Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
DHL_29028263 receipt document of the purchase,pdf.exe

Overview

General Information

Sample Name:DHL_29028263 receipt document of the purchase,pdf.exe
Analysis ID:635250
MD5:c97dfff9af3555ca25082cc686715c76
SHA1:efc71d34d01661436ef23e2af1a36f7f96319122
SHA256:bd89fe68b099ed00bea985dbdf7c8c0d87deb5a85c29d7a27f09764ab5b9d04d
Tags:DHLexeFormbook
Infos:

Detection

FormBook
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Yara detected UAC Bypass using CMSTP
Multi AV Scanner detection for submitted file
Yara detected FormBook
Icon mismatch, binary includes an icon from a different legit application in order to fool users
Malicious sample detected (through community Yara rule)
Yara detected AntiVM3
System process connects to network (likely due to code injection or exploit)
Antivirus detection for URL or domain
Multi AV Scanner detection for domain / URL
Snort IDS alert for network traffic
Sample uses process hollowing technique
Maps a DLL or memory area into another process
Initial sample is a PE file and has a suspicious name
Writes to foreign memory regions
Contains functionality to hide user accounts
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Allocates memory in foreign processes
Injects a PE file into a foreign processes
Queues an APC in another process (thread injection)
.NET source code contains very large array initializations
Tries to detect virtualization through RDTSC time measurements
Modifies the context of a thread in another process (thread injection)
C2 URLs / IPs found in malware configuration
Uses 32bit PE files
Queries the volume information (name, serial number etc) of a device
Yara signature match
Antivirus or Machine Learning detection for unpacked file
May sleep (evasive loops) to hinder dynamic analysis
Uses code obfuscation techniques (call, push, ret)
Internet Provider seen in connection with other malware
Detected potential crypto function
Found potential string decryption / allocating functions
Sample execution stops while process was sleeping (likely an evasion)
Contains functionality to call native functions
Creates processes with suspicious names
HTTP GET or POST without a user agent
IP address seen in connection with other malware
Contains functionality for execution timing, often used to detect debuggers
Contains long sleeps (>= 3 min)
Enables debug privileges
Creates a DirectInput object (often for capturing keystrokes)
AV process strings found (often used to terminate AV products)
Sample file is different than original file name gathered from version info
PE file contains strange resources
Contains functionality to read the PEB
Checks if the current process is being debugged
Binary contains a suspicious time stamp
Monitors certain registry keys / values for changes (often done to protect autostart functionality)
Found large amount of non-executed APIs
Creates a process in suspended mode (likely to inject code)
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)

Classification

  • System is w10x64
  • DHL_29028263 receipt document of the purchase,pdf.exe (PID: 7020 cmdline: "C:\Users\user\Desktop\DHL_29028263 receipt document of the purchase,pdf.exe" MD5: C97DFFF9AF3555CA25082CC686715C76)
    • tcmsetup.exe (PID: 7084 cmdline: C:\Windows\SysWOW64\tcmsetup.exe MD5: EBCB8BE0CD1C5FEC861B53CDE71F009D)
    • find.exe (PID: 7092 cmdline: C:\Windows\SysWOW64\find.exe MD5: 9BCB215932501B45D204DC8E592EA996)
      • explorer.exe (PID: 684 cmdline: C:\Windows\Explorer.EXE MD5: AD5296B280E8F522A8A897C96BAB0E1D)
        • svchost.exe (PID: 5564 cmdline: C:\Windows\SysWOW64\svchost.exe MD5: FA6C268A5B5BDA067A901764D203D433)
          • cmd.exe (PID: 6868 cmdline: /c del "C:\Windows\SysWOW64\find.exe" MD5: F3BDBE3BB6F734E357235F4D5898582D)
            • conhost.exe (PID: 3856 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
  • cleanup
{"C2 list": ["www.bestofsouthbeach.guide/mrw6/"], "decoy": ["car-kit.store", "localbrewsislamorada.com", "jaykamins.art", "babeswant.com", "tubularyhvlpu.online", "psychomindsofficial.com", "jmsls.net", "nxeifycssut.mobi", "paraquatinducedparkinsons.com", "trancendentalastroshop.store", "modaskayita.com", "reeventos.com", "loueofficial.com", "sentlogisticsja.com", "umiyan.com", "getvirtualaddress.com", "beargreasers.com", "kyousaku.net", "prospectdatasolutions.com", "16gjm.xyz", "range4tis.com", "doholiz.com", "techno-delights.com", "commercewholesale.com", "delcobilly.com", "artificial-pigment.wiki", "hashv.one", "weichuang-pifa.com", "cafehavanacigars.club", "misantaparticulares.online", "frontierwindpowerllc.com", "howellandassocinc.com", "cherylwoya.com", "platinumridge.art", "corporatesupplygroup.online", "blog-ikusachi-life.com", "946abg.net", "djfest.net", "haiye88.com", "koedayuuki.net", "jagapps.tech", "metanask.online", "southtm.com", "mcalpinindustries.com", "unifonic.agency", "quarhu.com", "jxrszp.com", "itasetembro-consulte.digital", "ff4cn15ck.xyz", "xd16880.com", "btcminers.bet", "laborchcg.com", "tanran.online", "shuddhiorganics.com", "numi.quest", "fortuscare.com", "fromleadertomastercoach.com", "xn--eltemplodehcate-lnb.com", "activeton.com", "morningvibecoffee.com", "uhk.academy", "finestrecitaltolearn-today.info", "citie-dct.com", "xn--xcr352cxsd.net"]}
SourceRuleDescriptionAuthorStrings
00000000.00000002.490164346.00000000048A4000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_FormBookYara detected FormBookJoe Security
    00000000.00000002.490164346.00000000048A4000.00000004.00000800.00020000.00000000.sdmpFormbook_1autogenerated rule brought to you by yara-signatorFelix Bilstein - yara-signator at cocacoding dot com
    • 0x583a8:$sequence_0: 03 C8 0F 31 2B C1 89 45 FC
    • 0x58742:$sequence_0: 03 C8 0F 31 2B C1 89 45 FC
    • 0x64455:$sequence_1: 3C 24 0F 84 76 FF FF FF 3C 25 74 94
    • 0x63f41:$sequence_2: 3B 4F 14 73 95 85 C9 74 91
    • 0x64557:$sequence_3: 3C 69 75 44 8B 7D 18 8B 0F
    • 0x646cf:$sequence_4: 5D C3 8D 50 7C 80 FA 07
    • 0x5915a:$sequence_5: 0F BE 5C 0E 01 0F B6 54 0E 02 83 E3 0F C1 EA 06
    • 0x631bc:$sequence_6: 57 89 45 FC 89 45 F4 89 45 F8
    • 0x59ed2:$sequence_7: 66 89 0C 02 5B 8B E5 5D
    • 0x69947:$sequence_8: 3C 54 74 04 3C 74 75 F4
    • 0x6a9ea:$sequence_9: 56 68 03 01 00 00 8D 85 95 FE FF FF 6A 00
    00000000.00000002.490164346.00000000048A4000.00000004.00000800.00020000.00000000.sdmpFormbookdetect Formbook in memoryJPCERT/CC Incident Response Group
    • 0x66879:$sqlite3step: 68 34 1C 7B E1
    • 0x6698c:$sqlite3step: 68 34 1C 7B E1
    • 0x668a8:$sqlite3text: 68 38 2A 90 C5
    • 0x669cd:$sqlite3text: 68 38 2A 90 C5
    • 0x668bb:$sqlite3blob: 68 53 D8 7F 8C
    • 0x669e3:$sqlite3blob: 68 53 D8 7F 8C
    00000004.00000000.527619880.0000000005187000.00000040.00000001.00040000.00000000.sdmpJoeSecurity_FormBookYara detected FormBookJoe Security
      00000004.00000000.527619880.0000000005187000.00000040.00000001.00040000.00000000.sdmpFormbook_1autogenerated rule brought to you by yara-signatorFelix Bilstein - yara-signator at cocacoding dot com
      • 0x46c5:$sequence_1: 3C 24 0F 84 76 FF FF FF 3C 25 74 94
      • 0x41b1:$sequence_2: 3B 4F 14 73 95 85 C9 74 91
      • 0x47c7:$sequence_3: 3C 69 75 44 8B 7D 18 8B 0F
      • 0x493f:$sequence_4: 5D C3 8D 50 7C 80 FA 07
      • 0x342c:$sequence_6: 57 89 45 FC 89 45 F4 89 45 F8
      • 0x9bb7:$sequence_8: 3C 54 74 04 3C 74 75 F4
      • 0xac5a:$sequence_9: 56 68 03 01 00 00 8D 85 95 FE FF FF 6A 00
      Click to see the 41 entries
      SourceRuleDescriptionAuthorStrings
      2.2.find.exe.400000.0.raw.unpackJoeSecurity_FormBookYara detected FormBookJoe Security
        2.2.find.exe.400000.0.raw.unpackFormbook_1autogenerated rule brought to you by yara-signatorFelix Bilstein - yara-signator at cocacoding dot com
        • 0x8618:$sequence_0: 03 C8 0F 31 2B C1 89 45 FC
        • 0x89b2:$sequence_0: 03 C8 0F 31 2B C1 89 45 FC
        • 0x146c5:$sequence_1: 3C 24 0F 84 76 FF FF FF 3C 25 74 94
        • 0x141b1:$sequence_2: 3B 4F 14 73 95 85 C9 74 91
        • 0x147c7:$sequence_3: 3C 69 75 44 8B 7D 18 8B 0F
        • 0x1493f:$sequence_4: 5D C3 8D 50 7C 80 FA 07
        • 0x93ca:$sequence_5: 0F BE 5C 0E 01 0F B6 54 0E 02 83 E3 0F C1 EA 06
        • 0x1342c:$sequence_6: 57 89 45 FC 89 45 F4 89 45 F8
        • 0xa142:$sequence_7: 66 89 0C 02 5B 8B E5 5D
        • 0x19bb7:$sequence_8: 3C 54 74 04 3C 74 75 F4
        • 0x1ac5a:$sequence_9: 56 68 03 01 00 00 8D 85 95 FE FF FF 6A 00
        2.2.find.exe.400000.0.raw.unpackFormbookdetect Formbook in memoryJPCERT/CC Incident Response Group
        • 0x16ae9:$sqlite3step: 68 34 1C 7B E1
        • 0x16bfc:$sqlite3step: 68 34 1C 7B E1
        • 0x16b18:$sqlite3text: 68 38 2A 90 C5
        • 0x16c3d:$sqlite3text: 68 38 2A 90 C5
        • 0x16b2b:$sqlite3blob: 68 53 D8 7F 8C
        • 0x16c53:$sqlite3blob: 68 53 D8 7F 8C
        2.0.find.exe.400000.1.unpackJoeSecurity_FormBookYara detected FormBookJoe Security
          2.0.find.exe.400000.1.unpackFormbook_1autogenerated rule brought to you by yara-signatorFelix Bilstein - yara-signator at cocacoding dot com
          • 0x7818:$sequence_0: 03 C8 0F 31 2B C1 89 45 FC
          • 0x7bb2:$sequence_0: 03 C8 0F 31 2B C1 89 45 FC
          • 0x138c5:$sequence_1: 3C 24 0F 84 76 FF FF FF 3C 25 74 94
          • 0x133b1:$sequence_2: 3B 4F 14 73 95 85 C9 74 91
          • 0x139c7:$sequence_3: 3C 69 75 44 8B 7D 18 8B 0F
          • 0x13b3f:$sequence_4: 5D C3 8D 50 7C 80 FA 07
          • 0x85ca:$sequence_5: 0F BE 5C 0E 01 0F B6 54 0E 02 83 E3 0F C1 EA 06
          • 0x1262c:$sequence_6: 57 89 45 FC 89 45 F4 89 45 F8
          • 0x9342:$sequence_7: 66 89 0C 02 5B 8B E5 5D
          • 0x18db7:$sequence_8: 3C 54 74 04 3C 74 75 F4
          • 0x19e5a:$sequence_9: 56 68 03 01 00 00 8D 85 95 FE FF FF 6A 00
          Click to see the 25 entries
          No Sigma rule has matched
          Timestamp:192.168.2.5209.99.64.4349816802031412 05/27/22-17:53:28.062546
          SID:2031412
          Source Port:49816
          Destination Port:80
          Protocol:TCP
          Classtype:A Network Trojan was detected
          Timestamp:192.168.2.5209.99.64.4349816802031453 05/27/22-17:53:28.062546
          SID:2031453
          Source Port:49816
          Destination Port:80
          Protocol:TCP
          Classtype:A Network Trojan was detected
          Timestamp:192.168.2.5209.99.64.4349816802031449 05/27/22-17:53:28.062546
          SID:2031449
          Source Port:49816
          Destination Port:80
          Protocol:TCP
          Classtype:A Network Trojan was detected

          Click to jump to signature section

          Show All Signature Results

          AV Detection

          barindex
          Source: 00000000.00000002.490164346.00000000048A4000.00000004.00000800.00020000.00000000.sdmpMalware Configuration Extractor: FormBook {"C2 list": ["www.bestofsouthbeach.guide/mrw6/"], "decoy": ["car-kit.store", "localbrewsislamorada.com", "jaykamins.art", "babeswant.com", "tubularyhvlpu.online", "psychomindsofficial.com", "jmsls.net", "nxeifycssut.mobi", "paraquatinducedparkinsons.com", "trancendentalastroshop.store", "modaskayita.com", "reeventos.com", "loueofficial.com", "sentlogisticsja.com", "umiyan.com", "getvirtualaddress.com", "beargreasers.com", "kyousaku.net", "prospectdatasolutions.com", "16gjm.xyz", "range4tis.com", "doholiz.com", "techno-delights.com", "commercewholesale.com", "delcobilly.com", "artificial-pigment.wiki", "hashv.one", "weichuang-pifa.com", "cafehavanacigars.club", "misantaparticulares.online", "frontierwindpowerllc.com", "howellandassocinc.com", "cherylwoya.com", "platinumridge.art", "corporatesupplygroup.online", "blog-ikusachi-life.com", "946abg.net", "djfest.net", "haiye88.com", "koedayuuki.net", "jagapps.tech", "metanask.online", "southtm.com", "mcalpinindustries.com", "unifonic.agency", "quarhu.com", "jxrszp.com", "itasetembro-consulte.digital", "ff4cn15ck.xyz", "xd16880.com", "btcminers.bet", "laborchcg.com", "tanran.online", "shuddhiorganics.com", "numi.quest", "fortuscare.com", "fromleadertomastercoach.com", "xn--eltemplodehcate-lnb.com", "activeton.com", "morningvibecoffee.com", "uhk.academy", "finestrecitaltolearn-today.info", "citie-dct.com", "xn--xcr352cxsd.net"]}
          Source: DHL_29028263 receipt document of the purchase,pdf.exeReversingLabs: Detection: 21%
          Source: Yara matchFile source: 2.2.find.exe.400000.0.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 2.0.find.exe.400000.1.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 2.0.find.exe.400000.3.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 2.0.find.exe.400000.3.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 2.2.find.exe.400000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 2.0.find.exe.400000.2.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 2.0.find.exe.400000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 2.0.find.exe.400000.2.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 2.0.find.exe.400000.1.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 00000000.00000002.490164346.00000000048A4000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000004.00000000.527619880.0000000005187000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000002.00000000.471183159.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000002.00000002.571277848.0000000000D40000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000000E.00000002.705413123.0000000003210000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000000.00000002.487275778.0000000004472000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000000E.00000002.704496254.00000000029D0000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000000.00000002.487559942.00000000044F0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000004.00000000.508992436.0000000005187000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000002.00000000.470820106.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000000E.00000002.705527409.0000000003240000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000002.00000002.570977775.0000000000D10000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000002.00000000.470421147.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000002.00000002.570002580.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
          Source: http://www.cherylwoya.com/mrw6/?5j=-Z8hhJu0CH1&kZL=6fZEMEdK0EUsHT8poDGbU1zs+0N96qjYHzalTR2tuqMjY7ixAH4WqcSwjImDfJQ+xirUAvira URL Cloud: Label: phishing
          Source: http://www.946abg.net/mrw6/?kZL=serf4G2fT23AQqvD11FW0e5UhnaipW+P1SIFRHWKX7vOHQGiYIAk+83ijhEv+8S8z0gu&5j=-Z8hhJu0CH1Avira URL Cloud: Label: malware
          Source: www.bestofsouthbeach.guide/mrw6/Avira URL Cloud: Label: malware
          Source: cherylwoya.comVirustotal: Detection: 9%Perma Link
          Source: 2.0.find.exe.400000.3.unpackAvira: Label: TR/Crypt.XPACK.Gen2
          Source: 2.2.find.exe.400000.0.unpackAvira: Label: TR/Crypt.XPACK.Gen2
          Source: 2.0.find.exe.400000.1.unpackAvira: Label: TR/Crypt.XPACK.Gen2
          Source: 2.0.find.exe.400000.2.unpackAvira: Label: TR/Crypt.XPACK.Gen2
          Source: 2.0.find.exe.400000.0.unpackAvira: Label: TR/Crypt.XPACK.Gen2

          Exploits

          barindex
          Source: Yara matchFile source: 0.2.DHL_29028263 receipt document of the purchase,pdf.exe.43b5118.3.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 00000000.00000002.486933021.0000000004396000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: Process Memory Space: DHL_29028263 receipt document of the purchase,pdf.exe PID: 7020, type: MEMORYSTR
          Source: DHL_29028263 receipt document of the purchase,pdf.exeStatic PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE
          Source: DHL_29028263 receipt document of the purchase,pdf.exeStatic PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT, HIGH_ENTROPY_VA
          Source: Binary string: find.pdb source: DHL_29028263 receipt document of the purchase,pdf.exe, 00000000.00000002.484850602.0000000002E3D000.00000004.00000800.00020000.00000000.sdmp, svchost.exe, 0000000E.00000002.705313981.0000000003012000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000E.00000002.706967568.0000000003C37000.00000004.10000000.00040000.00000000.sdmp
          Source: Binary string: wntdll.pdbUGP source: find.exe, 00000002.00000003.473865618.0000000003042000.00000004.00000800.00020000.00000000.sdmp, find.exe, 00000002.00000002.572052995.00000000031E0000.00000040.00000800.00020000.00000000.sdmp, find.exe, 00000002.00000002.573306968.00000000032FF000.00000040.00000800.00020000.00000000.sdmp, find.exe, 00000002.00000003.471487000.0000000000E8B000.00000004.00000800.00020000.00000000.sdmp, svchost.exe, 0000000E.00000003.569780070.0000000003300000.00000004.00000800.00020000.00000000.sdmp, svchost.exe, 0000000E.00000003.573320075.0000000003500000.00000004.00000800.00020000.00000000.sdmp, svchost.exe, 0000000E.00000002.705917603.0000000003700000.00000040.00000800.00020000.00000000.sdmp, svchost.exe, 0000000E.00000002.706304767.000000000381F000.00000040.00000800.00020000.00000000.sdmp
          Source: Binary string: wntdll.pdb source: find.exe, find.exe, 00000002.00000003.473865618.0000000003042000.00000004.00000800.00020000.00000000.sdmp, find.exe, 00000002.00000002.572052995.00000000031E0000.00000040.00000800.00020000.00000000.sdmp, find.exe, 00000002.00000002.573306968.00000000032FF000.00000040.00000800.00020000.00000000.sdmp, find.exe, 00000002.00000003.471487000.0000000000E8B000.00000004.00000800.00020000.00000000.sdmp, svchost.exe, svchost.exe, 0000000E.00000003.569780070.0000000003300000.00000004.00000800.00020000.00000000.sdmp, svchost.exe, 0000000E.00000003.573320075.0000000003500000.00000004.00000800.00020000.00000000.sdmp, svchost.exe, 0000000E.00000002.705917603.0000000003700000.00000040.00000800.00020000.00000000.sdmp, svchost.exe, 0000000E.00000002.706304767.000000000381F000.00000040.00000800.00020000.00000000.sdmp
          Source: Binary string: find.pdbGCTL source: DHL_29028263 receipt document of the purchase,pdf.exe, 00000000.00000002.484850602.0000000002E3D000.00000004.00000800.00020000.00000000.sdmp, svchost.exe, 0000000E.00000002.705313981.0000000003012000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000E.00000002.706967568.0000000003C37000.00000004.10000000.00040000.00000000.sdmp
          Source: Binary string: C:\agent\_work\4\s\obj\VS\Microsoft.WebTools.Languages.Json\Release\Microsoft.WebTools.Languages.Json.pdb source: DHL_29028263 receipt document of the purchase,pdf.exe, DHL_29028263 receipt document of the purchase,pdf.exe, 00000000.00000000.435567902.00000000010E2000.00000020.00000001.01000000.00000003.sdmp, DHL_29028263 receipt document of the purchase,pdf.exe, 00000000.00000002.479557672.00000000010E2000.00000020.00000001.01000000.00000003.sdmp

