Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
documentos DHL.exe

Overview

General Information

Sample Name:documentos DHL.exe
Analysis ID:755464
MD5:ca1cd0656568af4f58aa28e61a3e3edb
SHA1:1fde05eb6e587047d8a47950bcb2efdb53409b42
SHA256:6931d5a8ac6e00c855139d9da394b7895d83a9a18a8974c0b2381c5a28e68678
Infos:

Detection

GuLoader
Score:88
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
Yara detected GuLoader
Tries to steal Mail credentials (via file / registry access)
Initial sample is a PE file and has a suspicious name
Found stalling execution ending in API Sleep call
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to detect Any.run
Tries to harvest and steal ftp login credentials
Executable has a suspicious name (potential lure to open the executable)
Tries to harvest and steal browser information (history, passwords, etc)
Uses 32bit PE files
Contains functionality to shutdown / reboot the system
Uses code obfuscation techniques (call, push, ret)
PE file contains sections with non-standard names
Detected potential crypto function
JA3 SSL client fingerprint seen in connection with other malware
Contains functionality to call native functions
Contains functionality to dynamically determine API calls
Found dropped PE file which has not been started or loaded
Contains functionality for execution timing, often used to detect debuggers
Drops PE files
Tries to load missing DLLs
Contains functionality to read the PEB
Uses a known web browser user agent for HTTP communication
Checks if the current process is being debugged
PE file contains more sections than normal
Creates a process in suspended mode (likely to inject code)
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains functionality for read data from the clipboard

Classification

  • System is w10x64native
  • documentos DHL.exe (PID: 7424 cmdline: C:\Users\user\Desktop\documentos DHL.exe MD5: CA1CD0656568AF4F58AA28E61A3E3EDB)
    • ieinstal.exe (PID: 8576 cmdline: C:\Users\user\Desktop\documentos DHL.exe MD5: 7871873BABCEA94FBA13900B561C7C55)
    • ieinstal.exe (PID: 8584 cmdline: C:\Users\user\Desktop\documentos DHL.exe MD5: 7871873BABCEA94FBA13900B561C7C55)
    • ieinstal.exe (PID: 8596 cmdline: C:\Users\user\Desktop\documentos DHL.exe MD5: 7871873BABCEA94FBA13900B561C7C55)
    • ieinstal.exe (PID: 8604 cmdline: C:\Users\user\Desktop\documentos DHL.exe MD5: 7871873BABCEA94FBA13900B561C7C55)
    • ieinstal.exe (PID: 8612 cmdline: C:\Users\user\Desktop\documentos DHL.exe MD5: 7871873BABCEA94FBA13900B561C7C55)
    • ieinstal.exe (PID: 8620 cmdline: C:\Users\user\Desktop\documentos DHL.exe MD5: 7871873BABCEA94FBA13900B561C7C55)
    • ieinstal.exe (PID: 8628 cmdline: C:\Users\user\Desktop\documentos DHL.exe MD5: 7871873BABCEA94FBA13900B561C7C55)
    • ieinstal.exe (PID: 8640 cmdline: C:\Users\user\Desktop\documentos DHL.exe MD5: 7871873BABCEA94FBA13900B561C7C55)
    • ieinstal.exe (PID: 8648 cmdline: C:\Users\user\Desktop\documentos DHL.exe MD5: 7871873BABCEA94FBA13900B561C7C55)
    • ieinstal.exe (PID: 8672 cmdline: C:\Users\user\Desktop\documentos DHL.exe MD5: 7871873BABCEA94FBA13900B561C7C55)
    • ieinstal.exe (PID: 8680 cmdline: C:\Users\user\Desktop\documentos DHL.exe MD5: 7871873BABCEA94FBA13900B561C7C55)
    • ielowutil.exe (PID: 8688 cmdline: C:\Users\user\Desktop\documentos DHL.exe MD5: 650FE7460630188008BF8C8153526CEB)
    • ielowutil.exe (PID: 8696 cmdline: C:\Users\user\Desktop\documentos DHL.exe MD5: 650FE7460630188008BF8C8153526CEB)
    • ielowutil.exe (PID: 8704 cmdline: C:\Users\user\Desktop\documentos DHL.exe MD5: 650FE7460630188008BF8C8153526CEB)
    • ielowutil.exe (PID: 8712 cmdline: C:\Users\user\Desktop\documentos DHL.exe MD5: 650FE7460630188008BF8C8153526CEB)
    • ielowutil.exe (PID: 8720 cmdline: C:\Users\user\Desktop\documentos DHL.exe MD5: 650FE7460630188008BF8C8153526CEB)
    • ielowutil.exe (PID: 8728 cmdline: C:\Users\user\Desktop\documentos DHL.exe MD5: 650FE7460630188008BF8C8153526CEB)
    • ielowutil.exe (PID: 8736 cmdline: C:\Users\user\Desktop\documentos DHL.exe MD5: 650FE7460630188008BF8C8153526CEB)
    • ielowutil.exe (PID: 8748 cmdline: C:\Users\user\Desktop\documentos DHL.exe MD5: 650FE7460630188008BF8C8153526CEB)
    • ielowutil.exe (PID: 8760 cmdline: C:\Users\user\Desktop\documentos DHL.exe MD5: 650FE7460630188008BF8C8153526CEB)
    • ielowutil.exe (PID: 8776 cmdline: C:\Users\user\Desktop\documentos DHL.exe MD5: 650FE7460630188008BF8C8153526CEB)
    • ExtExport.exe (PID: 8784 cmdline: C:\Users\user\Desktop\documentos DHL.exe MD5: 3253FD643C51C133C3489A146781913B)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
00000025.00000002.1820565807.0000000002A00000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_GuLoader_2Yara detected GuLoaderJoe Security
    00000025.00000000.1618126975.0000000002A00000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_GuLoader_2Yara detected GuLoaderJoe Security
      00000002.00000002.1824658615.0000000003370000.00000040.00001000.00020000.00000000.sdmpJoeSecurity_GuLoader_2Yara detected GuLoaderJoe Security
        No Sigma rule has matched
        No Snort rule has matched

        Click to jump to signature section

        Show All Signature Results

        AV Detection

        barindex
        Source: documentos DHL.exeReversingLabs: Detection: 17%
        Source: documentos DHL.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
        Source: unknownHTTPS traffic detected: 142.250.74.206:443 -> 192.168.11.20:49802 version: TLS 1.2
        Source: unknownHTTPS traffic detected: 142.250.186.65:443 -> 192.168.11.20:49803 version: TLS 1.2
        Source: documentos DHL.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
        Source: C:\Users\user\Desktop\documentos DHL.exeCode function: 2_2_004066F3 FindFirstFileW,FindClose,
        Source: C:\Users\user\Desktop\documentos DHL.exeCode function: 2_2_00405ABE CloseHandle,DeleteFileW,lstrcatW,lstrcatW,lstrlenW,FindFirstFileW,FindNextFileW,FindClose,
        Source: C:\Users\user\Desktop\documentos DHL.exeCode function: 2_2_00402862 FindFirstFileW,
        Source: C:\Users\user\Desktop\documentos DHL.exeFile opened: C:\Users\user\Zorillinae\Skaalpundet\Inkbslistes\Tset\Demodulationen\Iagttagerposition\Americanly.Unc
        Source: C:\Users\user\Desktop\documentos DHL.exeFile opened: C:\Users\user
        Source: C:\Users\user\Desktop\documentos DHL.exeFile opened: C:\Users\user\Desktop\desktop.ini
        Source: C:\Users\user\Desktop\documentos DHL.exeFile opened: C:\Users\user\AppData\Local\Temp\nsd3BF8.tmp
        Source: C:\Users\user\Desktop\documentos DHL.exeFile opened: C:\Users\user\Desktop\documentos DHL.exe
        Source: C:\Users\user\Desktop\documentos DHL.exeFile opened: C:\Users\user\Zorillinae\Skaalpundet\Inkbslistes\Tset\Demodulationen\Iagttagerposition\Strukturerne.Pom
        Source: Joe Sandbox ViewJA3 fingerprint: 37f463bf4616ecd445d4a1937da06e19
        Source: global trafficHTTP traffic detected: GET /uc?export=download&id=1lmBjkmJX2WixZUvaKmoyB8cex-DCePE2 HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; WOW64; Trident/7.0; rv:11.0) like GeckoHost: drive.google.comCache-Control: no-cache
        Source: global trafficHTTP traffic detected: GET /docs/securesc/ha0ro937gcuc7l7deffksulhg5h7mbp1/cus72g9uti9p4sqam1k45t4h3de3hhkd/1669658550000/01268323115933183181/*/1lmBjkmJX2WixZUvaKmoyB8cex-DCePE2?e=download&uuid=e0f4c7f4-041c-4571-801a-cda7ca0f1ae2 HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; WOW64; Trident/7.0; rv:11.0) like GeckoCache-Control: no-cacheHost: doc-04-90-docs.googleusercontent.comConnection: Keep-Alive
        Source: unknownNetwork traffic detected: HTTP traffic on port 49803 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 49802 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49803
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49802
        Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
        Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
        Source: ExtExport.exe, 00000025.00000003.1809581126.0000000002E0A000.00000004.00000020.00020000.00000000.sdmp, ExtExport.exe, 00000025.00000003.1802976587.0000000002E0A000.00000004.00000020.00020000.00000000.sdmp, ExtExport.exe, 00000025.00000003.1803583412.0000000002E0A000.00000004.00000020.00020000.00000000.sdmp, ExtExport.exe, 00000025.00000002.1822393701.0000000002E0A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.comodoca.com/AAACertificateServices.crl06
        Source: ExtExport.exe, 00000025.00000003.1809581126.0000000002E0A000.00000004.00000020.00020000.00000000.sdmp, ExtExport.exe, 00000025.00000003.1802976587.0000000002E0A000.00000004.00000020.00020000.00000000.sdmp, ExtExport.exe, 00000025.00000003.1803583412.0000000002E0A000.00000004.00000020.00020000.00000000.sdmp, ExtExport.exe, 00000025.00000002.1822393701.0000000002E0A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.globalsign.net/root-r2.crl0
        Source: documentos DHL.exeString found in binary or memory: http://nsis.sf.net/NSIS_ErrorError
        Source: ExtExport.exe, 00000025.00000003.1802976587.0000000002E0A000.00000004.00000020.00020000.00000000.sdmp, ExtExport.exe, 00000025.00000003.1803583412.0000000002E0A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://csp.withgoogle.com/csp/report-to/DriveUntrustedContentHttp/external
        Source: ExtExport.exe, 00000025.00000003.1809581126.0000000002E0A000.00000004.00000020.00020000.00000000.sdmp, ExtExport.exe, 00000025.00000002.1822393701.0000000002E0A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://doc-04-90-docs.googleusercontent.com/
        Source: ExtExport.exe, 00000025.00000003.1809581126.0000000002E0A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://doc-04-90-docs.googleusercontent.com/:
        Source: ExtExport.exe, 00000025.00000003.1809581126.0000000002E0A000.00000004.00000020.00020000.00000000.sdmp, ExtExport.exe, 00000025.00000002.1822393701.0000000002E0A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://doc-04-90-docs.googleusercontent.com/=
        Source: ExtExport.exe, 00000025.00000002.1822822611.0000000002E46000.00000004.00000020.00020000.00000000.sdmp, ExtExport.exe, 00000025.00000003.1809581126.0000000002E0A000.00000004.00000020.00020000.00000000.sdmp, ExtExport.exe, 00000025.00000003.1802976587.0000000002E0A000.00000004.00000020.00020000.00000000.sdmp, ExtExport.exe, 00000025.00000002.1821975252.0000000002DD7000.00000004.00000020.00020000.00000000.sdmp, ExtExport.exe, 00000025.00000003.1803583412.0000000002E0A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://doc-04-90-docs.googleusercontent.com/docs/securesc/ha0ro937gcuc7l7deffksulhg5h7mbp1/cus72g9u
        Source: ExtExport.exe, 00000025.00000002.1821244010.0000000002D78000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://drive.google.com/
        Source: ExtExport.exe, 00000025.00000002.1821244010.0000000002D78000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://drive.google.com/d
        Source: ExtExport.exe, 00000025.00000002.1821244010.0000000002D78000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://drive.google.com/uc?export=download&id=1lmBjkmJX2WixZUvaKmoyB8cex-DCePE2
        Source: ExtExport.exe, 00000025.00000003.1810822160.000000001E7BA000.00000004.00001000.00020000.00000000.sdmp, ExtExport.exe, 00000025.00000003.1810628390.000000001E7B0000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/
        Source: ExtExport.exe, 00000025.00000003.1810822160.000000001E7BA000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://login.live.com//
        Source: ExtExport.exe, 00000025.00000003.1810822160.000000001E7BA000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/https://login.live.com/
        Source: ExtExport.exe, 00000025.00000003.1810822160.000000001E7BA000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/v104
        Source: unknownDNS traffic detected: queries for: drive.google.com
        Source: global trafficHTTP traffic detected: GET /uc?export=download&id=1lmBjkmJX2WixZUvaKmoyB8cex-DCePE2 HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; WOW64; Trident/7.0; rv:11.0) like GeckoHost: drive.google.comCache-Control: no-cache
        Source: global trafficHTTP traffic detected: GET /docs/securesc/ha0ro937gcuc7l7deffksulhg5h7mbp1/cus72g9uti9p4sqam1k45t4h3de3hhkd/1669658550000/01268323115933183181/*/1lmBjkmJX2WixZUvaKmoyB8cex-DCePE2?e=download&uuid=e0f4c7f4-041c-4571-801a-cda7ca0f1ae2 HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; WOW64; Trident/7.0; rv:11.0) like GeckoCache-Control: no-cacheHost: doc-04-90-docs.googleusercontent.comConnection: Keep-Alive
        Source: unknownHTTPS traffic detected: 142.250.74.206:443 -> 192.168.11.20:49802 version: TLS 1.2
        Source: unknownHTTPS traffic detected: 142.250.186.65:443 -> 192.168.11.20:49803 version: TLS 1.2
        Source: C:\Users\user\Desktop\documentos DHL.exeCode function: 2_2_00405553 GetDlgItem,GetDlgItem,GetDlgItem,GetDlgItem,GetClientRect,GetSystemMetrics,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,ShowWindow,ShowWindow,GetDlgItem,SendMessageW,SendMessageW,SendMessageW,GetDlgItem,CreateThread,CloseHandle,ShowWindow,ShowWindow,ShowWindow,ShowWindow,SendMessageW,CreatePopupMenu,AppendMenuW,GetWindowRect,TrackPopupMenu,SendMessageW,OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,SendMessageW,GlobalUnlock,SetClipboardData,CloseClipboard,

