000.sdmp, DHL Document.exe, 00000000.00000003.390882690.0000000005B37000.00000004.00000800.00020000.00000000.sdmp, DHL Document.exe, 00000000.00000003.390961983.0000000005B38000.00000004.00000800.00020000.00000000.sdmp, DHL Document.exe, 00000000.00000003.379399587.0000000005B2B000.00000004.00000800.00020000.00000000.sdmp, DHL Document.exe, 00000000.00000003.379897961.0000000005B2B000.00000004.00000800.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        http://www.zhongyicts.com.cnDHL Document.exe, 00000000.00000003.370472567.0000000005B2B000.00000004.00000800.00020000.00000000.sdmp, DHL Document.exe, 00000000.00000002.417347780.0000000006D22000.00000004.00000800.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        http://www.carterandcone.como.DHL Document.exe, 00000000.00000003.371590968.0000000005B2B000.00000004.00000800.00020000.00000000.sdmp, DHL Document.exe, 00000000.00000003.370770475.0000000005B2B000.00000004.00000800.00020000.00000000.sdmp, DHL Document.exe, 00000000.00000003.371463007.0000000005B2B000.00000004.00000800.00020000.00000000.sdmp, DHL Document.exe, 00000000.00000003.372069177.0000000005B2B000.00000004.00000800.00020000.00000000.sdmp, DHL Document.exe, 00000000.00000003.371722553.0000000005B2B000.00000004.00000800.00020000.00000000.sdmp, DHL Document.exe, 00000000.00000003.370629591.0000000005B2B000.00000004.00000800.00020000.00000000.sdmp, DHL Document.exe, 00000000.00000003.371333722.0000000005B2B000.00000004.00000800.00020000.00000000.sdmp, DHL Document.exe, 00000000.00000003.371050045.0000000005B2B000.00000004.00000800.00020000.00000000.sdmp, DHL Document.exe, 00000000.00000003.370913501.0000000005B2B000.00000004.00000800.00020000.00000000.sdmp, DHL Document.exe, 00000000.00000003.371864694.0000000005B2B000.00000004.00000800.00020000.00000000.sdmp, DHL Document.exe, 00000000.00000003.372227275.0000000005B2B000.00000004.00000800.00020000.00000000.sdmp, DHL Document.exe, 00000000.00000003.372366110.0000000005B2B000.00000004.00000800.00020000.00000000.sdmp, DHL Document.exe, 00000000.00000003.371185243.0000000005B2B000.00000004.00000800.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        http://www.fontbureau.com/designerspDHL Document.exe, 00000000.00000003.380215559.0000000005B2B000.00000004.00000800.00020000.00000000.sdmpfalse
                          high
                          http://www.sakkal.comDHL Document.exe, 00000000.00000002.417347780.0000000006D22000.00000004.00000800.00020000.00000000.sdmp, DHL Document.exe, 00000000.00000003.375219441.0000000005B33000.00000004.00000800.00020000.00000000.sdmpfalse
                          • URL Reputation: safe
                          unknown
                          http://www.urwpp.deoVDHL Document.exe, 00000000.00000003.379576940.0000000005B2B000.00000004.00000800.00020000.00000000.sdmp, DHL Document.exe, 00000000.00000003.379746296.0000000005B2B000.00000004.00000800.00020000.00000000.sdmp, DHL Document.exe, 00000000.00000003.379221676.0000000005B2B000.00000004.00000800.00020000.00000000.sdmp, DHL Document.exe, 00000000.00000003.379399587.0000000005B2B000.00000004.00000800.00020000.00000000.sdmp, DHL Document.exe, 00000000.00000003.379897961.0000000005B2B000.00000004.00000800.00020000.00000000.sdmpfalse
                          • Avira URL Cloud: safe
                          unknown
                          http://www.fontbureau.com/designersnDHL Document.exe, 00000000.00000003.382077223.0000000005B2B000.00000004.00000800.00020000.00000000.sdmp, DHL Document.exe, 00000000.00000003.382274635.0000000005B2B000.00000004.00000800.00020000.00000000.sdmp, DHL Document.exe, 00000000.00000003.382478395.0000000005B2B000.00000004.00000800.00020000.00000000.sdmpfalse
                            high
                            http://www.fontbureau.com/designers/(DHL Document.exe, 00000000.00000003.379897961.0000000005B2B000.00000004.00000800.00020000.00000000.sdmpfalse
                              high
                              http://www.carterandcone.comLDHL Document.exe, 00000000.00000003.370770475.0000000005B2B000.00000004.00000800.00020000.00000000.sdmp, DHL Document.exe, 00000000.00000003.371463007.0000000005B2B000.00000004.00000800.00020000.00000000.sdmp, DHL Document.exe, 00000000.00000003.371333722.0000000005B2B000.00000004.00000800.00020000.00000000.sdmp, DHL Document.exe, 00000000.00000003.371050045.0000000005B2B000.00000004.00000800.00020000.00000000.sdmp, DHL Document.exe, 00000000.00000003.370913501.0000000005B2B000.00000004.00000800.00020000.00000000.sdmpfalse
                              • URL Reputation: safe
                              unknown
                              http://www.fontbureau.com/designerssDHL Document.exe, 00000000.00000003.382274635.0000000005B2B000.00000004.00000800.00020000.00000000.sdmpfalse
                                high