          Networking

          barindex
          Source: C:\Windows\explorer.exeDomain query: www.cherylwoya.com
          Source: C:\Windows\explorer.exeNetwork Connect: 64.34.156.161 80
          Source: C:\Windows\explorer.exeDomain query: www.946abg.net
          Source: C:\Windows\explorer.exeDomain query: www.kyousaku.net
          Source: C:\Windows\explorer.exeNetwork Connect: 154.86.129.243 80
          Source: TrafficSnort IDS: 2031453 ET TROJAN FormBook CnC Checkin (GET) 192.168.2.5:49816 -> 209.99.64.43:80
          Source: TrafficSnort IDS: 2031449 ET TROJAN FormBook CnC Checkin (GET) 192.168.2.5:49816 -> 209.99.64.43:80
          Source: TrafficSnort IDS: 2031412 ET TROJAN FormBook CnC Checkin (GET) 192.168.2.5:49816 -> 209.99.64.43:80
          Source: Malware configuration extractorURLs: www.bestofsouthbeach.guide/mrw6/
          Source: Joe Sandbox ViewASN Name: COGECO-PEER1CA COGECO-PEER1CA
          Source: Joe Sandbox ViewASN Name: DXTL-HKDXTLTseungKwanOServiceHK DXTL-HKDXTLTseungKwanOServiceHK
          Source: global trafficHTTP traffic detected: GET /mrw6/?5j=-Z8hhJu0CH1&kZL=6fZEMEdK0EUsHT8poDGbU1zs+0N96qjYHzalTR2tuqMjY7ixAH4WqcSwjImDfJQ+xirU HTTP/1.1Host: www.cherylwoya.comConnection: closeData Raw: 00 00 00 00 00 00 00 Data Ascii:
          Source: global trafficHTTP traffic detected: GET /mrw6/?kZL=serf4G2fT23AQqvD11FW0e5UhnaipW+P1SIFRHWKX7vOHQGiYIAk+83ijhEv+8S8z0gu&5j=-Z8hhJu0CH1 HTTP/1.1Host: www.946abg.netConnection: closeData Raw: 00 00 00 00 00 00 00 Data Ascii:
          Source: Joe Sandbox ViewIP Address: 154.86.129.243 154.86.129.243
          Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Fri, 27 May 2022 15:53:01 GMTServer: ApacheUpgrade: h2,h2cConnection: Upgrade, closeAccept-Ranges: bytesVary: Accept-Encoding,User-AgentCache-Control: no-cache, no-store, must-revalidatePragma: no-cacheExpires: 0Transfer-Encoding: chunkedContent-Type: text/htmlData Raw: 31 0d 0a 0a 0d 0a 31 0d 0a 0a 0d 0a 31 0d 0a 0a 0d 0a 31 35 37 0d 0a 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 3e 0a 20 20 20 20 3c 68 65 61 64 3e 0a 20 20 20 20 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 43 6f 6e 74 65 6e 74 2d 74 79 70 65 22 20 63 6f 6e 74 65 6e 74 3d 22 74 65 78 74 2f 68 74 6d 6c 3b 20 63 68 61 72 73 65 74 3d 75 74 66 2d 38 22 3e 0a 20 20 20 20 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 43 61 63 68 65 2d 63 6f 6e 74 72 6f 6c 22 20 63 6f 6e 74 65 6e 74 3d 22 6e 6f 2d 63 61 63 68 65 22 3e 0a 20 20 20 20 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 50 72 61 67 6d 61 22 20 63 6f 6e 74 65 6e 74 3d 22 6e 6f 2d 63 61 63 68 65 22 3e 0a 20 20 20 20 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 45 78 70 69 72 65 73 22 20 63 6f 6e 74 65 6e 74 3d 22 30 22 3e 0a 20 20 20 20 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 76 69 65 77 70 6f 72 74 22 20 63 6f 6e 74 65 6e 74 3d 22 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 2c 20 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 2e 30 22 3e 0a 20 20 20 20 3c 74 69 74 6c 65 3e 0d 0a 33 0d 0a 34 30 34 0d 0a 31 0d 0a 20 0d 0a 39 0d 0a 4e 6f 74 20 46 6f 75 6e 64 0d 0a 31 66 63 61 0d 0a 3c 2f 74 69 74 6c 65 3e 0a 20 20 20 20 3c 73 74 79 6c 65 20 74 79 70 65 3d 22 74 65 78 74 2f 63 73 73 22 3e 0a 20 20 20 20 20 20 20 20 62 6f 64 79 20 7b 0a 20 20 20 20 20 20 20 20 20 20 20 20 66 6f 6e 74 2d 66 61 6d 69 6c 79 3a 20 41 72 69 61 6c 2c 20 48 65 6c 76 65 74 69 63 61 2c 20 73 61 6e 73 2d 73 65 72 69 66 3b 0a 20 20 20 20 20 20 20 20 20 20 20 20 66 6f 6e 74 2d 73 69 7a 65 3a 20 31 34 70 78 3b 0a 20 20 20 20 20 20 20 20 20 20 20 20 6c 69 6e 65 2d 68 65 69 67 68 74 3a 20 31 2e 34 32 38 35 37 31 34 32 39 3b 0a 20 20 20 20 20 20 20 20 20 20 20 20 62 61 63 6b 67 72 6f 75 6e 64 2d 63 6f 6c 6f 72 3a 20 23 66 66 66 66 66 66 3b 0a 20 20 20 20 20 20 20 20 20 20 20 20 63 6f 6c 6f 72 3a 20 23 32 46 33 32 33 30 3b 0a 20 20 20 20 20 20 20 20 20 20 20 20 70 61 64 64 69 6e 67 3a 20 30 3b 0a 20 20 20 20 20 20 20 20 20 20 20 20 6d 61 72 67 69 6e 3a 20 30 3b 0a 20 20 20 20 20 20 20 20 7d 0a 20 20 20 20 20 20 20 20 73 65 63 74 69 6f 6e 2c 20 66 6f 6f 74 65 72 20 7b 0a 20 20 20 20 20 20 20 20 20 20 20 20 64 69 73 70 6c 61 79 3a 20 62 6c 6f 63 6b 3b 0a 20 20 20 20 20 20 20 20 20 20 20 20 70 61 64 64 69 6e 67 3a 20 30 3b 0a 20 20 20 20 20 20 20 20 20 20 20 20 6d 61 72 67 69 6e 3a 20 30 3b 0a 20 20 20 20 20 20 20 20 7d 0a 20 20 20 20 20 20 20 20 2e 63 6f 6e 74 61 69 6e 65 72 20 7b 0a 20 20 20 20 20 20 20 20 20 20 20 20 6d 61 72 67 69 6e 2d 6c 65 66 74 3a 20 61 75 74 6f 3b 0a 20 20 20 20 20 20 20 20 20 20 20 20 6d 61 72 67 69 6e 2d 72 69 67 68 74 3a 20 61 75 74 6
          Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginxDate: Fri, 27 May 2022 15:53:07 GMTContent-Type: text/htmlContent-Length: 146Connection: closeData Raw: 3c 68 74 6d 6c 3e 0d 0a 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0d 0a 3c 62 6f 64 79 3e 0d 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 6e 67 69 6e 78 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 2f 62 6f 64 79 3e 0d 0a 3c 2f 68 74 6d 6c 3e 0d 0a Data Ascii: <html><head><title>404 Not Found</title></head><body><center><h1>404 Not Found</h1></center><hr><center>nginx</center></body></html>
          Source: DHL_29028263 receipt document of the purchase,pdf.exe, DHL_29028263 receipt document of the purchase,pdf.exe, 00000000.00000000.435567902.00000000010E2000.00000020.00000001.01000000.00000003.sdmp, DHL_29028263 receipt document of the purchase,pdf.exe, 00000000.00000002.479557672.00000000010E2000.00000020.00000001.01000000.00000003.sdmpString found in binary or memory: http://json-schema.org/draft-04/schema
          Source: DHL_29028263 receipt document of the purchase,pdf.exe, 00000000.00000000.435567902.00000000010E2000.00000020.00000001.01000000.00000003.sdmp, DHL_29028263 receipt document of the purchase,pdf.exe, 00000000.00000002.479557672.00000000010E2000.00000020.00000001.01000000.00000003.sdmpString found in binary or memory: http://json-schema.org/draft-04/schema#Lhttp://json-schema.org/draft-04/schema
          Source: DHL_29028263 receipt document of the purchase,pdf.exe, DHL_29028263 receipt document of the purchase,pdf.exe, 00000000.00000000.435567902.00000000010E2000.00000020.00000001.01000000.00000003.sdmp, DHL_29028263 receipt document of the purchase,pdf.exe, 00000000.00000002.479557672.00000000010E2000.00000020.00000001.01000000.00000003.sdmpString found in binary or memory: http://www.random.org/sequences/
          Source: DHL_29028263 receipt document of the purchase,pdf.exe, 00000000.00000000.435567902.00000000010E2000.00000020.00000001.01000000.00000003.sdmp, DHL_29028263 receipt document of the purchase,pdf.exe, 00000000.00000002.479557672.00000000010E2000.00000020.00000001.01000000.00000003.sdmpString found in binary or memory: https://aka.ms/arm-tools-apiversion.
          Source: DHL_29028263 receipt document of the purchase,pdf.exe, DHL_29028263 receipt document of the purchase,pdf.exe, 00000000.00000000.435567902.00000000010E2000.00000020.00000001.01000000.00000003.sdmp, DHL_29028263 receipt document of the purchase,pdf.exe, 00000000.00000002.479557672.00000000010E2000.00000020.00000001.01000000.00000003.sdmpString found in binary or memory: https://schema.management.azure.com/schemas/2014-04-01-preview/deploymentTemplate.json
          Source: DHL_29028263 receipt document of the purchase,pdf.exe, DHL_29028263 receipt document of the purchase,pdf.exe, 00000000.00000000.435567902.00000000010E2000.00000020.00000001.01000000.00000003.sdmp, DHL_29028263 receipt document of the purchase,pdf.exe, 00000000.00000002.479557672.00000000010E2000.00000020.00000001.01000000.00000003.sdmpString found in binary or memory: https://schema.management.azure.com/schemas/2015-01-01/deploymentTemplate.json
          Source: DHL_29028263 receipt document of the purchase,pdf.exe, DHL_29028263 receipt document of the purchase,pdf.exe, 00000000.00000000.435567902.00000000010E2000.00000020.00000001.01000000.00000003.sdmp, DHL_29028263 receipt document of the purchase,pdf.exe, 00000000.00000002.479557672.00000000010E2000.00000020.00000001.01000000.00000003.sdmpString found in binary or memory: https://schema.management.azure.com/schemas/2018-05-01/subscriptionDeploymentTemplate.json
          Source: DHL_29028263 receipt document of the purchase,pdf.exe, DHL_29028263 receipt document of the purchase,pdf.exe, 00000000.00000000.435567902.00000000010E2000.00000020.00000001.01000000.00000003.sdmp, DHL_29028263 receipt document of the purchase,pdf.exe, 00000000.00000002.479557672.00000000010E2000.00000020.00000001.01000000.00000003.sdmpString found in binary or memory: https://schema.management.azure.com/schemas/2019-04-01/deploymentTemplate.json
          Source: DHL_29028263 receipt document of the purchase,pdf.exe, DHL_29028263 receipt document of the purchase,pdf.exe, 00000000.00000000.435567902.00000000010E2000.00000020.00000001.01000000.00000003.sdmp, DHL_29028263 receipt document of the purchase,pdf.exe, 00000000.00000002.479557672.00000000010E2000.00000020.00000001.01000000.00000003.sdmpString found in binary or memory: https://schema.management.azure.com/schemas/2019-08-01/managementGroupDeploymentTemplate.json
          Source: DHL_29028263 receipt document of the purchase,pdf.exe, DHL_29028263 receipt document of the purchase,pdf.exe, 00000000.00000000.435567902.00000000010E2000.00000020.00000001.01000000.00000003.sdmp, DHL_29028263 receipt document of the purchase,pdf.exe, 00000000.00000002.479557672.00000000010E2000.00000020.00000001.01000000.00000003.sdmpString found in binary or memory: https://schema.management.azure.com/schemas/2019-08-01/tenantDeploymentTemplate.json
          Source: DHL_29028263 receipt document of the purchase,pdf.exe, 00000000.00000000.435567902.00000000010E2000.00000020.00000001.01000000.00000003.sdmp, DHL_29028263 receipt document of the purchase,pdf.exe, 00000000.00000002.479557672.00000000010E2000.00000020.00000001.01000000.00000003.sdmpString found in binary or memory: https://schema.management.azure.com/schemas/2019-08-01/tenantDeploymentTemplate.json.2014
          Source: unknownDNS traffic detected: queries for: www.cherylwoya.com
          Source: global trafficHTTP traffic detected: GET /mrw6/?5j=-Z8hhJu0CH1&kZL=6fZEMEdK0EUsHT8poDGbU1zs+0N96qjYHzalTR2tuqMjY7ixAH4WqcSwjImDfJQ+xirU HTTP/1.1Host: www.cherylwoya.comConnection: closeData Raw: 00 00 00 00 00 00 00 Data Ascii:
          Source: global trafficHTTP traffic detected: GET /mrw6/?kZL=serf4G2fT23AQqvD11FW0e5UhnaipW+P1SIFRHWKX7vOHQGiYIAk+83ijhEv+8S8z0gu&5j=-Z8hhJu0CH1 HTTP/1.1Host: www.946abg.netConnection: closeData Raw: 00 00 00 00 00 00 00 Data Ascii:
          Source: DHL_29028263 receipt document of the purchase,pdf.exe, 00000000.00000002.478889844.0000000000A8B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: <HOOK MODULE="DDRAW.DLL" FUNCTION="DirectDrawCreateEx"/>

          E-Banking Fraud

          barindex
          Source: Yara matchFile source: 2.2.find.exe.400000.0.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 2.0.find.exe.400000.1.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 2.0.find.exe.400000.3.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 2.0.find.exe.400000.3.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 2.2.find.exe.400000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 2.0.find.exe.400000.2.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 2.0.find.exe.400000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 2.0.find.exe.400000.2.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 2.0.find.exe.400000.1.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 00000000.00000002.490164346.00000000048A4000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000004.00000000.527619880.0000000005187000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000002.00000000.471183159.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000002.00000002.571277848.0000000000D40000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000000E.00000002.705413123.0000000003210000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000000.00000002.487275778.0000000004472000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000000E.00000002.704496254.00000000029D0000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000000.00000002.487559942.00000000044F0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000004.00000000.508992436.0000000005187000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000002.00000000.470820106.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000000E.00000002.705527409.0000000003240000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000002.00000002.570977775.0000000000D10000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000002.00000000.470421147.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000002.00000002.570002580.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY

