Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exe

Overview

General Information

Sample name:DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exe
Analysis ID:1585896
MD5:3aaa7d691a22ec1b7f9d03d63c7017a3
SHA1:b4a38d0c4b81a50fb40e407e4d439fd18cca89c2
SHA256:f214476db64248c82861c7b27fd55186beaf2e292cbe013d47f17305c3b2e95d
Infos:

Detection

Remcos, GuLoader
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Detected unpacking (changes PE section rights)
Found malware configuration
Multi AV Scanner detection for submitted file
Sigma detected: Remcos
Suricata IDS alerts for network traffic
Yara detected GuLoader
Yara detected Remcos RAT
C2 URLs / IPs found in malware configuration
Connects to many ports of the same IP (likely port scanning)
Deletes itself after installation
Initial sample is a PE file and has a suspicious name
Installs a global keyboard hook
Machine Learning detection for sample
Maps a DLL or memory area into another process
Sample has a suspicious name (potential lure to open the executable)
Sigma detected: Script Interpreter Execution From Suspicious Folder
Sigma detected: Suspicious Script Execution From Temp Folder
Sigma detected: WScript or CScript Dropper
Switches to a custom stack to bypass stack traces
Tries to detect Any.run
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Instant Messenger accounts or passwords
Tries to steal Mail credentials (via file / registry access)
Tries to steal Mail credentials (via file registry)
Uses dynamic DNS services
Yara detected WebBrowserPassView password recovery tool
Abnormal high CPU Usage
Contains functionality for read data from the clipboard
Contains functionality to call native functions
Contains functionality to check the parent process ID (often done to detect debuggers and analysis systems)
Contains functionality to dynamically determine API calls
Contains functionality to modify clipboard data
Contains functionality to shutdown / reboot the system
Creates a process in suspended mode (likely to inject code)
Creates files inside the system directory
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Drops PE files
Enables debug privileges
Extensive use of GetProcAddress (often used to hide API calls)
Found WSH timer for Javascript or VBS script (likely evasive script)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found dropped PE file which has not been started or loaded
Found potential string decryption / allocating functions
HTTP GET or POST without a user agent
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Sigma detected: WSF/JSE/JS/VBA/VBE File Execution Via Cscript/Wscript
Sleep loop found (likely to delay execution)
Suricata IDS alerts with low severity for network traffic
Uses 32bit PE files
Uses Microsoft's Enhanced Cryptographic Provider
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)

Classification

  • System is w10x64native
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
Remcos, RemcosRATRemcos (acronym of Remote Control & Surveillance Software) is a commercial Remote Access Tool to remotely control computers.Remcos is advertised as legitimate software which can be used for surveillance and penetration testing purposes, but has been used in numerous hacking campaigns.Remcos, once installed, opens a backdoor on the computer, granting full access to the remote user.Remcos is developed by the cybersecurity company BreakingSecurity.
  • APT33
  • The Gorgon Group
  • UAC-0050
https://malpedia.caad.fkie.fraunhofer.de/details/win.remcos
NameDescriptionAttributionBlogpost URLsLink
CloudEyE, GuLoaderCloudEyE (initially named GuLoader) is a small VB5/6 downloader. It typically downloads RATs/Stealers, such as Agent Tesla, Arkei/Vidar, Formbook, Lokibot, Netwire and Remcos, often but not always from Google Drive. The downloaded payload is xored.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.cloudeye
{"Host:Port:Password": ["wealthabundance01.duckdns.org:3981:1", "wealthabundance01.duckdns.org:3980:0", "wealthabundance002..duckdns.org:3980:0"], "Assigned name": "WEALTHBILLIONAIRES", "Connect interval": "1", "Install flag": "Disable", "Setup HKCU\\Run": "Enable", "Setup HKLM\\Run": "Enable", "Install path": "Application path", "Copy file": "remcos.exe", "Startup value": "Disable", "Hide file": "Disable", "Mutex": "wealthymannow-3N54OZ", "Keylog flag": "1", "Keylog path": "Application path", "Keylog file": "logs.dat", "Keylog crypt": "Disable", "Hide keylog file": "Disable", "Screenshot flag": "Disable", "Screenshot time": "1", "Take Screenshot option": "Disable", "Take screenshot title": "", "Take screenshot time": "5", "Screenshot path": "AppData", "Screenshot file": "Screenshots", "Screenshot crypt": "Disable", "Mouse option": "Disable", "Delete file": "Disable", "Audio record time": "5", "Audio folder": "MicRecords", "Connect delay": "0", "Copy folder": "Remcos", "Keylog folder": "remcos"}
SourceRuleDescriptionAuthorStrings
C:\ProgramData\remcos\logs.datJoeSecurity_RemcosYara detected Remcos RATJoe Security
    SourceRuleDescriptionAuthorStrings
    00000002.00000003.73355415794.000000000364C000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_RemcosYara detected Remcos RATJoe Security
      00000002.00000003.72131412308.0000000003644000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_RemcosYara detected Remcos RATJoe Security
        00000002.00000003.72098425641.000000000364C000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_RemcosYara detected Remcos RATJoe Security
          00000002.00000003.72098503659.0000000003608000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_RemcosYara detected Remcos RATJoe Security
            00000002.00000003.73355535275.0000000003608000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_RemcosYara detected Remcos RATJoe Security
              Click to see the 13 entries