                                http://www.autoitscript.com/autoit3/Jexplorer.exe, 00000008.00000000.417336784.000000000095C000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000008.00000000.457066024.000000000095C000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000008.00000000.438988395.000000000095C000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000008.00000000.516000007.000000000095C000.00000004.00000020.00020000.00000000.sdmpfalse
                                  high
                                  http://www.apache.org/licenses/LICENSE-2.0DHL Document.exe, 00000000.00000002.417347780.0000000006D22000.00000004.00000800.00020000.00000000.sdmpfalse
                                    high
                                    http://www.fontbureau.comDHL Document.exe, 00000000.00000002.417347780.0000000006D22000.00000004.00000800.00020000.00000000.sdmpfalse
                                      high
                                      http://www.fontbureau.com/designers/cabarga.htmlrDHL Document.exe, 00000000.00000003.389612639.0000000005B4E000.00000004.00000800.00020000.00000000.sdmpfalse
                                        high
                                        http://www.tiro.comsDHL Document.exe, 00000000.00000003.372603205.0000000005B2B000.00000004.00000800.00020000.00000000.sdmp, DHL Document.exe, 00000000.00000003.373065712.0000000005B2B000.00000004.00000800.00020000.00000000.sdmp, DHL Document.exe, 00000000.00000003.372516308.0000000005B2B000.00000004.00000800.00020000.00000000.sdmp, DHL Document.exe, 00000000.00000003.369779518.0000000005B2B000.00000004.00000800.00020000.00000000.sdmp, DHL Document.exe, 00000000.00000003.372761903.0000000005B2B000.00000004.00000800.00020000.00000000.sdmp, DHL Document.exe, 00000000.00000003.372909291.0000000005B2B000.00000004.00000800.00020000.00000000.sdmpfalse
                                        • URL Reputation: safe
                                        unknown
                                        http://www.fontbureau.com/designers/frere-jones.htmlgfaDHL Document.exe, 00000000.00000003.385720678.0000000005B2B000.00000004.00000800.00020000.00000000.sdmp, DHL Document.exe, 00000000.00000003.388682645.0000000005B2B000.00000004.00000800.00020000.00000000.sdmp, DHL Document.exe, 00000000.00000003.388184932.0000000005B2B000.00000004.00000800.00020000.00000000.sdmp, DHL Document.exe, 00000000.00000003.388824941.0000000005B2B000.00000004.00000800.00020000.00000000.sdmp, DHL Document.exe, 00000000.00000003.388516231.0000000005B2B000.00000004.00000800.00020000.00000000.sdmp, DHL Document.exe, 00000000.00000003.388382396.0000000005B2B000.00000004.00000800.00020000.00000000.sdmp, DHL Document.exe, 00000000.00000003.387955236.0000000005B2B000.00000004.00000800.00020000.00000000.sdmp, DHL Document.exe, 00000000.00000003.385477021.0000000005B2B000.00000004.00000800.00020000.00000000.sdmpfalse
                                          high
                                          http://blog.iandreev.comDHL Document.exe, 00000000.00000002.413281516.0000000002C51000.00000004.00000800.00020000.00000000.sdmpfalse
                                          • Avira URL Cloud: safe
                                          unknown
                                          http://www.fontbureau.comaDHL Document.exe, 00000000.00000002.413024823.0000000001287000.00000004.00000020.00020000.00000000.sdmpfalse
                                          • URL Reputation: safe
                                          unknown
                                          http://en.wDHL Document.exe, 00000000.00000003.364941552.0000000005B2B000.00000004.00000800.00020000.00000000.sdmp, DHL Document.exe, 00000000.00000003.365105939.0000000005B2B000.00000004.00000800.00020000.00000000.sdmp, DHL Document.exe, 00000000.00000003.365172175.0000000005B3A000.00000004.00000800.00020000.00000000.sdmpfalse
                                          • URL Reputation: safe
                                          unknown
                                          http://www.carterandcone.comlDHL Document.exe, 00000000.00000003.371463007.0000000005B2B000.00000004.00000800.00020000.00000000.sdmp, DHL Document.exe, 00000000.00000002.417347780.0000000006D22000.00000004.00000800.00020000.00000000.sdmpfalse
                                            unknown
                                            http://www.carterandcone.comkDHL Document.exe, 00000000.00000003.371590968.0000000005B2B000.00000004.00000800.00020000.00000000.sdmp, DHL Document.exe, 00000000.00000003.371463007.0000000005B2B000.00000004.00000800.00020000.00000000.sdmp, DHL Document.exe, 00000000.00000003.372069177.0000000005B2B000.00000004.00000800.00020000.00000000.sdmp, DHL Document.exe, 00000000.00000003.371722553.0000000005B2B000.00000004.00000800.00020000.00000000.sdmp, DHL Document.exe, 00000000.00000003.371333722.0000000005B2B000.00000004.00000800.00020000.00000000.sdmp, DHL Document.exe, 00000000.00000003.371050045.0000000005B2B000.00000004.00000800.00020000.00000000.sdmp, DHL Document.exe, 00000000.00000003.371864694.0000000005B2B000.00000004.00000800.00020000.00000000.sdmp, DHL Document.exe, 00000000.00000003.372227275.0000000005B2B000.00000004.00000800.00020000.00000000.sdmp, DHL Document.exe, 00000000.00000003.372366110.0000000005B2B000.00000004.00000800.00020000.00000000.sdmp, DHL Document.exe, 00000000.00000003.371185243.0000000005B2B000.00000004.00000800.00020000.00000000.sdmpfalse