          System Summary

          barindex
          Source: 2.2.find.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 2.2.find.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 2.0.find.exe.400000.1.unpack, type: UNPACKEDPEMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 2.0.find.exe.400000.1.unpack, type: UNPACKEDPEMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 2.0.find.exe.400000.3.raw.unpack, type: UNPACKEDPEMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 2.0.find.exe.400000.3.raw.unpack, type: UNPACKEDPEMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 2.0.find.exe.400000.3.unpack, type: UNPACKEDPEMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 2.0.find.exe.400000.3.unpack, type: UNPACKEDPEMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 0.2.DHL_29028263 receipt document of the purchase,pdf.exe.43b5118.3.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables containing artifcats associated with disabling Widnows Defender Author: ditekSHen
          Source: 0.2.DHL_29028263 receipt document of the purchase,pdf.exe.43b5118.3.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables embedding command execution via IExecuteCommand COM object Author: ditekSHen
          Source: 2.2.find.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 2.2.find.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 2.0.find.exe.400000.2.unpack, type: UNPACKEDPEMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 2.0.find.exe.400000.2.unpack, type: UNPACKEDPEMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 2.0.find.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 2.0.find.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 2.0.find.exe.400000.2.raw.unpack, type: UNPACKEDPEMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 2.0.find.exe.400000.2.raw.unpack, type: UNPACKEDPEMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 2.0.find.exe.400000.1.raw.unpack, type: UNPACKEDPEMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 2.0.find.exe.400000.1.raw.unpack, type: UNPACKEDPEMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 00000000.00000002.490164346.00000000048A4000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 00000000.00000002.490164346.00000000048A4000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 00000004.00000000.527619880.0000000005187000.00000040.00000001.00040000.00000000.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 00000004.00000000.527619880.0000000005187000.00000040.00000001.00040000.00000000.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 00000002.00000000.471183159.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 00000002.00000000.471183159.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 00000002.00000002.571277848.0000000000D40000.00000040.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 00000002.00000002.571277848.0000000000D40000.00000040.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 0000000E.00000002.705413123.0000000003210000.00000040.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 0000000E.00000002.705413123.0000000003210000.00000040.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 00000000.00000002.487275778.0000000004472000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 00000000.00000002.487275778.0000000004472000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 0000000E.00000002.704496254.00000000029D0000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 0000000E.00000002.704496254.00000000029D0000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 00000000.00000002.487559942.00000000044F0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 00000000.00000002.487559942.00000000044F0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 00000004.00000000.508992436.0000000005187000.00000040.00000001.00040000.00000000.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 00000004.00000000.508992436.0000000005187000.00000040.00000001.00040000.00000000.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 00000002.00000000.470820106.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 00000002.00000000.470820106.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 0000000E.00000002.705527409.0000000003240000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 0000000E.00000002.705527409.0000000003240000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 00000002.00000002.570977775.0000000000D10000.00000040.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 00000002.00000002.570977775.0000000000D10000.00000040.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 00000002.00000000.470421147.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 00000002.00000000.470421147.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 00000002.00000002.570002580.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 00000002.00000002.570002580.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: initial sampleStatic PE information: Filename: DHL_29028263 receipt document of the purchase,pdf.exe
          Source: initial sampleStatic PE information: Filename: DHL_29028263 receipt document of the purchase,pdf.exe
          Source: DHL_29028263 receipt document of the purchase,pdf.exe, u0036582548708/u0039910975725.csLarge array initialization: 0556637666: array initializer size 479744
          Source: DHL_29028263 receipt document of the purchase,pdf.exeStatic PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE
          Source: 2.2.find.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 2.2.find.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 2.0.find.exe.400000.1.unpack, type: UNPACKEDPEMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 2.0.find.exe.400000.1.unpack, type: UNPACKEDPEMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 2.0.find.exe.400000.3.raw.unpack, type: UNPACKEDPEMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 2.0.find.exe.400000.3.raw.unpack, type: UNPACKEDPEMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 2.0.find.exe.400000.3.unpack, type: UNPACKEDPEMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 2.0.find.exe.400000.3.unpack, type: UNPACKEDPEMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 0.2.DHL_29028263 receipt document of the purchase,pdf.exe.43b5118.3.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_DisableWinDefender author = ditekSHen, description = Detects executables containing artifcats associated with disabling Widnows Defender
          Source: 0.2.DHL_29028263 receipt document of the purchase,pdf.exe.43b5118.3.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_RegKeyComb_IExecuteCommandCOM author = ditekSHen, description = Detects executables embedding command execution via IExecuteCommand COM object
          Source: 2.2.find.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 2.2.find.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 2.0.find.exe.400000.2.unpack, type: UNPACKEDPEMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 2.0.find.exe.400000.2.unpack, type: UNPACKEDPEMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 2.0.find.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 2.0.find.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 2.0.find.exe.400000.2.raw.unpack, type: UNPACKEDPEMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 2.0.find.exe.400000.2.raw.unpack, type: UNPACKEDPEMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 2.0.find.exe.400000.1.raw.unpack, type: UNPACKEDPEMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 2.0.find.exe.400000.1.raw.unpack, type: UNPACKEDPEMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 00000000.00000002.490164346.00000000048A4000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 00000000.00000002.490164346.00000000048A4000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 00000004.00000000.527619880.0000000005187000.00000040.00000001.00040000.00000000.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 00000004.00000000.527619880.0000000005187000.00000040.00000001.00040000.00000000.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 00000002.00000000.471183159.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 00000002.00000000.471183159.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 00000002.00000002.571277848.0000000000D40000.00000040.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 00000002.00000002.571277848.0000000000D40000.00000040.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 0000000E.00000002.705413123.0000000003210000.00000040.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 0000000E.00000002.705413123.0000000003210000.00000040.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 00000000.00000002.487275778.0000000004472000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 00000000.00000002.487275778.0000000004472000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 0000000E.00000002.704496254.00000000029D0000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 0000000E.00000002.704496254.00000000029D0000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 00000000.00000002.487559942.00000000044F0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 00000000.00000002.487559942.00000000044F0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 00000004.00000000.508992436.0000000005187000.00000040.00000001.00040000.00000000.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 00000004.00000000.508992436.0000000005187000.00000040.00000001.00040000.00000000.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 00000002.00000000.470820106.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 00000002.00000000.470820106.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 0000000E.00000002.705527409.0000000003240000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 0000000E.00000002.705527409.0000000003240000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 00000002.00000002.570977775.0000000000D10000.00000040.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 00000002.00000002.570977775.0000000000D10000.00000040.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 00000002.00000000.470421147.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 00000002.00000000.470421147.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 00000002.00000002.570002580.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 00000002.00000002.570002580.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: C:\Users\user\Desktop\DHL_29028263 receipt document of the purchase,pdf.exeCode function: 0_2_0115997A
          Source: C:\Users\user\Desktop\DHL_29028263 receipt document of the purchase,pdf.exeCode function: 0_2_00F2A010
          Source: C:\Users\user\Desktop\DHL_29028263 receipt document of the purchase,pdf.exeCode function: 0_2_00F20490
          Source: C:\Users\user\Desktop\DHL_29028263 receipt document of the purchase,pdf.exeCode function: 0_2_00F2E570
          Source: C:\Users\user\Desktop\DHL_29028263 receipt document of the purchase,pdf.exeCode function: 0_2_00F276A0
          Source: C:\Users\user\Desktop\DHL_29028263 receipt document of the purchase,pdf.exeCode function: 0_2_00F29A88
          Source: C:\Users\user\Desktop\DHL_29028263 receipt document of the purchase,pdf.exeCode function: 0_2_00F2DB88
          Source: C:\Users\user\Desktop\DHL_29028263 receipt document of the purchase,pdf.exeCode function: 0_2_00F25EE8
          Source: C:\Users\user\Desktop\DHL_29028263 receipt document of the purchase,pdf.exeCode function: 0_2_00F2E028
          Source: C:\Users\user\Desktop\DHL_29028263 receipt document of the purchase,pdf.exeCode function: 0_2_00F2047F
          Source: C:\Users\user\Desktop\DHL_29028263 receipt document of the purchase,pdf.exeCode function: 0_2_00F22748
          Source: C:\Users\user\Desktop\DHL_29028263 receipt document of the purchase,pdf.exeCode function: 0_2_00F2F998
          Source: C:\Windows\SysWOW64\find.exeCode function: 2_2_00401030
          Source: C:\Windows\SysWOW64\find.exeCode function: 2_2_0041B8D3
          Source: C:\Windows\SysWOW64\find.exeCode function: 2_2_0041C89B
          Source: C:\Windows\SysWOW64\find.exeCode function: 2_2_0041D2B8
          Source: C:\Windows\SysWOW64\find.exeCode function: 2_2_0041CC55
          Source: C:\Windows\SysWOW64\find.exeCode function: 2_2_00408C90
          Source: C:\Windows\SysWOW64\find.exeCode function: 2_2_00402D87
          Source: C:\Windows\SysWOW64\find.exeCode function: 2_2_00402D90
          Source: C:\Windows\SysWOW64\find.exeCode function: 2_2_0041BE24
          Source: C:\Windows\SysWOW64\find.exeCode function: 2_2_0041C710
          Source: C:\Windows\SysWOW64\find.exeCode function: 2_2_00402FB0
          Source: C:\Windows\SysWOW64\find.exeCode function: 2_2_032D2B28
          Source: C:\Windows\SysWOW64\find.exeCode function: 2_2_0323EBB0
          Source: C:\Windows\SysWOW64\find.exeCode function: 2_2_032CDBD2
          Source: C:\Windows\SysWOW64\find.exeCode function: 2_2_032D22AE
          Source: C:\Windows\SysWOW64\find.exeCode function: 2_2_03224120
          Source: C:\Windows\SysWOW64\find.exeCode function: 2_2_0320F900
          Source: C:\Windows\SysWOW64\find.exeCode function: 2_2_032C1002
          Source: C:\Windows\SysWOW64\find.exeCode function: 2_2_032320A0
          Source: C:\Windows\SysWOW64\find.exeCode function: 2_2_032D20A8
          Source: C:\Windows\SysWOW64\find.exeCode function: 2_2_0321B090
          Source: C:\Windows\SysWOW64\find.exeCode function: 2_2_032D1FF1
          Source: C:\Windows\SysWOW64\find.exeCode function: 2_2_03226E30
          Source: C:\Windows\SysWOW64\find.exeCode function: 2_2_032D2EF7
          Source: C:\Windows\SysWOW64\find.exeCode function: 2_2_03200D20
          Source: C:\Windows\SysWOW64\find.exeCode function: 2_2_032D2D07
          Source: C:\Windows\SysWOW64\find.exeCode function: 2_2_032D1D55
          Source: C:\Windows\SysWOW64\find.exeCode function: 2_2_03232581
          Source: C:\Windows\SysWOW64\find.exeCode function: 2_2_0321D5E0
          Source: C:\Windows\SysWOW64\find.exeCode function: 2_2_0321841F
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 14_2_0375EBB0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 14_2_03746E30
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 14_2_037F1D55
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 14_2_03720D20
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 14_2_03744120
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 14_2_0372F900
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 14_2_0373D5E0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 14_2_03752581
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 14_2_0373841F
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 14_2_037E1002
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 14_2_0373B090
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 14_2_029ED2B8
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 14_2_029EC89B
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 14_2_029EB8D3
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 14_2_029EBE24
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 14_2_029D2FB0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 14_2_029EC711
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 14_2_029D8C90
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 14_2_029ECC55
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 14_2_029D2D90
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 14_2_029D2D87
          Source: C:\Windows\SysWOW64\svchost.exeCode function: String function: 0372B150 appears 32 times
          Source: C:\Windows\SysWOW64\find.exeCode function: String function: 0320B150 appears 35 times
          Source: C:\Windows\SysWOW64\find.exeCode function: 2_2_004185F0 NtCreateFile,
          Source: C:\Windows\SysWOW64\find.exeCode function: 2_2_004186A0 NtReadFile,
          Source: C:\Windows\SysWOW64\find.exeCode function: 2_2_00418720 NtClose,
          Source: C:\Windows\SysWOW64\find.exeCode function: 2_2_004187D0 NtAllocateVirtualMemory,
          Source: C:\Windows\SysWOW64\find.exeCode function: 2_2_004185EB NtCreateFile,
          Source: C:\Windows\SysWOW64\find.exeCode function: 2_2_0041869A NtReadFile,
          Source: C:\Windows\SysWOW64\find.exeCode function: 2_2_004187CD NtAllocateVirtualMemory,
          Source: C:\Windows\SysWOW64\find.exeCode function: 2_2_03249A20 NtResumeThread,LdrInitializeThunk,
          Source: C:\Windows\SysWOW64\find.exeCode function: 2_2_03249A00 NtProtectVirtualMemory,LdrInitializeThunk,
          Source: C:\Windows\SysWOW64\find.exeCode function: 2_2_03249A50 NtCreateFile,LdrInitializeThunk,
          Source: C:\Windows\SysWOW64\find.exeCode function: 2_2_03249910 NtAdjustPrivilegesToken,LdrInitializeThunk,
          Source: C:\Windows\SysWOW64\find.exeCode function: 2_2_032499A0 NtCreateSection,LdrInitializeThunk,
          Source: C:\Windows\SysWOW64\find.exeCode function: 2_2_03249860 NtQuerySystemInformation,LdrInitializeThunk,
          Source: C:\Windows\SysWOW64\find.exeCode function: 2_2_03249840 NtDelayExecution,LdrInitializeThunk,
          Source: C:\Windows\SysWOW64\find.exeCode function: 2_2_032498F0 NtReadVirtualMemory,LdrInitializeThunk,
          Source: C:\Windows\SysWOW64\find.exeCode function: 2_2_03249710 NtQueryInformationToken,LdrInitializeThunk,
          Source: C:\Windows\SysWOW64\find.exeCode function: 2_2_032497A0 NtUnmapViewOfSection,LdrInitializeThunk,
          Source: C:\Windows\SysWOW64\find.exeCode function: 2_2_03249780 NtMapViewOfSection,LdrInitializeThunk,
          Source: C:\Windows\SysWOW64\find.exeCode function: 2_2_03249FE0 NtCreateMutant,LdrInitializeThunk,
          Source: C:\Windows\SysWOW64\find.exeCode function: 2_2_03249660 NtAllocateVirtualMemory,LdrInitializeThunk,
          Source: C:\Windows\SysWOW64\find.exeCode function: 2_2_032496E0 NtFreeVirtualMemory,LdrInitializeThunk,
          Source: C:\Windows\SysWOW64\find.exeCode function: 2_2_03249540 NtReadFile,LdrInitializeThunk,
          Source: C:\Windows\SysWOW64\find.exeCode function: 2_2_032495D0 NtClose,LdrInitializeThunk,
          Source: C:\Windows\SysWOW64\find.exeCode function: 2_2_03249B00 NtSetValueKey,
          Source: C:\Windows\SysWOW64\find.exeCode function: 2_2_0324A3B0 NtGetContextThread,
          Source: C:\Windows\SysWOW64\find.exeCode function: 2_2_03249A10 NtQuerySection,
          Source: C:\Windows\SysWOW64\find.exeCode function: 2_2_03249A80 NtOpenDirectoryObject,
          Source: C:\Windows\SysWOW64\find.exeCode function: 2_2_03249950 NtQueueApcThread,
          Source: C:\Windows\SysWOW64\find.exeCode function: 2_2_032499D0 NtCreateProcessEx,
          Source: C:\Windows\SysWOW64\find.exeCode function: 2_2_03249820 NtEnumerateKey,
          Source: C:\Windows\SysWOW64\find.exeCode function: 2_2_0324B040 NtSuspendThread,
          Source: C:\Windows\SysWOW64\find.exeCode function: 2_2_032498A0 NtWriteVirtualMemory,
          Source: C:\Windows\SysWOW64\find.exeCode function: 2_2_03249730 NtQueryVirtualMemory,
          Source: C:\Windows\SysWOW64\find.exeCode function: 2_2_0324A710 NtOpenProcessToken,
          Source: C:\Windows\SysWOW64\find.exeCode function: 2_2_03249760 NtOpenProcess,
          Source: C:\Windows\SysWOW64\find.exeCode function: 2_2_03249770 NtSetInformationFile,
          Source: C:\Windows\SysWOW64\find.exeCode function: 2_2_0324A770 NtOpenThread,
          Source: C:\Windows\SysWOW64\find.exeCode function: 2_2_03249610 NtEnumerateValueKey,
          Source: C:\Windows\SysWOW64\find.exeCode function: 2_2_03249670 NtQueryInformationProcess,
          Source: C:\Windows\SysWOW64\find.exeCode function: 2_2_03249650 NtQueryValueKey,
          Source: C:\Windows\SysWOW64\find.exeCode function: 2_2_032496D0 NtCreateKey,
          Source: C:\Windows\SysWOW64\find.exeCode function: 2_2_03249520 NtWaitForSingleObject,
          Source: C:\Windows\SysWOW64\find.exeCode function: 2_2_0324AD30 NtSetContextThread,
          Source: C:\Windows\SysWOW64\find.exeCode function: 2_2_03249560 NtWriteFile,
          Source: C:\Windows\SysWOW64\find.exeCode function: 2_2_032495F0 NtQueryInformationFile,
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 14_2_03769710 NtQueryInformationToken,LdrInitializeThunk,
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 14_2_03769FE0 NtCreateMutant,LdrInitializeThunk,
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 14_2_03769780 NtMapViewOfSection,LdrInitializeThunk,
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 14_2_03769660 NtAllocateVirtualMemory,LdrInitializeThunk,
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 14_2_03769650 NtQueryValueKey,LdrInitializeThunk,
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 14_2_03769A50 NtCreateFile,LdrInitializeThunk,
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 14_2_037696E0 NtFreeVirtualMemory,LdrInitializeThunk,
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 14_2_037696D0 NtCreateKey,LdrInitializeThunk,
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 14_2_03769540 NtReadFile,LdrInitializeThunk,
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 14_2_03769910 NtAdjustPrivilegesToken,LdrInitializeThunk,
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 14_2_037695D0 NtClose,LdrInitializeThunk,
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 14_2_037699A0 NtCreateSection,LdrInitializeThunk,
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 14_2_03769860 NtQuerySystemInformation,LdrInitializeThunk,
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 14_2_03769840 NtDelayExecution,LdrInitializeThunk,
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 14_2_03769770 NtSetInformationFile,
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 14_2_0376A770 NtOpenThread,
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 14_2_03769760 NtOpenProcess,
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 14_2_03769730 NtQueryVirtualMemory,
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 14_2_0376A710 NtOpenProcessToken,
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 14_2_03769B00 NtSetValueKey,
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 14_2_0376A3B0 NtGetContextThread,
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 14_2_037697A0 NtUnmapViewOfSection,
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 14_2_03769670 NtQueryInformationProcess,
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 14_2_03769A20 NtResumeThread,
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 14_2_03769610 NtEnumerateValueKey,
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 14_2_03769A10 NtQuerySection,
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 14_2_03769A00 NtProtectVirtualMemory,
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 14_2_03769A80 NtOpenDirectoryObject,
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 14_2_03769560 NtWriteFile,
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 14_2_03769950 NtQueueApcThread,
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 14_2_0376AD30 NtSetContextThread,
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 14_2_03769520 NtWaitForSingleObject,
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 14_2_037695F0 NtQueryInformationFile,
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 14_2_037699D0 NtCreateProcessEx,
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 14_2_0376B040 NtSuspendThread,
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 14_2_03769820 NtEnumerateKey,
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 14_2_037698F0 NtReadVirtualMemory,
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 14_2_037698A0 NtWriteVirtualMemory,
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 14_2_029E86A0 NtReadFile,
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 14_2_029E87D0 NtAllocateVirtualMemory,
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 14_2_029E8720 NtClose,
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 14_2_029E85F0 NtCreateFile,
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 14_2_029E869A NtReadFile,
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 14_2_029E87CD NtAllocateVirtualMemory,
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 14_2_029E85EB NtCreateFile,
          Source: DHL_29028263 receipt document of the purchase,pdf.exe, 00000000.00000002.489905963.00000000047AD000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameSKPZ QLE.exe2 vs DHL_29028263 receipt document of the purchase,pdf.exe
          Source: DHL_29028263 receipt document of the purchase,pdf.exe, 00000000.00000002.490035294.0000000004800000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameSKPZ QLE.exe2 vs DHL_29028263 receipt document of the purchase,pdf.exe
          Source: DHL_29028263 receipt document of the purchase,pdf.exe, 00000000.00000002.488161417.00000000045C0000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameSKPZ QLE.exe2 vs DHL_29028263 receipt document of the purchase,pdf.exe
          Source: DHL_29028263 receipt document of the purchase,pdf.exe, 00000000.00000002.479974336.000000000132E000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameMicrosoft.WebTools.Languages.Json.dll^ vs DHL_29028263 receipt document of the purchase,pdf.exe
          Source: DHL_29028263 receipt document of the purchase,pdf.exe, 00000000.00000002.484705986.0000000002DEB000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameSKPZ QLE.exe2 vs DHL_29028263 receipt document of the purchase,pdf.exe
          Source: DHL_29028263 receipt document of the purchase,pdf.exe, 00000000.00000002.490164346.00000000048A4000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameSKPZ QLE.exe2 vs DHL_29028263 receipt document of the purchase,pdf.exe
          Source: DHL_29028263 receipt document of the purchase,pdf.exe, 00000000.00000002.490107342.0000000004852000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameSKPZ QLE.exe2 vs DHL_29028263 receipt document of the purchase,pdf.exe
          Source: DHL_29028263 receipt document of the purchase,pdf.exe, 00000000.00000002.487670894.000000000451B000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameSKPZ QLE.exe2 vs DHL_29028263 receipt document of the purchase,pdf.exe
          Source: DHL_29028263 receipt document of the purchase,pdf.exe, 00000000.00000002.488773360.0000000004664000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameSKPZ QLE.exe2 vs DHL_29028263 receipt document of the purchase,pdf.exe
          Source: DHL_29028263 receipt document of the purchase,pdf.exe, 00000000.00000002.487887405.000000000456E000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameSKPZ QLE.exe2 vs DHL_29028263 receipt document of the purchase,pdf.exe
          Source: DHL_29028263 receipt document of the purchase,pdf.exe, 00000000.00000002.489662833.0000000004709000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameSKPZ QLE.exe2 vs DHL_29028263 receipt document of the purchase,pdf.exe
          Source: DHL_29028263 receipt document of the purchase,pdf.exe, 00000000.00000002.487275778.0000000004472000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameSKPZ QLE.exe2 vs DHL_29028263 receipt document of the purchase,pdf.exe
          Source: DHL_29028263 receipt document of the purchase,pdf.exe, 00000000.00000002.478889844.0000000000A8B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameclr.dllT vs DHL_29028263 receipt document of the purchase,pdf.exe
          Source: DHL_29028263 receipt document of the purchase,pdf.exe, 00000000.00000002.489815300.000000000475B000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameSKPZ QLE.exe2 vs DHL_29028263 receipt document of the purchase,pdf.exe
          Source: DHL_29028263 receipt document of the purchase,pdf.exe, 00000000.00000002.487559942.00000000044F0000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameSKPZ QLE.exe2 vs DHL_29028263 receipt document of the purchase,pdf.exe
          Source: DHL_29028263 receipt document of the purchase,pdf.exe, 00000000.00000002.488475451.0000000004612000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameSKPZ QLE.exe2 vs DHL_29028263 receipt document of the purchase,pdf.exe
          Source: DHL_29028263 receipt document of the purchase,pdf.exe, 00000000.00000002.489309681.00000000046B7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameSKPZ QLE.exe2 vs DHL_29028263 receipt document of the purchase,pdf.exe
          Source: DHL_29028263 receipt document of the purchase,pdf.exe, 00000000.00000002.484850602.0000000002E3D000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameFIND.EXEj% vs DHL_29028263 receipt document of the purchase,pdf.exe
          Source: DHL_29028263 receipt document of the purchase,pdf.exeStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
          Source: DHL_29028263 receipt document of the purchase,pdf.exeReversingLabs: Detection: 21%
          Source: DHL_29028263 receipt document of the purchase,pdf.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
          Source: C:\Users\user\Desktop\DHL_29028263 receipt document of the purchase,pdf.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
          Source: unknownProcess created: C:\Users\user\Desktop\DHL_29028263 receipt document of the purchase,pdf.exe "C:\Users\user\Desktop\DHL_29028263 receipt document of the purchase,pdf.exe"
          Source: C:\Users\user\Desktop\DHL_29028263 receipt document of the purchase,pdf.exeProcess created: C:\Windows\SysWOW64\tcmsetup.exe C:\Windows\SysWOW64\tcmsetup.exe
          Source: C:\Users\user\Desktop\DHL_29028263 receipt document of the purchase,pdf.exeProcess created: C:\Windows\SysWOW64\find.exe C:\Windows\SysWOW64\find.exe
          Source: C:\Windows\explorer.exeProcess created: C:\Windows\SysWOW64\svchost.exe C:\Windows\SysWOW64\svchost.exe
          Source: C:\Windows\SysWOW64\svchost.exeProcess created: C:\Windows\SysWOW64\cmd.exe /c del "C:\Windows\SysWOW64\find.exe"
          Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
          Source: C:\Users\user\Desktop\DHL_29028263 receipt document of the purchase,pdf.exeProcess created: C:\Windows\SysWOW64\tcmsetup.exe C:\Windows\SysWOW64\tcmsetup.exe
          Source: C:\Users\user\Desktop\DHL_29028263 receipt document of the purchase,pdf.exeProcess created: C:\Windows\SysWOW64\find.exe C:\Windows\SysWOW64\find.exe
          Source: C:\Windows\SysWOW64\svchost.exeProcess created: C:\Windows\SysWOW64\cmd.exe /c del "C:\Windows\SysWOW64\find.exe"
          Source: C:\Windows\explorer.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{317D06E8-5F24-433D-BDF7-79CE68D8ABC2}\InProcServer32
          Source: C:\Users\user\Desktop\DHL_29028263 receipt document of the purchase,pdf.exeFile created: C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\DHL_29028263 receipt document of the purchase,pdf.exe.logJump to behavior
          Source: classification engineClassification label: mal100.troj.expl.evad.winEXE@9/1@5/2
          Source: DHL_29028263 receipt document of the purchase,pdf.exe, u0039197857021/u0031845525383.csTask registration methods: 'CreateEvaluationTreeAsync'
          Source: DHL_29028263 receipt document of the purchase,pdf.exe, u0039855675130/u0035175654553.csTask registration methods: 'CreateEvaluationTreeAsync'
          Source: DHL_29028263 receipt document of the purchase,pdf.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 49.83%
          Source: C:\Users\user\Desktop\DHL_29028263 receipt document of the purchase,pdf.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
          Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:3856:120:WilError_01
          Source: C:\Windows\explorer.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
          Source: C:\Windows\explorer.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
          Source: C:\Users\user\Desktop\DHL_29028263 receipt document of the purchase,pdf.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dll
          Source: DHL_29028263 receipt document of the purchase,pdf.exeStatic PE information: Virtual size of .text is bigger than: 0x100000
          Source: DHL_29028263 receipt document of the purchase,pdf.exeStatic file information: File size 2419712 > 1048576
          Source: DHL_29028263 receipt document of the purchase,pdf.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
          Source: DHL_29028263 receipt document of the purchase,pdf.exeStatic PE information: Raw size of .text is bigger than: 0x100000 < 0x24a800
          Source: DHL_29028263 receipt document of the purchase,pdf.exeStatic PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT, HIGH_ENTROPY_VA
          Source: DHL_29028263 receipt document of the purchase,pdf.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
          Source: Binary string: find.pdb source: DHL_29028263 receipt document of the purchase,pdf.exe, 00000000.00000002.484850602.0000000002E3D000.00000004.00000800.00020000.00000000.sdmp, svchost.exe, 0000000E.00000002.705313981.0000000003012000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000E.00000002.706967568.0000000003C37000.00000004.10000000.00040000.00000000.sdmp
          Source: Binary string: wntdll.pdbUGP source: find.exe, 00000002.00000003.473865618.0000000003042000.00000004.00000800.00020000.00000000.sdmp, find.exe, 00000002.00000002.572052995.00000000031E0000.00000040.00000800.00020000.00000000.sdmp, find.exe, 00000002.00000002.573306968.00000000032FF000.00000040.00000800.00020000.00000000.sdmp, find.exe, 00000002.00000003.471487000.0000000000E8B000.00000004.00000800.00020000.00000000.sdmp, svchost.exe, 0000000E.00000003.569780070.0000000003300000.00000004.00000800.00020000.00000000.sdmp, svchost.exe, 0000000E.00000003.573320075.0000000003500000.00000004.00000800.00020000.00000000.sdmp, svchost.exe, 0000000E.00000002.705917603.0000000003700000.00000040.00000800.00020000.00000000.sdmp, svchost.exe, 0000000E.00000002.706304767.000000000381F000.00000040.00000800.00020000.00000000.sdmp
          Source: Binary string: wntdll.pdb source: find.exe, find.exe, 00000002.00000003.473865618.0000000003042000.00000004.00000800.00020000.00000000.sdmp, find.exe, 00000002.00000002.572052995.00000000031E0000.00000040.00000800.00020000.00000000.sdmp, find.exe, 00000002.00000002.573306968.00000000032FF000.00000040.00000800.00020000.00000000.sdmp, find.exe, 00000002.00000003.471487000.0000000000E8B000.00000004.00000800.00020000.00000000.sdmp, svchost.exe, svchost.exe, 0000000E.00000003.569780070.0000000003300000.00000004.00000800.00020000.00000000.sdmp, svchost.exe, 0000000E.00000003.573320075.0000000003500000.00000004.00000800.00020000.00000000.sdmp, svchost.exe, 0000000E.00000002.705917603.0000000003700000.00000040.00000800.00020000.00000000.sdmp, svchost.exe, 0000000E.00000002.706304767.000000000381F000.00000040.00000800.00020000.00000000.sdmp
          Source: Binary string: find.pdbGCTL source: DHL_29028263 receipt document of the purchase,pdf.exe, 00000000.00000002.484850602.0000000002E3D000.00000004.00000800.00020000.00000000.sdmp, svchost.exe, 0000000E.00000002.705313981.0000000003012000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000E.00000002.706967568.0000000003C37000.00000004.10000000.00040000.00000000.sdmp
          Source: Binary string: C:\agent\_work\4\s\obj\VS\Microsoft.WebTools.Languages.Json\Release\Microsoft.WebTools.Languages.Json.pdb source: DHL_29028263 receipt document of the purchase,pdf.exe, DHL_29028263 receipt document of the purchase,pdf.exe, 00000000.00000000.435567902.00000000010E2000.00000020.00000001.01000000.00000003.sdmp, DHL_29028263 receipt document of the purchase,pdf.exe, 00000000.00000002.479557672.00000000010E2000.00000020.00000001.01000000.00000003.sdmp
          Source: C:\Users\user\Desktop\DHL_29028263 receipt document of the purchase,pdf.exeCode function: 0_2_00F2CC7F pushfd ; retf
          Source: C:\Windows\SysWOW64\find.exeCode function: 2_2_00405878 push ebx; iretd
          Source: C:\Windows\SysWOW64\find.exeCode function: 2_2_0041B832 push eax; ret
          Source: C:\Windows\SysWOW64\find.exeCode function: 2_2_0041B83B push eax; ret
          Source: C:\Windows\SysWOW64\find.exeCode function: 2_2_0041B89C push eax; ret
          Source: C:\Windows\SysWOW64\find.exeCode function: 2_2_004161BA push edi; iretd
          Source: C:\Windows\SysWOW64\find.exeCode function: 2_2_00411285 push ss; retf
          Source: C:\Windows\SysWOW64\find.exeCode function: 2_2_00419292 push eax; ret
          Source: C:\Windows\SysWOW64\find.exeCode function: 2_2_00412AB5 push edx; iretd
          Source: C:\Windows\SysWOW64\find.exeCode function: 2_2_00415488 push 4F182E36h; iretd
          Source: C:\Windows\SysWOW64\find.exeCode function: 2_2_00414D6B push ss; retf
          Source: C:\Windows\SysWOW64\find.exeCode function: 2_2_00415648 push ebp; ret
          Source: C:\Windows\SysWOW64\find.exeCode function: 2_2_00414EA8 push ds; retf
          Source: C:\Windows\SysWOW64\find.exeCode function: 2_2_0041B7E5 push eax; ret
          Source: C:\Windows\SysWOW64\find.exeCode function: 2_2_0325D0D1 push ecx; ret
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 14_2_0377D0D1 push ecx; ret
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 14_2_029E9292 push eax; ret
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 14_2_029E1285 push ss; retf
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 14_2_029E2AB5 push edx; iretd
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 14_2_029EB89C push eax; ret
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 14_2_029EB83B push eax; ret
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 14_2_029EB832 push eax; ret
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 14_2_029D5878 push ebx; iretd
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 14_2_029E61BA push edi; iretd
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 14_2_029E4EA8 push ds; retf
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 14_2_029E5648 push ebp; ret
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 14_2_029EB7E5 push eax; ret
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 14_2_029E5488 push 4F182E36h; iretd
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 14_2_029E4D6B push ss; retf
          Source: DHL_29028263 receipt document of the purchase,pdf.exeStatic PE information: 0xD7CA2EE6 [Thu Sep 21 05:15:18 2084 UTC]
          Source: C:\Users\user\Desktop\DHL_29028263 receipt document of the purchase,pdf.exeFile created: \dhl_29028263 receipt document of the purchase,pdf.exe
          Source: C:\Users\user\Desktop\DHL_29028263 receipt document of the purchase,pdf.exeFile created: \dhl_29028263 receipt document of the purchase,pdf.exe
          Source: C:\Users\user\Desktop\DHL_29028263 receipt document of the purchase,pdf.exeFile created: \dhl_29028263 receipt document of the purchase,pdf.exe
          Source: C:\Users\user\Desktop\DHL_29028263 receipt document of the purchase,pdf.exeFile created: \dhl_29028263 receipt document of the purchase,pdf.exe