        System Summary

        barindex
        Source: initial sampleStatic PE information: Filename: documentos DHL.exe
        Source: documentos DHL.exeStatic file information: Suspicious name
        Source: documentos DHL.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
        Source: C:\Users\user\Desktop\documentos DHL.exeCode function: 2_2_00403489 EntryPoint,SetErrorMode,GetVersion,lstrlenA,#17,OleInitialize,SHGetFileInfoW,GetCommandLineW,GetModuleHandleW,CharNextW,GetTempPathW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,GetTempPathW,lstrcatW,SetEnvironmentVariableW,SetEnvironmentVariableW,SetEnvironmentVariableW,DeleteFileW,OleUninitialize,ExitProcess,lstrcatW,lstrcatW,lstrcatW,lstrcmpiW,SetCurrentDirectoryW,DeleteFileW,CopyFileW,CloseHandle,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,
        Source: C:\Users\user\Desktop\documentos DHL.exeCode function: 2_2_00404D90
        Source: C:\Users\user\Desktop\documentos DHL.exeCode function: 2_2_00406ABA
        Source: C:\Users\user\Desktop\documentos DHL.exeCode function: 2_2_0338F535
        Source: C:\Users\user\Desktop\documentos DHL.exeCode function: 2_2_0337133E
        Source: C:\Users\user\Desktop\documentos DHL.exeCode function: 2_2_03372B3E
        Source: C:\Users\user\Desktop\documentos DHL.exeCode function: 2_2_03378B2A
        Source: C:\Users\user\Desktop\documentos DHL.exeCode function: 2_2_03377B14
        Source: C:\Users\user\Desktop\documentos DHL.exeCode function: 2_2_0337231C
        Source: C:\Users\user\Desktop\documentos DHL.exeCode function: 2_2_03372719
        Source: C:\Users\user\Desktop\documentos DHL.exeCode function: 2_2_03371F0F
        Source: C:\Users\user\Desktop\documentos DHL.exeCode function: 2_2_03372F0E
        Source: C:\Users\user\Desktop\documentos DHL.exeCode function: 2_2_0337B70E
        Source: C:\Users\user\Desktop\documentos DHL.exeCode function: 2_2_0338E704
        Source: C:\Users\user\Desktop\documentos DHL.exeCode function: 2_2_03377373
        Source: C:\Users\user\Desktop\documentos DHL.exeCode function: 2_2_03372F7C
        Source: C:\Users\user\Desktop\documentos DHL.exeCode function: 2_2_03372763
        Source: C:\Users\user\Desktop\documentos DHL.exeCode function: 2_2_03371760
        Source: C:\Users\user\Desktop\documentos DHL.exeCode function: 2_2_03371F6F
        Source: C:\Users\user\Desktop\documentos DHL.exeCode function: 2_2_0337236E
        Source: C:\Users\user\Desktop\documentos DHL.exeCode function: 2_2_03370750
        Source: C:\Users\user\Desktop\documentos DHL.exeCode function: 2_2_0337675F
        Source: C:\Users\user\Desktop\documentos DHL.exeCode function: 2_2_03370F5A
        Source: C:\Users\user\Desktop\documentos DHL.exeCode function: 2_2_03370B42
        Source: C:\Users\user\Desktop\documentos DHL.exeCode function: 2_2_033727B7
        Source: C:\Users\user\Desktop\documentos DHL.exeCode function: 2_2_03370BB9
        Source: C:\Users\user\Desktop\documentos DHL.exeCode function: 2_2_03372BA4
        Source: C:\Users\user\Desktop\documentos DHL.exeCode function: 2_2_0338FB9A
        Source: C:\Users\user\Desktop\documentos DHL.exeCode function: 2_2_0337139F
        Source: C:\Users\user\Desktop\documentos DHL.exeCode function: 2_2_03370799
        Source: C:\Users\user\Desktop\documentos DHL.exeCode function: 2_2_03370383
        Source: C:\Users\user\Desktop\documentos DHL.exeCode function: 2_2_033703FE
        Source: C:\Users\user\Desktop\documentos DHL.exeCode function: 2_2_033727F8
        Source: C:\Users\user\Desktop\documentos DHL.exeCode function: 2_2_03376FEF
        Source: C:\Users\user\Desktop\documentos DHL.exeCode function: 2_2_033717D6
        Source: C:\Users\user\Desktop\documentos DHL.exeCode function: 2_2_0337BBD5
        Source: C:\Users\user\Desktop\documentos DHL.exeCode function: 2_2_03371FD4
        Source: C:\Users\user\Desktop\documentos DHL.exeCode function: 2_2_033707DB
        Source: C:\Users\user\Desktop\documentos DHL.exeCode function: 2_2_03372FDA
        Source: C:\Users\user\Desktop\documentos DHL.exeCode function: 2_2_033723CC
        Source: C:\Users\user\Desktop\documentos DHL.exeCode function: 2_2_0338EBC3
        Source: C:\Users\user\Desktop\documentos DHL.exeCode function: 2_2_0337223F
        Source: C:\Users\user\Desktop\documentos DHL.exeCode function: 2_2_0337263F
        Source: C:\Users\user\Desktop\documentos DHL.exeCode function: 2_2_03370225
        Source: C:\Users\user\Desktop\documentos DHL.exeCode function: 2_2_0339021B
        Source: C:\Users\user\Desktop\documentos DHL.exeCode function: 2_2_0339260A
        Source: C:\Users\user\Desktop\documentos DHL.exeCode function: 2_2_03370601
        Source: C:\Users\user\Desktop\documentos DHL.exeCode function: 2_2_03370A0D
        Source: C:\Users\user\Desktop\documentos DHL.exeCode function: 2_2_03370E08
        Source: C:\Users\user\Desktop\documentos DHL.exeCode function: 2_2_03371670
        Source: C:\Users\user\Desktop\documentos DHL.exeCode function: 2_2_03370E7C
        Source: C:\Users\user\Desktop\documentos DHL.exeCode function: 2_2_03371267
        Source: C:\Users\user\Desktop\documentos DHL.exeCode function: 2_2_03370A62
        Source: C:\Users\user\Desktop\documentos DHL.exeCode function: 2_2_03372A68
        Source: C:\Users\user\Desktop\documentos DHL.exeCode function: 2_2_03377258
        Source: C:\Users\user\Desktop\documentos DHL.exeCode function: 2_2_03372E41
        Source: C:\Users\user\Desktop\documentos DHL.exeCode function: 2_2_033776B4
        Source: C:\Users\user\Desktop\documentos DHL.exeCode function: 2_2_033706A6
        Source: C:\Users\user\Desktop\documentos DHL.exeCode function: 2_2_03372EAF
        Source: C:\Users\user\Desktop\documentos DHL.exeCode function: 2_2_03378EAF
        Source: C:\Users\user\Desktop\documentos DHL.exeCode function: 2_2_03377691
        Source: C:\Users\user\Desktop\documentos DHL.exeCode function: 2_2_03371E9D
        Source: C:\Users\user\Desktop\documentos DHL.exeCode function: 2_2_0337269D
        Source: C:\Users\user\Desktop\documentos DHL.exeCode function: 2_2_0337029B
        Source: C:\Users\user\Desktop\documentos DHL.exeCode function: 2_2_03378AF6
        Source: C:\Users\user\Desktop\documentos DHL.exeCode function: 2_2_033716F3
        Source: C:\Users\user\Desktop\documentos DHL.exeCode function: 2_2_03370EFD
        Source: C:\Users\user\Desktop\documentos DHL.exeCode function: 2_2_0338E2E8
        Source: C:\Users\user\Desktop\documentos DHL.exeCode function: 2_2_033706ED
        Source: C:\Users\user\Desktop\documentos DHL.exeCode function: 2_2_03377EEC
        Source: C:\Users\user\Desktop\documentos DHL.exeCode function: 2_2_03372AE9
        Source: C:\Users\user\Desktop\documentos DHL.exeCode function: 2_2_033712DD
        Source: C:\Users\user\Desktop\documentos DHL.exeCode function: 2_2_033702D9
        Source: C:\Users\user\Desktop\documentos DHL.exeCode function: 2_2_03377ED8
        Source: C:\Users\user\Desktop\documentos DHL.exeCode function: 2_2_03370AC6
        Source: C:\Users\user\Desktop\documentos DHL.exeCode function: 2_2_033722C0
        Source: C:\Users\user\Desktop\documentos DHL.exeCode function: 2_2_0337293D
        Source: C:\Users\user\Desktop\documentos DHL.exeCode function: 2_2_03372D3A
        Source: C:\Users\user\Desktop\documentos DHL.exeCode function: 2_2_03370925
        Source: C:\Users\user\Desktop\documentos DHL.exeCode function: 2_2_03377124
        Source: C:\Users\user\Desktop\documentos DHL.exeCode function: 2_2_03372528
        Source: C:\Users\user\Desktop\documentos DHL.exeCode function: 2_2_03372D75
        Source: C:\Users\user\Desktop\documentos DHL.exeCode function: 2_2_03372D73
        Source: C:\Users\user\Desktop\documentos DHL.exeCode function: 2_2_0337B57F
        Source: C:\Users\user\Desktop\documentos DHL.exeCode function: 2_2_0337057E
        Source: C:\Users\user\Desktop\documentos DHL.exeCode function: 2_2_03377578
        Source: C:\Users\user\Desktop\documentos DHL.exeCode function: 2_2_0337BD78
        Source: C:\Users\user\Desktop\documentos DHL.exeCode function: 2_2_03372D67
        Source: C:\Users\user\Desktop\documentos DHL.exeCode function: 2_2_03371566
        Source: C:\Users\user\Desktop\documentos DHL.exeCode function: 2_2_03372D65
        Source: C:\Users\user\Desktop\documentos DHL.exeCode function: 2_2_03372D63
        Source: C:\Users\user\Desktop\documentos DHL.exeCode function: 2_2_03372D61
        Source: C:\Users\user\Desktop\documentos DHL.exeCode function: 2_2_03372D6F
        Source: C:\Users\user\Desktop\documentos DHL.exeCode function: 2_2_0337B56F
        Source: C:\Users\user\Desktop\documentos DHL.exeCode function: 2_2_03372D6D
        Source: C:\Users\user\Desktop\documentos DHL.exeCode function: 2_2_03372D6B
        Source: C:\Users\user\Desktop\documentos DHL.exeCode function: 2_2_03383D65
        Source: C:\Users\user\Desktop\documentos DHL.exeCode function: 2_2_03372D69
        Source: C:\Users\user\Desktop\documentos DHL.exeCode function: 2_2_03372169
        Source: C:\Users\user\Desktop\documentos DHL.exeCode function: 2_2_03377569
        Source: C:\Users\user\Desktop\documentos DHL.exeCode function: 2_2_03370155
        Source: C:\Users\user\Desktop\documentos DHL.exeCode function: 2_2_03372D55
        Source: C:\Users\user\Desktop\documentos DHL.exeCode function: 2_2_03372D53
        Source: C:\Users\user\Desktop\documentos DHL.exeCode function: 2_2_03372D51
        Source: C:\Users\user\Desktop\documentos DHL.exeCode function: 2_2_03371150
        Source: C:\Users\user\Desktop\documentos DHL.exeCode function: 2_2_03370D50
        Source: C:\Users\user\Desktop\documentos DHL.exeCode function: 2_2_03372D5F
        Source: C:\Users\user\Desktop\documentos DHL.exeCode function: 2_2_03378D5E
        Source: C:\Users\user\Desktop\documentos DHL.exeCode function: 2_2_0337055D
        Source: C:\Users\user\Desktop\documentos DHL.exeCode function: 2_2_03372D5D
        Source: C:\Users\user\Desktop\documentos DHL.exeCode function: 2_2_03372D5B
        Source: C:\Users\user\Desktop\documentos DHL.exeCode function: 2_2_03372D59
        Source: C:\Users\user\Desktop\documentos DHL.exeCode function: 2_2_03372D4B
        Source: C:\Users\user\Desktop\documentos DHL.exeCode function: 2_2_033775B7
        Source: C:\Users\user\Desktop\documentos DHL.exeCode function: 2_2_03372DB2
        Source: C:\Users\user\Desktop\documentos DHL.exeCode function: 2_2_033911B4
        Source: C:\Users\user\Desktop\documentos DHL.exeCode function: 2_2_033729A6
        Source: C:\Users\user\Desktop\documentos DHL.exeCode function: 2_2_03372DAC
        Source: C:\Users\user\Desktop\documentos DHL.exeCode function: 2_2_0337B9AC
        Source: C:\Users\user\Desktop\documentos DHL.exeCode function: 2_2_033709AA
        Source: C:\Users\user\Desktop\documentos DHL.exeCode function: 2_2_03378DA9
        Source: C:\Users\user\Desktop\documentos DHL.exeCode function: 2_2_03377994
        Source: C:\Users\user\Desktop\documentos DHL.exeCode function: 2_2_03370D92
        Source: C:\Users\user\Desktop\documentos DHL.exeCode function: 2_2_0337BD8C
        Source: C:\Users\user\Desktop\documentos DHL.exeCode function: 2_2_033779FF
        Source: C:\Users\user\Desktop\documentos DHL.exeCode function: 2_2_033715E9
        Source: C:\Users\user\Desktop\documentos DHL.exeCode function: 2_2_033721DD
        Source: C:\Users\user\Desktop\documentos DHL.exeCode function: 2_2_033701C7
        Source: C:\Users\user\Desktop\documentos DHL.exeCode function: 2_2_03372DC5
        Source: C:\Users\user\Desktop\documentos DHL.exeCode function: 2_2_033725C0
        Source: C:\Users\user\Desktop\documentos DHL.exeCode function: 2_2_03377038
        Source: C:\Users\user\Desktop\documentos DHL.exeCode function: 2_2_03377027
        Source: C:\Users\user\Desktop\documentos DHL.exeCode function: 2_2_0337082F
        Source: C:\Users\user\Desktop\documentos DHL.exeCode function: 2_2_03378C2C
        Source: C:\Users\user\Desktop\documentos DHL.exeCode function: 2_2_03391419
        Source: C:\Users\user\Desktop\documentos DHL.exeCode function: 2_2_03371416
        Source: C:\Users\user\Desktop\documentos DHL.exeCode function: 2_2_03370010
        Source: C:\Users\user\Desktop\documentos DHL.exeCode function: 2_2_03372019
        Source: C:\Users\user\Desktop\documentos DHL.exeCode function: 2_2_03370C19
        Source: C:\Users\user\Desktop\documentos DHL.exeCode function: 2_2_0337C007
        Source: C:\Users\user\Desktop\documentos DHL.exeCode function: 2_2_03372C04
        Source: C:\Users\user\Desktop\documentos DHL.exeCode function: 2_2_0337C07E
        Source: C:\Users\user\Desktop\documentos DHL.exeCode function: 2_2_0337207C
        Source: C:\Users\user\Desktop\documentos DHL.exeCode function: 2_2_03370464
        Source: C:\Users\user\Desktop\documentos DHL.exeCode function: 2_2_03370C63
        Source: C:\Users\user\Desktop\documentos DHL.exeCode function: 2_2_0337006F
        Source: C:\Users\user\Desktop\documentos DHL.exeCode function: 2_2_03377468
        Source: C:\Users\user\Desktop\documentos DHL.exeCode function: 2_2_0339085F
        Source: C:\Users\user\Desktop\documentos DHL.exeCode function: 2_2_0337B847
        Source: C:\Users\user\Desktop\documentos DHL.exeCode function: 2_2_03372446
        Source: C:\Users\user\Desktop\documentos DHL.exeCode function: 2_2_03390044
        Source: C:\Users\user\Desktop\documentos DHL.exeCode function: 2_2_033714B7
        Source: C:\Users\user\Desktop\documentos DHL.exeCode function: 2_2_0337B4B7
        Source: C:\Users\user\Desktop\documentos DHL.exeCode function: 2_2_033728A6
        Source: C:\Users\user\Desktop\documentos DHL.exeCode function: 2_2_033770A6
        Source: C:\Users\user\Desktop\documentos DHL.exeCode function: 2_2_033708A3
        Source: C:\Users\user\Desktop\documentos DHL.exeCode function: 2_2_033724AE
        Source: C:\Users\user\Desktop\documentos DHL.exeCode function: 2_2_03384CF8
        Source: C:\Users\user\Desktop\documentos DHL.exeCode function: 2_2_03372CE3
        Source: C:\Users\user\Desktop\documentos DHL.exeCode function: 2_2_033700E0
        Source: C:\Users\user\Desktop\documentos DHL.exeCode function: 2_2_033720EF
        Source: C:\Users\user\Desktop\documentos DHL.exeCode function: 2_2_033704DF
        Source: C:\Users\user\Desktop\documentos DHL.exeCode function: 2_2_03370CDC
        Source: C:\Users\user\Desktop\documentos DHL.exeCode function: 2_2_033728C7
        Source: C:\Program Files (x86)\Internet Explorer\ExtExport.exeCode function: 37_2_02A08897
        Source: C:\Program Files (x86)\Internet Explorer\ExtExport.exeCode function: 37_2_02A079DC
        Source: C:\Program Files (x86)\Internet Explorer\ExtExport.exeCode function: 37_2_02A03D68
        Source: C:\Program Files (x86)\Internet Explorer\ExtExport.exeCode function: 37_2_02A206A9
        Source: C:\Program Files (x86)\Internet Explorer\ExtExport.exeCode function: 37_2_02A03CB1
        Source: C:\Program Files (x86)\Internet Explorer\ExtExport.exeCode function: 37_2_02A02EBF
        Source: C:\Program Files (x86)\Internet Explorer\ExtExport.exeCode function: 37_2_02A1B885
        Source: C:\Program Files (x86)\Internet Explorer\ExtExport.exeCode function: 37_2_02A03CE9
        Source: C:\Program Files (x86)\Internet Explorer\ExtExport.exeCode function: 37_2_02A058EE
        Source: C:\Program Files (x86)\Internet Explorer\ExtExport.exeCode function: 37_2_02A03CFA
        Source: C:\Program Files (x86)\Internet Explorer\ExtExport.exeCode function: 37_2_02A046C1
        Source: C:\Program Files (x86)\Internet Explorer\ExtExport.exeCode function: 37_2_02A08CC9
        Source: C:\Program Files (x86)\Internet Explorer\ExtExport.exeCode function: 37_2_02A1CEDD
        Source: C:\Program Files (x86)\Internet Explorer\ExtExport.exeCode function: 37_2_02A05A20
        Source: C:\Program Files (x86)\Internet Explorer\ExtExport.exeCode function: 37_2_02A03421
        Source: C:\Program Files (x86)\Internet Explorer\ExtExport.exeCode function: 37_2_02A0422B
        Source: C:\Program Files (x86)\Internet Explorer\ExtExport.exeCode function: 37_2_02A08231
        Source: C:\Program Files (x86)\Internet Explorer\ExtExport.exeCode function: 37_2_02A04035
        Source: C:\Program Files (x86)\Internet Explorer\ExtExport.exeCode function: 37_2_02A0423A
        Source: C:\Program Files (x86)\Internet Explorer\ExtExport.exeCode function: 37_2_02A08A3A
        Source: C:\Program Files (x86)\Internet Explorer\ExtExport.exeCode function: 37_2_02A05A6B
        Source: C:\Program Files (x86)\Internet Explorer\ExtExport.exeCode function: 37_2_02A0866E
        Source: C:\Program Files (x86)\Internet Explorer\ExtExport.exeCode function: 37_2_02A1DE76
        Source: C:\Program Files (x86)\Internet Explorer\ExtExport.exeCode function: 37_2_02A04279
        Source: C:\Program Files (x86)\Internet Explorer\ExtExport.exeCode function: 37_2_02A08241
        Source: C:\Program Files (x86)\Internet Explorer\ExtExport.exeCode function: 37_2_02A08A4E
        Source: C:\Program Files (x86)\Internet Explorer\ExtExport.exeCode function: 37_2_02A04656
        Source: C:\Program Files (x86)\Internet Explorer\ExtExport.exeCode function: 37_2_02A1C85C
        Source: C:\Program Files (x86)\Internet Explorer\ExtExport.exeCode function: 37_2_02A1AFAA
        Source: C:\Program Files (x86)\Internet Explorer\ExtExport.exeCode function: 37_2_02A04BAE
        Source: C:\Program Files (x86)\Internet Explorer\ExtExport.exeCode function: 37_2_02A057B8
        Source: C:\Program Files (x86)\Internet Explorer\ExtExport.exeCode function: 37_2_02A04B9A
        Source: C:\Program Files (x86)\Internet Explorer\ExtExport.exeCode function: 37_2_02A03DE6
        Source: C:\Program Files (x86)\Internet Explorer\ExtExport.exeCode function: 37_2_02A057EC
        Source: C:\Program Files (x86)\Internet Explorer\ExtExport.exeCode function: 37_2_02A1B3C6
        Source: C:\Program Files (x86)\Internet Explorer\ExtExport.exeCode function: 37_2_02A083D0
        Source: C:\Program Files (x86)\Internet Explorer\ExtExport.exeCode function: 37_2_02A047D6
        Source: C:\Program Files (x86)\Internet Explorer\ExtExport.exeCode function: 37_2_02A0412A
        Source: C:\Program Files (x86)\Internet Explorer\ExtExport.exeCode function: 37_2_02A1CD06
        Source: C:\Program Files (x86)\Internet Explorer\ExtExport.exeCode function: 37_2_02A08509
        Source: C:\Program Files (x86)\Internet Explorer\ExtExport.exeCode function: 37_2_02A03F1A
        Source: C:\Program Files (x86)\Internet Explorer\ExtExport.exeCode function: 37_2_02A05B71
        Source: C:\Program Files (x86)\Internet Explorer\ExtExport.exeCode function: 37_2_02A04376
        Source: C:\Program Files (x86)\Internet Explorer\ExtExport.exeCode function: 37_2_02A08179
        Source: C:\Program Files (x86)\Internet Explorer\ExtExport.exeCode function: 37_2_02A08D40
        Source: C:\Program Files (x86)\Internet Explorer\ExtExport.exeCode function: 37_2_02A04353
        Source: C:\Program Files (x86)\Internet Explorer\ExtExport.exeCode function: 37_2_02A1FE97 NtCreateThreadEx,
        Source: C:\Program Files (x86)\Internet Explorer\ExtExport.exeCode function: 37_2_02A08897 NtProtectVirtualMemory,
        Source: C:\Program Files (x86)\Internet Explorer\ExtExport.exeCode function: 37_2_02A065BA NtSetInformationProcess,
        Source: C:\Program Files (x86)\Internet Explorer\ExtExport.exeCode function: 37_2_02A03D68 NtProtectVirtualMemory,
        Source: C:\Program Files (x86)\Internet Explorer\ExtExport.exeCode function: 37_2_02A03CB1 NtProtectVirtualMemory,
        Source: C:\Program Files (x86)\Internet Explorer\ExtExport.exeCode function: 37_2_02A03CE9 NtProtectVirtualMemory,
        Source: C:\Program Files (x86)\Internet Explorer\ExtExport.exeCode function: 37_2_02A03CFA NtProtectVirtualMemory,
        Source: C:\Program Files (x86)\Internet Explorer\ExtExport.exeCode function: 37_2_02A0422B NtProtectVirtualMemory,
        Source: C:\Program Files (x86)\Internet Explorer\ExtExport.exeCode function: 37_2_02A04035 NtProtectVirtualMemory,
        Source: C:\Program Files (x86)\Internet Explorer\ExtExport.exeCode function: 37_2_02A0423A NtProtectVirtualMemory,
        Source: C:\Program Files (x86)\Internet Explorer\ExtExport.exeCode function: 37_2_02A04279 NtProtectVirtualMemory,
        Source: C:\Program Files (x86)\Internet Explorer\ExtExport.exeCode function: 37_2_02A08A4E NtProtectVirtualMemory,
        Source: C:\Program Files (x86)\Internet Explorer\ExtExport.exeCode function: 37_2_02A03DE6 NtProtectVirtualMemory,
        Source: C:\Program Files (x86)\Internet Explorer\ExtExport.exeCode function: 37_2_02A0412A NtProtectVirtualMemory,
        Source: C:\Program Files (x86)\Internet Explorer\ExtExport.exeCode function: 37_2_02A08932 NtProtectVirtualMemory,
        Source: C:\Program Files (x86)\Internet Explorer\ExtExport.exeCode function: 37_2_02A0890D NtProtectVirtualMemory,
        Source: C:\Program Files (x86)\Internet Explorer\ExtExport.exeCode function: 37_2_02A03F1A NtProtectVirtualMemory,
        Source: C:\Program Files (x86)\Internet Explorer\ExtExport.exeCode function: 37_2_02A04376 NtProtectVirtualMemory,
        Source: C:\Users\user\Desktop\documentos DHL.exeSection loaded: edgegdi.dll
        Source: C:\Program Files (x86)\Internet Explorer\ExtExport.exeSection loaded: edgegdi.dll
        Source: libpixbufloader-icns.dll.2.drStatic PE information: Number of sections : 11 > 10
        Source: documentos DHL.exeReversingLabs: Detection: 17%
        Source: C:\Users\user\Desktop\documentos DHL.exeFile read: C:\Users\user\Desktop\documentos DHL.exeJump to behavior
        Source: documentos DHL.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
        Source: C:\Users\user\Desktop\documentos DHL.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
        Source: unknownProcess created: C:\Users\user\Desktop\documentos DHL.exe C:\Users\user\Desktop\documentos DHL.exe
        Source: C:\Users\user\Desktop\documentos DHL.exeProcess created: C:\Program Files (x86)\Internet Explorer\ieinstal.exe C:\Users\user\Desktop\documentos DHL.exe
        Source: C:\Users\user\Desktop\documentos DHL.exeProcess created: C:\Program Files (x86)\Internet Explorer\ieinstal.exe C:\Users\user\Desktop\documentos DHL.exe
        Source: C:\Users\user\Desktop\documentos DHL.exeProcess created: C:\Program Files (x86)\Internet Explorer\ieinstal.exe C:\Users\user\Desktop\documentos DHL.exe
        Source: C:\Users\user\Desktop\documentos DHL.exeProcess created: C:\Program Files (x86)\Internet Explorer\ieinstal.exe C:\Users\user\Desktop\documentos DHL.exe
        Source: C:\Users\user\Desktop\documentos DHL.exeProcess created: C:\Program Files (x86)\Internet Explorer\ieinstal.exe C:\Users\user\Desktop\documentos DHL.exe
        Source: C:\Users\user\Desktop\documentos DHL.exeProcess created: C:\Program Files (x86)\Internet Explorer\ieinstal.exe C:\Users\user\Desktop\documentos DHL.exe
        Source: C:\Users\user\Desktop\documentos DHL.exeProcess created: C:\Program Files (x86)\Internet Explorer\ieinstal.exe C:\Users\user\Desktop\documentos DHL.exe
        Source: C:\Users\user\Desktop\documentos DHL.exeProcess created: C:\Program Files (x86)\Internet Explorer\ieinstal.exe C:\Users\user\Desktop\documentos DHL.exe
        Source: C:\Users\user\Desktop\documentos DHL.exeProcess created: C:\Program Files (x86)\Internet Explorer\ieinstal.exe C:\Users\user\Desktop\documentos DHL.exe
        Source: C:\Users\user\Desktop\documentos DHL.exeProcess created: C:\Program Files (x86)\Internet Explorer\ieinstal.exe C:\Users\user\Desktop\documentos DHL.exe
        Source: C:\Users\user\Desktop\documentos DHL.exeProcess created: C:\Program Files (x86)\Internet Explorer\ieinstal.exe C:\Users\user\Desktop\documentos DHL.exe
        Source: C:\Users\user\Desktop\documentos DHL.exeProcess created: C:\Program Files (x86)\Internet Explorer\ielowutil.exe C:\Users\user\Desktop\documentos DHL.exe
        Source: C:\Users\user\Desktop\documentos DHL.exeProcess created: C:\Program Files (x86)\Internet Explorer\ielowutil.exe C:\Users\user\Desktop\documentos DHL.exe
        Source: C:\Users\user\Desktop\documentos DHL.exeProcess created: C:\Program Files (x86)\Internet Explorer\ielowutil.exe C:\Users\user\Desktop\documentos DHL.exe
        Source: C:\Users\user\Desktop\documentos DHL.exeProcess created: C:\Program Files (x86)\Internet Explorer\ielowutil.exe C:\Users\user\Desktop\documentos DHL.exe
        Source: C:\Users\user\Desktop\documentos DHL.exeProcess created: C:\Program Files (x86)\Internet Explorer\ielowutil.exe C:\Users\user\Desktop\documentos DHL.exe
        Source: C:\Users\user\Desktop\documentos DHL.exeProcess created: C:\Program Files (x86)\Internet Explorer\ielowutil.exe C:\Users\user\Desktop\documentos DHL.exe
        Source: C:\Users\user\Desktop\documentos DHL.exeProcess created: C:\Program Files (x86)\Internet Explorer\ielowutil.exe C:\Users\user\Desktop\documentos DHL.exe
        Source: C:\Users\user\Desktop\documentos DHL.exeProcess created: C:\Program Files (x86)\Internet Explorer\ielowutil.exe C:\Users\user\Desktop\documentos DHL.exe
        Source: C:\Users\user\Desktop\documentos DHL.exeProcess created: C:\Program Files (x86)\Internet Explorer\ielowutil.exe C:\Users\user\Desktop\documentos DHL.exe
        Source: C:\Users\user\Desktop\documentos DHL.exeProcess created: C:\Program Files (x86)\Internet Explorer\ielowutil.exe C:\Users\user\Desktop\documentos DHL.exe
        Source: C:\Users\user\Desktop\documentos DHL.exeProcess created: C:\Program Files (x86)\Internet Explorer\ExtExport.exe C:\Users\user\Desktop\documentos DHL.exe
        Source: C:\Users\user\Desktop\documentos DHL.exeProcess created: C:\Program Files (x86)\Internet Explorer\ieinstal.exe C:\Users\user\Desktop\documentos DHL.exe
        Source: C:\Users\user\Desktop\documentos DHL.exeProcess created: C:\Program Files (x86)\Internet Explorer\ieinstal.exe C:\Users\user\Desktop\documentos DHL.exe
        Source: C:\Users\user\Desktop\documentos DHL.exeProcess created: C:\Program Files (x86)\Internet Explorer\ieinstal.exe C:\Users\user\Desktop\documentos DHL.exe
        Source: C:\Users\user\Desktop\documentos DHL.exeProcess created: C:\Program Files (x86)\Internet Explorer\ieinstal.exe C:\Users\user\Desktop\documentos DHL.exe
        Source: C:\Users\user\Desktop\documentos DHL.exeProcess created: C:\Program Files (x86)\Internet Explorer\ieinstal.exe C:\Users\user\Desktop\documentos DHL.exe
        Source: C:\Users\user\Desktop\documentos DHL.exeProcess created: C:\Program Files (x86)\Internet Explorer\ieinstal.exe C:\Users\user\Desktop\documentos DHL.exe
        Source: C:\Users\user\Desktop\documentos DHL.exeProcess created: C:\Program Files (x86)\Internet Explorer\ieinstal.exe C:\Users\user\Desktop\documentos DHL.exe
        Source: C:\Users\user\Desktop\documentos DHL.exeProcess created: C:\Program Files (x86)\Internet Explorer\ieinstal.exe C:\Users\user\Desktop\documentos DHL.exe
        Source: C:\Users\user\Desktop\documentos DHL.exeProcess created: C:\Program Files (x86)\Internet Explorer\ieinstal.exe C:\Users\user\Desktop\documentos DHL.exe
        Source: C:\Users\user\Desktop\documentos DHL.exeProcess created: C:\Program Files (x86)\Internet Explorer\ieinstal.exe C:\Users\user\Desktop\documentos DHL.exe
        Source: C:\Users\user\Desktop\documentos DHL.exeProcess created: C:\Program Files (x86)\Internet Explorer\ieinstal.exe C:\Users\user\Desktop\documentos DHL.exe
        Source: C:\Users\user\Desktop\documentos DHL.exeProcess created: C:\Program Files (x86)\Internet Explorer\ielowutil.exe C:\Users\user\Desktop\documentos DHL.exe
        Source: C:\Users\user\Desktop\documentos DHL.exeProcess created: C:\Program Files (x86)\Internet Explorer\ielowutil.exe C:\Users\user\Desktop\documentos DHL.exe
        Source: C:\Users\user\Desktop\documentos DHL.exeProcess created: C:\Program Files (x86)\Internet Explorer\ielowutil.exe C:\Users\user\Desktop\documentos DHL.exe
        Source: C:\Users\user\Desktop\documentos DHL.exeProcess created: C:\Program Files (x86)\Internet Explorer\ielowutil.exe C:\Users\user\Desktop\documentos DHL.exe
        Source: C:\Users\user\Desktop\documentos DHL.exeProcess created: C:\Program Files (x86)\Internet Explorer\ielowutil.exe C:\Users\user\Desktop\documentos DHL.exe
        Source: C:\Users\user\Desktop\documentos DHL.exeProcess created: C:\Program Files (x86)\Internet Explorer\ielowutil.exe C:\Users\user\Desktop\documentos DHL.exe
        Source: C:\Users\user\Desktop\documentos DHL.exeProcess created: C:\Program Files (x86)\Internet Explorer\ielowutil.exe C:\Users\user\Desktop\documentos DHL.exe
        Source: C:\Users\user\Desktop\documentos DHL.exeProcess created: C:\Program Files (x86)\Internet Explorer\ielowutil.exe C:\Users\user\Desktop\documentos DHL.exe
        Source: C:\Users\user\Desktop\documentos DHL.exeProcess created: C:\Program Files (x86)\Internet Explorer\ielowutil.exe C:\Users\user\Desktop\documentos DHL.exe
        Source: C:\Users\user\Desktop\documentos DHL.exeProcess created: C:\Program Files (x86)\Internet Explorer\ielowutil.exe C:\Users\user\Desktop\documentos DHL.exe
        Source: C:\Users\user\Desktop\documentos DHL.exeProcess created: C:\Program Files (x86)\Internet Explorer\ExtExport.exe C:\Users\user\Desktop\documentos DHL.exe
        Source: C:\Users\user\Desktop\documentos DHL.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f486a52-3cb1-48fd-8f50-b8dc300d9f9d}\InProcServer32
        Source: C:\Users\user\Desktop\documentos DHL.exeCode function: 2_2_00403489 EntryPoint,SetErrorMode,GetVersion,lstrlenA,#17,OleInitialize,SHGetFileInfoW,GetCommandLineW,GetModuleHandleW,CharNextW,GetTempPathW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,GetTempPathW,lstrcatW,SetEnvironmentVariableW,SetEnvironmentVariableW,SetEnvironmentVariableW,DeleteFileW,OleUninitialize,ExitProcess,lstrcatW,lstrcatW,lstrcatW,lstrcmpiW,SetCurrentDirectoryW,DeleteFileW,CopyFileW,CloseHandle,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,
        Source: C:\Users\user\Desktop\documentos DHL.exeFile created: C:\Users\user\ZorillinaeJump to behavior
        Source: C:\Users\user\Desktop\documentos DHL.exeFile created: C:\Users\user\AppData\Local\Temp\nsd3BF7.tmpJump to behavior
        Source: classification engineClassification label: mal88.troj.spyw.evad.winEXE@45/6@2/2
        Source: C:\Users\user\Desktop\documentos DHL.exeCode function: 2_2_004020FE CoCreateInstance,
        Source: C:\Users\user\Desktop\documentos DHL.exeFile read: C:\Users\desktop.iniJump to behavior
        Source: C:\Users\user\Desktop\documentos DHL.exeCode function: 2_2_00404814 GetDlgItem,SetWindowTextW,SHBrowseForFolderW,CoTaskMemFree,lstrcmpiW,lstrcatW,SetDlgItemTextW,GetDiskFreeSpaceW,MulDiv,SetDlgItemTextW,
        Source: C:\Program Files (x86)\Internet Explorer\ExtExport.exeMutant created: \Sessions\1\BaseNamedObjects\28278665D4ACB73EF64D459A
        Source: C:\Users\user\Desktop\documentos DHL.exeFile written: C:\Windows\Resources\0409\Transcriptive.iniJump to behavior
        Source: C:\Program Files (x86)\Internet Explorer\ExtExport.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook
        Source: documentos DHL.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE

        Data Obfuscation

        barindex
        Source: Yara matchFile source: 00000025.00000002.1820565807.0000000002A00000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000025.00000000.1618126975.0000000002A00000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000002.00000002.1824658615.0000000003370000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
        Source: C:\Users\user\Desktop\documentos DHL.exeCode function: 2_2_10002DE0 push eax; ret
        Source: C:\Users\user\Desktop\documentos DHL.exeCode function: 2_2_0337977F push cs; iretd
        Source: C:\Users\user\Desktop\documentos DHL.exeCode function: 2_2_03375F4D push ss; retf
        Source: C:\Users\user\Desktop\documentos DHL.exeCode function: 2_2_03373FEA push ss; retf
        Source: C:\Users\user\Desktop\documentos DHL.exeCode function: 2_2_03376225 push FFFFFFE5h; ret
        Source: C:\Users\user\Desktop\documentos DHL.exeCode function: 2_2_033765ED push ecx; retf
        Source: C:\Program Files (x86)\Internet Explorer\ExtExport.exeCode function: 37_2_02A00CAC push ss; retf
        Source: C:\Program Files (x86)\Internet Explorer\ExtExport.exeCode function: 37_2_02A032AF push ecx; retf
        Source: C:\Program Files (x86)\Internet Explorer\ExtExport.exeCode function: 37_2_02A02C0F push ss; retf
        Source: C:\Program Files (x86)\Internet Explorer\ExtExport.exeCode function: 37_2_02A06441 push cs; iretd
        Source: libpixbufloader-icns.dll.2.drStatic PE information: section name: .xdata
        Source: C:\Users\user\Desktop\documentos DHL.exeCode function: 2_2_10001B18 GlobalAlloc,lstrcpyW,lstrcpyW,GlobalFree,GlobalFree,GlobalFree,GlobalFree,GlobalFree,GlobalFree,lstrcpyW,GetModuleHandleW,LoadLibraryW,GetProcAddress,lstrlenW,
        Source: C:\Users\user\Desktop\documentos DHL.exeFile created: C:\Users\user\Zorillinae\Skaalpundet\Inkbslistes\Tset\Demodulationen\Iagttagerposition\libpixbufloader-icns.dllJump to dropped file
        Source: C:\Users\user\Desktop\documentos DHL.exeFile created: C:\Users\user\AppData\Local\Temp\nsw5DC6.tmp\System.dllJump to dropped file
        Source: C:\Users\user\Desktop\documentos DHL.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\Internet Explorer\ExtExport.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\Internet Explorer\ExtExport.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\Internet Explorer\ExtExport.exeProcess information set: NOGPFAULTERRORBOX
        Source: C:\Program Files (x86)\Internet Explorer\ExtExport.exeProcess information set: NOGPFAULTERRORBOX
        Source: C:\Program Files (x86)\Internet Explorer\ExtExport.exeProcess information set: NOGPFAULTERRORBOX
        Source: C:\Program Files (x86)\Internet Explorer\ExtExport.exeProcess information set: NOGPFAULTERRORBOX
        Source: C:\Program Files (x86)\Internet Explorer\ExtExport.exeProcess information set: NOGPFAULTERRORBOX
        Source: C:\Program Files (x86)\Internet Explorer\ExtExport.exeProcess information set: NOGPFAULTERRORBOX
        Source: C:\Program Files (x86)\Internet Explorer\ExtExport.exeProcess information set: NOGPFAULTERRORBOX
        Source: C:\Program Files (x86)\Internet Explorer\ExtExport.exeProcess information set: NOGPFAULTERRORBOX
        Source: C:\Program Files (x86)\Internet Explorer\ExtExport.exeProcess information set: NOGPFAULTERRORBOX
        Source: C:\Program Files (x86)\Internet Explorer\ExtExport.exeProcess information set: NOGPFAULTERRORBOX
        Source: C:\Program Files (x86)\Internet Explorer\ExtExport.exeProcess information set: NOGPFAULTERRORBOX
        Source: C:\Program Files (x86)\Internet Explorer\ExtExport.exeProcess information set: NOGPFAULTERRORBOX
        Source: C:\Program Files (x86)\Internet Explorer\ExtExport.exeProcess information set: NOGPFAULTERRORBOX
        Source: C:\Program Files (x86)\Internet Explorer\ExtExport.exeProcess information set: NOGPFAULTERRORBOX
        Source: C:\Program Files (x86)\Internet Explorer\ExtExport.exeProcess information set: NOGPFAULTERRORBOX
        Source: C:\Program Files (x86)\Internet Explorer\ExtExport.exeProcess information set: NOGPFAULTERRORBOX
        Source: C:\Program Files (x86)\Internet Explorer\ExtExport.exeProcess information set: NOGPFAULTERRORBOX
        Source: C:\Program Files (x86)\Internet Explorer\ExtExport.exeProcess information set: NOGPFAULTERRORBOX
        Source: C:\Program Files (x86)\Internet Explorer\ExtExport.exeProcess information set: NOGPFAULTERRORBOX
        Source: C:\Program Files (x86)\Internet Explorer\ExtExport.exeProcess information set: NOGPFAULTERRORBOX
        Source: C:\Program Files (x86)\Internet Explorer\ExtExport.exeProcess information set: NOGPFAULTERRORBOX
        Source: C:\Program Files (x86)\Internet Explorer\ExtExport.exeProcess information set: NOGPFAULTERRORBOX
        Source: C:\Program Files (x86)\Internet Explorer\ExtExport.exeProcess information set: NOGPFAULTERRORBOX
        Source: C:\Program Files (x86)\Internet Explorer\ExtExport.exeProcess information set: NOGPFAULTERRORBOX
        Source: C:\Program Files (x86)\Internet Explorer\ExtExport.exeProcess information set: NOGPFAULTERRORBOX
        Source: C:\Program Files (x86)\Internet Explorer\ExtExport.exeProcess information set: NOGPFAULTERRORBOX
        Source: C:\Program Files (x86)\Internet Explorer\ExtExport.exeProcess information set: NOGPFAULTERRORBOX
        Source: C:\Program Files (x86)\Internet Explorer\ExtExport.exeProcess information set: NOGPFAULTERRORBOX
        Source: C:\Program Files (x86)\Internet Explorer\ExtExport.exeProcess information set: NOGPFAULTERRORBOX
        Source: C:\Program Files (x86)\Internet Explorer\ExtExport.exeProcess information set: NOGPFAULTERRORBOX
        Source: C:\Program Files (x86)\Internet Explorer\ExtExport.exeProcess information set: NOGPFAULTERRORBOX
        Source: C:\Program Files (x86)\Internet Explorer\ExtExport.exeProcess information set: NOGPFAULTERRORBOX
        Source: C:\Program Files (x86)\Internet Explorer\ExtExport.exeProcess information set: NOGPFAULTERRORBOX
        Source: C:\Program Files (x86)\Internet Explorer\ExtExport.exeProcess information set: NOGPFAULTERRORBOX
        Source: C:\Program Files (x86)\Internet Explorer\ExtExport.exeProcess information set: NOGPFAULTERRORBOX
        Source: C:\Program Files (x86)\Internet Explorer\ExtExport.exeProcess information set: NOGPFAULTERRORBOX
        Source: C:\Program Files (x86)\Internet Explorer\ExtExport.exeProcess information set: NOGPFAULTERRORBOX
        Source: C:\Program Files (x86)\Internet Explorer\ExtExport.exeProcess information set: NOGPFAULTERRORBOX
        Source: C:\Program Files (x86)\Internet Explorer\ExtExport.exeProcess information set: NOGPFAULTERRORBOX
        Source: C:\Program Files (x86)\Internet Explorer\ExtExport.exeProcess information set: NOGPFAULTERRORBOX
        Source: C:\Program Files (x86)\Internet Explorer\ExtExport.exeProcess information set: NOGPFAULTERRORBOX
        Source: C:\Program Files (x86)\Internet Explorer\ExtExport.exeProcess information set: NOGPFAULTERRORBOX
        Source: C:\Program Files (x86)\Internet Explorer\ExtExport.exeProcess information set: NOGPFAULTERRORBOX
        Source: C:\Program Files (x86)\Internet Explorer\ExtExport.exeProcess information set: NOGPFAULTERRORBOX
        Source: C:\Program Files (x86)\Internet Explorer\ExtExport.exeProcess information set: NOGPFAULTERRORBOX
        Source: C:\Program Files (x86)\Internet Explorer\ExtExport.exeProcess information set: NOGPFAULTERRORBOX
        Source: C:\Program Files (x86)\Internet Explorer\ExtExport.exeProcess information set: NOGPFAULTERRORBOX
        Source: C:\Program Files (x86)\Internet Explorer\ExtExport.exeProcess information set: NOGPFAULTERRORBOX
        Source: C:\Program Files (x86)\Internet Explorer\ExtExport.exeProcess information set: NOGPFAULTERRORBOX
        Source: C:\Program Files (x86)\Internet Explorer\ExtExport.exeProcess information set: NOGPFAULTERRORBOX
        Source: C:\Program Files (x86)\Internet Explorer\ExtExport.exeProcess information set: NOGPFAULTERRORBOX
        Source: C:\Program Files (x86)\Internet Explorer\ExtExport.exeProcess information set: NOGPFAULTERRORBOX
        Source: C:\Program Files (x86)\Internet Explorer\ExtExport.exeProcess information set: NOGPFAULTERRORBOX
        Source: C:\Program Files (x86)\Internet Explorer\ExtExport.exeProcess information set: NOGPFAULTERRORBOX
        Source: C:\Program Files (x86)\Internet Explorer\ExtExport.exeProcess information set: NOGPFAULTERRORBOX
        Source: C:\Program Files (x86)\Internet Explorer\ExtExport.exeProcess information set: NOGPFAULTERRORBOX
        Source: C:\Program Files (x86)\Internet Explorer\ExtExport.exeProcess information set: NOGPFAULTERRORBOX
        Source: C:\Program Files (x86)\Internet Explorer\ExtExport.exeProcess information set: NOGPFAULTERRORBOX
        Source: C:\Program Files (x86)\Internet Explorer\ExtExport.exeProcess information set: NOGPFAULTERRORBOX
        Source: C:\Program Files (x86)\Internet Explorer\ExtExport.exeProcess information set: NOGPFAULTERRORBOX
        Source: C:\Program Files (x86)\Internet Explorer\ExtExport.exeProcess information set: NOGPFAULTERRORBOX
        Source: C:\Program Files (x86)\Internet Explorer\ExtExport.exeProcess information set: NOGPFAULTERRORBOX
        Source: C:\Program Files (x86)\Internet Explorer\ExtExport.exeProcess information set: NOGPFAULTERRORBOX
        Source: C:\Program Files (x86)\Internet Explorer\ExtExport.exeProcess information set: NOGPFAULTERRORBOX
        Source: C:\Program Files (x86)\Internet Explorer\ExtExport.exeProcess information set: NOGPFAULTERRORBOX
        Source: C:\Program Files (x86)\Internet Explorer\ExtExport.exeProcess information set: NOGPFAULTERRORBOX
        Source: C:\Program Files (x86)\Internet Explorer\ExtExport.exeProcess information set: NOGPFAULTERRORBOX
        Source: C:\Program Files (x86)\Internet Explorer\ExtExport.exeProcess information set: NOGPFAULTERRORBOX
        Source: C:\Program Files (x86)\Internet Explorer\ExtExport.exeProcess information set: NOGPFAULTERRORBOX
        Source: C:\Program Files (x86)\Internet Explorer\ExtExport.exeProcess information set: NOGPFAULTERRORBOX
        Source: C:\Program Files (x86)\Internet Explorer\ExtExport.exeProcess information set: NOGPFAULTERRORBOX
        Source: C:\Program Files (x86)\Internet Explorer\ExtExport.exeProcess information set: NOGPFAULTERRORBOX
        Source: C:\Program Files (x86)\Internet Explorer\ExtExport.exeProcess information set: NOGPFAULTERRORBOX
        Source: C:\Program Files (x86)\Internet Explorer\ExtExport.exeProcess information set: NOGPFAULTERRORBOX
        Source: C:\Program Files (x86)\Internet Explorer\ExtExport.exeProcess information set: NOGPFAULTERRORBOX
        Source: C:\Program Files (x86)\Internet Explorer\ExtExport.exeProcess information set: NOGPFAULTERRORBOX
        Source: C:\Program Files (x86)\Internet Explorer\ExtExport.exeProcess information set: NOGPFAULTERRORBOX
        Source: C:\Program Files (x86)\Internet Explorer\ExtExport.exeProcess information set: NOGPFAULTERRORBOX
        Source: C:\Program Files (x86)\Internet Explorer\ExtExport.exeProcess information set: NOGPFAULTERRORBOX
        Source: C:\Program Files (x86)\Internet Explorer\ExtExport.exeProcess information set: NOGPFAULTERRORBOX
        Source: C:\Program Files (x86)\Internet Explorer\ExtExport.exeProcess information set: NOGPFAULTERRORBOX
        Source: C:\Program Files (x86)\Internet Explorer\ExtExport.exeProcess information set: NOGPFAULTERRORBOX
        Source: C:\Program Files (x86)\Internet Explorer\ExtExport.exeProcess information set: NOGPFAULTERRORBOX
        Source: C:\Program Files (x86)\Internet Explorer\ExtExport.exeProcess information set: NOGPFAULTERRORBOX
        Source: C:\Program Files (x86)\Internet Explorer\ExtExport.exeProcess information set: NOGPFAULTERRORBOX
        Source: C:\Program Files (x86)\Internet Explorer\ExtExport.exeProcess information set: NOGPFAULTERRORBOX
        Source: C:\Program Files (x86)\Internet Explorer\ExtExport.exeProcess information set: NOGPFAULTERRORBOX
        Source: C:\Program Files (x86)\Internet Explorer\ExtExport.exeProcess information set: NOGPFAULTERRORBOX
        Source: C:\Program Files (x86)\Internet Explorer\ExtExport.exeProcess information set: NOGPFAULTERRORBOX
        Source: C:\Program Files (x86)\Internet Explorer\ExtExport.exeProcess information set: NOGPFAULTERRORBOX
        Source: C:\Program Files (x86)\Internet Explorer\ExtExport.exeProcess information set: NOGPFAULTERRORBOX
        Source: C:\Program Files (x86)\Internet Explorer\ExtExport.exeProcess information set: NOGPFAULTERRORBOX
        Source: C:\Program Files (x86)\Internet Explorer\ExtExport.exeProcess information set: NOGPFAULTERRORBOX
        Source: C:\Program Files (x86)\Internet Explorer\ExtExport.exeProcess information set: NOGPFAULTERRORBOX
        Source: C:\Program Files (x86)\Internet Explorer\ExtExport.exeProcess information set: NOGPFAULTERRORBOX
        Source: C:\Program Files (x86)\Internet Explorer\ExtExport.exeProcess information set: NOGPFAULTERRORBOX
        Source: C:\Program Files (x86)\Internet Explorer\ExtExport.exeProcess information set: NOGPFAULTERRORBOX
        Source: C:\Program Files (x86)\Internet Explorer\ExtExport.exeProcess information set: NOGPFAULTERRORBOX
        Source: C:\Program Files (x86)\Internet Explorer\ExtExport.exeProcess information set: NOGPFAULTERRORBOX
        Source: C:\Program Files (x86)\Internet Explorer\ExtExport.exeProcess information set: NOGPFAULTERRORBOX
        Source: C:\Program Files (x86)\Internet Explorer\ExtExport.exeProcess information set: NOGPFAULTERRORBOX
        Source: C:\Program Files (x86)\Internet Explorer\ExtExport.exeProcess information set: NOGPFAULTERRORBOX
        Source: C:\Program Files (x86)\Internet Explorer\ExtExport.exeProcess information set: NOGPFAULTERRORBOX
        Source: C:\Program Files (x86)\Internet Explorer\ExtExport.exeProcess information set: NOGPFAULTERRORBOX
        Source: C:\Program Files (x86)\Internet Explorer\ExtExport.exeProcess information set: NOGPFAULTERRORBOX
        Source: C:\Program Files (x86)\Internet Explorer\ExtExport.exeProcess information set: NOGPFAULTERRORBOX
        Source: C:\Program Files (x86)\Internet Explorer\ExtExport.exeProcess information set: NOGPFAULTERRORBOX
        Source: C:\Program Files (x86)\Internet Explorer\ExtExport.exeProcess information set: NOGPFAULTERRORBOX
        Source: C:\Program Files (x86)\Internet Explorer\ExtExport.exeProcess information set: NOGPFAULTERRORBOX
        Source: C:\Program Files (x86)\Internet Explorer\ExtExport.exeProcess information set: NOGPFAULTERRORBOX
        Source: C:\Program Files (x86)\Internet Explorer\ExtExport.exeProcess information set: NOGPFAULTERRORBOX
        Source: C:\Program Files (x86)\Internet Explorer\ExtExport.exeProcess information set: NOGPFAULTERRORBOX