                                            • URL Reputation: safe
                                            unknown
                                            http://www.founder.com.cn/cn/DHL Document.exe, 00000000.00000003.369287425.0000000005B2D000.00000004.00000800.00020000.00000000.sdmp, DHL Document.exe, 00000000.00000003.368254834.0000000005B2B000.00000004.00000800.00020000.00000000.sdmpfalse
                                            • URL Reputation: safe
                                            unknown
                                            http://www.fontbureau.com/designers/cabarga.htmlNDHL Document.exe, 00000000.00000002.417347780.0000000006D22000.00000004.00000800.00020000.00000000.sdmpfalse
                                              high
                                              http://www.founder.com.cn/cnDHL Document.exe, 00000000.00000003.369779518.0000000005B2B000.00000004.00000800.00020000.00000000.sdmp, DHL Document.exe, 00000000.00000003.372761903.0000000005B2B000.00000004.00000800.00020000.00000000.sdmp, DHL Document.exe, 00000000.00000003.368790068.0000000005B2B000.00000004.00000800.00020000.00000000.sdmp, DHL Document.exe, 00000000.00000003.372909291.0000000005B2B000.00000004.00000800.00020000.00000000.sdmp, DHL Document.exe, 00000000.00000003.373449690.0000000005B2B000.00000004.00000800.00020000.00000000.sdmpfalse
                                              • URL Reputation: safe
                                              unknown
                                              http://www.goodfont.co.krtpDHL Document.exe, 00000000.00000003.368102080.0000000005B2B000.00000004.00000800.00020000.00000000.sdmpfalse
                                              • Avira URL Cloud: safe
                                              unknown
                                              http://www.fontbureau.com/designers/frere-jones.htmlDHL Document.exe, 00000000.00000003.385584605.0000000005B4E000.00000004.00000800.00020000.00000000.sdmp, DHL Document.exe, 00000000.00000002.417347780.0000000006D22000.00000004.00000800.00020000.00000000.sdmpfalse
                                                high
                                                http://www.jiyu-kobo.co.jp/DHL Document.exe, 00000000.00000002.417347780.0000000006D22000.00000004.00000800.00020000.00000000.sdmpfalse
                                                • URL Reputation: safe
                                                unknown
                                                http://www.zhongyicts.com.cno.DHL Document.exe, 00000000.00000003.370472567.0000000005B2B000.00000004.00000800.00020000.00000000.sdmpfalse
                                                • URL Reputation: safe
                                                unknown
                                                http://www.fontbureau.com/designers8DHL Document.exe, 00000000.00000002.417347780.0000000006D22000.00000004.00000800.00020000.00000000.sdmpfalse
                                                  high
                                                  http://fontfabrik.com(DHL Document.exe, 00000000.00000003.363650587.0000000005B2B000.00000004.00000800.00020000.00000000.sdmpfalse
                                                  • Avira URL Cloud: safe
                                                  low
                                                  http://www.sandoll.co.krFeNDHL Document.exe, 00000000.00000003.368102080.0000000005B2B000.00000004.00000800.00020000.00000000.sdmp, DHL Document.exe, 00000000.00000003.367946380.0000000005B2B000.00000004.00000800.00020000.00000000.sdmpfalse
                                                  • Avira URL Cloud: safe
                                                  unknown
                                                  http://www.urwpp.depkoDHL Document.exe, 00000000.00000003.379576940.0000000005B2B000.00000004.00000800.00020000.00000000.sdmp, DHL Document.exe, 00000000.00000003.380052033.0000000005B2B000.00000004.00000800.00020000.00000000.sdmp, DHL Document.exe, 00000000.00000003.379746296.0000000005B2B000.00000004.00000800.00020000.00000000.sdmp, DHL Document.exe, 00000000.00000003.379221676.0000000005B2B000.00000004.00000800.00020000.00000000.sdmp, DHL Document.exe, 00000000.00000003.379399587.0000000005B2B000.00000004.00000800.00020000.00000000.sdmp, DHL Document.exe, 00000000.00000003.379897961.0000000005B2B000.00000004.00000800.00020000.00000000.sdmpfalse
                                                  • Avira URL Cloud: safe
                                                  unknown