          Hooking and other Techniques for Hiding and Protection

          barindex
          Source: initial sampleIcon embedded in binary file: icon matches a legit application icon: download (67).png
          Source: DHL_29028263 receipt document of the purchase,pdf.exe, 00000000.00000002.486933021.0000000004396000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: REG ADD "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\SpecialAccounts\UserList" /v
          Source: DHL_29028263 receipt document of the purchase,pdf.exe, 00000000.00000002.486933021.0000000004396000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: localgroup administrators aREG ADD "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\SpecialAccounts\UserList" /v
          Source: C:\Windows\explorer.exeRegistry key monitored for changes: HKEY_CURRENT_USER_Classes
          Source: C:\Users\user\Desktop\DHL_29028263 receipt document of the purchase,pdf.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\DHL_29028263 receipt document of the purchase,pdf.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\DHL_29028263 receipt document of the purchase,pdf.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\DHL_29028263 receipt document of the purchase,pdf.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\DHL_29028263 receipt document of the purchase,pdf.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\DHL_29028263 receipt document of the purchase,pdf.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\DHL_29028263 receipt document of the purchase,pdf.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\DHL_29028263 receipt document of the purchase,pdf.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\DHL_29028263 receipt document of the purchase,pdf.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\DHL_29028263 receipt document of the purchase,pdf.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\DHL_29028263 receipt document of the purchase,pdf.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\DHL_29028263 receipt document of the purchase,pdf.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\DHL_29028263 receipt document of the purchase,pdf.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\DHL_29028263 receipt document of the purchase,pdf.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\DHL_29028263 receipt document of the purchase,pdf.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\DHL_29028263 receipt document of the purchase,pdf.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\DHL_29028263 receipt document of the purchase,pdf.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\DHL_29028263 receipt document of the purchase,pdf.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\DHL_29028263 receipt document of the purchase,pdf.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\DHL_29028263 receipt document of the purchase,pdf.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\DHL_29028263 receipt document of the purchase,pdf.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\DHL_29028263 receipt document of the purchase,pdf.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX

          Malware Analysis System Evasion

          barindex
          Source: Yara matchFile source: 00000000.00000002.486933021.0000000004396000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: Process Memory Space: DHL_29028263 receipt document of the purchase,pdf.exe PID: 7020, type: MEMORYSTR
          Source: DHL_29028263 receipt document of the purchase,pdf.exe, 00000000.00000002.486933021.0000000004396000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: WINE_GET_UNIX_FILE_NAME
          Source: DHL_29028263 receipt document of the purchase,pdf.exe, 00000000.00000002.480019825.0000000002AC1000.00000004.00000800.00020000.00000000.sdmp, DHL_29028263 receipt document of the purchase,pdf.exe, 00000000.00000002.486933021.0000000004396000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: SBIEDLL.DLL
          Source: C:\Windows\SysWOW64\find.exeRDTSC instruction interceptor: First address: 0000000000408614 second address: 000000000040861A instructions: 0x00000000 rdtsc 0x00000002 xor ecx, ecx 0x00000004 add ecx, eax 0x00000006 rdtsc
          Source: C:\Windows\SysWOW64\find.exeRDTSC instruction interceptor: First address: 00000000004089AE second address: 00000000004089B4 instructions: 0x00000000 rdtsc 0x00000002 xor ecx, ecx 0x00000004 add ecx, eax 0x00000006 rdtsc
          Source: C:\Windows\SysWOW64\svchost.exeRDTSC instruction interceptor: First address: 00000000029D8614 second address: 00000000029D861A instructions: 0x00000000 rdtsc 0x00000002 xor ecx, ecx 0x00000004 add ecx, eax 0x00000006 rdtsc
          Source: C:\Windows\SysWOW64\svchost.exeRDTSC instruction interceptor: First address: 00000000029D89AE second address: 00000000029D89B4 instructions: 0x00000000 rdtsc 0x00000002 xor ecx, ecx 0x00000004 add ecx, eax 0x00000006 rdtsc
          Source: C:\Users\user\Desktop\DHL_29028263 receipt document of the purchase,pdf.exe TID: 7040Thread sleep time: -922337203685477s >= -30000s
          Source: C:\Windows\explorer.exeLast function: Thread delayed
          Source: C:\Windows\SysWOW64\svchost.exeLast function: Thread delayed
          Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
          Source: C:\Windows\SysWOW64\find.exeCode function: 2_2_004088E0 rdtsc
          Source: C:\Users\user\Desktop\DHL_29028263 receipt document of the purchase,pdf.exeThread delayed: delay time: 922337203685477
          Source: C:\Windows\SysWOW64\find.exeAPI coverage: 9.1 %
          Source: C:\Users\user\Desktop\DHL_29028263 receipt document of the purchase,pdf.exeProcess information queried: ProcessInformation
          Source: C:\Users\user\Desktop\DHL_29028263 receipt document of the purchase,pdf.exeThread delayed: delay time: 922337203685477
          Source: DHL_29028263 receipt document of the purchase,pdf.exeBinary or memory string: 63d-b2daf143ffb9", "roleDefinitionId": "f96bd990-ffdf-4c17-8ee3-77454d9c3f5d" } ], "id": "/subscriptions/a18897a6-7e44-457d-9260-f2854c0aca42/providers/Microsoft.SqlVirtualMachine", "namespace": "Microsoft.SqlVirtualMachine",
          Source: DHL_29028263 receipt document of the purchase,pdf.exe, 00000000.00000000.435567902.00000000010E2000.00000020.00000001.01000000.00000003.sdmp, DHL_29028263 receipt document of the purchase,pdf.exe, 00000000.00000002.479557672.00000000010E2000.00000020.00000001.01000000.00000003.sdmpBinary or memory string: "resourceType": "SqlVirtualMachines"
          Source: DHL_29028263 receipt document of the purchase,pdf.exeBinary or memory string: "North Central US (Stage)" ], "properties": null, "resourceType": "virtualMachines/diagnosticSettings" }, { "aliases": null, "apiVersions": [ "2014-04-01" ], "capabi
          Source: DHL_29028263 receipt document of the purchase,pdf.exe, 00000000.00000002.486933021.0000000004396000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: VMware
          Source: DHL_29028263 receipt document of the purchase,pdf.exe, 00000000.00000002.486933021.0000000004396000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: VMWARE"SOFTWARE\VMware, Inc.\VMware ToolsLHARDWARE\DEVICEMAP\Scsi\Scsi Port 1\Scsi Bus 0\Target Id 0\Logical Unit Id 0LHARDWARE\DEVICEMAP\Scsi\Scsi Port 2\Scsi Bus 0\Target Id 0\Logical Unit Id 0'SYSTEM\ControlSet001\Services\Disk\EnumNSYSTEM\ControlSet001\Control\Class\{4D36E968-E325-11CE-BFC1-08002BE10318}\0000
          Source: explorer.exe, 00000004.00000000.516455897.0000000007EF6000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: SCSI\Disk&Ven_VMware&Prod_Virtual_disk\5&1ec51bf7&0&000000
          Source: DHL_29028263 receipt document of the purchase,pdf.exeBinary or memory string: "Southeast Asia", "UK West", "West US", "South Africa North", "UAE Central", "UAE North" ], "properties": null, "resourceType": "SqlVirtualMachineGroups/AvailabilityGr
          Source: DHL_29028263 receipt document of the purchase,pdf.exeBinary or memory string: "Korea Central", "Korea South", "France Central", "South Africa North", "UAE North" ], "properties": null, "resourceType": "locations/virtualMachines" }, { "a
          Source: DHL_29028263 receipt document of the purchase,pdf.exe, 00000000.00000002.486933021.0000000004396000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: C:\PROGRAM FILES\VMWARE\VMWARE TOOLS\
          Source: DHL_29028263 receipt document of the purchase,pdf.exeBinary or memory string: eType": "labs/virtualMachines" }, { "aliases": null, "apiVersions": [ "2018-10-15-preview", "2018-09-15", "2017-04-26-preview", "2016-05-15" ], "capabilities": "Cross
          Source: DHL_29028263 receipt document of the purchase,pdf.exe, 00000000.00000000.435567902.00000000010E2000.00000020.00000001.01000000.00000003.sdmp, DHL_29028263 receipt document of the purchase,pdf.exe, 00000000.00000002.479557672.00000000010E2000.00000020.00000001.01000000.00000003.sdmpBinary or memory string: "resourceType": "Locations/sqlVirtualMachineGroupOperationResults"
          Source: DHL_29028263 receipt document of the purchase,pdf.exeBinary or memory string: Move, SupportsTags, SupportsLocation", "locations": [ "West Europe", "East US", "West US" ], "properties": null, "resourceType": "virtualMachines" }, { "aliases": null,
          Source: DHL_29028263 receipt document of the purchase,pdf.exe, 00000000.00000000.435567902.00000000010E2000.00000020.00000001.01000000.00000003.sdmp, DHL_29028263 receipt document of the purchase,pdf.exe, 00000000.00000002.479557672.00000000010E2000.00000020.00000001.01000000.00000003.sdmpBinary or memory string: "resourceType": "locations/supportedVirtualMachineSizes"
          Source: DHL_29028263 receipt document of the purchase,pdf.exe, 00000000.00000002.486933021.0000000004396000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: VMWARE
          Source: DHL_29028263 receipt document of the purchase,pdf.exe, 00000000.00000002.486933021.0000000004396000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: InstallPath%C:\PROGRAM FILES\VMWARE\VMWARE TOOLS\'C:\WINDOWS\system32\drivers\vmmouse.sys&C:\WINDOWS\system32\drivers\vmhgfs.sys
          Source: explorer.exe, 00000004.00000000.490084142.000000000807B000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: SCSI\CDROM&VEN_NECVMWAR&PROD_VMWARE_SATA_CD00\5&280B647&0&000000
          Source: DHL_29028263 receipt document of the purchase,pdf.exe, 00000000.00000000.435567902.00000000010E2000.00000020.00000001.01000000.00000003.sdmp, DHL_29028263 receipt document of the purchase,pdf.exe, 00000000.00000002.479557672.00000000010E2000.00000020.00000001.01000000.00000003.sdmpBinary or memory string: "resourceType": "virtualMachines/diagnosticSettings"
          Source: DHL_29028263 receipt document of the purchase,pdf.exeBinary or memory string: "France Central" ], "properties": null, "resourceType": "VMwareSites" }, { "aliases": null, "apiVersions": [ "2019-06-06", "2018-05-01-preview" ], "capabil
          Source: DHL_29028263 receipt document of the purchase,pdf.exeBinary or memory string: ceType": "locations/privateClouds/virtualMachineTemplates" }, { "aliases": null, "apiVersions": [ "2019-04-01" ], "capabilities": "None", "locations": [ "West Europe",
          Source: DHL_29028263 receipt document of the purchase,pdf.exe, 00000000.00000000.435567902.00000000010E2000.00000020.00000001.01000000.00000003.sdmp, DHL_29028263 receipt document of the purchase,pdf.exe, 00000000.00000002.479557672.00000000010E2000.00000020.00000001.01000000.00000003.sdmpBinary or memory string: "resourceType": "virtualMachineScaleSets/networkInterfaces"
          Source: DHL_29028263 receipt document of the purchase,pdf.exe, 00000000.00000000.435567902.00000000010E2000.00000020.00000001.01000000.00000003.sdmp, DHL_29028263 receipt document of the purchase,pdf.exe, 00000000.00000002.479557672.00000000010E2000.00000020.00000001.01000000.00000003.sdmpBinary or memory string: "resourceType": "virtualMachines/extensions"
          Source: DHL_29028263 receipt document of the purchase,pdf.exeBinary or memory string: name": "CloudSimpleExtension" } ] } ], "id": "/subscriptions/a18897a6-7e44-457d-9260-f2854c0aca42/providers/Microsoft.VMwareCloudSimple", "namespace": "Microsoft.VMwareCloudSimple", "registrationPolicy": "Registra
          Source: DHL_29028263 receipt document of the purchase,pdf.exe, 00000000.00000002.486933021.0000000004396000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: C:\WINDOWS\system32\drivers\vmmouse.sys
          Source: DHL_29028263 receipt document of the purchase,pdf.exe, 00000000.00000002.486933021.0000000004396000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: vmware
          Source: DHL_29028263 receipt document of the purchase,pdf.exe, 00000000.00000000.435567902.00000000010E2000.00000020.00000001.01000000.00000003.sdmp, DHL_29028263 receipt document of the purchase,pdf.exe, 00000000.00000002.479557672.00000000010E2000.00000020.00000001.01000000.00000003.sdmpBinary or memory string: "resourceType": "virtualMachineScaleSets/extensions"
          Source: explorer.exe, 00000004.00000000.489833071.0000000007F92000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: VMware SATA CD00
          Source: DHL_29028263 receipt document of the purchase,pdf.exe, 00000000.00000002.486933021.0000000004396000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: C:\WINDOWS\system32\drivers\vmhgfs.sys
          Source: DHL_29028263 receipt document of the purchase,pdf.exe, 00000000.00000000.435567902.00000000010E2000.00000020.00000001.01000000.00000003.sdmp, DHL_29028263 receipt document of the purchase,pdf.exe, 00000000.00000002.479557672.00000000010E2000.00000020.00000001.01000000.00000003.sdmpBinary or memory string: "resourceType": "virtualMachines/metrics"
          Source: DHL_29028263 receipt document of the purchase,pdf.exe, 00000000.00000000.435567902.00000000010E2000.00000020.00000001.01000000.00000003.sdmp, DHL_29028263 receipt document of the purchase,pdf.exe, 00000000.00000002.479557672.00000000010E2000.00000020.00000001.01000000.00000003.sdmpBinary or memory string: "resourceType": "virtualMachineScaleSets/virtualMachines"
          Source: DHL_29028263 receipt document of the purchase,pdf.exe, 00000000.00000000.435567902.00000000010E2000.00000020.00000001.01000000.00000003.sdmp, DHL_29028263 receipt document of the purchase,pdf.exe, 00000000.00000002.479557672.00000000010E2000.00000020.00000001.01000000.00000003.sdmpBinary or memory string: "resourceType": "SqlVirtualMachineGroups/AvailabilityGroupListeners"
          Source: DHL_29028263 receipt document of the purchase,pdf.exeBinary or memory string: "resourceType": "Locations/sqlVirtualMachineGroupOperationResults" }, { "aliases": null, "apiVersions": [ "2017-03-01-preview" ], "capabilities": "None", "defaultApiVersion": "2017-03-01-p
          Source: DHL_29028263 receipt document of the purchase,pdf.exe, 00000000.00000002.486933021.0000000004396000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: noValueButYesKey)C:\WINDOWS\system32\drivers\VBoxMouse.sys
          Source: DHL_29028263 receipt document of the purchase,pdf.exe, 00000000.00000002.486933021.0000000004396000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: C:\WINDOWS\system32\drivers\VBoxMouse.sys
          Source: DHL_29028263 receipt document of the purchase,pdf.exeBinary or memory string: es": null, "resourceType": "virtualMachines/metrics" }, { "aliases": null, "apiVersions": [ "2017-04-01", "2016-11-01", "2016-04-01", "2015-12-01", "2015-10-01",
          Source: DHL_29028263 receipt document of the purchase,pdf.exeBinary or memory string: "UK South", "UK West", "Korea Central", "Korea South", "France Central", "South Africa North", "UAE North" ], "properties": null, "resourceType": "virtualMachineSc
          Source: DHL_29028263 receipt document of the purchase,pdf.exe, 00000000.00000002.486933021.0000000004396000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: WWW /c Microsoft-Hyper-V-Common-Drivers-Package
          Source: explorer.exe, 00000004.00000000.490084142.000000000807B000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: \\?\scsi#cdrom&ven_necvmwar&prod_vmware_sata_cd00#5&280b647&0&000000#{53f56308-b6bf-11d0-94f2-00a0c91efb8b}8Ll/
          Source: DHL_29028263 receipt document of the purchase,pdf.exeBinary or memory string: ral", "UAE North" ], "properties": null, "resourceType": "Locations/sqlVirtualMachineOperationResults" }, { "aliases": null, "apiVersions": [ "2017-03-01-preview" ],
          Source: DHL_29028263 receipt document of the purchase,pdf.exeBinary or memory string: India", "Korea Central", "Korea South", "East US 2 (Stage)", "North Central US (Stage)" ], "properties": null, "resourceType": "virtualMachines/metricDefinitions" }, {
          Source: DHL_29028263 receipt document of the purchase,pdf.exeBinary or memory string: th" ], "properties": null, "resourceType": "SqlVirtualMachineGroups" }, { "aliases": null, "apiVersions": [ "2017-03-01-preview" ], "capabilities": "CrossResourceGroupResou
          Source: DHL_29028263 receipt document of the purchase,pdf.exeBinary or memory string: "Australia Central" ], "properties": null, "resourceType": "virtualMachines" }, { "aliases": null, "apiVersions": [ "2016-11-01", "2016-04-01", "2015-12-01",
          Source: DHL_29028263 receipt document of the purchase,pdf.exeBinary or memory string: "properties": null, "resourceType": "virtualMachines", "zoneMappings": [ { "location": "East US 2", "zones": [ "2", "1", "3" ] },
          Source: DHL_29028263 receipt document of the purchase,pdf.exe, 00000000.00000000.435567902.00000000010E2000.00000020.00000001.01000000.00000003.sdmp, DHL_29028263 receipt document of the purchase,pdf.exe, 00000000.00000002.479557672.00000000010E2000.00000020.00000001.01000000.00000003.sdmpBinary or memory string: "resourceType": "locations/virtualMachines"
          Source: DHL_29028263 receipt document of the purchase,pdf.exeBinary or memory string: achineScaleSets/virtualMachines" }, { "aliases": null, "apiProfiles": [ { "apiVersion": "2016-03-30", "profileVersion": "2017-03-09-profile" }, { "apiVersio
          Source: DHL_29028263 receipt document of the purchase,pdf.exeBinary or memory string: "UK West", "Korea Central", "Korea South", "France Central", "South Africa North", "UAE North" ], "properties": null, "resourceType": "virtualMachines/metricDefinitions"
          Source: DHL_29028263 receipt document of the purchase,pdf.exe, 00000000.00000000.435567902.00000000010E2000.00000020.00000001.01000000.00000003.sdmp, DHL_29028263 receipt document of the purchase,pdf.exe, 00000000.00000002.479557672.00000000010E2000.00000020.00000001.01000000.00000003.sdmpBinary or memory string: "resourceType": "virtualMachines",
          Source: DHL_29028263 receipt document of the purchase,pdf.exe, 00000000.00000000.435567902.00000000010E2000.00000020.00000001.01000000.00000003.sdmp, DHL_29028263 receipt document of the purchase,pdf.exe, 00000000.00000002.479557672.00000000010E2000.00000020.00000001.01000000.00000003.sdmpBinary or memory string: "resourceType": "virtualMachines/metricDefinitions"
          Source: DHL_29028263 receipt document of the purchase,pdf.exe, 00000000.00000002.486933021.0000000004396000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: VMware SVGA II
          Source: DHL_29028263 receipt document of the purchase,pdf.exe, 00000000.00000002.479557672.00000000010E2000.00000020.00000001.01000000.00000003.sdmpBinary or memory string: "id": "/subscriptions/a18897a6-7e44-457d-9260-f2854c0aca42/providers/Microsoft.VMwareCloudSimple",
          Source: DHL_29028263 receipt document of the purchase,pdf.exe, 00000000.00000000.435567902.00000000010E2000.00000020.00000001.01000000.00000003.sdmp, DHL_29028263 receipt document of the purchase,pdf.exe, 00000000.00000002.479557672.00000000010E2000.00000020.00000001.01000000.00000003.sdmpBinary or memory string: "resourceType": "virtualMachineScaleSets/virtualMachines/networkInterfaces"
          Source: DHL_29028263 receipt document of the purchase,pdf.exe, 00000000.00000000.435567902.00000000010E2000.00000020.00000001.01000000.00000003.sdmp, DHL_29028263 receipt document of the purchase,pdf.exe, 00000000.00000002.479557672.00000000010E2000.00000020.00000001.01000000.00000003.sdmpBinary or memory string: "resourceType": "SqlVirtualMachineGroups"
          Source: DHL_29028263 receipt document of the purchase,pdf.exe, 00000000.00000000.435567902.00000000010E2000.00000020.00000001.01000000.00000003.sdmp, DHL_29028263 receipt document of the purchase,pdf.exe, 00000000.00000002.479557672.00000000010E2000.00000020.00000001.01000000.00000003.sdmpBinary or memory string: "resourceType": "virtualMachineScaleSets",
          Source: DHL_29028263 receipt document of the purchase,pdf.exe, 00000000.00000002.479557672.00000000010E2000.00000020.00000001.01000000.00000003.sdmpBinary or memory string: "resourceType": "VMwareSites"
          Source: DHL_29028263 receipt document of the purchase,pdf.exeBinary or memory string: ], "properties": null, "resourceType": "SqlVirtualMachines" }, { "aliases": null, "apiVersions": [ "2017-03-01-preview" ], "capabilities": "None", "defaultApiVersion":
          Source: explorer.exe, 00000004.00000000.476501179.0000000000E38000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: AGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000025700000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#000000001F400000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000026700000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000000100000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&280b647&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_Msft&Prod_Virtual_DVD-ROM#2&1f4adffe&0&000001#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}
          Source: DHL_29028263 receipt document of the purchase,pdf.exeBinary or memory string: "resourceType": "virtualMachineScaleSets/virtualMachines/networkInterfaces" }, { "aliases": null, "apiProfiles": [ { "apiVersion": "2017-03-30", "profileVersion": "2018-03-01-hybrid"
          Source: DHL_29028263 receipt document of the purchase,pdf.exeBinary or memory string: a North", "UAE North" ], "properties": null, "resourceType": "virtualMachineScaleSets", "zoneMappings": [ { "location": "East US 2", "zones": [ "2",
          Source: explorer.exe, 00000004.00000000.490084142.000000000807B000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: \\?\scsi#cdrom&ven_necvmwar&prod_vmware_sata_cd00#5&280b647&0&000000#{53f56308-b6bf-11d0-94f2-00a0c91efb8b}
          Source: DHL_29028263 receipt document of the purchase,pdf.exeBinary or memory string: uth", "UK West", "Korea Central", "Korea South", "France Central", "South Africa North", "UAE North" ], "properties": null, "resourceType": "virtualMachineScaleSets/pu
          Source: DHL_29028263 receipt document of the purchase,pdf.exeBinary or memory string: ], "properties": null, "resourceType": "locations/supportedVirtualMachineSizes" }, { "aliases": null, "apiVersions": [ "2019-08-01", "2019-07-01", "2019-06-01",
          Source: DHL_29028263 receipt document of the purchase,pdf.exe, 00000000.00000000.435567902.00000000010E2000.00000020.00000001.01000000.00000003.sdmp, DHL_29028263 receipt document of the purchase,pdf.exe, 00000000.00000002.479557672.00000000010E2000.00000020.00000001.01000000.00000003.sdmpBinary or memory string: "namespace": "Microsoft.SqlVirtualMachine",
          Source: DHL_29028263 receipt document of the purchase,pdf.exe, 00000000.00000002.486933021.0000000004396000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: SOFTWARE\VMware, Inc.\VMware Tools
          Source: explorer.exe, 00000004.00000000.529318652.0000000006915000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: \\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&280b647&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}
          Source: DHL_29028263 receipt document of the purchase,pdf.exe, 00000000.00000000.435567902.00000000010E2000.00000020.00000001.01000000.00000003.sdmp, DHL_29028263 receipt document of the purchase,pdf.exe, 00000000.00000002.479557672.00000000010E2000.00000020.00000001.01000000.00000003.sdmpBinary or memory string: "id": "/subscriptions/a18897a6-7e44-457d-9260-f2854c0aca42/providers/Microsoft.SqlVirtualMachine",
          Source: DHL_29028263 receipt document of the purchase,pdf.exe, 00000000.00000000.435567902.00000000010E2000.00000020.00000001.01000000.00000003.sdmp, DHL_29028263 receipt document of the purchase,pdf.exe, 00000000.00000002.479557672.00000000010E2000.00000020.00000001.01000000.00000003.sdmpBinary or memory string: "resourceType": "virtualMachineScaleSets/publicIPAddresses"
          Source: DHL_29028263 receipt document of the purchase,pdf.exe, 00000000.00000000.435567902.00000000010E2000.00000020.00000001.01000000.00000003.sdmp, DHL_29028263 receipt document of the purchase,pdf.exe, 00000000.00000002.479557672.00000000010E2000.00000020.00000001.01000000.00000003.sdmpBinary or memory string: "resourceType": "virtualMachines"
          Source: DHL_29028263 receipt document of the purchase,pdf.exe, 00000000.00000000.435567902.00000000010E2000.00000020.00000001.01000000.00000003.sdmp, DHL_29028263 receipt document of the purchase,pdf.exe, 00000000.00000002.479557672.00000000010E2000.00000020.00000001.01000000.00000003.sdmpBinary or memory string: "resourceType": "labs/virtualMachines"
          Source: DHL_29028263 receipt document of the purchase,pdf.exe, 00000000.00000000.435567902.00000000010E2000.00000020.00000001.01000000.00000003.sdmp, DHL_29028263 receipt document of the purchase,pdf.exe, 00000000.00000002.479557672.00000000010E2000.00000020.00000001.01000000.00000003.sdmpBinary or memory string: "resourceType": "locations/privateClouds/virtualMachineTemplates"
          Source: DHL_29028263 receipt document of the purchase,pdf.exe, 00000000.00000000.435567902.00000000010E2000.00000020.00000001.01000000.00000003.sdmp, DHL_29028263 receipt document of the purchase,pdf.exe, 00000000.00000002.479557672.00000000010E2000.00000020.00000001.01000000.00000003.sdmpBinary or memory string: "resourceType": "Locations/sqlVirtualMachineOperationResults"
          Source: DHL_29028263 receipt document of the purchase,pdf.exeBinary or memory string: ": "virtualMachineScaleSets/networkInterfaces" }, { "aliases": null, "apiProfiles": [ { "apiVersion": "2016-03-30", "profileVersion": "2017-03-09-profile" }, {
          Source: explorer.exe, 00000004.00000000.489833071.0000000007F92000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: SCSI\CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00\5&280b647&0&000000
          Source: DHL_29028263 receipt document of the purchase,pdf.exe, 00000000.00000002.479557672.00000000010E2000.00000020.00000001.01000000.00000003.sdmpBinary or memory string: "namespace": "Microsoft.VMwareCloudSimple",
          Source: C:\Windows\SysWOW64\find.exeCode function: 2_2_004088E0 rdtsc
          Source: C:\Users\user\Desktop\DHL_29028263 receipt document of the purchase,pdf.exeProcess token adjusted: Debug
          Source: C:\Windows\SysWOW64\find.exeProcess token adjusted: Debug
          Source: C:\Windows\SysWOW64\svchost.exeProcess token adjusted: Debug
          Source: C:\Windows\SysWOW64\find.exeCode function: 2_2_032C131B mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\find.exeCode function: 2_2_0320DB60 mov ecx, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\find.exeCode function: 2_2_03233B7A mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\find.exeCode function: 2_2_03233B7A mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\find.exeCode function: 2_2_0320DB40 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\find.exeCode function: 2_2_032D8B58 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\find.exeCode function: 2_2_0320F358 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\find.exeCode function: 2_2_032D5BA5 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\find.exeCode function: 2_2_03234BAD mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\find.exeCode function: 2_2_03234BAD mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\find.exeCode function: 2_2_03234BAD mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\find.exeCode function: 2_2_032C138A mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\find.exeCode function: 2_2_032BD380 mov ecx, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\find.exeCode function: 2_2_03211B8F mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\find.exeCode function: 2_2_03211B8F mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\find.exeCode function: 2_2_0323B390 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\find.exeCode function: 2_2_03232397 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\find.exeCode function: 2_2_032303E2 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\find.exeCode function: 2_2_032303E2 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\find.exeCode function: 2_2_032303E2 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\find.exeCode function: 2_2_032303E2 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\find.exeCode function: 2_2_032303E2 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\find.exeCode function: 2_2_032303E2 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\find.exeCode function: 2_2_0322DBE9 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\find.exeCode function: 2_2_032853CA mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\find.exeCode function: 2_2_032853CA mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\find.exeCode function: 2_2_03244A2C mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\find.exeCode function: 2_2_03244A2C mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\find.exeCode function: 2_2_03218A0A mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\find.exeCode function: 2_2_03205210 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\find.exeCode function: 2_2_03205210 mov ecx, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\find.exeCode function: 2_2_03205210 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\find.exeCode function: 2_2_03205210 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\find.exeCode function: 2_2_0320AA16 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\find.exeCode function: 2_2_0320AA16 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\find.exeCode function: 2_2_03223A1C mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\find.exeCode function: 2_2_032BB260 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\find.exeCode function: 2_2_032BB260 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\find.exeCode function: 2_2_032D8A62 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\find.exeCode function: 2_2_0324927A mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\find.exeCode function: 2_2_03209240 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\find.exeCode function: 2_2_03209240 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\find.exeCode function: 2_2_03209240 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\find.exeCode function: 2_2_03209240 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\find.exeCode function: 2_2_03294257 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\find.exeCode function: 2_2_032052A5 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\find.exeCode function: 2_2_032052A5 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\find.exeCode function: 2_2_032052A5 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\find.exeCode function: 2_2_032052A5 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\find.exeCode function: 2_2_032052A5 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\find.exeCode function: 2_2_0321AAB0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\find.exeCode function: 2_2_0321AAB0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\find.exeCode function: 2_2_0323FAB0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\find.exeCode function: 2_2_0323D294 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\find.exeCode function: 2_2_0323D294 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\find.exeCode function: 2_2_03232AE4 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\find.exeCode function: 2_2_03232ACB mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\find.exeCode function: 2_2_03224120 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\find.exeCode function: 2_2_03224120 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\find.exeCode function: 2_2_03224120 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\find.exeCode function: 2_2_03224120 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\find.exeCode function: 2_2_03224120 mov ecx, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\find.exeCode function: 2_2_0323513A mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\find.exeCode function: 2_2_0323513A mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\find.exeCode function: 2_2_03209100 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\find.exeCode function: 2_2_03209100 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\find.exeCode function: 2_2_03209100 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\find.exeCode function: 2_2_0320C962 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\find.exeCode function: 2_2_0320B171 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\find.exeCode function: 2_2_0320B171 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\find.exeCode function: 2_2_0322B944 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\find.exeCode function: 2_2_0322B944 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\find.exeCode function: 2_2_032361A0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\find.exeCode function: 2_2_032361A0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\find.exeCode function: 2_2_032869A6 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\find.exeCode function: 2_2_032851BE mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\find.exeCode function: 2_2_032851BE mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\find.exeCode function: 2_2_032851BE mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\find.exeCode function: 2_2_032851BE mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\find.exeCode function: 2_2_0322C182 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\find.exeCode function: 2_2_0323A185 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\find.exeCode function: 2_2_03232990 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\find.exeCode function: 2_2_0320B1E1 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\find.exeCode function: 2_2_0320B1E1 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\find.exeCode function: 2_2_0320B1E1 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\find.exeCode function: 2_2_032941E8 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\find.exeCode function: 2_2_0321B02A mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\find.exeCode function: 2_2_0321B02A mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\find.exeCode function: 2_2_0321B02A mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\find.exeCode function: 2_2_0321B02A mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\find.exeCode function: 2_2_0323002D mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\find.exeCode function: 2_2_0323002D mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\find.exeCode function: 2_2_0323002D mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\find.exeCode function: 2_2_0323002D mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\find.exeCode function: 2_2_0323002D mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\find.exeCode function: 2_2_032D4015 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\find.exeCode function: 2_2_032D4015 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\find.exeCode function: 2_2_03287016 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\find.exeCode function: 2_2_03287016 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\find.exeCode function: 2_2_03287016 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\find.exeCode function: 2_2_032D1074 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\find.exeCode function: 2_2_032C2073 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\find.exeCode function: 2_2_03220050 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\find.exeCode function: 2_2_03220050 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\find.exeCode function: 2_2_032320A0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\find.exeCode function: 2_2_032320A0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\find.exeCode function: 2_2_032320A0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\find.exeCode function: 2_2_032320A0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\find.exeCode function: 2_2_032320A0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\find.exeCode function: 2_2_032320A0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\find.exeCode function: 2_2_032490AF mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\find.exeCode function: 2_2_0323F0BF mov ecx, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\find.exeCode function: 2_2_0323F0BF mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\find.exeCode function: 2_2_0323F0BF mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\find.exeCode function: 2_2_03209080 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\find.exeCode function: 2_2_03283884 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\find.exeCode function: 2_2_03283884 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\find.exeCode function: 2_2_032058EC mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\find.exeCode function: 2_2_0329B8D0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\find.exeCode function: 2_2_0329B8D0 mov ecx, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\find.exeCode function: 2_2_0329B8D0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\find.exeCode function: 2_2_0329B8D0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\find.exeCode function: 2_2_0329B8D0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\find.exeCode function: 2_2_0329B8D0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\find.exeCode function: 2_2_03204F2E mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\find.exeCode function: 2_2_03204F2E mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\find.exeCode function: 2_2_0323E730 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\find.exeCode function: 2_2_032D070D mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\find.exeCode function: 2_2_032D070D mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\find.exeCode function: 2_2_0323A70E mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\find.exeCode function: 2_2_0323A70E mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\find.exeCode function: 2_2_0322F716 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\find.exeCode function: 2_2_0329FF10 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\find.exeCode function: 2_2_0329FF10 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\find.exeCode function: 2_2_0321FF60 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\find.exeCode function: 2_2_032D8F6A mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\find.exeCode function: 2_2_0321EF40 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\find.exeCode function: 2_2_03218794 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\find.exeCode function: 2_2_03287794 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\find.exeCode function: 2_2_03287794 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\find.exeCode function: 2_2_03287794 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\find.exeCode function: 2_2_032437F5 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\find.exeCode function: 2_2_0320E620 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\find.exeCode function: 2_2_032BFE3F mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\find.exeCode function: 2_2_0320C600 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\find.exeCode function: 2_2_0320C600 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\find.exeCode function: 2_2_0320C600 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\find.exeCode function: 2_2_03238E00 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\find.exeCode function: 2_2_032C1608 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\find.exeCode function: 2_2_0323A61C mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\find.exeCode function: 2_2_0323A61C mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\find.exeCode function: 2_2_0321766D mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\find.exeCode function: 2_2_0322AE73 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\find.exeCode function: 2_2_0322AE73 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\find.exeCode function: 2_2_0322AE73 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\find.exeCode function: 2_2_0322AE73 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\find.exeCode function: 2_2_0322AE73 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\find.exeCode function: 2_2_03217E41 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\find.exeCode function: 2_2_03217E41 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\find.exeCode function: 2_2_03217E41 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\find.exeCode function: 2_2_03217E41 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\find.exeCode function: 2_2_03217E41 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\find.exeCode function: 2_2_03217E41 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\find.exeCode function: 2_2_032D0EA5 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\find.exeCode function: 2_2_032D0EA5 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\find.exeCode function: 2_2_032D0EA5 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\find.exeCode function: 2_2_032846A7 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\find.exeCode function: 2_2_0329FE87 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\find.exeCode function: 2_2_032316E0 mov ecx, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\find.exeCode function: 2_2_032176E2 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\find.exeCode function: 2_2_03248EC7 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\find.exeCode function: 2_2_032BFEC0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\find.exeCode function: 2_2_032336CC mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\find.exeCode function: 2_2_032D8ED6 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\find.exeCode function: 2_2_0320AD30 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\find.exeCode function: 2_2_03213D34 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\find.exeCode function: 2_2_03213D34 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\find.exeCode function: 2_2_03213D34 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\find.exeCode function: 2_2_03213D34 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\find.exeCode function: 2_2_03213D34 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\find.exeCode function: 2_2_03213D34 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\find.exeCode function: 2_2_03213D34 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\find.exeCode function: 2_2_03213D34 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\find.exeCode function: 2_2_03213D34 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\find.exeCode function: 2_2_03213D34 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\find.exeCode function: 2_2_03213D34 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\find.exeCode function: 2_2_03213D34 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\find.exeCode function: 2_2_03213D34 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\find.exeCode function: 2_2_03234D3B mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\find.exeCode function: 2_2_03234D3B mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\find.exeCode function: 2_2_03234D3B mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\find.exeCode function: 2_2_032D8D34 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\find.exeCode function: 2_2_0328A537 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\find.exeCode function: 2_2_0322C577 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\find.exeCode function: 2_2_0322C577 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\find.exeCode function: 2_2_03243D43 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\find.exeCode function: 2_2_03283540 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\find.exeCode function: 2_2_03227D50 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\find.exeCode function: 2_2_032D05AC mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\find.exeCode function: 2_2_032D05AC mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\find.exeCode function: 2_2_032335A1 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\find.exeCode function: 2_2_03231DB5 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\find.exeCode function: 2_2_03231DB5 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\find.exeCode function: 2_2_03231DB5 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\find.exeCode function: 2_2_03232581 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\find.exeCode function: 2_2_03232581 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\find.exeCode function: 2_2_03232581 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\find.exeCode function: 2_2_03232581 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\find.exeCode function: 2_2_03202D8A mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\find.exeCode function: 2_2_03202D8A mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\find.exeCode function: 2_2_03202D8A mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\find.exeCode function: 2_2_03202D8A mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\find.exeCode function: 2_2_03202D8A mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\find.exeCode function: 2_2_0323FD9B mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\find.exeCode function: 2_2_0323FD9B mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\find.exeCode function: 2_2_0321D5E0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\find.exeCode function: 2_2_0321D5E0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\find.exeCode function: 2_2_032CFDE2 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\find.exeCode function: 2_2_032CFDE2 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\find.exeCode function: 2_2_032CFDE2 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\find.exeCode function: 2_2_032CFDE2 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\find.exeCode function: 2_2_032B8DF1 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\find.exeCode function: 2_2_03286DC9 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\find.exeCode function: 2_2_03286DC9 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\find.exeCode function: 2_2_03286DC9 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\find.exeCode function: 2_2_03286DC9 mov ecx, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\find.exeCode function: 2_2_03286DC9 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\find.exeCode function: 2_2_03286DC9 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\find.exeCode function: 2_2_0323BC2C mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\find.exeCode function: 2_2_032D740D mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\find.exeCode function: 2_2_032D740D mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\find.exeCode function: 2_2_032D740D mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\find.exeCode function: 2_2_03286C0A mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\find.exeCode function: 2_2_03286C0A mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\find.exeCode function: 2_2_03286C0A mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\find.exeCode function: 2_2_03286C0A mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\find.exeCode function: 2_2_032C1C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\find.exeCode function: 2_2_032C1C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\find.exeCode function: 2_2_032C1C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\find.exeCode function: 2_2_032C1C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\find.exeCode function: 2_2_032C1C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\find.exeCode function: 2_2_032C1C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\find.exeCode function: 2_2_032C1C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\find.exeCode function: 2_2_032C1C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\find.exeCode function: 2_2_032C1C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\find.exeCode function: 2_2_032C1C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\find.exeCode function: 2_2_032C1C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\find.exeCode function: 2_2_032C1C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\find.exeCode function: 2_2_032C1C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\find.exeCode function: 2_2_032C1C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\find.exeCode function: 2_2_0322746D mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\find.exeCode function: 2_2_0323A44B mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\find.exeCode function: 2_2_0329C450 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\find.exeCode function: 2_2_0329C450 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\find.exeCode function: 2_2_0321849B mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\find.exeCode function: 2_2_032C14FB mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\find.exeCode function: 2_2_03286CF0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\find.exeCode function: 2_2_03286CF0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\find.exeCode function: 2_2_03286CF0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\find.exeCode function: 2_2_032D8CD6 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 14_2_03753B7A mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 14_2_03753B7A mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 14_2_0372DB60 mov ecx, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 14_2_0373FF60 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 14_2_037F8F6A mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 14_2_037F8B58 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 14_2_0372F358 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 14_2_0372DB40 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 14_2_0373EF40 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 14_2_0375E730 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 14_2_03724F2E mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 14_2_03724F2E mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 14_2_0374F716 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 14_2_037E131B mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 14_2_037BFF10 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 14_2_037BFF10 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 14_2_037F070D mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 14_2_037F070D mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 14_2_0375A70E mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 14_2_0375A70E mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 14_2_037637F5 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 14_2_037503E2 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 14_2_037503E2 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 14_2_037503E2 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 14_2_037503E2 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 14_2_037503E2 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 14_2_037503E2 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 14_2_037A53CA mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 14_2_037A53CA mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 14_2_037F5BA5 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 14_2_0375B390 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 14_2_03738794 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 14_2_037A7794 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 14_2_037A7794 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 14_2_037A7794 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 14_2_037E138A mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 14_2_03731B8F mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 14_2_03731B8F mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 14_2_037DD380 mov ecx, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 14_2_0374AE73 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 14_2_0374AE73 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 14_2_0374AE73 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 14_2_0374AE73 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 14_2_0374AE73 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 14_2_0376927A mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 14_2_037DB260 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 14_2_037DB260 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 14_2_037F8A62 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 14_2_0373766D mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 14_2_037B4257 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 14_2_03729240 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 14_2_03729240 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 14_2_03729240 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 14_2_03729240 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 14_2_03737E41 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 14_2_03737E41 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 14_2_03737E41 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 14_2_03737E41 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 14_2_03737E41 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 14_2_03737E41 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 14_2_037DFE3F mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 14_2_0372E620 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 14_2_0372AA16 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 14_2_0372AA16 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 14_2_03743A1C mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 14_2_0375A61C mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 14_2_0375A61C mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 14_2_0372C600 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 14_2_0372C600 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 14_2_0372C600 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 14_2_03758E00 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 14_2_03738A0A mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 14_2_037376E2 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 14_2_03752AE4 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 14_2_037516E0 mov ecx, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 14_2_037F8ED6 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 14_2_03768EC7 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 14_2_037536CC mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 14_2_037DFEC0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 14_2_03752ACB mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 14_2_0373AAB0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 14_2_0373AAB0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 14_2_0375FAB0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 14_2_037252A5 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 14_2_037252A5 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 14_2_037252A5 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 14_2_037252A5 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 14_2_037252A5 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 14_2_037F0EA5 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 14_2_037F0EA5 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 14_2_037F0EA5 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 14_2_037A46A7 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 14_2_0375D294 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 14_2_0375D294 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 14_2_037BFE87 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 14_2_0372B171 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 14_2_0372B171 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 14_2_0374C577 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 14_2_0374C577 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 14_2_0372C962 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 14_2_03747D50 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 14_2_0374B944 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 14_2_0374B944 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 14_2_03763D43 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 14_2_037A3540 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 14_2_0372AD30 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 14_2_03733D34 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 14_2_03733D34 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 14_2_03733D34 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 14_2_03733D34 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 14_2_03733D34 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 14_2_03733D34 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 14_2_03733D34 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 14_2_03733D34 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 14_2_03733D34 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 14_2_03733D34 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 14_2_03733D34 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 14_2_03733D34 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 14_2_03733D34 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 14_2_037F8D34 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 14_2_037AA537 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 14_2_03754D3B mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 14_2_03754D3B mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 14_2_03754D3B mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 14_2_0375513A mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 14_2_0375513A mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 14_2_03744120 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 14_2_03744120 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 14_2_03744120 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 14_2_03744120 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 14_2_03744120 mov ecx, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 14_2_03729100 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 14_2_03729100 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 14_2_03729100 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 14_2_037D8DF1 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 14_2_0372B1E1 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 14_2_0372B1E1 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 14_2_0372B1E1 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 14_2_037B41E8 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 14_2_0373D5E0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 14_2_0373D5E0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 14_2_03751DB5 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 14_2_03751DB5 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 14_2_03751DB5 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 14_2_037A51BE mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 14_2_037A51BE mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 14_2_037A51BE mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 14_2_037A51BE mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 14_2_037535A1 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 14_2_037561A0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 14_2_037561A0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 14_2_037A69A6 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 14_2_03752990 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 14_2_0375FD9B mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 14_2_0375FD9B mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 14_2_0375A185 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 14_2_03752581 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 14_2_03752581 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 14_2_03752581 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 14_2_0374C182 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 14_2_03722D8A mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 14_2_03722D8A mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 14_2_03722D8A mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 14_2_03722D8A mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 14_2_03722D8A mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 14_2_037F1074 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 14_2_037E2073 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 14_2_0374746D mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 14_2_03740050 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 14_2_03740050 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 14_2_037BC450 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 14_2_037BC450 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 14_2_0375A44B mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 14_2_0375002D mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 14_2_0375002D mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 14_2_0375002D mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 14_2_0375002D mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 14_2_0375002D mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 14_2_0373B02A mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 14_2_0373B02A mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 14_2_0373B02A mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 14_2_0373B02A mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 14_2_0375BC2C mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 14_2_037F4015 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 14_2_037F4015 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 14_2_037A7016 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 14_2_037A7016 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 14_2_037A7016 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 14_2_037A6C0A mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 14_2_037A6C0A mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 14_2_037A6C0A mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 14_2_037A6C0A mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 14_2_037F740D mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 14_2_037F740D mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 14_2_037F740D mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 14_2_037E1C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 14_2_037E1C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 14_2_037E1C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 14_2_037E1C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 14_2_037E1C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 14_2_037E1C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 14_2_037E1C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 14_2_037E1C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 14_2_037E1C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 14_2_037E1C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 14_2_037E1C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 14_2_037E1C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 14_2_037E1C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 14_2_037E1C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 14_2_037E14FB mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 14_2_037A6CF0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 14_2_037A6CF0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 14_2_037A6CF0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 14_2_037F8CD6 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 14_2_037BB8D0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 14_2_037BB8D0 mov ecx, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 14_2_037BB8D0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 14_2_037BB8D0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 14_2_037BB8D0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 14_2_037BB8D0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 14_2_0375F0BF mov ecx, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 14_2_0375F0BF mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 14_2_0375F0BF mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 14_2_037690AF mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 14_2_0373849B mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 14_2_03729080 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 14_2_037A3884 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 14_2_037A3884 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\find.exeProcess queried: DebugPort
          Source: C:\Windows\SysWOW64\svchost.exeProcess queried: DebugPort
          Source: C:\Windows\SysWOW64\find.exeCode function: 2_2_00409B50 LdrLoadDll,
          Source: C:\Users\user\Desktop\DHL_29028263 receipt document of the purchase,pdf.exeMemory allocated: page read and write | page guard