        Malware Analysis System Evasion

        barindex
        Source: C:\Program Files (x86)\Internet Explorer\ExtExport.exeStalling execution: Execution stalls by calling Sleep
        Source: C:\Users\user\Desktop\documentos DHL.exeFile opened: C:\Program Files\Qemu-ga\qemu-ga.exe
        Source: C:\Users\user\Desktop\documentos DHL.exeFile opened: C:\Program Files\qga\qga.exe
        Source: C:\Program Files (x86)\Internet Explorer\ExtExport.exeFile opened: C:\Program Files\Qemu-ga\qemu-ga.exe
        Source: C:\Program Files (x86)\Internet Explorer\ExtExport.exeFile opened: C:\Program Files\qga\qga.exe
        Source: C:\Users\user\Desktop\documentos DHL.exeDropped PE file which has not been started: C:\Users\user\Zorillinae\Skaalpundet\Inkbslistes\Tset\Demodulationen\Iagttagerposition\libpixbufloader-icns.dllJump to dropped file
        Source: C:\Users\user\Desktop\documentos DHL.exeCode function: 2_2_0337133E rdtsc
        Source: C:\Users\user\Desktop\documentos DHL.exeCode function: 2_2_004066F3 FindFirstFileW,FindClose,
        Source: C:\Users\user\Desktop\documentos DHL.exeCode function: 2_2_00405ABE CloseHandle,DeleteFileW,lstrcatW,lstrcatW,lstrlenW,FindFirstFileW,FindNextFileW,FindClose,
        Source: C:\Users\user\Desktop\documentos DHL.exeCode function: 2_2_00402862 FindFirstFileW,
        Source: C:\Users\user\Desktop\documentos DHL.exeSystem information queried: ModuleInformation
        Source: C:\Users\user\Desktop\documentos DHL.exeAPI call chain: ExitProcess graph end node
        Source: C:\Users\user\Desktop\documentos DHL.exeAPI call chain: ExitProcess graph end node
        Source: C:\Users\user\Desktop\documentos DHL.exeFile opened: C:\Users\user\Zorillinae\Skaalpundet\Inkbslistes\Tset\Demodulationen\Iagttagerposition\Americanly.Unc
        Source: C:\Users\user\Desktop\documentos DHL.exeFile opened: C:\Users\user
        Source: C:\Users\user\Desktop\documentos DHL.exeFile opened: C:\Users\user\Desktop\desktop.ini
        Source: C:\Users\user\Desktop\documentos DHL.exeFile opened: C:\Users\user\AppData\Local\Temp\nsd3BF8.tmp
        Source: C:\Users\user\Desktop\documentos DHL.exeFile opened: C:\Users\user\Desktop\documentos DHL.exe
        Source: C:\Users\user\Desktop\documentos DHL.exeFile opened: C:\Users\user\Zorillinae\Skaalpundet\Inkbslistes\Tset\Demodulationen\Iagttagerposition\Strukturerne.Pom
        Source: documentos DHL.exe, 00000002.00000002.1825655120.0000000010059000.00000004.00000800.00020000.00000000.sdmp, ExtExport.exe, 00000025.00000002.1823268088.0000000004849000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Hyper-V Guest Shutdown Service
        Source: documentos DHL.exe, 00000002.00000002.1825655120.0000000010059000.00000004.00000800.00020000.00000000.sdmp, ExtExport.exe, 00000025.00000002.1823268088.0000000004849000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Hyper-V Remote Desktop Virtualization Service
        Source: ExtExport.exe, 00000025.00000002.1823268088.0000000004849000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: vmicshutdown
        Source: documentos DHL.exe, 00000002.00000002.1825655120.0000000010059000.00000004.00000800.00020000.00000000.sdmp, ExtExport.exe, 00000025.00000002.1823268088.0000000004849000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Hyper-V Volume Shadow Copy Requestor
        Source: documentos DHL.exe, 00000002.00000002.1825655120.0000000010059000.00000004.00000800.00020000.00000000.sdmp, ExtExport.exe, 00000025.00000002.1823268088.0000000004849000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Hyper-V PowerShell Direct Service
        Source: documentos DHL.exe, 00000002.00000002.1825655120.0000000010059000.00000004.00000800.00020000.00000000.sdmp, ExtExport.exe, 00000025.00000002.1823268088.0000000004849000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Hyper-V Time Synchronization Service
        Source: ExtExport.exe, 00000025.00000002.1823268088.0000000004849000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: vmicvss
        Source: ExtExport.exe, 00000025.00000002.1822131908.0000000002DE5000.00000004.00000020.00020000.00000000.sdmp, ExtExport.exe, 00000025.00000002.1821244010.0000000002D78000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
        Source: documentos DHL.exe, 00000002.00000002.1825655120.0000000010059000.00000004.00000800.00020000.00000000.sdmp, ExtExport.exe, 00000025.00000002.1823268088.0000000004849000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Hyper-V Data Exchange Service
        Source: documentos DHL.exe, 00000002.00000002.1825655120.0000000010059000.00000004.00000800.00020000.00000000.sdmp, ExtExport.exe, 00000025.00000002.1823268088.0000000004849000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Hyper-V Heartbeat Service
        Source: documentos DHL.exe, 00000002.00000002.1825655120.0000000010059000.00000004.00000800.00020000.00000000.sdmp, ExtExport.exe, 00000025.00000002.1823268088.0000000004849000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Hyper-V Guest Service Interface
        Source: ExtExport.exe, 00000025.00000002.1823268088.0000000004849000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: vmicheartbeat
        Source: C:\Users\user\Desktop\documentos DHL.exeCode function: 2_2_10001B18 GlobalAlloc,lstrcpyW,lstrcpyW,GlobalFree,GlobalFree,GlobalFree,GlobalFree,GlobalFree,GlobalFree,lstrcpyW,GetModuleHandleW,LoadLibraryW,GetProcAddress,lstrlenW,
        Source: C:\Users\user\Desktop\documentos DHL.exeCode function: 2_2_0337133E rdtsc
        Source: C:\Users\user\Desktop\documentos DHL.exeCode function: 2_2_0337BF0F mov eax, dword ptr fs:[00000030h]
        Source: C:\Users\user\Desktop\documentos DHL.exeCode function: 2_2_03376FEF mov eax, dword ptr fs:[00000030h]
        Source: C:\Users\user\Desktop\documentos DHL.exeCode function: 2_2_0337BBD5 mov eax, dword ptr fs:[00000030h]
        Source: C:\Users\user\Desktop\documentos DHL.exeCode function: 2_2_0337F2D4 mov eax, dword ptr fs:[00000030h]
        Source: C:\Users\user\Desktop\documentos DHL.exeCode function: 2_2_0338F516 mov eax, dword ptr fs:[00000030h]
        Source: C:\Users\user\Desktop\documentos DHL.exeCode function: 2_2_0337BD78 mov ebx, dword ptr fs:[00000030h]
        Source: C:\Users\user\Desktop\documentos DHL.exeCode function: 2_2_0337BD78 mov eax, dword ptr fs:[00000030h]
        Source: C:\Users\user\Desktop\documentos DHL.exeCode function: 2_2_0337BD8C mov ebx, dword ptr fs:[00000030h]
        Source: C:\Users\user\Desktop\documentos DHL.exeCode function: 2_2_0337BD8C mov eax, dword ptr fs:[00000030h]
        Source: C:\Users\user\Desktop\documentos DHL.exeCode function: 2_2_03377038 mov eax, dword ptr fs:[00000030h]
        Source: C:\Users\user\Desktop\documentos DHL.exeCode function: 2_2_03377027 mov eax, dword ptr fs:[00000030h]
        Source: C:\Users\user\Desktop\documentos DHL.exeCode function: 2_2_03391419 mov eax, dword ptr fs:[00000030h]
        Source: C:\Users\user\Desktop\documentos DHL.exeCode function: 2_2_0337BC70 mov eax, dword ptr fs:[00000030h]
        Source: C:\Users\user\Desktop\documentos DHL.exeCode function: 2_2_0337BC4B mov eax, dword ptr fs:[00000030h]
        Source: C:\Users\user\Desktop\documentos DHL.exeCode function: 2_2_0337B4B7 mov eax, dword ptr fs:[00000030h]
        Source: C:\Users\user\Desktop\documentos DHL.exeCode function: 2_2_033770A6 mov eax, dword ptr fs:[00000030h]
        Source: C:\Program Files (x86)\Internet Explorer\ExtExport.exeCode function: 37_2_02A08897 mov eax, dword ptr fs:[00000030h]
        Source: C:\Program Files (x86)\Internet Explorer\ExtExport.exeCode function: 37_2_02A03D68 mov eax, dword ptr fs:[00000030h]
        Source: C:\Program Files (x86)\Internet Explorer\ExtExport.exeCode function: 37_2_02A03CB1 mov eax, dword ptr fs:[00000030h]
        Source: C:\Program Files (x86)\Internet Explorer\ExtExport.exeCode function: 37_2_02A03CE9 mov eax, dword ptr fs:[00000030h]
        Source: C:\Program Files (x86)\Internet Explorer\ExtExport.exeCode function: 37_2_02A03CFA mov eax, dword ptr fs:[00000030h]
        Source: C:\Program Files (x86)\Internet Explorer\ExtExport.exeCode function: 37_2_02A08A3A mov ebx, dword ptr fs:[00000030h]
        Source: C:\Program Files (x86)\Internet Explorer\ExtExport.exeCode function: 37_2_02A08A3A mov eax, dword ptr fs:[00000030h]
        Source: C:\Program Files (x86)\Internet Explorer\ExtExport.exeCode function: 37_2_02A08A4E mov ebx, dword ptr fs:[00000030h]
        Source: C:\Program Files (x86)\Internet Explorer\ExtExport.exeCode function: 37_2_02A08A4E mov eax, dword ptr fs:[00000030h]
        Source: C:\Program Files (x86)\Internet Explorer\ExtExport.exeCode function: 37_2_02A0BF96 mov eax, dword ptr fs:[00000030h]
        Source: C:\Program Files (x86)\Internet Explorer\ExtExport.exeCode function: 37_2_02A08BD1 mov eax, dword ptr fs:[00000030h]
        Source: C:\Program Files (x86)\Internet Explorer\ExtExport.exeCode function: 37_2_02A1C1D8 mov eax, dword ptr fs:[00000030h]
        Source: C:\Program Files (x86)\Internet Explorer\ExtExport.exeCode function: 37_2_02A08932 mov eax, dword ptr fs:[00000030h]
        Source: C:\Program Files (x86)\Internet Explorer\ExtExport.exeCode function: 37_2_02A0890D mov eax, dword ptr fs:[00000030h]
        Source: C:\Program Files (x86)\Internet Explorer\ExtExport.exeCode function: 37_2_02A08179 mov eax, dword ptr fs:[00000030h]
        Source: C:\Users\user\Desktop\documentos DHL.exeProcess queried: DebugPort
        Source: C:\Program Files (x86)\Internet Explorer\ExtExport.exeProcess queried: DebugPort
        Source: C:\Program Files (x86)\Internet Explorer\ExtExport.exeProcess queried: DebugPort
        Source: C:\Users\user\Desktop\documentos DHL.exeCode function: 2_2_0338F535 LdrLoadDll,
        Source: C:\Users\user\Desktop\documentos DHL.exeProcess created: C:\Program Files (x86)\Internet Explorer\ieinstal.exe C:\Users\user\Desktop\documentos DHL.exe
        Source: C:\Users\user\Desktop\documentos DHL.exeProcess created: C:\Program Files (x86)\Internet Explorer\ieinstal.exe C:\Users\user\Desktop\documentos DHL.exe
        Source: C:\Users\user\Desktop\documentos DHL.exeProcess created: C:\Program Files (x86)\Internet Explorer\ieinstal.exe C:\Users\user\Desktop\documentos DHL.exe
        Source: C:\Users\user\Desktop\documentos DHL.exeProcess created: C:\Program Files (x86)\Internet Explorer\ieinstal.exe C:\Users\user\Desktop\documentos DHL.exe
        Source: C:\Users\user\Desktop\documentos DHL.exeProcess created: C:\Program Files (x86)\Internet Explorer\ieinstal.exe C:\Users\user\Desktop\documentos DHL.exe
        Source: C:\Users\user\Desktop\documentos DHL.exeProcess created: C:\Program Files (x86)\Internet Explorer\ieinstal.exe C:\Users\user\Desktop\documentos DHL.exe
        Source: C:\Users\user\Desktop\documentos DHL.exeProcess created: C:\Program Files (x86)\Internet Explorer\ieinstal.exe C:\Users\user\Desktop\documentos DHL.exe
        Source: C:\Users\user\Desktop\documentos DHL.exeProcess created: C:\Program Files (x86)\Internet Explorer\ieinstal.exe C:\Users\user\Desktop\documentos DHL.exe
        Source: C:\Users\user\Desktop\documentos DHL.exeProcess created: C:\Program Files (x86)\Internet Explorer\ieinstal.exe C:\Users\user\Desktop\documentos DHL.exe
        Source: C:\Users\user\Desktop\documentos DHL.exeProcess created: C:\Program Files (x86)\Internet Explorer\ieinstal.exe C:\Users\user\Desktop\documentos DHL.exe
        Source: C:\Users\user\Desktop\documentos DHL.exeProcess created: C:\Program Files (x86)\Internet Explorer\ieinstal.exe C:\Users\user\Desktop\documentos DHL.exe
        Source: C:\Users\user\Desktop\documentos DHL.exeProcess created: C:\Program Files (x86)\Internet Explorer\ielowutil.exe C:\Users\user\Desktop\documentos DHL.exe
        Source: C:\Users\user\Desktop\documentos DHL.exeProcess created: C:\Program Files (x86)\Internet Explorer\ielowutil.exe C:\Users\user\Desktop\documentos DHL.exe
        Source: C:\Users\user\Desktop\documentos DHL.exeProcess created: C:\Program Files (x86)\Internet Explorer\ielowutil.exe C:\Users\user\Desktop\documentos DHL.exe
        Source: C:\Users\user\Desktop\documentos DHL.exeProcess created: C:\Program Files (x86)\Internet Explorer\ielowutil.exe C:\Users\user\Desktop\documentos DHL.exe
        Source: C:\Users\user\Desktop\documentos DHL.exeProcess created: C:\Program Files (x86)\Internet Explorer\ielowutil.exe C:\Users\user\Desktop\documentos DHL.exe
        Source: C:\Users\user\Desktop\documentos DHL.exeProcess created: C:\Program Files (x86)\Internet Explorer\ielowutil.exe C:\Users\user\Desktop\documentos DHL.exe
        Source: C:\Users\user\Desktop\documentos DHL.exeProcess created: C:\Program Files (x86)\Internet Explorer\ielowutil.exe C:\Users\user\Desktop\documentos DHL.exe
        Source: C:\Users\user\Desktop\documentos DHL.exeProcess created: C:\Program Files (x86)\Internet Explorer\ielowutil.exe C:\Users\user\Desktop\documentos DHL.exe
        Source: C:\Users\user\Desktop\documentos DHL.exeProcess created: C:\Program Files (x86)\Internet Explorer\ielowutil.exe C:\Users\user\Desktop\documentos DHL.exe
        Source: C:\Users\user\Desktop\documentos DHL.exeProcess created: C:\Program Files (x86)\Internet Explorer\ielowutil.exe C:\Users\user\Desktop\documentos DHL.exe
        Source: C:\Users\user\Desktop\documentos DHL.exeProcess created: C:\Program Files (x86)\Internet Explorer\ExtExport.exe C:\Users\user\Desktop\documentos DHL.exe
        Source: C:\Program Files (x86)\Internet Explorer\ExtExport.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid
        Source: C:\Users\user\Desktop\documentos DHL.exeCode function: 2_2_00403489 EntryPoint,SetErrorMode,GetVersion,lstrlenA,#17,OleInitialize,SHGetFileInfoW,GetCommandLineW,GetModuleHandleW,CharNextW,GetTempPathW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,GetTempPathW,lstrcatW,SetEnvironmentVariableW,SetEnvironmentVariableW,SetEnvironmentVariableW,DeleteFileW,OleUninitialize,ExitProcess,lstrcatW,lstrcatW,lstrcatW,lstrcmpiW,SetCurrentDirectoryW,DeleteFileW,CopyFileW,CloseHandle,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,