                                                  No contacted IP infos
                                                  Joe Sandbox Version:34.0.0 Boulder Opal
                                                  Analysis ID:562453
                                                  Start date:28.01.2022
                                                  Start time:22:10:02
                                                  Joe Sandbox Product:CloudBasic
                                                  Overall analysis duration:0h 11m 59s
                                                  Hypervisor based Inspection enabled:false
                                                  Report type:light
                                                  Sample file name:DHL Document.exe
                                                  Cookbook file name:default.jbs
                                                  Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
                                                  Number of analysed new started processes analysed:29
                                                  Number of new started drivers analysed:0
                                                  Number of existing processes analysed:0
                                                  Number of existing drivers analysed:0
                                                  Number of injected processes analysed:1
                                                  Technologies:
                                                  • HCA enabled
                                                  • EGA enabled
                                                  • HDC enabled
                                                  • AMSI enabled
                                                  Analysis Mode:default
                                                  Analysis stop reason:Timeout
                                                  Detection:MAL
                                                  Classification:mal100.troj.evad.winEXE@8/2@0/0
                                                  EGA Information:
                                                  • Successful, ratio: 100%
                                                  HDC Information:
                                                  • Successful, ratio: 32.7% (good quality ratio 30.1%)
                                                  • Quality average: 70.7%
                                                  • Quality standard deviation: 31.2%
                                                  HCA Information:
                                                  • Successful, ratio: 99%
                                                  • Number of executed functions: 0
                                                  • Number of non-executed functions: 0
                                                  Cookbook Comments:
                                                  • Adjust boot time
                                                  • Enable AMSI
                                                  • Found application associated with file extension: .exe
                                                  • Exclude process from analysis (whitelisted): MpCmdRun.exe, SearchUI.exe, audiodg.exe, BackgroundTransferHost.exe, WerFault.exe, ShellExperienceHost.exe, WMIADAP.exe, backgroundTaskHost.exe, conhost.exe, svchost.exe, wuapihost.exe
                                                  • Excluded IPs from analysis (whitelisted): 20.42.65.92
                                                  • Excluded domains from analysis (whitelisted): www.bing.com, ris.api.iris.microsoft.com, client.wns.windows.com, fs.microsoft.com, onedsblobprdeus17.eastus.cloudapp.azure.com, store-images.s-microsoft.com, blobcollector.events.data.trafficmanager.net, displaycatalog.mp.microsoft.com, img-prod-cms-rt-microsoft-com.akamaized.net, watson.telemetry.microsoft.com, arc.msn.com
                                                  • Not all processes where analyzed, report is missing behavior information
                                                  • Report size exceeded maximum capacity and may have missing behavior information.
                                                  • Report size getting too big, too many NtAllocateVirtualMemory calls found.
                                                  • Report size getting too big, too many NtEnumerateValueKey calls found.
                                                  • Report size getting too big, too many NtOpenKeyEx calls found.
                                                  • Report size getting too big, too many NtProtectVirtualMemory calls found.
                                                  • Report size getting too big, too many NtQueryAttributesFile calls found.
                                                  • Report size getting too big, too many NtQueryValueKey calls found.