          HIPS / PFW / Operating System Protection Evasion

          barindex
          Source: C:\Windows\explorer.exeDomain query: www.cherylwoya.com
          Source: C:\Windows\explorer.exeNetwork Connect: 64.34.156.161 80
          Source: C:\Windows\explorer.exeDomain query: www.946abg.net
          Source: C:\Windows\explorer.exeDomain query: www.kyousaku.net
          Source: C:\Windows\explorer.exeNetwork Connect: 154.86.129.243 80
          Source: C:\Windows\SysWOW64\find.exeSection unmapped: C:\Windows\SysWOW64\svchost.exe base address: 8A0000
          Source: C:\Windows\SysWOW64\find.exeSection loaded: unknown target: C:\Windows\explorer.exe protection: execute and read and write
          Source: C:\Windows\SysWOW64\find.exeSection loaded: unknown target: C:\Windows\SysWOW64\svchost.exe protection: execute and read and write
          Source: C:\Windows\SysWOW64\find.exeSection loaded: unknown target: C:\Windows\SysWOW64\svchost.exe protection: execute and read and write
          Source: C:\Windows\SysWOW64\svchost.exeSection loaded: unknown target: C:\Windows\explorer.exe protection: read write
          Source: C:\Windows\SysWOW64\svchost.exeSection loaded: unknown target: C:\Windows\explorer.exe protection: execute and read and write
          Source: C:\Users\user\Desktop\DHL_29028263 receipt document of the purchase,pdf.exeMemory written: C:\Windows\SysWOW64\find.exe base: 400000
          Source: C:\Users\user\Desktop\DHL_29028263 receipt document of the purchase,pdf.exeMemory written: C:\Windows\SysWOW64\find.exe base: 401000
          Source: C:\Users\user\Desktop\DHL_29028263 receipt document of the purchase,pdf.exeMemory written: C:\Windows\SysWOW64\find.exe base: 429000
          Source: C:\Users\user\Desktop\DHL_29028263 receipt document of the purchase,pdf.exeMemory written: C:\Windows\SysWOW64\find.exe base: B0D008
          Source: C:\Users\user\Desktop\DHL_29028263 receipt document of the purchase,pdf.exeMemory allocated: C:\Windows\SysWOW64\find.exe base: 400000 protect: page execute and read and write
          Source: C:\Users\user\Desktop\DHL_29028263 receipt document of the purchase,pdf.exeMemory written: C:\Windows\SysWOW64\find.exe base: 400000 value starts with: 4D5A
          Source: C:\Windows\SysWOW64\find.exeThread APC queued: target process: C:\Windows\explorer.exe
          Source: C:\Windows\SysWOW64\find.exeThread register set: target process: 684
          Source: C:\Windows\SysWOW64\svchost.exeThread register set: target process: 684
          Source: C:\Users\user\Desktop\DHL_29028263 receipt document of the purchase,pdf.exeProcess created: C:\Windows\SysWOW64\tcmsetup.exe C:\Windows\SysWOW64\tcmsetup.exe
          Source: C:\Users\user\Desktop\DHL_29028263 receipt document of the purchase,pdf.exeProcess created: C:\Windows\SysWOW64\find.exe C:\Windows\SysWOW64\find.exe
          Source: C:\Windows\SysWOW64\svchost.exeProcess created: C:\Windows\SysWOW64\cmd.exe /c del "C:\Windows\SysWOW64\find.exe"
          Source: explorer.exe, 00000004.00000000.512312703.0000000006100000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000003.558816370.0000000007EFB000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000000.534654530.0000000007EF6000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: Shell_TrayWnd
          Source: explorer.exe, 00000004.00000000.476501179.0000000000E38000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000004.00000000.506649925.0000000001430000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 00000004.00000000.524723252.0000000000E38000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Progman
          Source: explorer.exe, 00000004.00000000.506649925.0000000001430000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 00000004.00000000.525999583.0000000001430000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 00000004.00000000.477060567.0000000001430000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: YProgram Managerf
          Source: explorer.exe, 00000004.00000000.506649925.0000000001430000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 00000004.00000000.525999583.0000000001430000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 00000004.00000000.477060567.0000000001430000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: Progmanlock
          Source: C:\Users\user\Desktop\DHL_29028263 receipt document of the purchase,pdf.exeQueries volume information: C:\Users\user\Desktop\DHL_29028263 receipt document of the purchase,pdf.exe VolumeInformation
          Source: C:\Users\user\Desktop\DHL_29028263 receipt document of the purchase,pdf.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
          Source: C:\Users\user\Desktop\DHL_29028263 receipt document of the purchase,pdf.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid
          Source: DHL_29028263 receipt document of the purchase,pdf.exe, 00000000.00000002.484850602.0000000002E3D000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: procdump.exe
          Source: DHL_29028263 receipt document of the purchase,pdf.exe, 00000000.00000002.484850602.0000000002E3D000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Nm C:\Windows\SysWOW64\procdump.exe

          Stealing of Sensitive Information

          barindex
          Source: Yara matchFile source: 2.2.find.exe.400000.0.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 2.0.find.exe.400000.1.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 2.0.find.exe.400000.3.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 2.0.find.exe.400000.3.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 2.2.find.exe.400000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 2.0.find.exe.400000.2.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 2.0.find.exe.400000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 2.0.find.exe.400000.2.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 2.0.find.exe.400000.1.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 00000000.00000002.490164346.00000000048A4000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000004.00000000.527619880.0000000005187000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000002.00000000.471183159.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000002.00000002.571277848.0000000000D40000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000000E.00000002.705413123.0000000003210000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000000.00000002.487275778.0000000004472000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000000E.00000002.704496254.00000000029D0000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000000.00000002.487559942.00000000044F0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000004.00000000.508992436.0000000005187000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000002.00000000.470820106.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000000E.00000002.705527409.0000000003240000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000002.00000002.570977775.0000000000D10000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000002.00000000.470421147.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000002.00000002.570002580.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY

          Remote Access Functionality

          barindex
          Source: Yara matchFile source: 2.2.find.exe.400000.0.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 2.0.find.exe.400000.1.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 2.0.find.exe.400000.3.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 2.0.find.exe.400000.3.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 2.2.find.exe.400000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 2.0.find.exe.400000.2.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 2.0.find.exe.400000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 2.0.find.exe.400000.2.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 2.0.find.exe.400000.1.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 00000000.00000002.490164346.00000000048A4000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000004.00000000.527619880.0000000005187000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000002.00000000.471183159.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000002.00000002.571277848.0000000000D40000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000000E.00000002.705413123.0000000003210000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000000.00000002.487275778.0000000004472000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000000E.00000002.704496254.00000000029D0000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000000.00000002.487559942.00000000044F0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000004.00000000.508992436.0000000005187000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000002.00000000.470820106.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000000E.00000002.705527409.0000000003240000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000002.00000002.570977775.0000000000D10000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000002.00000000.470421147.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000002.00000002.570002580.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
          Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
          Valid Accounts1
          Scheduled Task/Job
          1
          Scheduled Task/Job
          812
          Process Injection
          11
          Masquerading
          1
          Input Capture
          1
          Query Registry
          Remote Services1
          Input Capture
          Exfiltration Over Other Network Medium1
          Encrypted Channel
          Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
          Default Accounts1
          Shared Modules
          Boot or Logon Initialization Scripts1
          Scheduled Task/Job
          1
          Disable or Modify Tools
          LSASS Memory231
          Security Software Discovery
          Remote Desktop Protocol1
          Archive Collected Data
          Exfiltration Over Bluetooth3
          Ingress Tool Transfer
          Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
          Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)31
          Virtualization/Sandbox Evasion
          Security Account Manager2
          Process Discovery
          SMB/Windows Admin SharesData from Network Shared DriveAutomated Exfiltration3
          Non-Application Layer Protocol
          Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
          Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)812
          Process Injection
          NTDS31
          Virtualization/Sandbox Evasion
          Distributed Component Object ModelInput CaptureScheduled Transfer13
          Application Layer Protocol
          SIM Card SwapCarrier Billing Fraud
          Cloud AccountsCronNetwork Logon ScriptNetwork Logon Script1
          Deobfuscate/Decode Files or Information
          LSA Secrets1
          Remote System Discovery
          SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
          Replication Through Removable MediaLaunchdRc.commonRc.common1
          Hidden Users
          Cached Domain Credentials112
          System Information Discovery
          VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
          External Remote ServicesScheduled TaskStartup ItemsStartup Items2
          Obfuscated Files or Information
          DCSyncNetwork SniffingWindows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
          Drive-by CompromiseCommand and Scripting InterpreterScheduled Task/JobScheduled Task/Job1
          Software Packing
          Proc FilesystemNetwork Service ScanningShared WebrootCredential API HookingExfiltration Over Symmetric Encrypted Non-C2 ProtocolApplication Layer ProtocolDowngrade to Insecure ProtocolsGenerate Fraudulent Advertising Revenue
          Exploit Public-Facing ApplicationPowerShellAt (Linux)At (Linux)1
          Timestomp
          /etc/passwd and /etc/shadowSystem Network Connections DiscoverySoftware Deployment ToolsData StagedExfiltration Over Asymmetric Encrypted Non-C2 ProtocolWeb ProtocolsRogue Cellular Base StationData Destruction
          Hide Legend

          Legend:

          • Process
          • Signature
          • Created File
          • DNS/IP Info
          • Is Dropped
          • Is Windows Process
          • Number of created Registry Values
          • Number of created Files
          • Visual Basic
          • Delphi
          • Java
          • .Net C# or VB.NET
          • C, C++ or other language
          • Is malicious
          • Internet
          behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 635250 Sample: DHL_29028263 receipt docume... Startdate: 27/05/2022 Architecture: WINDOWS Score: 100 33 www.commercewholesale.com 2->33 35 www.corporatesupplygroup.online 2->35 43 Snort IDS alert for network traffic 2->43 45 Multi AV Scanner detection for domain / URL 2->45 47 Found malware configuration 2->47 49 12 other signatures 2->49 11 DHL_29028263 receipt document of the purchase,pdf.exe 1 2->11         started        signatures3 process4 file5 31 DHL_29028263 recei...urchase,pdf.exe.log, ASCII 11->31 dropped 59 Writes to foreign memory regions 11->59 61 Allocates memory in foreign processes 11->61 63 Injects a PE file into a foreign processes 11->63 15 find.exe 11->15         started        18 tcmsetup.exe 11->18         started        signatures6 process7 signatures8 65 Modifies the context of a thread in another process (thread injection) 15->65 67 Maps a DLL or memory area into another process 15->67 69 Sample uses process hollowing technique 15->69 71 2 other signatures 15->71 20 explorer.exe 15->20 injected process9 dnsIp10 37 www.946abg.net 154.86.129.243, 49798, 80 DXTL-HKDXTLTseungKwanOServiceHK Seychelles 20->37 39 cherylwoya.com 64.34.156.161, 49797, 80 COGECO-PEER1CA Canada 20->39 41 2 other IPs or domains 20->41 51 System process connects to network (likely due to code injection or exploit) 20->51 24 svchost.exe 20->24         started        signatures11 process12 signatures13 53 Modifies the context of a thread in another process (thread injection) 24->53 55 Maps a DLL or memory area into another process 24->55 57 Tries to detect virtualization through RDTSC time measurements 24->57 27 cmd.exe 1 24->27         started        process14 process15 29 conhost.exe 27->29         started       

          This section contains all screenshots as thumbnails, including those not shown in the slideshow.