        Stealing of Sensitive Information

        barindex
        Source: C:\Program Files (x86)\Internet Explorer\ExtExport.exeKey opened: HKEY_CURRENT_USER\Software\IncrediMail\Identities
        Source: C:\Program Files (x86)\Internet Explorer\ExtExport.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook
        Source: C:\Program Files (x86)\Internet Explorer\ExtExport.exeKey opened: HKEY_CURRENT_USER\Software\9bis.com\KiTTY\Sessions
        Source: C:\Program Files (x86)\Internet Explorer\ExtExport.exeKey opened: HKEY_CURRENT_USER\Software\Martin Prikryl
        Source: C:\Program Files (x86)\Internet Explorer\ExtExport.exeFile opened: HKEY_CURRENT_USER\Software\Far2\Plugins\FTP\Hosts
        Source: C:\Program Files (x86)\Internet Explorer\ExtExport.exeFile opened: HKEY_CURRENT_USER\Software\NCH Software\ClassicFTP\FTPAccounts
        Source: C:\Program Files (x86)\Internet Explorer\ExtExport.exeFile opened: HKEY_CURRENT_USER\Software\Far\Plugins\FTP\Hosts
        Source: C:\Program Files (x86)\Internet Explorer\ExtExport.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login Data
        Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
        Valid Accounts1
        Native API
        1
        DLL Side-Loading
        1
        Access Token Manipulation
        1
        Masquerading
        2
        OS Credential Dumping
        121
        Security Software Discovery
        Remote Services1
        Email Collection
        Exfiltration Over Other Network Medium11
        Encrypted Channel
        Eavesdrop on Insecure Network CommunicationRemotely Track Device Without Authorization1
        System Shutdown/Reboot
        Default AccountsScheduled Task/JobBoot or Logon Initialization Scripts11
        Process Injection
        11
        Virtualization/Sandbox Evasion
        1
        Credentials in Registry
        11
        Virtualization/Sandbox Evasion
        Remote Desktop Protocol1
        Archive Collected Data
        Exfiltration Over Bluetooth1
        Ingress Tool Transfer
        Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
        Domain AccountsAt (Linux)Logon Script (Windows)1
        DLL Side-Loading
        1
        Access Token Manipulation
        Security Account Manager4
        File and Directory Discovery
        SMB/Windows Admin Shares2
        Data from Local System
        Automated Exfiltration2
        Non-Application Layer Protocol
        Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
        Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)11
        Process Injection
        NTDS6
        System Information Discovery
        Distributed Component Object Model1
        Clipboard Data
        Scheduled Transfer13
        Application Layer Protocol
        SIM Card SwapCarrier Billing Fraud
        Cloud AccountsCronNetwork Logon ScriptNetwork Logon Script1
        Obfuscated Files or Information
        LSA SecretsRemote System DiscoverySSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
        Replication Through Removable MediaLaunchdRc.commonRc.common1
        DLL Side-Loading
        Cached Domain CredentialsSystem Owner/User DiscoveryVNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
        Hide Legend

        Legend:

        • Process
        • Signature
        • Created File
        • DNS/IP Info
        • Is Dropped
        • Is Windows Process
        • Number of created Registry Values
        • Number of created Files
        • Visual Basic
        • Delphi
        • Java
        • .Net C# or VB.NET
        • C, C++ or other language
        • Is malicious
        • Internet

        This section contains all screenshots as thumbnails, including those not shown in the slideshow.