              System Summary

              barindex
              Source: Process startedAuthor: Florian Roth (Nextron Systems), Nasreddine Bencherchali (Nextron Systems): Data: Command: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Local\Temp\cjjbdefodddngoym.vbs" , CommandLine: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Local\Temp\cjjbdefodddngoym.vbs" , CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\wscript.exe, NewProcessName: C:\Windows\SysWOW64\wscript.exe, OriginalFileName: C:\Windows\SysWOW64\wscript.exe, ParentCommandLine: "C:\Users\user\Desktop\DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exe", ParentImage: C:\Users\user\Desktop\DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exe, ParentProcessId: 8060, ParentProcessName: DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exe, ProcessCommandLine: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Local\Temp\cjjbdefodddngoym.vbs" , ProcessId: 2656, ProcessName: wscript.exe
              Source: Process startedAuthor: Florian Roth (Nextron Systems), Max Altgelt (Nextron Systems), Tim Shelton: Data: Command: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Local\Temp\cjjbdefodddngoym.vbs" , CommandLine: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Local\Temp\cjjbdefodddngoym.vbs" , CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\wscript.exe, NewProcessName: C:\Windows\SysWOW64\wscript.exe, OriginalFileName: C:\Windows\SysWOW64\wscript.exe, ParentCommandLine: "C:\Users\user\Desktop\DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exe", ParentImage: C:\Users\user\Desktop\DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exe, ParentProcessId: 8060, ParentProcessName: DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exe, ProcessCommandLine: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Local\Temp\cjjbdefodddngoym.vbs" , ProcessId: 2656, ProcessName: wscript.exe
              Source: Process startedAuthor: Margaritis Dimitrios (idea), Florian Roth (Nextron Systems), oscd.community: Data: Command: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Local\Temp\cjjbdefodddngoym.vbs" , CommandLine: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Local\Temp\cjjbdefodddngoym.vbs" , CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\wscript.exe, NewProcessName: C:\Windows\SysWOW64\wscript.exe, OriginalFileName: C:\Windows\SysWOW64\wscript.exe, ParentCommandLine: "C:\Users\user\Desktop\DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exe", ParentImage: C:\Users\user\Desktop\DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exe, ParentProcessId: 8060, ParentProcessName: DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exe, ProcessCommandLine: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Local\Temp\cjjbdefodddngoym.vbs" , ProcessId: 2656, ProcessName: wscript.exe
              Source: Process startedAuthor: Michael Haag: Data: Command: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Local\Temp\cjjbdefodddngoym.vbs" , CommandLine: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Local\Temp\cjjbdefodddngoym.vbs" , CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\wscript.exe, NewProcessName: C:\Windows\SysWOW64\wscript.exe, OriginalFileName: C:\Windows\SysWOW64\wscript.exe, ParentCommandLine: "C:\Users\user\Desktop\DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exe", ParentImage: C:\Users\user\Desktop\DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exe, ParentProcessId: 8060, ParentProcessName: DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exe, ProcessCommandLine: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Local\Temp\cjjbdefodddngoym.vbs" , ProcessId: 2656, ProcessName: wscript.exe

              Stealing of Sensitive Information

              barindex
              Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Users\user\Desktop\DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exe, ProcessId: 8060, TargetFilename: C:\ProgramData\remcos\logs.dat
              TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
              2025-01-08T13:32:18.725144+010020327761Malware Command and Control Activity Detected192.168.11.204976043.226.229.2073980TCP
              TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
              2025-01-08T13:32:19.273911+010020327771Malware Command and Control Activity Detected43.226.229.2073980192.168.11.2049760TCP
              2025-01-08T13:34:19.590681+010020327771Malware Command and Control Activity Detected43.226.229.2073980192.168.11.2049760TCP
              TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
              2025-01-08T13:32:20.385130+010028033043Unknown Traffic192.168.11.2049762178.237.33.5080TCP
              TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
              2025-01-08T13:31:08.105379+010028032702Potentially Bad Traffic192.168.11.2049755109.99.162.14443TCP