          windows-stand
          SourceDetectionScannerLabelLink
          DHL_29028263 receipt document of the purchase,pdf.exe22%ReversingLabsByteCode-MSIL.Trojan.Tedy
          No Antivirus matches
          SourceDetectionScannerLabelLinkDownload
          2.0.find.exe.400000.3.unpack100%AviraTR/Crypt.XPACK.Gen2Download File
          2.2.find.exe.400000.0.unpack100%AviraTR/Crypt.XPACK.Gen2Download File
          2.0.find.exe.400000.1.unpack100%AviraTR/Crypt.XPACK.Gen2Download File
          2.0.find.exe.400000.2.unpack100%AviraTR/Crypt.XPACK.Gen2Download File
          2.0.find.exe.400000.0.unpack100%AviraTR/Crypt.XPACK.Gen2Download File
          SourceDetectionScannerLabelLink
          cherylwoya.com10%VirustotalBrowse
          www.946abg.net1%VirustotalBrowse
          SourceDetectionScannerLabelLink
          http://www.cherylwoya.com/mrw6/?5j=-Z8hhJu0CH1&kZL=6fZEMEdK0EUsHT8poDGbU1zs+0N96qjYHzalTR2tuqMjY7ixAH4WqcSwjImDfJQ+xirU100%Avira URL Cloudphishing
          http://www.946abg.net/mrw6/?kZL=serf4G2fT23AQqvD11FW0e5UhnaipW+P1SIFRHWKX7vOHQGiYIAk+83ijhEv+8S8z0gu&5j=-Z8hhJu0CH1100%Avira URL Cloudmalware
          www.bestofsouthbeach.guide/mrw6/100%Avira URL Cloudmalware
          NameIPActiveMaliciousAntivirus DetectionReputation
          www.commercewholesale.com
          209.99.64.43
          truetrue
            unknown
            cherylwoya.com
            64.34.156.161
            truetrueunknown
            www.946abg.net
            154.86.129.243
            truetrueunknown
            www.corporatesupplygroup.online
            203.170.80.250
            truefalse
              unknown
              www.cherylwoya.com
              unknown
              unknowntrue
                unknown
                www.kyousaku.net
                unknown
                unknowntrue
                  unknown
                  NameMaliciousAntivirus DetectionReputation
                  http://www.cherylwoya.com/mrw6/?5j=-Z8hhJu0CH1&kZL=6fZEMEdK0EUsHT8poDGbU1zs+0N96qjYHzalTR2tuqMjY7ixAH4WqcSwjImDfJQ+xirUtrue
                  • Avira URL Cloud: phishing
                  unknown
                  http://www.946abg.net/mrw6/?kZL=serf4G2fT23AQqvD11FW0e5UhnaipW+P1SIFRHWKX7vOHQGiYIAk+83ijhEv+8S8z0gu&5j=-Z8hhJu0CH1true
                  • Avira URL Cloud: malware
                  unknown
                  www.bestofsouthbeach.guide/mrw6/true
                  • Avira URL Cloud: malware
                  low
                  NameSourceMaliciousAntivirus DetectionReputation
                  http://www.random.org/sequences/DHL_29028263 receipt document of the purchase,pdf.exe, DHL_29028263 receipt document of the purchase,pdf.exe, 00000000.00000000.435567902.00000000010E2000.00000020.00000001.01000000.00000003.sdmp, DHL_29028263 receipt document of the purchase,pdf.exe, 00000000.00000002.479557672.00000000010E2000.00000020.00000001.01000000.00000003.sdmpfalse
                    high
                    https://schema.management.azure.com/schemas/2019-08-01/managementGroupDeploymentTemplate.jsonDHL_29028263 receipt document of the purchase,pdf.exe, DHL_29028263 receipt document of the purchase,pdf.exe, 00000000.00000000.435567902.00000000010E2000.00000020.00000001.01000000.00000003.sdmp, DHL_29028263 receipt document of the purchase,pdf.exe, 00000000.00000002.479557672.00000000010E2000.00000020.00000001.01000000.00000003.sdmpfalse
                      high
                      https://schema.management.azure.com/schemas/2019-08-01/tenantDeploymentTemplate.jsonDHL_29028263 receipt document of the purchase,pdf.exe, DHL_29028263 receipt document of the purchase,pdf.exe, 00000000.00000000.435567902.00000000010E2000.00000020.00000001.01000000.00000003.sdmp, DHL_29028263 receipt document of the purchase,pdf.exe, 00000000.00000002.479557672.00000000010E2000.00000020.00000001.01000000.00000003.sdmpfalse
                        high
                        https://schema.management.azure.com/schemas/2018-05-01/subscriptionDeploymentTemplate.jsonDHL_29028263 receipt document of the purchase,pdf.exe, DHL_29028263 receipt document of the purchase,pdf.exe, 00000000.00000000.435567902.00000000010E2000.00000020.00000001.01000000.00000003.sdmp, DHL_29028263 receipt document of the purchase,pdf.exe, 00000000.00000002.479557672.00000000010E2000.00000020.00000001.01000000.00000003.sdmpfalse
                          high
                          https://schema.management.azure.com/schemas/2014-04-01-preview/deploymentTemplate.jsonDHL_29028263 receipt document of the purchase,pdf.exe, DHL_29028263 receipt document of the purchase,pdf.exe, 00000000.00000000.435567902.00000000010E2000.00000020.00000001.01000000.00000003.sdmp, DHL_29028263 receipt document of the purchase,pdf.exe, 00000000.00000002.479557672.00000000010E2000.00000020.00000001.01000000.00000003.sdmpfalse
                            high
                            https://schema.management.azure.com/schemas/2019-04-01/deploymentTemplate.jsonDHL_29028263 receipt document of the purchase,pdf.exe, DHL_29028263 receipt document of the purchase,pdf.exe, 00000000.00000000.435567902.00000000010E2000.00000020.00000001.01000000.00000003.sdmp, DHL_29028263 receipt document of the purchase,pdf.exe, 00000000.00000002.479557672.00000000010E2000.00000020.00000001.01000000.00000003.sdmpfalse
                              high
                              http://json-schema.org/draft-04/schema#Lhttp://json-schema.org/draft-04/schemaDHL_29028263 receipt document of the purchase,pdf.exe, 00000000.00000000.435567902.00000000010E2000.00000020.00000001.01000000.00000003.sdmp, DHL_29028263 receipt document of the purchase,pdf.exe, 00000000.00000002.479557672.00000000010E2000.00000020.00000001.01000000.00000003.sdmpfalse
                                high
                                http://json-schema.org/draft-04/schemaDHL_29028263 receipt document of the purchase,pdf.exe, DHL_29028263 receipt document of the purchase,pdf.exe, 00000000.00000000.435567902.00000000010E2000.00000020.00000001.01000000.00000003.sdmp, DHL_29028263 receipt document of the purchase,pdf.exe, 00000000.00000002.479557672.00000000010E2000.00000020.00000001.01000000.00000003.sdmpfalse
                                  high
                                  https://aka.ms/arm-tools-apiversion.DHL_29028263 receipt document of the purchase,pdf.exe, 00000000.00000000.435567902.00000000010E2000.00000020.00000001.01000000.00000003.sdmp, DHL_29028263 receipt document of the purchase,pdf.exe, 00000000.00000002.479557672.00000000010E2000.00000020.00000001.01000000.00000003.sdmpfalse
                                    high
                                    https://schema.management.azure.com/schemas/2015-01-01/deploymentTemplate.jsonDHL_29028263 receipt document of the purchase,pdf.exe, DHL_29028263 receipt document of the purchase,pdf.exe, 00000000.00000000.435567902.00000000010E2000.00000020.00000001.01000000.00000003.sdmp, DHL_29028263 receipt document of the purchase,pdf.exe, 00000000.00000002.479557672.00000000010E2000.00000020.00000001.01000000.00000003.sdmpfalse
                                      high
                                      https://schema.management.azure.com/schemas/2019-08-01/tenantDeploymentTemplate.json.2014DHL_29028263 receipt document of the purchase,pdf.exe, 00000000.00000000.435567902.00000000010E2000.00000020.00000001.01000000.00000003.sdmp, DHL_29028263 receipt document of the purchase,pdf.exe, 00000000.00000002.479557672.00000000010E2000.00000020.00000001.01000000.00000003.sdmpfalse
                                        high
                                        • No. of IPs < 25%
                                        • 25% < No. of IPs < 50%
                                        • 50% < No. of IPs < 75%
                                        • 75% < No. of IPs
                                        IPDomainCountryFlagASNASN NameMalicious
                                        64.34.156.161
                                        cherylwoya.comCanada
                                        13768COGECO-PEER1CAtrue
                                        154.86.129.243
                                        www.946abg.netSeychelles
                                        134548DXTL-HKDXTLTseungKwanOServiceHKtrue
                                        Joe Sandbox Version:34.0.0 Boulder Opal
                                        Analysis ID:635250
                                        Start date and time: 27/05/202217:49:582022-05-27 17:49:58 +02:00
                                        Joe Sandbox Product:CloudBasic
                                        Overall analysis duration:0h 12m 17s
                                        Hypervisor based Inspection enabled:false
                                        Report type:light
                                        Sample file name:DHL_29028263 receipt document of the purchase,pdf.exe
                                        Cookbook file name:default.jbs
                                        Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
                                        Number of analysed new started processes analysed:22
                                        Number of new started drivers analysed:0
                                        Number of existing processes analysed:0
                                        Number of existing drivers analysed:0
                                        Number of injected processes analysed:1
                                        Technologies:
                                        • HCA enabled
                                        • EGA enabled
                                        • HDC enabled
                                        • AMSI enabled
                                        Analysis Mode:default
                                        Analysis stop reason:Timeout
                                        Detection:MAL
                                        Classification:mal100.troj.expl.evad.winEXE@9/1@5/2
                                        EGA Information:
                                        • Successful, ratio: 66.7%
                                        HDC Information:
                                        • Successful, ratio: 64.4% (good quality ratio 58.7%)
                                        • Quality average: 71.5%
                                        • Quality standard deviation: 31.7%
                                        HCA Information:
                                        • Successful, ratio: 100%
                                        • Number of executed functions: 0
                                        • Number of non-executed functions: 0
                                        Cookbook Comments:
                                        • Found application associated with file extension: .exe
                                        • Adjust boot time
                                        • Enable AMSI
                                        • Exclude process from analysis (whitelisted): audiodg.exe, BackgroundTransferHost.exe, WMIADAP.exe, backgroundTaskHost.exe, svchost.exe, wuapihost.exe
                                        • Excluded IPs from analysis (whitelisted): 20.223.24.244
                                        • Excluded domains from analysis (whitelisted): client.wns.windows.com, fs.microsoft.com, consumer-displaycatalogrp-aks2aks-europe.md.mp.microsoft.com.akadns.net, store-images.s-microsoft.com, login.live.com, displaycatalog-rp-europe.md.mp.microsoft.com.akadns.net, neu-displaycatalogrp.frontdoor.bigcatalog.commerce.microsoft.com, sls.update.microsoft.com, displaycatalog.mp.microsoft.com, img-prod-cms-rt-microsoft-com.akamaized.net, arc.msn.com, displaycatalog-rp.md.mp.microsoft.com.akadns.net
                                        • Execution Graph export aborted for target DHL_29028263 receipt document of the purchase,pdf.exe, PID 7020 because it is empty
                                        • Not all processes where analyzed, report is missing behavior information
                                        No simulations
                                        No context
                                        No context
                                        No context
                                        No context
                                        No context
                                        Process:C:\Users\user\Desktop\DHL_29028263 receipt document of the purchase,pdf.exe
                                        File Type:ASCII text, with CRLF line terminators
                                        Category:dropped
                                        Size (bytes):522
                                        Entropy (8bit):5.348034597186669
                                        Encrypted:false
                                        SSDEEP:12:Q3La/hz92n4M9tDLI4MWuPk21OKbbDLI4MWuPJKiUrRZ9I0ZKhav:MLU84qpE4Ks2wKDE4KhK3VZ9pKhk
                                        MD5:D4AF6B20AEA9906B4FF574A174E96287
                                        SHA1:81655019BB100FAADD5B36755F798EE5FB09E672
                                        SHA-256:DD8AE93DA079839B31327D22A2408E0C3EA4DDE92FD389CD5B96AD57CCE7B2E1
                                        SHA-512:6D912AC17876D9C21E61ED8C1B435AEA0FBB27FB97626A40903B4DFFC1204BEF3A43B02805DEDD2531822FD6F62CF06F0D758C1B2CA07258E82F95225D71C16E
                                        Malicious:true
                                        Reputation:moderate, very likely benign file
                                        Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"Microsoft.VisualBasic, Version=10.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\4f0a7eefa3cd3e0ba98b5ebddbbc72e6\System.ni.dll",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\f1d8480152e0da9a60ad49c6d16a3b6d\System.Core.ni.dll",0..
                                        File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                        Entropy (8bit):6.208402474565558
                                        TrID:
                                        • Win32 Executable (generic) Net Framework (10011505/4) 49.83%
                                        • Win32 Executable (generic) a (10002005/4) 49.78%
                                        • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                                        • Generic Win/DOS Executable (2004/3) 0.01%
                                        • DOS Executable Generic (2002/1) 0.01%
                                        File name:DHL_29028263 receipt document of the purchase,pdf.exe
                                        File size:2419712
                                        MD5:c97dfff9af3555ca25082cc686715c76
                                        SHA1:efc71d34d01661436ef23e2af1a36f7f96319122
                                        SHA256:bd89fe68b099ed00bea985dbdf7c8c0d87deb5a85c29d7a27f09764ab5b9d04d
                                        SHA512:7a10d62a1f0ba0ada604822ac15d2172af65b521d9fbe14bc559eb1f9a01547034981a837fe8e9e0f3d835f5e2519ee498cb7838fe73e32c3cbbf1e86db6d301
                                        SSDEEP:24576:Wmnp0sdiKbb62RNH6AyM1l/+rRa53ruU:IKbb62RNaKsF6
                                        TLSH:B5B5B337DF344E2592F9A719A9644912FE30A78F4A41870FBA7D060C1F3B77A114B72A
                                        File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L.....................0...$..B........$.. ....$...@.. .......................@%...........`................................
                                        Icon Hash:c49a0894909c6494
                                        Entrypoint:0x64c703
                                        Entrypoint Section:.text
                                        Digitally signed:false
                                        Imagebase:0x400000
                                        Subsystem:windows gui
                                        Image File Characteristics:32BIT_MACHINE, EXECUTABLE_IMAGE
                                        DLL Characteristics:NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT, HIGH_ENTROPY_VA
                                        Time Stamp:0xD7CA2EE6 [Thu Sep 21 05:15:18 2084 UTC]
                                        TLS Callbacks:
                                        CLR (.Net) Version:v4.0.30319
                                        OS Version Major:4
                                        OS Version Minor:0
                                        File Version Major:4
                                        File Version Minor:0
                                        Subsystem Version Major:4
                                        Subsystem Version Minor:0
                                        Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
                                        Instruction
                                        jmp dword ptr [00402000h]
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        NameVirtual AddressVirtual Size Is in Section
                                        IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                        IMAGE_DIRECTORY_ENTRY_IMPORT0x24c5fc0x4a.text
                                        IMAGE_DIRECTORY_ENTRY_RESOURCE0x24e0000x3fe8.rsrc
                                        IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                        IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                        IMAGE_DIRECTORY_ENTRY_BASERELOC0x2520000xc.reloc
                                        IMAGE_DIRECTORY_ENTRY_DEBUG0x24c6460x38.text
                                        IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                        IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                        IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                        IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                        IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                        IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                                        IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                        IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                                        IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                        NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                        .text0x20000x24a7090x24a800unknownunknownunknownunknownIMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                                        .rsrc0x24e0000x3fe80x4000False0.453125data5.64147469867IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                        .reloc0x2520000xc0x200False0.044921875data0.101910425663IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                        NameRVASizeTypeLanguageCountry
                                        RT_ICON0x24e1480x468GLS_BINARY_LSB_FIRST
                                        RT_ICON0x24e5b00x10a8dBase IV DBT of @.DBF, block length 4096, next free block index 40, next free block 1134929317, next used block 44344484
                                        RT_ICON0x24f6580x25a8dBase IV DBT of `.DBF, block length 9216, next free block index 40, next free block 0, next used block 0
                                        RT_GROUP_ICON0x251c000x30data
                                        RT_VERSION0x251c300x3b6data
                                        DLLImport
                                        mscoree.dll_CorExeMain
                                        DescriptionData
                                        Translation0x0000 0x04b0
                                        LegalCopyright? Microsoft Corporation. All rights reserved.
                                        Assembly Version16.0.0.0
                                        InternalNameMicrosoft.WebTools.Languages.Json.dll
                                        FileVersion16.6.936.3669
                                        CompanyNameMicrosoft Corporation
                                        LegalTrademarks
                                        ProductVersion16.6.936-preview3+550e59c1ad
                                        FileDescription
                                        OriginalFilenameMicrosoft.WebTools.Languages.Json.dll
                                        TimestampProtocolSIDMessageSource PortDest PortSource IPDest IP
                                        192.168.2.5209.99.64.4349816802031412 05/27/22-17:53:28.062546TCP2031412ET TROJAN FormBook CnC Checkin (GET)4981680192.168.2.5209.99.64.43
                                        192.168.2.5209.99.64.4349816802031453 05/27/22-17:53:28.062546TCP2031453ET TROJAN FormBook CnC Checkin (GET)4981680192.168.2.5209.99.64.43
                                        192.168.2.5209.99.64.4349816802031449 05/27/22-17:53:28.062546TCP2031449ET TROJAN FormBook CnC Checkin (GET)4981680192.168.2.5209.99.64.43
                                        TimestampSource PortDest PortSource IPDest IP
                                        May 27, 2022 17:53:01.227459908 CEST4979780192.168.2.564.34.156.161
                                        May 27, 2022 17:53:01.337821007 CEST804979764.34.156.161192.168.2.5
                                        May 27, 2022 17:53:01.337915897 CEST4979780192.168.2.564.34.156.161
                                        May 27, 2022 17:53:01.338088036 CEST4979780192.168.2.564.34.156.161
                                        May 27, 2022 17:53:01.448623896 CEST804979764.34.156.161192.168.2.5
                                        May 27, 2022 17:53:01.452982903 CEST804979764.34.156.161192.168.2.5
                                        May 27, 2022 17:53:01.453003883 CEST804979764.34.156.161192.168.2.5
                                        May 27, 2022 17:53:01.453022003 CEST804979764.34.156.161192.168.2.5
                                        May 27, 2022 17:53:01.453039885 CEST804979764.34.156.161192.168.2.5
                                        May 27, 2022 17:53:01.453057051 CEST804979764.34.156.161192.168.2.5
                                        May 27, 2022 17:53:01.453073978 CEST804979764.34.156.161192.168.2.5
                                        May 27, 2022 17:53:01.453090906 CEST804979764.34.156.161192.168.2.5
                                        May 27, 2022 17:53:01.453109026 CEST804979764.34.156.161192.168.2.5
                                        May 27, 2022 17:53:01.453125000 CEST4979780192.168.2.564.34.156.161
                                        May 27, 2022 17:53:01.453128099 CEST804979764.34.156.161192.168.2.5
                                        May 27, 2022 17:53:01.453186035 CEST804979764.34.156.161192.168.2.5
                                        May 27, 2022 17:53:01.453228951 CEST4979780192.168.2.564.34.156.161
                                        May 27, 2022 17:53:01.453255892 CEST4979780192.168.2.564.34.156.161
                                        May 27, 2022 17:53:01.453469992 CEST4979780192.168.2.564.34.156.161
                                        May 27, 2022 17:53:06.815435886 CEST4979880192.168.2.5154.86.129.243
                                        May 27, 2022 17:53:07.025321960 CEST8049798154.86.129.243192.168.2.5
                                        May 27, 2022 17:53:07.025649071 CEST4979880192.168.2.5154.86.129.243
                                        May 27, 2022 17:53:07.025675058 CEST4979880192.168.2.5154.86.129.243
                                        May 27, 2022 17:53:07.227186918 CEST8049798154.86.129.243192.168.2.5
                                        May 27, 2022 17:53:07.227204084 CEST8049798154.86.129.243192.168.2.5
                                        May 27, 2022 17:53:07.227215052 CEST8049798154.86.129.243192.168.2.5
                                        May 27, 2022 17:53:07.227734089 CEST4979880192.168.2.5154.86.129.243
                                        May 27, 2022 17:53:07.227752924 CEST4979880192.168.2.5154.86.129.243
                                        May 27, 2022 17:53:07.429177999 CEST8049798154.86.129.243192.168.2.5
                                        TimestampSource PortDest PortSource IPDest IP
                                        May 27, 2022 17:53:01.072865009 CEST6353853192.168.2.58.8.8.8
                                        May 27, 2022 17:53:01.219815016 CEST53635388.8.8.8192.168.2.5
                                        May 27, 2022 17:53:06.473618031 CEST6147853192.168.2.58.8.8.8
                                        May 27, 2022 17:53:06.814008951 CEST53614788.8.8.8192.168.2.5
                                        May 27, 2022 17:53:12.240880966 CEST5535553192.168.2.58.8.8.8
                                        May 27, 2022 17:53:12.280710936 CEST53553558.8.8.8192.168.2.5
                                        May 27, 2022 17:53:22.301239967 CEST5446353192.168.2.58.8.8.8
                                        May 27, 2022 17:53:22.336560011 CEST53544638.8.8.8192.168.2.5
                                        May 27, 2022 17:53:27.801031113 CEST5039353192.168.2.58.8.8.8
                                        May 27, 2022 17:53:27.909094095 CEST53503938.8.8.8192.168.2.5
                                        TimestampSource IPDest IPTrans IDOP CodeNameTypeClass
                                        May 27, 2022 17:53:01.072865009 CEST192.168.2.58.8.8.80x1bd5Standard query (0)www.cherylwoya.comA (IP address)IN (0x0001)
                                        May 27, 2022 17:53:06.473618031 CEST192.168.2.58.8.8.80x4e8eStandard query (0)www.946abg.netA (IP address)IN (0x0001)
                                        May 27, 2022 17:53:12.240880966 CEST192.168.2.58.8.8.80x813cStandard query (0)www.kyousaku.netA (IP address)IN (0x0001)
                                        May 27, 2022 17:53:22.301239967 CEST192.168.2.58.8.8.80xd0Standard query (0)www.corporatesupplygroup.onlineA (IP address)IN (0x0001)
                                        May 27, 2022 17:53:27.801031113 CEST192.168.2.58.8.8.80xc623Standard query (0)www.commercewholesale.comA (IP address)IN (0x0001)
                                        TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClass
                                        May 27, 2022 17:53:01.219815016 CEST8.8.8.8192.168.2.50x1bd5No error (0)www.cherylwoya.comcherylwoya.comCNAME (Canonical name)IN (0x0001)
                                        May 27, 2022 17:53:01.219815016 CEST8.8.8.8192.168.2.50x1bd5No error (0)cherylwoya.com64.34.156.161A (IP address)IN (0x0001)
                                        May 27, 2022 17:53:06.814008951 CEST8.8.8.8192.168.2.50x4e8eNo error (0)www.946abg.net154.86.129.243A (IP address)IN (0x0001)
                                        May 27, 2022 17:53:12.280710936 CEST8.8.8.8192.168.2.50x813cName error (3)www.kyousaku.netnonenoneA (IP address)IN (0x0001)
                                        May 27, 2022 17:53:22.336560011 CEST8.8.8.8192.168.2.50xd0No error (0)www.corporatesupplygroup.online203.170.80.250A (IP address)IN (0x0001)
                                        May 27, 2022 17:53:27.909094095 CEST8.8.8.8192.168.2.50xc623No error (0)www.commercewholesale.com209.99.64.43A (IP address)IN (0x0001)
                                        • www.cherylwoya.com
                                        • www.946abg.net
                                        Session IDSource IPSource PortDestination IPDestination PortProcess
                                        0192.168.2.54979764.34.156.16180C:\Windows\explorer.exe
                                        TimestampkBytes transferredDirectionData
                                        May 27, 2022 17:53:01.338088036 CEST9264OUTGET /mrw6/?5j=-Z8hhJu0CH1&kZL=6fZEMEdK0EUsHT8poDGbU1zs+0N96qjYHzalTR2tuqMjY7ixAH4WqcSwjImDfJQ+xirU HTTP/1.1
                                        Host: www.cherylwoya.com
                                        Connection: close
                                        Data Raw: 00 00 00 00 00 00 00
                                        Data Ascii:
                                        May 27, 2022 17:53:01.452982903 CEST9265INHTTP/1.1 404 Not Found
                                        Date: Fri, 27 May 2022 15:53:01 GMT
                                        Server: Apache
                                        Upgrade: h2,h2c
                                        Connection: Upgrade, close
                                        Accept-Ranges: bytes
                                        Vary: Accept-Encoding,User-Agent
                                        Cache-Control: no-cache, no-store, must-revalidate
                                        Pragma: no-cache
                                        Expires: 0
                                        Transfer-Encoding: chunked
                                        Content-Type: text/html
                                        Data Raw: 31 0d 0a 0a 0d 0a 31 0d 0a 0a 0d 0a 31 0d 0a 0a 0d 0a 31 35 37 0d 0a 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 3e 0a 20 20 20 20 3c 68 65 61 64 3e 0a 20 20 20 20 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 43 6f 6e 74 65 6e 74 2d 74 79 70 65 22 20 63 6f 6e 74 65 6e 74 3d 22 74 65 78 74 2f 68 74 6d 6c 3b 20 63 68 61 72 73 65 74 3d 75 74 66 2d 38 22 3e 0a 20 20 20 20 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 43 61 63 68 65 2d 63 6f 6e 74 72 6f 6c 22 20 63 6f 6e 74 65 6e 74 3d 22 6e 6f 2d 63 61 63 68 65 22 3e 0a 20 20 20 20 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 50 72 61 67 6d 61 22 20 63 6f 6e 74 65 6e 74 3d 22 6e 6f 2d 63 61 63 68 65 22 3e 0a 20 20 20 20 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 45 78 70 69 72 65 73 22 20 63 6f 6e 74 65 6e 74 3d 22 30 22 3e 0a 20 20 20 20 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 76 69 65 77 70 6f 72 74 22 20 63 6f 6e 74 65 6e 74 3d 22 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 2c 20 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 2e 30 22 3e 0a 20 20 20 20 3c 74 69 74 6c 65 3e 0d 0a 33 0d 0a 34 30 34 0d 0a 31 0d 0a 20 0d 0a 39 0d 0a 4e 6f 74 20 46 6f 75 6e 64 0d 0a 31 66 63 61 0d 0a 3c 2f 74 69 74 6c 65 3e 0a 20 20 20 20 3c 73 74 79 6c 65 20 74 79 70 65 3d 22 74 65 78 74 2f 63 73 73 22 3e 0a 20 20 20 20 20 20 20 20 62 6f 64 79 20 7b 0a 20 20 20 20 20 20 20 20 20 20 20 20 66 6f 6e 74 2d 66 61 6d 69 6c 79 3a 20 41 72 69 61 6c 2c 20 48 65 6c 76 65 74 69 63 61 2c 20 73 61 6e 73 2d 73 65 72 69 66 3b 0a 20 20 20 20 20 20 20 20 20 20 20 20 66 6f 6e 74 2d 73 69 7a 65 3a 20 31 34 70 78 3b 0a 20 20 20 20 20 20 20 20 20 20 20 20 6c 69 6e 65 2d 68 65 69 67 68 74 3a 20 31 2e 34 32 38 35 37 31 34 32 39 3b 0a 20 20 20 20 20 20 20 20 20 20 20 20 62 61 63 6b 67 72 6f 75 6e 64 2d 63 6f 6c 6f 72 3a 20 23 66 66 66 66 66 66 3b 0a 20 20 20 20 20 20 20 20 20 20 20 20 63 6f 6c 6f 72 3a 20 23 32 46 33 32 33 30 3b 0a 20 20 20 20 20 20 20 20 20 20 20 20 70 61 64 64 69 6e 67 3a 20 30 3b 0a 20 20 20 20 20 20 20 20 20 20 20 20 6d 61 72 67 69 6e 3a 20 30 3b 0a 20 20 20 20 20 20 20 20 7d 0a 20 20 20 20 20 20 20 20 73 65 63 74 69 6f 6e 2c 20 66 6f 6f 74 65 72 20 7b 0a 20 20 20 20 20 20 20 20 20 20 20 20 64 69 73 70 6c 61 79 3a 20 62 6c 6f 63 6b 3b 0a 20 20 20 20 20 20 20 20 20 20 20 20 70 61 64 64 69 6e 67 3a 20 30 3b 0a 20 20 20 20 20 20 20 20 20 20 20 20 6d 61 72 67 69 6e 3a 20 30 3b 0a 20 20 20 20 20 20 20 20 7d 0a 20 20 20 20 20 20 20 20 2e 63 6f 6e 74 61 69 6e 65 72 20 7b 0a 20 20 20 20 20 20 20 20 20 20 20 20 6d 61 72 67 69 6e 2d 6c 65 66 74 3a 20 61 75 74 6f 3b 0a 20 20 20 20 20 20 20 20 20 20 20 20 6d 61 72 67 69 6e 2d 72 69 67 68 74 3a 20 61 75 74 6f 3b 0a 20 20 20 20 20 20 20 20 20 20 20 20 70 61 64 64 69 6e 67 3a 20 30 20 31 30 70 78 3b 0a 20 20 20 20 20 20 20 20 7d 0a 20 20 20 20 20 20 20 20 2e 72 65 73 70 6f 6e 73 65 2d 69 6e 66 6f 20 7b 0a 20 20 20 20 20 20 20 20 20 20 20 20 63 6f 6c 6f 72 3a 20 23 43 43 43 43 43 43 3b 0a 20 20 20 20 20 20 20 20 7d 0a 20 20 20 20 20 20 20 20 2e 73 74 61 74 75 73 2d 63 6f 64 65 20 7b 0a 20 20 20
                                        Data Ascii: 111157<!DOCTYPE html><html> <head> <meta http-equiv="Content-type" content="text/html; charset=utf-8"> <meta http-equiv="Cache-control" content="no-cache"> <meta http-equiv="Pragma" content="no-cache"> <meta http-equiv="Expires" content="0"> <meta name="viewport" content="width=device-width, initial-scale=1.0"> <title>34041 9Not Found1fca</title> <style type="text/css"> body { font-family: Arial, Helvetica, sans-serif; font-size: 14px; line-height: 1.428571429; background-color: #ffffff; color: #2F3230; padding: 0; margin: 0; } section, footer { display: block; padding: 0; margin: 0; } .container { margin-left: auto; margin-right: auto; padding: 0 10px; } .response-info { color: #CCCCCC; } .status-code {