                                                  TimeTypeDescription
                                                  22:11:27API Interceptor1x Sleep call for process: DHL Document.exe modified
                                                  22:12:48API Interceptor28x Sleep call for process: explorer.exe modified
                                                  No context
                                                  No context
                                                  No context
                                                  No context
                                                  No context
                                                  Process:C:\Users\user\Desktop\DHL Document.exe
                                                  File Type:ASCII text, with CRLF line terminators
                                                  Category:dropped
                                                  Size (bytes):1216
                                                  Entropy (8bit):5.355304211458859
                                                  Encrypted:false
                                                  SSDEEP:24:MLUE4K5E4Ks2E1qE4qXKDE4KhK3VZ9pKhPKIE4oKFKHKoZAE4Kzr7FE4x84j:MIHK5HKXE1qHiYHKhQnoPtHoxHhAHKzr
                                                  MD5:FED34146BF2F2FA59DCF8702FCC8232E
                                                  SHA1:B03BFEA175989D989850CF06FE5E7BBF56EAA00A
                                                  SHA-256:123BE4E3590609A008E85501243AF5BC53FA0C26C82A92881B8879524F8C0D5C
                                                  SHA-512:1CC89F2ED1DBD70628FA1DC41A32BA0BFA3E81EAE1A1CF3C5F6A48F2DA0BF1F21A5001B8A18B04043C5B8FE4FBE663068D86AA8C4BD8E17933F75687C3178FF6
                                                  Malicious:true
                                                  Reputation:high, very likely benign file
                                                  Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\4f0a7eefa3cd3e0ba98b5ebddbbc72e6\System.ni.dll",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\f1d8480152e0da9a60ad49c6d16a3b6d\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\8d67d92724ba494b6c7fd089d6f25b48\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Xml\b219d4630d26b88041b59c21
                                                  Process:C:\Windows\explorer.exe
                                                  File Type:data
                                                  Category:modified
                                                  Size (bytes):29232
                                                  Entropy (8bit):1.712958339156189
                                                  Encrypted:false
                                                  SSDEEP:96:GXNfA4LX+vXbxSkGZEuQJUSvijSNx/HIK1Pf:DvOX6UiBT/Z
                                                  MD5:17B3FC0F4C0F19C5695334AD1797A4FB
                                                  SHA1:E34B4470FAE001E27339A7EA348AB6A7AFF81ACB
                                                  SHA-256:E83C62DF6C3B31CDB782966982D65C01805E0A93D1EDA55186943DE20E1F07DB
                                                  SHA-512:B7410337431C65D1AEF8C3EED8B5E6C926D686BC7313A5C6F8E7579629E56175F45840E649DF76902C8638A7324BE5B77D330665DD7C1D6BBAB9EDBFCFD2F28F
                                                  Malicious:false
                                                  Preview:..0 IMMM ...............................................................................z...........3...............................................................................................................................................................................................QR.....................................................................D... ............T..................................................z.....Q. ...............................................................R..T.g.5 ...............................................................:..e.;6. ............j..................................................................................................................................................................................................................................................................................................................................................................................................................
                                                  File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                  Entropy (8bit):6.412500083584597
                                                  TrID:
                                                  • Win32 Executable (generic) Net Framework (10011505/4) 49.83%
                                                  • Win32 Executable (generic) a (10002005/4) 49.78%
                                                  • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                                                  • Win16/32 Executable Delphi generic (2074/23) 0.01%
                                                  • Generic Win/DOS Executable (2004/3) 0.01%
                                                  File name:DHL Document.exe
                                                  File size:799232
                                                  MD5:c66df8b380d1db550cb5f0bc5ded67d7
                                                  SHA1:080556dec75ae3a4a844fcad0419d9c533c0c0d5
                                                  SHA256:6fc6d0526995ef4c7ab87e092759ef93e84495a8c71b9ec36b924bcf7c2fa75c
                                                  SHA512:f61d9cf4bbfb99c3cfaa641e7f37e8591b471bf851ea365ba508817812d0d685cab55b8502c3d30c05296f6710a16449d448265e36a2ff1f9ba089e56c3b7a56
                                                  SSDEEP:12288:SuzkZo9WcvuMVvH4zTl/NuMwoTXMNOwTKyz:Suz+oJuMVC7uQTXMNOw2yz
                                                  File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...v..a.................$..........>C... ...`....@.. ....................................@................................