        windows-stand
        SourceDetectionScannerLabelLink
        documentos DHL.exe18%ReversingLabsWin32.Downloader.Minix
        SourceDetectionScannerLabelLink
        C:\Users\user\AppData\Local\Temp\nsw5DC6.tmp\System.dll0%ReversingLabs
        C:\Users\user\AppData\Local\Temp\nsw5DC6.tmp\System.dll1%VirustotalBrowse
        C:\Users\user\Zorillinae\Skaalpundet\Inkbslistes\Tset\Demodulationen\Iagttagerposition\libpixbufloader-icns.dll0%ReversingLabs
        C:\Users\user\Zorillinae\Skaalpundet\Inkbslistes\Tset\Demodulationen\Iagttagerposition\libpixbufloader-icns.dll0%VirustotalBrowse
        No Antivirus matches
        No Antivirus matches
        SourceDetectionScannerLabelLink
        https://csp.withgoogle.com/csp/report-to/DriveUntrustedContentHttp/external0%Avira URL Cloudsafe
        https://csp.withgoogle.com/csp/report-to/DriveUntrustedContentHttp/external0%VirustotalBrowse
        NameIPActiveMaliciousAntivirus DetectionReputation
        drive.google.com
        142.250.74.206
        truefalse
          high
          googlehosted.l.googleusercontent.com
          142.250.186.65
          truefalse
            high
            doc-04-90-docs.googleusercontent.com
            unknown
            unknownfalse
              high
              NameMaliciousAntivirus DetectionReputation
              https://doc-04-90-docs.googleusercontent.com/docs/securesc/ha0ro937gcuc7l7deffksulhg5h7mbp1/cus72g9uti9p4sqam1k45t4h3de3hhkd/1669658550000/01268323115933183181/*/1lmBjkmJX2WixZUvaKmoyB8cex-DCePE2?e=download&uuid=e0f4c7f4-041c-4571-801a-cda7ca0f1ae2false
                high
                NameSourceMaliciousAntivirus DetectionReputation
                https://doc-04-90-docs.googleusercontent.com/docs/securesc/ha0ro937gcuc7l7deffksulhg5h7mbp1/cus72g9uExtExport.exe, 00000025.00000002.1822822611.0000000002E46000.00000004.00000020.00020000.00000000.sdmp, ExtExport.exe, 00000025.00000003.1809581126.0000000002E0A000.00000004.00000020.00020000.00000000.sdmp, ExtExport.exe, 00000025.00000003.1802976587.0000000002E0A000.00000004.00000020.00020000.00000000.sdmp, ExtExport.exe, 00000025.00000002.1821975252.0000000002DD7000.00000004.00000020.00020000.00000000.sdmp, ExtExport.exe, 00000025.00000003.1803583412.0000000002E0A000.00000004.00000020.00020000.00000000.sdmpfalse
                  high
                  http://nsis.sf.net/NSIS_ErrorErrordocumentos DHL.exefalse
                    high
                    https://doc-04-90-docs.googleusercontent.com/ExtExport.exe, 00000025.00000003.1809581126.0000000002E0A000.00000004.00000020.00020000.00000000.sdmp, ExtExport.exe, 00000025.00000002.1822393701.0000000002E0A000.00000004.00000020.00020000.00000000.sdmpfalse
                      high
                      https://doc-04-90-docs.googleusercontent.com/:ExtExport.exe, 00000025.00000003.1809581126.0000000002E0A000.00000004.00000020.00020000.00000000.sdmpfalse
                        high
                        https://drive.google.com/ExtExport.exe, 00000025.00000002.1821244010.0000000002D78000.00000004.00000020.00020000.00000000.sdmpfalse
                          high
                          https://drive.google.com/dExtExport.exe, 00000025.00000002.1821244010.0000000002D78000.00000004.00000020.00020000.00000000.sdmpfalse
                            high
                            https://doc-04-90-docs.googleusercontent.com/=ExtExport.exe, 00000025.00000003.1809581126.0000000002E0A000.00000004.00000020.00020000.00000000.sdmp, ExtExport.exe, 00000025.00000002.1822393701.0000000002E0A000.00000004.00000020.00020000.00000000.sdmpfalse
                              high
                              https://csp.withgoogle.com/csp/report-to/DriveUntrustedContentHttp/externalExtExport.exe, 00000025.00000003.1802976587.0000000002E0A000.00000004.00000020.00020000.00000000.sdmp, ExtExport.exe, 00000025.00000003.1803583412.0000000002E0A000.00000004.00000020.00020000.00000000.sdmpfalse
                              • 0%, Virustotal, Browse
                              • Avira URL Cloud: safe
                              unknown
                              • No. of IPs < 25%
                              • 25% < No. of IPs < 50%
                              • 50% < No. of IPs < 75%
                              • 75% < No. of IPs
                              IPDomainCountryFlagASNASN NameMalicious
                              142.250.74.206
                              drive.google.comUnited States
                              15169GOOGLEUSfalse
                              142.250.186.65
                              googlehosted.l.googleusercontent.comUnited States
                              15169GOOGLEUSfalse
                              Joe Sandbox Version:36.0.0 Rainbow Opal
                              Analysis ID:755464
                              Start date and time:2022-11-28 19:00:32 +01:00
                              Joe Sandbox Product:CloudBasic
                              Overall analysis duration:0h 13m 32s
                              Hypervisor based Inspection enabled:false
                              Report type:light
                              Sample file name:documentos DHL.exe
                              Cookbook file name:default.jbs
                              Analysis system description:Windows 10 64 bit 20H2 Native physical Machine for testing VM-aware malware (Office 2019, IE 11, Chrome 93, Firefox 91, Adobe Reader DC 21, Java 8 Update 301
                              Run name:Suspected Instruction Hammering
                              Number of analysed new started processes analysed:40
                              Number of new started drivers analysed:0
                              Number of existing processes analysed:0
                              Number of existing drivers analysed:0
                              Number of injected processes analysed:0
                              Technologies:
                              • HCA enabled
                              • EGA enabled
                              • HDC enabled
                              • AMSI enabled
                              Analysis Mode:default
                              Analysis stop reason:Timeout
                              Detection:MAL
                              Classification:mal88.troj.spyw.evad.winEXE@45/6@2/2
                              EGA Information:
                              • Successful, ratio: 100%
                              HDC Information:
                              • Successful, ratio: 21.5% (good quality ratio 21.1%)
                              • Quality average: 88.5%
                              • Quality standard deviation: 21.7%
                              HCA Information:
                              • Successful, ratio: 97%
                              • Number of executed functions: 0
                              • Number of non-executed functions: 0
                              Cookbook Comments:
                              • Found application associated with file extension: .exe
                              • Sleeps bigger than 100000000ms are automatically reduced to 1000ms
                              • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, SIHClient.exe, backgroundTaskHost.exe, SgrmBroker.exe, MoUsoCoreWorker.exe, svchost.exe
                              • TCP Packets have been reduced to 100
                              • Excluded domains from analysis (whitelisted): spclient.wg.spotify.com, wdcpalt.microsoft.com, client.wns.windows.com, login.live.com, slscr.update.microsoft.com, ctldl.windowsupdate.com, settings-win.data.microsoft.com, wdcp.microsoft.com, fe3cr.delivery.mp.microsoft.com
                              • Report size exceeded maximum capacity and may have missing behavior information.
                              • Report size getting too big, too many NtCreateFile calls found.
                              • Report size getting too big, too many NtOpenFile calls found.
                              • Report size getting too big, too many NtOpenKeyEx calls found.
                              • Report size getting too big, too many NtProtectVirtualMemory calls found.
                              • Report size getting too big, too many NtQueryAttributesFile calls found.
                              • Report size getting too big, too many NtQueryValueKey calls found.
                              • Report size getting too big, too many NtSetInformationFile calls found.
                              No simulations
                              No context
                              No context
                              No context
                              No context
                              No context
                              Process:C:\Users\user\Desktop\documentos DHL.exe
                              File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                              Category:dropped
                              Size (bytes):11776
                              Entropy (8bit):5.659384359264642
                              Encrypted:false
                              SSDEEP:192:ex24sihno00Wfl97nH6BenXwWobpWBTtvShJ5omi7dJWjOlESlS:h8QIl972eXqlWBFSt273YOlEz
                              MD5:8B3830B9DBF87F84DDD3B26645FED3A0
                              SHA1:223BEF1F19E644A610A0877D01EADC9E28299509
                              SHA-256:F004C568D305CD95EDBD704166FCD2849D395B595DFF814BCC2012693527AC37
                              SHA-512:D13CFD98DB5CA8DC9C15723EEE0E7454975078A776BCE26247228BE4603A0217E166058EBADC68090AFE988862B7514CB8CB84DE13B3DE35737412A6F0A8AC03
                              Malicious:false
                              Antivirus:
                              • Antivirus: ReversingLabs, Detection: 0%
                              • Antivirus: Virustotal, Detection: 1%, Browse
                              Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......1...u.u.u...s.u.a....r.!..q....t....t.Richu.........................PE..L.....uY...........!..... ...........'.......0...............................`.......................................2.......0..P............................P.......................................................0..X............................text............ .................. ..`.rdata..S....0.......$..............@..@.data...x....@.......(..............@....reloc..`....P.......*..............@..B................................................................................................................................................................................................................................................................................................................................................................................
                              Process:C:\Program Files (x86)\Internet Explorer\ExtExport.exe
                              File Type:data
                              Category:dropped
                              Size (bytes):47
                              Entropy (8bit):1.1262763721961973
                              Encrypted:false
                              SSDEEP:3:/lSllIEXln:AWE1
                              MD5:D69FB7CE74DAC48982B69816C3772E4E
                              SHA1:B1C04CDB2567DC2B50D903B0E1D0D3211191E065
                              SHA-256:8CC6CA5CA4D0FA03842A60D90A6141F0B8D64969E830FC899DBA60ACB4905396
                              SHA-512:7E4EC58DA8335E43A4542E0F6E05FA2D15393E83634BE973AA3E758A870577BA0BA136F6E831907C4B30D587B8E6EEAFA2A4B8142F49714101BA50ECC294DDB0
                              Malicious:false
                              Preview:........................................user.
                              Process:C:\Users\user\Desktop\documentos DHL.exe
                              File Type:ASCII text, with very long lines (41286), with no line terminators
                              Category:dropped
                              Size (bytes):41286
                              Entropy (8bit):3.9996729388074086
                              Encrypted:false
                              SSDEEP:768:7QFBt4/f3V9yKs85GMDkPo5jwtKrqfKOrd/t1GfhfzAa08RtCdIc:7QGf3V1siGM/5jEKrqyOrdl+hrZRQr
                              MD5:9B8C8C90EE802C398079F4AF57961D8B
                              SHA1:644AA417B2BC3B61BC2966CB4F732304B6229655
                              SHA-256:A0B1E5CAC30130A40C239EB24DC2EEFE148B78310D1A550A580E1EBE0FCEEE74
                              SHA-512:7640ACDF2F4B38E18FC7F633BEA98FFAA7CC5137CCDBEB108529F2C92027A3241CEF942FA511A5E028E056FF2F97779886C7F8CBD69CE31D6C31D951CDB60EF2
                              Malicious:false
                              Preview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
                              Process:C:\Users\user\Desktop\documentos DHL.exe
                              File Type:OpenPGP Public Key
                              Category:dropped
                              Size (bytes):158847
                              Entropy (8bit):6.98796457235067
                              Encrypted:false
                              SSDEEP:3072:tGYqJRr8sNY/ryIAYmvZ535mkL9bebIbws3CMppUy3V:FqJRr8UY/Bgvr35mkJ0Y9l
                              MD5:7C98821952212D7D1554D45AF77DED1E
                              SHA1:41DBCCEFDC520F60122AF9A6FEBDF452AC65DE10
                              SHA-256:387C91D05A65764ED93EB897E5D68465E251811A5D09EAB2EA23BB7F26740A8E
                              SHA-512:0E8B46122DEE44C2BE98A747A4F508FD8E2E41631D68C361D95AB701ECDB2C2D18923E7047DA6A74E93B0B43C6F553FD61FC1AF452D2404C259346D68431D12E
                              Malicious:false
                              Preview:........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                              Process:C:\Users\user\Desktop\documentos DHL.exe
                              File Type:PE32+ executable (DLL) (console) x86-64 (stripped to external PDB), for MS Windows
                              Category:dropped
                              Size (bytes):19856
                              Entropy (8bit):4.96426410091434
                              Encrypted:false
                              SSDEEP:384:GNe90VEZnTALI8BHHJOpA6nHPrrNUgNGcRr:Gg90WAI8BnJ1KTRr
                              MD5:7DEA5DAB23582505C0EB671EF816C927
                              SHA1:CBB8443E8511DF1A6CDBD5AB6D1A8982B881B52E
                              SHA-256:C655C545DE5F07D85F588599043D8429CC7682FFA9E1DC55FD5275308ABCA20E
                              SHA-512:BA054DF0AEDB086F2300AE5E3E2BB705256BFDDFC6BD24D37638A502B6B37150C6FCA1ACF28237B8BCCB95EE2D87633539E60D813EFC9C7C5EE49E36249B6361
                              Malicious:false
                              Antivirus:
                              • Antivirus: ReversingLabs, Detection: 0%
                              • Antivirus: Virustotal, Detection: 0%, Browse
                              Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..d........D..>.....&"...%.....@......P................................................P....`... .........................................k....................P..................h............................B..(...................0................................text...(...........................`..`.data........0......."..............@....rdata.......@.......$..............@..@.pdata.......P.......,..............@..@.xdata.......`.......0..............@..@.bss.........p...........................edata..k............2..............@..@.idata...............4..............@....CRT....X............>..............@....tls.................@..............@....reloc..h............B..............@..B........................................................................................................................................................................
                              Process:C:\Users\user\Desktop\documentos DHL.exe
                              File Type:ASCII text, with CRLF line terminators
                              Category:modified
                              Size (bytes):34
                              Entropy (8bit):4.253212018409155
                              Encrypted:false
                              SSDEEP:3:uyI6sJQ7n:uyeC7n
                              MD5:7A4C132CE54889252F5A733BBC39C097
                              SHA1:B235DE8CA2A3E8667B283AED77E3518C21925BE0
                              SHA-256:FF5E7709D11246A22FD9D7532BD01A7E2BF640713521E9B5539C9B38D09A9433
                              SHA-512:C9EFBD99C4C3930AD311DD761952902E93D38AC988BFC3959CE490B41B475E167AF865C63922606D7A7A0A79DFA44C348215356602E6E6AA4241FA033AA2C75A
                              Malicious:false
                              Preview:[Reproached222]..teenie=Firklang..
                              File type:PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
                              Entropy (8bit):6.448537030186477
                              TrID:
                              • Win32 Executable (generic) a (10002005/4) 99.96%
                              • Generic Win/DOS Executable (2004/3) 0.02%
                              • DOS Executable Generic (2002/1) 0.02%
                              • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                              File name:documentos DHL.exe
                              File size:339276
                              MD5:ca1cd0656568af4f58aa28e61a3e3edb
                              SHA1:1fde05eb6e587047d8a47950bcb2efdb53409b42
                              SHA256:6931d5a8ac6e00c855139d9da394b7895d83a9a18a8974c0b2381c5a28e68678
                              SHA512:bfd4b3dfe4a78d2e1a4c94a78c633ba5dcef7ad9abe209fce6dbe123538b3bdbcf9c5e2de4a35d24237a663188ed6475810f9f686b9429f782bb16a819febc7a
                              SSDEEP:6144:YIw3Q/Id1TZuGuUbWNTarTP6oJgZqI5wyqYVyQH:TQPYG/WZaXP6oN2wJ27
                              TLSH:7974C0462360D13BFDBE0770B82710937995AC1675BCC0AAF29CB69D67F31620B2A771
                              File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........1...Pf..Pf..Pf.*_9..Pf..Pg.LPf.*_;..Pf..sV..Pf..V`..Pf.Rich.Pf.........................PE..L.....uY.................d...*.....
                              Icon Hash:8660f0e68af8388d
                              Entrypoint:0x403489
                              Entrypoint Section:.text
                              Digitally signed:false
                              Imagebase:0x400000
                              Subsystem:windows gui
                              Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
                              DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                              Time Stamp:0x5975952E [Mon Jul 24 06:35:26 2017 UTC]
                              TLS Callbacks:
                              CLR (.Net) Version:
                              OS Version Major:4
                              OS Version Minor:0
                              File Version Major:4
                              File Version Minor:0
                              Subsystem Version Major:4
                              Subsystem Version Minor:0
                              Import Hash:1f23f452093b5c1ff091a2f9fb4fa3e9
                              Instruction
                              sub esp, 000002D4h
                              push ebx
                              push esi
                              push edi
                              push 00000020h
                              pop edi
                              xor ebx, ebx
                              push 00008001h
                              mov dword ptr [esp+14h], ebx
                              mov dword ptr [esp+10h], 0040A230h
                              mov dword ptr [esp+1Ch], ebx
                              call dword ptr [004080ACh]
                              call dword ptr [004080A8h]
                              and eax, BFFFFFFFh
                              cmp ax, 00000006h
                              mov dword ptr [0042A24Ch], eax
                              je 00007F7CDCCE8193h
                              push ebx
                              call 00007F7CDCCEB441h
                              cmp eax, ebx
                              je 00007F7CDCCE8189h
                              push 00000C00h
                              call eax
                              mov esi, 004082B0h
                              push esi