                                        Session IDSource IPSource PortDestination IPDestination PortProcess
                                        1192.168.2.549798154.86.129.24380C:\Windows\explorer.exe
                                        TimestampkBytes transferredDirectionData
                                        May 27, 2022 17:53:07.025675058 CEST9276OUTGET /mrw6/?kZL=serf4G2fT23AQqvD11FW0e5UhnaipW+P1SIFRHWKX7vOHQGiYIAk+83ijhEv+8S8z0gu&5j=-Z8hhJu0CH1 HTTP/1.1
                                        Host: www.946abg.net
                                        Connection: close
                                        Data Raw: 00 00 00 00 00 00 00
                                        Data Ascii:
                                        May 27, 2022 17:53:07.227204084 CEST9276INHTTP/1.1 404 Not Found
                                        Server: nginx
                                        Date: Fri, 27 May 2022 15:53:07 GMT
                                        Content-Type: text/html
                                        Content-Length: 146
                                        Connection: close
                                        Data Raw: 3c 68 74 6d 6c 3e 0d 0a 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0d 0a 3c 62 6f 64 79 3e 0d 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 6e 67 69 6e 78 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 2f 62 6f 64 79 3e 0d 0a 3c 2f 68 74 6d 6c 3e 0d 0a
                                        Data Ascii: <html><head><title>404 Not Found</title></head><body><center><h1>404 Not Found</h1></center><hr><center>nginx</center></body></html>


                                        Click to jump to process

                                        Target ID:0
                                        Start time:17:51:13
                                        Start date:27/05/2022
                                        Path:C:\Users\user\Desktop\DHL_29028263 receipt document of the purchase,pdf.exe
                                        Wow64 process (32bit):true
                                        Commandline:"C:\Users\user\Desktop\DHL_29028263 receipt document of the purchase,pdf.exe"
                                        Imagebase:0x10e0000
                                        File size:2419712 bytes
                                        MD5 hash:C97DFFF9AF3555CA25082CC686715C76
                                        Has elevated privileges:true
                                        Has administrator privileges:true
                                        Programmed in:.Net C# or VB.NET
                                        Yara matches:
                                        • Rule: JoeSecurity_FormBook, Description: Yara detected FormBook, Source: 00000000.00000002.490164346.00000000048A4000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                        • Rule: Formbook_1, Description: autogenerated rule brought to you by yara-signator, Source: 00000000.00000002.490164346.00000000048A4000.00000004.00000800.00020000.00000000.sdmp, Author: Felix Bilstein - yara-signator at cocacoding dot com
                                        • Rule: Formbook, Description: detect Formbook in memory, Source: 00000000.00000002.490164346.00000000048A4000.00000004.00000800.00020000.00000000.sdmp, Author: JPCERT/CC Incident Response Group
                                        • Rule: JoeSecurity_FormBook, Description: Yara detected FormBook, Source: 00000000.00000002.487275778.0000000004472000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                        • Rule: Formbook_1, Description: autogenerated rule brought to you by yara-signator, Source: 00000000.00000002.487275778.0000000004472000.00000004.00000800.00020000.00000000.sdmp, Author: Felix Bilstein - yara-signator at cocacoding dot com
                                        • Rule: Formbook, Description: detect Formbook in memory, Source: 00000000.00000002.487275778.0000000004472000.00000004.00000800.00020000.00000000.sdmp, Author: JPCERT/CC Incident Response Group
                                        • Rule: JoeSecurity_FormBook, Description: Yara detected FormBook, Source: 00000000.00000002.487559942.00000000044F0000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                        • Rule: Formbook_1, Description: autogenerated rule brought to you by yara-signator, Source: 00000000.00000002.487559942.00000000044F0000.00000004.00000800.00020000.00000000.sdmp, Author: Felix Bilstein - yara-signator at cocacoding dot com
                                        • Rule: Formbook, Description: detect Formbook in memory, Source: 00000000.00000002.487559942.00000000044F0000.00000004.00000800.00020000.00000000.sdmp, Author: JPCERT/CC Incident Response Group
                                        • Rule: JoeSecurity_AntiVM_3, Description: Yara detected AntiVM_3, Source: 00000000.00000002.486933021.0000000004396000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                        • Rule: JoeSecurity_UACBypassusingCMSTP, Description: Yara detected UAC Bypass using CMSTP, Source: 00000000.00000002.486933021.0000000004396000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                        Reputation:low

                                        Target ID:1
                                        Start time:17:51:28
                                        Start date:27/05/2022
                                        Path:C:\Windows\SysWOW64\tcmsetup.exe
                                        Wow64 process (32bit):false
                                        Commandline:C:\Windows\SysWOW64\tcmsetup.exe
                                        Imagebase:0x9e0000
                                        File size:14848 bytes
                                        MD5 hash:EBCB8BE0CD1C5FEC861B53CDE71F009D
                                        Has elevated privileges:true
                                        Has administrator privileges:true
                                        Programmed in:C, C++ or other language
                                        Reputation:low

                                        Target ID:2
                                        Start time:17:51:29
                                        Start date:27/05/2022
                                        Path:C:\Windows\SysWOW64\find.exe
                                        Wow64 process (32bit):true
                                        Commandline:C:\Windows\SysWOW64\find.exe
                                        Imagebase:0x1030000
                                        File size:14848 bytes
                                        MD5 hash:9BCB215932501B45D204DC8E592EA996
                                        Has elevated privileges:true
                                        Has administrator privileges:true
                                        Programmed in:C, C++ or other language
                                        Yara matches:
                                        • Rule: JoeSecurity_FormBook, Description: Yara detected FormBook, Source: 00000002.00000000.471183159.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                        • Rule: Formbook_1, Description: autogenerated rule brought to you by yara-signator, Source: 00000002.00000000.471183159.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Felix Bilstein - yara-signator at cocacoding dot com
                                        • Rule: Formbook, Description: detect Formbook in memory, Source: 00000002.00000000.471183159.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: JPCERT/CC Incident Response Group
                                        • Rule: JoeSecurity_FormBook, Description: Yara detected FormBook, Source: 00000002.00000002.571277848.0000000000D40000.00000040.10000000.00040000.00000000.sdmp, Author: Joe Security
                                        • Rule: Formbook_1, Description: autogenerated rule brought to you by yara-signator, Source: 00000002.00000002.571277848.0000000000D40000.00000040.10000000.00040000.00000000.sdmp, Author: Felix Bilstein - yara-signator at cocacoding dot com
                                        • Rule: Formbook, Description: detect Formbook in memory, Source: 00000002.00000002.571277848.0000000000D40000.00000040.10000000.00040000.00000000.sdmp, Author: JPCERT/CC Incident Response Group
                                        • Rule: JoeSecurity_FormBook, Description: Yara detected FormBook, Source: 00000002.00000000.470820106.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                        • Rule: Formbook_1, Description: autogenerated rule brought to you by yara-signator, Source: 00000002.00000000.470820106.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Felix Bilstein - yara-signator at cocacoding dot com
                                        • Rule: Formbook, Description: detect Formbook in memory, Source: 00000002.00000000.470820106.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: JPCERT/CC Incident Response Group
                                        • Rule: JoeSecurity_FormBook, Description: Yara detected FormBook, Source: 00000002.00000002.570977775.0000000000D10000.00000040.10000000.00040000.00000000.sdmp, Author: Joe Security
                                        • Rule: Formbook_1, Description: autogenerated rule brought to you by yara-signator, Source: 00000002.00000002.570977775.0000000000D10000.00000040.10000000.00040000.00000000.sdmp, Author: Felix Bilstein - yara-signator at cocacoding dot com
                                        • Rule: Formbook, Description: detect Formbook in memory, Source: 00000002.00000002.570977775.0000000000D10000.00000040.10000000.00040000.00000000.sdmp, Author: JPCERT/CC Incident Response Group
                                        • Rule: JoeSecurity_FormBook, Description: Yara detected FormBook, Source: 00000002.00000000.470421147.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                        • Rule: Formbook_1, Description: autogenerated rule brought to you by yara-signator, Source: 00000002.00000000.470421147.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Felix Bilstein - yara-signator at cocacoding dot com
                                        • Rule: Formbook, Description: detect Formbook in memory, Source: 00000002.00000000.470421147.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: JPCERT/CC Incident Response Group
                                        • Rule: JoeSecurity_FormBook, Description: Yara detected FormBook, Source: 00000002.00000002.570002580.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                        • Rule: Formbook_1, Description: autogenerated rule brought to you by yara-signator, Source: 00000002.00000002.570002580.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Felix Bilstein - yara-signator at cocacoding dot com
                                        • Rule: Formbook, Description: detect Formbook in memory, Source: 00000002.00000002.570002580.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: JPCERT/CC Incident Response Group
                                        Reputation:moderate

                                        Target ID:4
                                        Start time:17:51:33
                                        Start date:27/05/2022
                                        Path:C:\Windows\explorer.exe
                                        Wow64 process (32bit):false
                                        Commandline:C:\Windows\Explorer.EXE
                                        Imagebase:0x7ff74fc70000
                                        File size:3933184 bytes
                                        MD5 hash:AD5296B280E8F522A8A897C96BAB0E1D
                                        Has elevated privileges:true
                                        Has administrator privileges:true
                                        Programmed in:C, C++ or other language
                                        Yara matches:
                                        • Rule: JoeSecurity_FormBook, Description: Yara detected FormBook, Source: 00000004.00000000.527619880.0000000005187000.00000040.00000001.00040000.00000000.sdmp, Author: Joe Security
                                        • Rule: Formbook_1, Description: autogenerated rule brought to you by yara-signator, Source: 00000004.00000000.527619880.0000000005187000.00000040.00000001.00040000.00000000.sdmp, Author: Felix Bilstein - yara-signator at cocacoding dot com
                                        • Rule: Formbook, Description: detect Formbook in memory, Source: 00000004.00000000.527619880.0000000005187000.00000040.00000001.00040000.00000000.sdmp, Author: JPCERT/CC Incident Response Group
                                        • Rule: JoeSecurity_FormBook, Description: Yara detected FormBook, Source: 00000004.00000000.508992436.0000000005187000.00000040.00000001.00040000.00000000.sdmp, Author: Joe Security
                                        • Rule: Formbook_1, Description: autogenerated rule brought to you by yara-signator, Source: 00000004.00000000.508992436.0000000005187000.00000040.00000001.00040000.00000000.sdmp, Author: Felix Bilstein - yara-signator at cocacoding dot com
                                        • Rule: Formbook, Description: detect Formbook in memory, Source: 00000004.00000000.508992436.0000000005187000.00000040.00000001.00040000.00000000.sdmp, Author: JPCERT/CC Incident Response Group
                                        Reputation:high

                                        Target ID:14
                                        Start time:17:52:10
                                        Start date:27/05/2022
                                        Path:C:\Windows\SysWOW64\svchost.exe
                                        Wow64 process (32bit):true
                                        Commandline:C:\Windows\SysWOW64\svchost.exe
                                        Imagebase:0x8a0000
                                        File size:44520 bytes
                                        MD5 hash:FA6C268A5B5BDA067A901764D203D433
                                        Has elevated privileges:true
                                        Has administrator privileges:true
                                        Programmed in:C, C++ or other language
                                        Yara matches:
                                        • Rule: JoeSecurity_FormBook, Description: Yara detected FormBook, Source: 0000000E.00000002.705413123.0000000003210000.00000040.10000000.00040000.00000000.sdmp, Author: Joe Security
                                        • Rule: Formbook_1, Description: autogenerated rule brought to you by yara-signator, Source: 0000000E.00000002.705413123.0000000003210000.00000040.10000000.00040000.00000000.sdmp, Author: Felix Bilstein - yara-signator at cocacoding dot com
                                        • Rule: Formbook, Description: detect Formbook in memory, Source: 0000000E.00000002.705413123.0000000003210000.00000040.10000000.00040000.00000000.sdmp, Author: JPCERT/CC Incident Response Group
                                        • Rule: JoeSecurity_FormBook, Description: Yara detected FormBook, Source: 0000000E.00000002.704496254.00000000029D0000.00000040.80000000.00040000.00000000.sdmp, Author: Joe Security
                                        • Rule: Formbook_1, Description: autogenerated rule brought to you by yara-signator, Source: 0000000E.00000002.704496254.00000000029D0000.00000040.80000000.00040000.00000000.sdmp, Author: Felix Bilstein - yara-signator at cocacoding dot com
                                        • Rule: Formbook, Description: detect Formbook in memory, Source: 0000000E.00000002.704496254.00000000029D0000.00000040.80000000.00040000.00000000.sdmp, Author: JPCERT/CC Incident Response Group
                                        • Rule: JoeSecurity_FormBook, Description: Yara detected FormBook, Source: 0000000E.00000002.705527409.0000000003240000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                        • Rule: Formbook_1, Description: autogenerated rule brought to you by yara-signator, Source: 0000000E.00000002.705527409.0000000003240000.00000004.00000800.00020000.00000000.sdmp, Author: Felix Bilstein - yara-signator at cocacoding dot com
                                        • Rule: Formbook, Description: detect Formbook in memory, Source: 0000000E.00000002.705527409.0000000003240000.00000004.00000800.00020000.00000000.sdmp, Author: JPCERT/CC Incident Response Group
                                        Reputation:high

                                        Target ID:16
                                        Start time:17:52:19
                                        Start date:27/05/2022
                                        Path:C:\Windows\SysWOW64\cmd.exe
                                        Wow64 process (32bit):true
                                        Commandline:/c del "C:\Windows\SysWOW64\find.exe"
                                        Imagebase:0x1100000
                                        File size:232960 bytes
                                        MD5 hash:F3BDBE3BB6F734E357235F4D5898582D
                                        Has elevated privileges:true
                                        Has administrator privileges:true
                                        Programmed in:C, C++ or other language
                                        Reputation:high

                                        Target ID:17
                                        Start time:17:52:20
                                        Start date:27/05/2022
                                        Path:C:\Windows\System32\conhost.exe
                                        Wow64 process (32bit):false
                                        Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                        Imagebase:0x7ff77f440000
                                        File size:625664 bytes
                                        MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                        Has elevated privileges:true
                                        Has administrator privileges:true
                                        Programmed in:C, C++ or other language
                                        Reputation:high

                                        No disassembly