                                                  Icon Hash:00828e8e8686b000
                                                  Entrypoint:0x4c433e
                                                  Entrypoint Section:.text
                                                  Digitally signed:false
                                                  Imagebase:0x400000
                                                  Subsystem:windows gui
                                                  Image File Characteristics:LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED
                                                  DLL Characteristics:NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
                                                  Time Stamp:0x61F3C276 [Fri Jan 28 10:16:22 2022 UTC]
                                                  TLS Callbacks:
                                                  CLR (.Net) Version:v4.0.30319
                                                  OS Version Major:4
                                                  OS Version Minor:0
                                                  File Version Major:4
                                                  File Version Minor:0
                                                  Subsystem Version Major:4
                                                  Subsystem Version Minor:0
                                                  Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
                                                  Instruction
                                                  jmp dword ptr [00402000h]
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  NameVirtual AddressVirtual Size Is in Section
                                                  IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                  IMAGE_DIRECTORY_ENTRY_IMPORT0xc42f00x4b.text
                                                  IMAGE_DIRECTORY_ENTRY_RESOURCE0xc80000x5e8.rsrc
                                                  IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                  IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                  IMAGE_DIRECTORY_ENTRY_BASERELOC0xca0000xc.reloc
                                                  IMAGE_DIRECTORY_ENTRY_DEBUG0xc429b0x1c.text
                                                  IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                  IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                  IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                  IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                  IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                  IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                                                  IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                  IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                                                  IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                  NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                  .text0x20000xc23440xc2400False0.479371531129data6.41763143135IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                                                  .sdata0xc60000x1e80x200False0.861328125data6.62773006256IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_WRITE, IMAGE_SCN_MEM_READ
                                                  .rsrc0xc80000x5e80x600False0.434244791667data4.17616271786IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                  .reloc0xca0000xc0x200False0.044921875data0.0940979256627IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                                  NameRVASizeTypeLanguageCountry
                                                  RT_VERSION0xc80a00x35cdata
                                                  RT_MANIFEST0xc83fc0x1eaXML 1.0 document, UTF-8 Unicode (with BOM) text, with CRLF line terminators
                                                  DLLImport
                                                  mscoree.dll_CorExeMain
                                                  DescriptionData
                                                  Translation0x0000 0x04b0
                                                  LegalCopyrightCopyright 2016
                                                  Assembly Version1.0.0.0
                                                  InternalNameCultureNameResourceSetPa.exe
                                                  FileVersion1.0.0.0
                                                  CompanyName
                                                  LegalTrademarks
                                                  Comments
                                                  ProductNameOthelloCS
                                                  ProductVersion1.0.0.0
                                                  FileDescriptionOthelloCS
                                                  OriginalFilenameCultureNameResourceSetPa.exe
                                                  No network behavior found

                                                  Click to jump to process

                                                  Target ID:0
                                                  Start time:22:11:02
                                                  Start date:28/01/2022
                                                  Path:C:\Users\user\Desktop\DHL Document.exe
                                                  Wow64 process (32bit):true
                                                  Commandline:"C:\Users\user\Desktop\DHL Document.exe"
                                                  Imagebase:0x710000
                                                  File size:799232 bytes
                                                  MD5 hash:C66DF8B380D1DB550CB5F0BC5DED67D7
                                                  Has elevated privileges:true
                                                  Has administrator privileges:true
                                                  Programmed in:.Net C# or VB.NET
                                                  Yara matches:
                                                  • Rule: JoeSecurity_FormBook, Description: Yara detected FormBook, Source: 00000000.00000002.413926760.0000000003C59000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                  • Rule: Formbook_1, Description: autogenerated rule brought to you by yara-signator, Source: 00000000.00000002.413926760.0000000003C59000.00000004.00000800.00020000.00000000.sdmp, Author: Felix Bilstein - yara-signator at cocacoding dot com
                                                  • Rule: Formbook, Description: detect Formbook in memory, Source: 00000000.00000002.413926760.0000000003C59000.00000004.00000800.00020000.00000000.sdmp, Author: JPCERT/CC Incident Response Group