                              call 00007F7CDCCEB3BBh
                              push esi
                              call dword ptr [00408150h]
                              lea esi, dword ptr [esi+eax+01h]
                              cmp byte ptr [esi], 00000000h
                              jne 00007F7CDCCE816Ch
                              push 0000000Ah
                              call 00007F7CDCCEB414h
                              push 00000008h
                              call 00007F7CDCCEB40Dh
                              push 00000006h
                              mov dword ptr [0042A244h], eax
                              call 00007F7CDCCEB401h
                              cmp eax, ebx
                              je 00007F7CDCCE8191h
                              push 0000001Eh
                              call eax
                              test eax, eax
                              je 00007F7CDCCE8189h
                              or byte ptr [0042A24Fh], 00000040h
                              push ebp
                              call dword ptr [00408044h]
                              push ebx
                              call dword ptr [004082A0h]
                              mov dword ptr [0042A318h], eax
                              push ebx
                              lea eax, dword ptr [esp+34h]
                              push 000002B4h
                              push eax
                              push ebx
                              push 004216E8h
                              call dword ptr [00408188h]
                              push 0040A384h
                              Programming Language:
                              • [EXP] VC++ 6.0 SP5 build 8804
                              NameVirtual AddressVirtual Size Is in Section
                              IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                              IMAGE_DIRECTORY_ENTRY_IMPORT0x84fc0xa0.rdata
                              IMAGE_DIRECTORY_ENTRY_RESOURCE0x5e0000x28868.rsrc
                              IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                              IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                              IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                              IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                              IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                              IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                              IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                              IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                              IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                              IMAGE_DIRECTORY_ENTRY_IAT0x80000x2b0.rdata
                              IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                              IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                              IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                              NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                              .text0x10000x63d10x6400False0.66515625data6.479451209065IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                              .rdata0x80000x138e0x1400False0.45data5.143831732151552IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                              .data0xa0000x203580x600False0.501953125data4.000739070159718IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                              .ndata0x2b0000x330000x0False0empty0.0IMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                              .rsrc0x5e0000x288680x28a00False0.28479567307692305data4.106888119561181IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                              NameRVASizeTypeLanguageCountry
                              RT_BITMAP0x5e3b80x368Device independent bitmap graphic, 96 x 16 x 4, image size 768EnglishUnited States
                              RT_ICON0x5e7200x10828Device independent bitmap graphic, 128 x 256 x 32, image size 67584EnglishUnited States
                              RT_ICON0x6ef480x94a8Device independent bitmap graphic, 96 x 192 x 32, image size 38016EnglishUnited States
                              RT_ICON0x783f00x5488Device independent bitmap graphic, 72 x 144 x 32, image size 21600EnglishUnited States
                              RT_ICON0x7d8780x4228Device independent bitmap graphic, 64 x 128 x 32, image size 16896EnglishUnited States
                              RT_ICON0x81aa00x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 9600EnglishUnited States
                              RT_ICON0x840480x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 4224EnglishUnited States
                              RT_ICON0x850f00x988Device independent bitmap graphic, 24 x 48 x 32, image size 2400EnglishUnited States
                              RT_ICON0x85a780x468Device independent bitmap graphic, 16 x 32 x 32, image size 1088EnglishUnited States
                              RT_DIALOG0x85ee00x144dataEnglishUnited States
                              RT_DIALOG0x860280x13cdataEnglishUnited States
                              RT_DIALOG0x861680x100dataEnglishUnited States
                              RT_DIALOG0x862680x11cdataEnglishUnited States
                              RT_DIALOG0x863880xc4dataEnglishUnited States
                              RT_DIALOG0x864500x60dataEnglishUnited States
                              RT_GROUP_ICON0x864b00x76dataEnglishUnited States
                              RT_MANIFEST0x865280x33eXML 1.0 document, ASCII text, with very long lines (830), with no line terminatorsEnglishUnited States
                              DLLImport
                              KERNEL32.dllExitProcess, SetFileAttributesW, Sleep, GetTickCount, CreateFileW, GetFileSize, GetModuleFileNameW, GetCurrentProcess, SetCurrentDirectoryW, GetFileAttributesW, SetEnvironmentVariableW, GetWindowsDirectoryW, GetTempPathW, GetCommandLineW, GetVersion, SetErrorMode, lstrlenW, lstrcpynW, CopyFileW, GetShortPathNameW, GlobalLock, CreateThread, GetLastError, CreateDirectoryW, CreateProcessW, RemoveDirectoryW, lstrcmpiA, GetTempFileNameW, WriteFile, lstrcpyA, MoveFileExW, lstrcatW, GetSystemDirectoryW, GetProcAddress, GetModuleHandleA, GetExitCodeProcess, WaitForSingleObject, lstrcmpiW, MoveFileW, GetFullPathNameW, SetFileTime, SearchPathW, CompareFileTime, lstrcmpW, CloseHandle, ExpandEnvironmentStringsW, GlobalFree, GlobalUnlock, GetDiskFreeSpaceW, GlobalAlloc, FindFirstFileW, FindNextFileW, DeleteFileW, SetFilePointer, ReadFile, FindClose, lstrlenA, MulDiv, MultiByteToWideChar, WideCharToMultiByte, GetPrivateProfileStringW, WritePrivateProfileStringW, FreeLibrary, LoadLibraryExW, GetModuleHandleW
                              USER32.dllGetSystemMenu, SetClassLongW, EnableMenuItem, IsWindowEnabled, SetWindowPos, GetSysColor, GetWindowLongW, SetCursor, LoadCursorW, CheckDlgButton, GetMessagePos, LoadBitmapW, CallWindowProcW, IsWindowVisible, CloseClipboard, SetClipboardData, EmptyClipboard, OpenClipboard, ScreenToClient, GetWindowRect, GetDlgItem, GetSystemMetrics, SetDlgItemTextW, GetDlgItemTextW, MessageBoxIndirectW, CharPrevW, CharNextA, wsprintfA, DispatchMessageW, PeekMessageW, ReleaseDC, EnableWindow, InvalidateRect, SendMessageW, DefWindowProcW, BeginPaint, GetClientRect, FillRect, DrawTextW, EndDialog, RegisterClassW, SystemParametersInfoW, CreateWindowExW, GetClassInfoW, DialogBoxParamW, CharNextW, ExitWindowsEx, DestroyWindow, GetDC, SetTimer, SetWindowTextW, LoadImageW, SetForegroundWindow, ShowWindow, IsWindow, SetWindowLongW, FindWindowExW, TrackPopupMenu, AppendMenuW, CreatePopupMenu, EndPaint, CreateDialogParamW, SendMessageTimeoutW, wsprintfW, PostQuitMessage
                              GDI32.dllSelectObject, SetBkMode, CreateFontIndirectW, SetTextColor, DeleteObject, GetDeviceCaps, CreateBrushIndirect, SetBkColor
                              SHELL32.dllSHGetSpecialFolderLocation, ShellExecuteExW, SHGetPathFromIDListW, SHBrowseForFolderW, SHGetFileInfoW, SHFileOperationW
                              ADVAPI32.dllAdjustTokenPrivileges, RegCreateKeyExW, RegOpenKeyExW, SetFileSecurityW, OpenProcessToken, LookupPrivilegeValueW, RegEnumValueW, RegDeleteKeyW, RegDeleteValueW, RegCloseKey, RegSetValueExW, RegQueryValueExW, RegEnumKeyW
                              COMCTL32.dllImageList_Create, ImageList_AddMasked, ImageList_Destroy
                              ole32.dllOleUninitialize, OleInitialize, CoTaskMemFree, CoCreateInstance
                              Language of compilation systemCountry where language is spokenMap
                              EnglishUnited States
                              TimestampSource PortDest PortSource IPDest IP
                              Nov 28, 2022 19:03:18.615021944 CET49802443192.168.11.20142.250.74.206
                              Nov 28, 2022 19:03:18.615070105 CET44349802142.250.74.206192.168.11.20
                              Nov 28, 2022 19:03:18.615206957 CET49802443192.168.11.20142.250.74.206
                              Nov 28, 2022 19:03:18.639564991 CET49802443192.168.11.20142.250.74.206
                              Nov 28, 2022 19:03:18.639585018 CET44349802142.250.74.206192.168.11.20
                              Nov 28, 2022 19:03:18.677011967 CET44349802142.250.74.206192.168.11.20
                              Nov 28, 2022 19:03:18.677251101 CET49802443192.168.11.20142.250.74.206
                              Nov 28, 2022 19:03:18.677993059 CET44349802142.250.74.206192.168.11.20
                              Nov 28, 2022 19:03:18.678250074 CET49802443192.168.11.20142.250.74.206
                              Nov 28, 2022 19:03:18.913369894 CET49802443192.168.11.20142.250.74.206
                              Nov 28, 2022 19:03:18.913429976 CET44349802142.250.74.206192.168.11.20
                              Nov 28, 2022 19:03:18.914542913 CET44349802142.250.74.206192.168.11.20
                              Nov 28, 2022 19:03:18.914834023 CET49802443192.168.11.20142.250.74.206
                              Nov 28, 2022 19:03:18.933219910 CET49802443192.168.11.20142.250.74.206
                              Nov 28, 2022 19:03:18.980402946 CET44349802142.250.74.206192.168.11.20
                              Nov 28, 2022 19:03:19.381166935 CET44349802142.250.74.206192.168.11.20
                              Nov 28, 2022 19:03:19.381335974 CET49802443192.168.11.20142.250.74.206
                              Nov 28, 2022 19:03:19.381417036 CET44349802142.250.74.206192.168.11.20
                              Nov 28, 2022 19:03:19.381680965 CET49802443192.168.11.20142.250.74.206
                              Nov 28, 2022 19:03:19.381733894 CET49802443192.168.11.20142.250.74.206
                              Nov 28, 2022 19:03:19.381897926 CET44349802142.250.74.206192.168.11.20
                              Nov 28, 2022 19:03:19.382034063 CET49802443192.168.11.20142.250.74.206
                              Nov 28, 2022 19:03:19.382050991 CET44349802142.250.74.206192.168.11.20
                              Nov 28, 2022 19:03:19.382185936 CET49802443192.168.11.20142.250.74.206
                              Nov 28, 2022 19:03:19.544370890 CET49803443192.168.11.20142.250.186.65
                              Nov 28, 2022 19:03:19.544482946 CET44349803142.250.186.65192.168.11.20
                              Nov 28, 2022 19:03:19.544661045 CET49803443192.168.11.20142.250.186.65
                              Nov 28, 2022 19:03:19.545027018 CET49803443192.168.11.20142.250.186.65
                              Nov 28, 2022 19:03:19.545068026 CET44349803142.250.186.65192.168.11.20
                              Nov 28, 2022 19:03:19.601592064 CET44349803142.250.186.65192.168.11.20
                              Nov 28, 2022 19:03:19.601780891 CET49803443192.168.11.20142.250.186.65
                              Nov 28, 2022 19:03:19.601839066 CET49803443192.168.11.20142.250.186.65
                              Nov 28, 2022 19:03:19.602772951 CET44349803142.250.186.65192.168.11.20
                              Nov 28, 2022 19:03:19.603266001 CET49803443192.168.11.20142.250.186.65
                              Nov 28, 2022 19:03:19.606729031 CET49803443192.168.11.20142.250.186.65
                              Nov 28, 2022 19:03:19.606743097 CET44349803142.250.186.65192.168.11.20
                              Nov 28, 2022 19:03:19.607040882 CET44349803142.250.186.65192.168.11.20
                              Nov 28, 2022 19:03:19.607247114 CET49803443192.168.11.20142.250.186.65
                              Nov 28, 2022 19:03:19.607765913 CET49803443192.168.11.20142.250.186.65
                              Nov 28, 2022 19:03:19.648458004 CET44349803142.250.186.65192.168.11.20
                              Nov 28, 2022 19:03:20.017338037 CET44349803142.250.186.65192.168.11.20
                              Nov 28, 2022 19:03:20.017560959 CET49803443192.168.11.20142.250.186.65
                              Nov 28, 2022 19:03:20.017635107 CET44349803142.250.186.65192.168.11.20
                              Nov 28, 2022 19:03:20.017712116 CET44349803142.250.186.65192.168.11.20
                              Nov 28, 2022 19:03:20.017822981 CET49803443192.168.11.20142.250.186.65
                              Nov 28, 2022 19:03:20.017864943 CET44349803142.250.186.65192.168.11.20
                              Nov 28, 2022 19:03:20.017889977 CET49803443192.168.11.20142.250.186.65
                              Nov 28, 2022 19:03:20.018009901 CET49803443192.168.11.20142.250.186.65
                              Nov 28, 2022 19:03:20.019331932 CET44349803142.250.186.65192.168.11.20
                              Nov 28, 2022 19:03:20.019500017 CET49803443192.168.11.20142.250.186.65
                              Nov 28, 2022 19:03:20.019557953 CET49803443192.168.11.20142.250.186.65
                              Nov 28, 2022 19:03:20.020034075 CET44349803142.250.186.65192.168.11.20
                              Nov 28, 2022 19:03:20.020205021 CET49803443192.168.11.20142.250.186.65
                              Nov 28, 2022 19:03:20.020205975 CET49803443192.168.11.20142.250.186.65
                              Nov 28, 2022 19:03:20.020286083 CET49803443192.168.11.20142.250.186.65
                              Nov 28, 2022 19:03:20.020354033 CET44349803142.250.186.65192.168.11.20
                              Nov 28, 2022 19:03:20.020477057 CET49803443192.168.11.20142.250.186.65
                              Nov 28, 2022 19:03:20.020766973 CET44349803142.250.186.65192.168.11.20
                              Nov 28, 2022 19:03:20.021039963 CET49803443192.168.11.20142.250.186.65
                              Nov 28, 2022 19:03:20.021116972 CET44349803142.250.186.65192.168.11.20
                              Nov 28, 2022 19:03:20.021365881 CET49803443192.168.11.20142.250.186.65
                              Nov 28, 2022 19:03:20.021579981 CET44349803142.250.186.65192.168.11.20
                              Nov 28, 2022 19:03:20.021781921 CET49803443192.168.11.20142.250.186.65
                              Nov 28, 2022 19:03:20.028414011 CET44349803142.250.186.65192.168.11.20
                              Nov 28, 2022 19:03:20.028592110 CET49803443192.168.11.20142.250.186.65
                              Nov 28, 2022 19:03:20.028697968 CET44349803142.250.186.65192.168.11.20
                              Nov 28, 2022 19:03:20.028853893 CET49803443192.168.11.20142.250.186.65
                              Nov 28, 2022 19:03:20.028918028 CET44349803142.250.186.65192.168.11.20
                              Nov 28, 2022 19:03:20.029164076 CET49803443192.168.11.20142.250.186.65
                              Nov 28, 2022 19:03:20.029230118 CET44349803142.250.186.65192.168.11.20
                              Nov 28, 2022 19:03:20.029441118 CET49803443192.168.11.20142.250.186.65
                              Nov 28, 2022 19:03:20.029491901 CET44349803142.250.186.65192.168.11.20
                              Nov 28, 2022 19:03:20.029648066 CET49803443192.168.11.20142.250.186.65
                              Nov 28, 2022 19:03:20.029702902 CET44349803142.250.186.65192.168.11.20
                              Nov 28, 2022 19:03:20.029735088 CET44349803142.250.186.65192.168.11.20
                              Nov 28, 2022 19:03:20.029911041 CET49803443192.168.11.20142.250.186.65
                              Nov 28, 2022 19:03:20.029911995 CET49803443192.168.11.20142.250.186.65
                              Nov 28, 2022 19:03:20.029992104 CET44349803142.250.186.65192.168.11.20
                              Nov 28, 2022 19:03:20.030206919 CET49803443192.168.11.20142.250.186.65
                              Nov 28, 2022 19:03:20.030698061 CET44349803142.250.186.65192.168.11.20
                              Nov 28, 2022 19:03:20.030905962 CET49803443192.168.11.20142.250.186.65
                              Nov 28, 2022 19:03:20.030972958 CET44349803142.250.186.65192.168.11.20
                              Nov 28, 2022 19:03:20.031176090 CET49803443192.168.11.20142.250.186.65
                              Nov 28, 2022 19:03:20.031251907 CET44349803142.250.186.65192.168.11.20
                              Nov 28, 2022 19:03:20.031435966 CET49803443192.168.11.20142.250.186.65
                              Nov 28, 2022 19:03:20.031749964 CET44349803142.250.186.65192.168.11.20
                              Nov 28, 2022 19:03:20.032052040 CET49803443192.168.11.20142.250.186.65
                              Nov 28, 2022 19:03:20.032118082 CET44349803142.250.186.65192.168.11.20
                              Nov 28, 2022 19:03:20.032354116 CET49803443192.168.11.20142.250.186.65
                              Nov 28, 2022 19:03:20.032409906 CET44349803142.250.186.65192.168.11.20
                              Nov 28, 2022 19:03:20.032641888 CET44349803142.250.186.65192.168.11.20
                              Nov 28, 2022 19:03:20.032717943 CET49803443192.168.11.20142.250.186.65
                              Nov 28, 2022 19:03:20.032777071 CET44349803142.250.186.65192.168.11.20
                              Nov 28, 2022 19:03:20.032818079 CET49803443192.168.11.20142.250.186.65
                              Nov 28, 2022 19:03:20.033026934 CET49803443192.168.11.20142.250.186.65
                              Nov 28, 2022 19:03:20.033077002 CET44349803142.250.186.65192.168.11.20
                              Nov 28, 2022 19:03:20.033278942 CET49803443192.168.11.20142.250.186.65
                              Nov 28, 2022 19:03:20.033329010 CET44349803142.250.186.65192.168.11.20
                              Nov 28, 2022 19:03:20.033663034 CET49803443192.168.11.20142.250.186.65
                              Nov 28, 2022 19:03:20.033716917 CET44349803142.250.186.65192.168.11.20
                              TimestampSource PortDest PortSource IPDest IP
                              Nov 28, 2022 19:03:18.583724976 CET5444353192.168.11.201.1.1.1
                              Nov 28, 2022 19:03:18.594630003 CET53544431.1.1.1192.168.11.20
                              Nov 28, 2022 19:03:19.510133982 CET6067253192.168.11.201.1.1.1
                              Nov 28, 2022 19:03:19.541562080 CET53606721.1.1.1192.168.11.20
                              TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                              Nov 28, 2022 19:03:18.583724976 CET192.168.11.201.1.1.10xbc76Standard query (0)drive.google.comA (IP address)IN (0x0001)false
                              Nov 28, 2022 19:03:19.510133982 CET192.168.11.201.1.1.10xa3a7Standard query (0)doc-04-90-docs.googleusercontent.comA (IP address)IN (0x0001)false
                              TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                              Nov 28, 2022 19:03:18.594630003 CET1.1.1.1192.168.11.200xbc76No error (0)drive.google.com142.250.74.206A (IP address)IN (0x0001)false
                              Nov 28, 2022 19:03:19.541562080 CET1.1.1.1192.168.11.200xa3a7No error (0)doc-04-90-docs.googleusercontent.comgooglehosted.l.googleusercontent.comCNAME (Canonical name)IN (0x0001)false
                              Nov 28, 2022 19:03:19.541562080 CET1.1.1.1192.168.11.200xa3a7No error (0)googlehosted.l.googleusercontent.com142.250.186.65A (IP address)IN (0x0001)false
                              • drive.google.com
                              • doc-04-90-docs.googleusercontent.com