                                                  • Rule: JoeSecurity_AntiVM_3, Description: Yara detected AntiVM_3, Source: 00000000.00000002.413494042.0000000002D09000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                  • Rule: JoeSecurity_AntiVM_3, Description: Yara detected AntiVM_3, Source: 00000000.00000002.413281516.0000000002C51000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                  Reputation:low

                                                  Target ID:5
                                                  Start time:22:11:28
                                                  Start date:28/01/2022
                                                  Path:C:\Users\user\Desktop\DHL Document.exe
                                                  Wow64 process (32bit):true
                                                  Commandline:C:\Users\user\Desktop\DHL Document.exe
                                                  Imagebase:0x9f0000
                                                  File size:799232 bytes
                                                  MD5 hash:C66DF8B380D1DB550CB5F0BC5DED67D7
                                                  Has elevated privileges:true
                                                  Has administrator privileges:true
                                                  Programmed in:C, C++ or other language
                                                  Yara matches:
                                                  • Rule: JoeSecurity_FormBook, Description: Yara detected FormBook, Source: 00000005.00000000.409977263.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                  • Rule: Formbook_1, Description: autogenerated rule brought to you by yara-signator, Source: 00000005.00000000.409977263.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Felix Bilstein - yara-signator at cocacoding dot com
                                                  • Rule: Formbook, Description: detect Formbook in memory, Source: 00000005.00000000.409977263.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: JPCERT/CC Incident Response Group
                                                  • Rule: JoeSecurity_FormBook, Description: Yara detected FormBook, Source: 00000005.00000002.487657383.0000000001390000.00000040.10000000.00040000.00000000.sdmp, Author: Joe Security
                                                  • Rule: Formbook_1, Description: autogenerated rule brought to you by yara-signator, Source: 00000005.00000002.487657383.0000000001390000.00000040.10000000.00040000.00000000.sdmp, Author: Felix Bilstein - yara-signator at cocacoding dot com
                                                  • Rule: Formbook, Description: detect Formbook in memory, Source: 00000005.00000002.487657383.0000000001390000.00000040.10000000.00040000.00000000.sdmp, Author: JPCERT/CC Incident Response Group
                                                  • Rule: JoeSecurity_FormBook, Description: Yara detected FormBook, Source: 00000005.00000002.487435815.0000000001360000.00000040.10000000.00040000.00000000.sdmp, Author: Joe Security
                                                  • Rule: Formbook_1, Description: autogenerated rule brought to you by yara-signator, Source: 00000005.00000002.487435815.0000000001360000.00000040.10000000.00040000.00000000.sdmp, Author: Felix Bilstein - yara-signator at cocacoding dot com
                                                  • Rule: Formbook, Description: detect Formbook in memory, Source: 00000005.00000002.487435815.0000000001360000.00000040.10000000.00040000.00000000.sdmp, Author: JPCERT/CC Incident Response Group
                                                  • Rule: JoeSecurity_FormBook, Description: Yara detected FormBook, Source: 00000005.00000000.409332272.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                  • Rule: Formbook_1, Description: autogenerated rule brought to you by yara-signator, Source: 00000005.00000000.409332272.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Felix Bilstein - yara-signator at cocacoding dot com
                                                  • Rule: Formbook, Description: detect Formbook in memory, Source: 00000005.00000000.409332272.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: JPCERT/CC Incident Response Group
                                                  • Rule: JoeSecurity_FormBook, Description: Yara detected FormBook, Source: 00000005.00000002.485734016.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                  • Rule: Formbook_1, Description: autogenerated rule brought to you by yara-signator, Source: 00000005.00000002.485734016.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Felix Bilstein - yara-signator at cocacoding dot com
                                                  • Rule: Formbook, Description: detect Formbook in memory, Source: 00000005.00000002.485734016.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: JPCERT/CC Incident Response Group
                                                  Reputation:low

                                                  Target ID:8
                                                  Start time:22:11:32
                                                  Start date:28/01/2022
                                                  Path:C:\Windows\explorer.exe
                                                  Wow64 process (32bit):false
                                                  Commandline:C:\Windows\Explorer.EXE
                                                  Imagebase:0x7ff6f22f0000
                                                  File size:3933184 bytes
                                                  MD5 hash:AD5296B280E8F522A8A897C96BAB0E1D
                                                  Has elevated privileges:true
                                                  Has administrator privileges:true
                                                  Programmed in:C, C++ or other language
                                                  Yara matches:
                                                  • Rule: JoeSecurity_FormBook, Description: Yara detected FormBook, Source: 00000008.00000000.471020130.000000000DD11000.00000040.00000001.00040000.00000000.sdmp, Author: Joe Security
                                                  • Rule: Formbook_1, Description: autogenerated rule brought to you by yara-signator, Source: 00000008.00000000.471020130.000000000DD11000.00000040.00000001.00040000.00000000.sdmp, Author: Felix Bilstein - yara-signator at cocacoding dot com
                                                  • Rule: Formbook, Description: detect Formbook in memory, Source: 00000008.00000000.471020130.000000000DD11000.00000040.00000001.00040000.00000000.sdmp, Author: JPCERT/CC Incident Response Group
                                                  • Rule: JoeSecurity_FormBook, Description: Yara detected FormBook, Source: 00000008.00000000.450790503.000000000DD11000.00000040.00000001.00040000.00000000.sdmp, Author: Joe Security
                                                  • Rule: Formbook_1, Description: autogenerated rule brought to you by yara-signator, Source: 00000008.00000000.450790503.000000000DD11000.00000040.00000001.00040000.00000000.sdmp, Author: Felix Bilstein - yara-signator at cocacoding dot com
                                                  • Rule: Formbook, Description: detect Formbook in memory, Source: 00000008.00000000.450790503.000000000DD11000.00000040.00000001.00040000.00000000.sdmp, Author: JPCERT/CC Incident Response Group
                                                  Reputation:high

                                                  Target ID:15
                                                  Start time:22:12:01
                                                  Start date:28/01/2022
                                                  Path:C:\Windows\SysWOW64\colorcpl.exe
                                                  Wow64 process (32bit):true
                                                  Commandline:C:\Windows\SysWOW64\colorcpl.exe
                                                  Imagebase:0xa90000
                                                  File size:86528 bytes
                                                  MD5 hash:746F3B5E7652EA0766BA10414D317981
                                                  Has elevated privileges:true
                                                  Has administrator privileges:true
                                                  Programmed in:C, C++ or other language
                                                  Yara matches:
                                                  • Rule: JoeSecurity_FormBook, Description: Yara detected FormBook, Source: 0000000F.00000002.639726248.0000000002EC0000.00000040.80000000.00040000.00000000.sdmp, Author: Joe Security
                                                  • Rule: Formbook_1, Description: autogenerated rule brought to you by yara-signator, Source: 0000000F.00000002.639726248.0000000002EC0000.00000040.80000000.00040000.00000000.sdmp, Author: Felix Bilstein - yara-signator at cocacoding dot com
                                                  • Rule: Formbook, Description: detect Formbook in memory, Source: 0000000F.00000002.639726248.0000000002EC0000.00000040.80000000.00040000.00000000.sdmp, Author: JPCERT/CC Incident Response Group
                                                  • Rule: JoeSecurity_FormBook, Description: Yara detected FormBook, Source: 0000000F.00000002.638592382.0000000002BC0000.00000040.10000000.00040000.00000000.sdmp, Author: Joe Security
                                                  • Rule: Formbook_1, Description: autogenerated rule brought to you by yara-signator, Source: 0000000F.00000002.638592382.0000000002BC0000.00000040.10000000.00040000.00000000.sdmp, Author: Felix Bilstein - yara-signator at cocacoding dot com
                                                  • Rule: Formbook, Description: detect Formbook in memory, Source: 0000000F.00000002.638592382.0000000002BC0000.00000040.10000000.00040000.00000000.sdmp, Author: JPCERT/CC Incident Response Group
                                                  • Rule: JoeSecurity_FormBook, Description: Yara detected FormBook, Source: 0000000F.00000002.637724743.0000000000B60000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                  • Rule: Formbook_1, Description: autogenerated rule brought to you by yara-signator, Source: 0000000F.00000002.637724743.0000000000B60000.00000004.00000800.00020000.00000000.sdmp, Author: Felix Bilstein - yara-signator at cocacoding dot com
                                                  • Rule: Formbook, Description: detect Formbook in memory, Source: 0000000F.00000002.637724743.0000000000B60000.00000004.00000800.00020000.00000000.sdmp, Author: JPCERT/CC Incident Response Group
                                                  Reputation:moderate

                                                  Target ID:16
                                                  Start time:22:12:07
                                                  Start date:28/01/2022
                                                  Path:C:\Windows\SysWOW64\cmd.exe
                                                  Wow64 process (32bit):true
                                                  Commandline:/c del "C:\Users\user\Desktop\DHL Document.exe"
                                                  Imagebase:0x2a0000
                                                  File size:232960 bytes
                                                  MD5 hash:F3BDBE3BB6F734E357235F4D5898582D
                                                  Has elevated privileges:true
                                                  Has administrator privileges:true
                                                  Programmed in:C, C++ or other language
                                                  Reputation:high

                                                  Target ID:17
                                                  Start time:22:12:08
                                                  Start date:28/01/2022
                                                  Path:C:\Windows\System32\conhost.exe
                                                  Wow64 process (32bit):false
                                                  Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                  Imagebase:0x7ff61de10000
                                                  File size:625664 bytes
                                                  MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                                  Has elevated privileges:true
                                                  Has administrator privileges:true
                                                  Programmed in:C, C++ or other language
                                                  Reputation:high

                                                  Target ID:27
                                                  Start time:22:12:47
                                                  Start date:28/01/2022
                                                  Path:C:\Windows\explorer.exe
                                                  Wow64 process (32bit):false
                                                  Commandline:"C:\Windows\explorer.exe" /LOADSAVEDWINDOWS
                                                  Imagebase:0x7ff6f22f0000
                                                  File size:3933184 bytes
                                                  MD5 hash:AD5296B280E8F522A8A897C96BAB0E1D
                                                  Has elevated privileges:true
                                                  Has administrator privileges:true
                                                  Programmed in:C, C++ or other language
                                                  Reputation:high

                                                  No disassembly