                              Click to jump to process

                              Target ID:2
                              Start time:19:02:24
                              Start date:28/11/2022
                              Path:C:\Users\user\Desktop\documentos DHL.exe
                              Wow64 process (32bit):true
                              Commandline:C:\Users\user\Desktop\documentos DHL.exe
                              Imagebase:0x400000
                              File size:339276 bytes
                              MD5 hash:CA1CD0656568AF4F58AA28E61A3E3EDB
                              Has elevated privileges:true
                              Has administrator privileges:true
                              Programmed in:C, C++ or other language
                              Yara matches:
                              • Rule: JoeSecurity_GuLoader_2, Description: Yara detected GuLoader, Source: 00000002.00000002.1824658615.0000000003370000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                              Reputation:low

                              Target ID:16
                              Start time:19:02:53
                              Start date:28/11/2022
                              Path:C:\Program Files (x86)\Internet Explorer\ieinstal.exe
                              Wow64 process (32bit):false
                              Commandline:C:\Users\user\Desktop\documentos DHL.exe
                              Imagebase:0x4b0000
                              File size:480256 bytes
                              MD5 hash:7871873BABCEA94FBA13900B561C7C55
                              Has elevated privileges:true
                              Has administrator privileges:true
                              Programmed in:C, C++ or other language
                              Reputation:moderate

                              Target ID:17
                              Start time:19:02:53
                              Start date:28/11/2022
                              Path:C:\Program Files (x86)\Internet Explorer\ieinstal.exe
                              Wow64 process (32bit):false
                              Commandline:C:\Users\user\Desktop\documentos DHL.exe
                              Imagebase:0x4b0000
                              File size:480256 bytes
                              MD5 hash:7871873BABCEA94FBA13900B561C7C55
                              Has elevated privileges:true
                              Has administrator privileges:true
                              Programmed in:C, C++ or other language
                              Reputation:moderate

                              Target ID:18
                              Start time:19:02:53
                              Start date:28/11/2022
                              Path:C:\Program Files (x86)\Internet Explorer\ieinstal.exe
                              Wow64 process (32bit):false
                              Commandline:C:\Users\user\Desktop\documentos DHL.exe
                              Imagebase:0x4b0000
                              File size:480256 bytes
                              MD5 hash:7871873BABCEA94FBA13900B561C7C55
                              Has elevated privileges:true
                              Has administrator privileges:true
                              Programmed in:C, C++ or other language
                              Reputation:moderate

                              Target ID:19
                              Start time:19:02:54
                              Start date:28/11/2022
                              Path:C:\Program Files (x86)\Internet Explorer\ieinstal.exe
                              Wow64 process (32bit):false
                              Commandline:C:\Users\user\Desktop\documentos DHL.exe
                              Imagebase:0x4b0000
                              File size:480256 bytes
                              MD5 hash:7871873BABCEA94FBA13900B561C7C55
                              Has elevated privileges:true
                              Has administrator privileges:true
                              Programmed in:C, C++ or other language
                              Reputation:moderate

                              Target ID:20
                              Start time:19:02:54
                              Start date:28/11/2022
                              Path:C:\Program Files (x86)\Internet Explorer\ieinstal.exe
                              Wow64 process (32bit):false
                              Commandline:C:\Users\user\Desktop\documentos DHL.exe
                              Imagebase:0x4b0000
                              File size:480256 bytes
                              MD5 hash:7871873BABCEA94FBA13900B561C7C55
                              Has elevated privileges:true
                              Has administrator privileges:true
                              Programmed in:C, C++ or other language
                              Reputation:moderate

                              Target ID:21
                              Start time:19:02:54
                              Start date:28/11/2022
                              Path:C:\Program Files (x86)\Internet Explorer\ieinstal.exe
                              Wow64 process (32bit):false
                              Commandline:C:\Users\user\Desktop\documentos DHL.exe
                              Imagebase:0x4b0000
                              File size:480256 bytes
                              MD5 hash:7871873BABCEA94FBA13900B561C7C55
                              Has elevated privileges:true
                              Has administrator privileges:true
                              Programmed in:C, C++ or other language
                              Reputation:moderate

                              Target ID:22
                              Start time:19:02:55
                              Start date:28/11/2022
                              Path:C:\Program Files (x86)\Internet Explorer\ieinstal.exe
                              Wow64 process (32bit):false
                              Commandline:C:\Users\user\Desktop\documentos DHL.exe
                              Imagebase:0x4b0000
                              File size:480256 bytes
                              MD5 hash:7871873BABCEA94FBA13900B561C7C55
                              Has elevated privileges:true
                              Has administrator privileges:true
                              Programmed in:C, C++ or other language
                              Reputation:moderate

                              Target ID:23
                              Start time:19:02:55
                              Start date:28/11/2022
                              Path:C:\Program Files (x86)\Internet Explorer\ieinstal.exe
                              Wow64 process (32bit):false
                              Commandline:C:\Users\user\Desktop\documentos DHL.exe
                              Imagebase:0x4b0000
                              File size:480256 bytes
                              MD5 hash:7871873BABCEA94FBA13900B561C7C55
                              Has elevated privileges:true
                              Has administrator privileges:true
                              Programmed in:C, C++ or other language

                              Target ID:24
                              Start time:19:02:55
                              Start date:28/11/2022
                              Path:C:\Program Files (x86)\Internet Explorer\ieinstal.exe
                              Wow64 process (32bit):false
                              Commandline:C:\Users\user\Desktop\documentos DHL.exe
                              Imagebase:0x4b0000
                              File size:480256 bytes
                              MD5 hash:7871873BABCEA94FBA13900B561C7C55
                              Has elevated privileges:true
                              Has administrator privileges:true
                              Programmed in:C, C++ or other language

                              Target ID:25
                              Start time:19:02:55
                              Start date:28/11/2022
                              Path:C:\Program Files (x86)\Internet Explorer\ieinstal.exe
                              Wow64 process (32bit):false
                              Commandline:C:\Users\user\Desktop\documentos DHL.exe
                              Imagebase:0x4b0000
                              File size:480256 bytes
                              MD5 hash:7871873BABCEA94FBA13900B561C7C55
                              Has elevated privileges:true
                              Has administrator privileges:true
                              Programmed in:C, C++ or other language

                              Target ID:26
                              Start time:19:02:56
                              Start date:28/11/2022
                              Path:C:\Program Files (x86)\Internet Explorer\ieinstal.exe
                              Wow64 process (32bit):false
                              Commandline:C:\Users\user\Desktop\documentos DHL.exe
                              Imagebase:0x4b0000
                              File size:480256 bytes
                              MD5 hash:7871873BABCEA94FBA13900B561C7C55
                              Has elevated privileges:true
                              Has administrator privileges:true
                              Programmed in:C, C++ or other language

                              Target ID:27
                              Start time:19:02:56
                              Start date:28/11/2022
                              Path:C:\Program Files (x86)\Internet Explorer\ielowutil.exe
                              Wow64 process (32bit):false
                              Commandline:C:\Users\user\Desktop\documentos DHL.exe
                              Imagebase:0x3e0000
                              File size:221696 bytes
                              MD5 hash:650FE7460630188008BF8C8153526CEB
                              Has elevated privileges:true
                              Has administrator privileges:true
                              Programmed in:C, C++ or other language

                              Target ID:28
                              Start time:19:02:56
                              Start date:28/11/2022
                              Path:C:\Program Files (x86)\Internet Explorer\ielowutil.exe
                              Wow64 process (32bit):false
                              Commandline:C:\Users\user\Desktop\documentos DHL.exe
                              Imagebase:0x3e0000
                              File size:221696 bytes
                              MD5 hash:650FE7460630188008BF8C8153526CEB
                              Has elevated privileges:true
                              Has administrator privileges:true
                              Programmed in:C, C++ or other language

                              Target ID:29
                              Start time:19:02:57
                              Start date:28/11/2022
                              Path:C:\Program Files (x86)\Internet Explorer\ielowutil.exe
                              Wow64 process (32bit):false
                              Commandline:C:\Users\user\Desktop\documentos DHL.exe
                              Imagebase:0x3e0000
                              File size:221696 bytes
                              MD5 hash:650FE7460630188008BF8C8153526CEB
                              Has elevated privileges:true
                              Has administrator privileges:true
                              Programmed in:C, C++ or other language

                              Target ID:30
                              Start time:19:02:57
                              Start date:28/11/2022
                              Path:C:\Program Files (x86)\Internet Explorer\ielowutil.exe
                              Wow64 process (32bit):false
                              Commandline:C:\Users\user\Desktop\documentos DHL.exe
                              Imagebase:0x3e0000
                              File size:221696 bytes
                              MD5 hash:650FE7460630188008BF8C8153526CEB
                              Has elevated privileges:true
                              Has administrator privileges:true
                              Programmed in:C, C++ or other language

                              Target ID:31
                              Start time:19:02:57
                              Start date:28/11/2022
                              Path:C:\Program Files (x86)\Internet Explorer\ielowutil.exe
                              Wow64 process (32bit):false
                              Commandline:C:\Users\user\Desktop\documentos DHL.exe
                              Imagebase:0x3e0000
                              File size:221696 bytes
                              MD5 hash:650FE7460630188008BF8C8153526CEB
                              Has elevated privileges:true
                              Has administrator privileges:true
                              Programmed in:C, C++ or other language

                              Target ID:32
                              Start time:19:02:58
                              Start date:28/11/2022
                              Path:C:\Program Files (x86)\Internet Explorer\ielowutil.exe
                              Wow64 process (32bit):false
                              Commandline:C:\Users\user\Desktop\documentos DHL.exe
                              Imagebase:0x3e0000
                              File size:221696 bytes
                              MD5 hash:650FE7460630188008BF8C8153526CEB
                              Has elevated privileges:true
                              Has administrator privileges:true
                              Programmed in:C, C++ or other language

                              Target ID:33
                              Start time:19:02:58
                              Start date:28/11/2022
                              Path:C:\Program Files (x86)\Internet Explorer\ielowutil.exe
                              Wow64 process (32bit):false
                              Commandline:C:\Users\user\Desktop\documentos DHL.exe
                              Imagebase:0x3e0000
                              File size:221696 bytes
                              MD5 hash:650FE7460630188008BF8C8153526CEB
                              Has elevated privileges:true
                              Has administrator privileges:true
                              Programmed in:C, C++ or other language

                              Target ID:34
                              Start time:19:02:58
                              Start date:28/11/2022
                              Path:C:\Program Files (x86)\Internet Explorer\ielowutil.exe
                              Wow64 process (32bit):false
                              Commandline:C:\Users\user\Desktop\documentos DHL.exe
                              Imagebase:0x3e0000
                              File size:221696 bytes
                              MD5 hash:650FE7460630188008BF8C8153526CEB
                              Has elevated privileges:true
                              Has administrator privileges:true
                              Programmed in:C, C++ or other language

                              Target ID:35
                              Start time:19:02:59
                              Start date:28/11/2022
                              Path:C:\Program Files (x86)\Internet Explorer\ielowutil.exe
                              Wow64 process (32bit):false
                              Commandline:C:\Users\user\Desktop\documentos DHL.exe
                              Imagebase:0x3e0000
                              File size:221696 bytes
                              MD5 hash:650FE7460630188008BF8C8153526CEB
                              Has elevated privileges:true
                              Has administrator privileges:true
                              Programmed in:C, C++ or other language

                              Target ID:36
                              Start time:19:02:59
                              Start date:28/11/2022
                              Path:C:\Program Files (x86)\Internet Explorer\ielowutil.exe
                              Wow64 process (32bit):false
                              Commandline:C:\Users\user\Desktop\documentos DHL.exe
                              Imagebase:0x3e0000
                              File size:221696 bytes
                              MD5 hash:650FE7460630188008BF8C8153526CEB
                              Has elevated privileges:true
                              Has administrator privileges:true
                              Programmed in:C, C++ or other language

                              Target ID:37
                              Start time:19:02:59
                              Start date:28/11/2022
                              Path:C:\Program Files (x86)\Internet Explorer\ExtExport.exe
                              Wow64 process (32bit):true
                              Commandline:C:\Users\user\Desktop\documentos DHL.exe
                              Imagebase:0x190000
                              File size:45056 bytes
                              MD5 hash:3253FD643C51C133C3489A146781913B
                              Has elevated privileges:true
                              Has administrator privileges:true
                              Programmed in:C, C++ or other language
                              Yara matches:
                              • Rule: JoeSecurity_GuLoader_2, Description: Yara detected GuLoader, Source: 00000025.00000002.1820565807.0000000002A00000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                              • Rule: JoeSecurity_GuLoader_2, Description: Yara detected GuLoader, Source: 00000025.00000000.1618126975.0000000002A00000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security

                              No disassembly