              Click to jump to signature section

              Show All Signature Results

              AV Detection

              barindex
              Source: 00000002.00000003.73355828769.0000000003627000.00000004.00000020.00020000.00000000.sdmpMalware Configuration Extractor: Remcos {"Host:Port:Password": ["wealthabundance01.duckdns.org:3981:1", "wealthabundance01.duckdns.org:3980:0", "wealthabundance002..duckdns.org:3980:0"], "Assigned name": "WEALTHBILLIONAIRES", "Connect interval": "1", "Install flag": "Disable", "Setup HKCU\\Run": "Enable", "Setup HKLM\\Run": "Enable", "Install path": "Application path", "Copy file": "remcos.exe", "Startup value": "Disable", "Hide file": "Disable", "Mutex": "wealthymannow-3N54OZ", "Keylog flag": "1", "Keylog path": "Application path", "Keylog file": "logs.dat", "Keylog crypt": "Disable", "Hide keylog file": "Disable", "Screenshot flag": "Disable", "Screenshot time": "1", "Take Screenshot option": "Disable", "Take screenshot title": "", "Take screenshot time": "5", "Screenshot path": "AppData", "Screenshot file": "Screenshots", "Screenshot crypt": "Disable", "Mouse option": "Disable", "Delete file": "Disable", "Audio record time": "5", "Audio folder": "MicRecords", "Connect delay": "0", "Copy folder": "Remcos", "Keylog folder": "remcos"}
              Source: DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exeVirustotal: Detection: 23%Perma Link
              Source: DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exeReversingLabs: Detection: 13%
              Source: Yara matchFile source: 00000002.00000003.73355415794.000000000364C000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000002.00000003.72131412308.0000000003644000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000002.00000003.72098425641.000000000364C000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000002.00000003.72098503659.0000000003608000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000002.00000003.73355535275.0000000003608000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000002.00000003.73357732368.0000000003608000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000002.00000003.73355828769.0000000003627000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000002.00000003.73365841768.0000000003644000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000002.00000003.72163777757.0000000003644000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000002.00000003.73357732368.0000000003627000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000002.00000003.72098503659.0000000003627000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000002.00000003.73355535275.0000000003627000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000002.00000003.73355828769.0000000003608000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000002.00000003.73355675137.000000000364C000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000002.00000003.73375358957.0000000003644000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exe PID: 8060, type: MEMORYSTR
              Source: Yara matchFile source: C:\ProgramData\remcos\logs.dat, type: DROPPED
              Source: DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exeJoe Sandbox ML: detected
              Source: C:\Users\user\Desktop\DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exeCode function: 3_2_00404423 GetProcAddress,FreeLibrary,CryptUnprotectData,3_2_00404423
              Source: DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
              Source: unknownHTTPS traffic detected: 109.99.162.14:443 -> 192.168.11.20:49755 version: TLS 1.2
              Source: DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
              Source: Binary string: mshtml.pdb source: DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exe, 00000002.00000001.71300341533.0000000000649000.00000020.00000001.01000000.00000007.sdmp
              Source: Binary string: mshtml.pdbUGP source: DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exe, 00000002.00000001.71300341533.0000000000649000.00000020.00000001.01000000.00000007.sdmp
              Source: C:\Users\user\Desktop\DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exeCode function: 0_2_00405861 CloseHandle,GetTempPathA,DeleteFileA,lstrcatA,lstrcatA,lstrlenA,FindFirstFileA,FindNextFileA,FindClose,0_2_00405861
              Source: C:\Users\user\Desktop\DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exeCode function: 0_2_0040639C FindFirstFileA,FindClose,0_2_0040639C
              Source: C:\Users\user\Desktop\DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exeCode function: 0_2_004026F8 FindFirstFileA,0_2_004026F8
              Source: C:\Users\user\Desktop\DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exeCode function: 3_2_0040AE51 FindFirstFileW,FindNextFileW,3_2_0040AE51
              Source: C:\Users\user\Desktop\DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exeCode function: 4_2_00407EF8 FindFirstFileA,FindNextFileA,strlen,strlen,4_2_00407EF8
              Source: C:\Users\user\Desktop\DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exeCode function: 5_2_00407898 FindFirstFileA,FindNextFileA,strlen,strlen,5_2_00407898
              Source: C:\Users\user\Desktop\DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exeFile opened: C:\Users\user\AppData\Local\Temp\jpzokfvjcJump to behavior
              Source: C:\Users\user\Desktop\DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exeFile opened: C:\Users\user\AppData\Local\Temp\zbiszrwxdwivJump to behavior
              Source: C:\Users\user\Desktop\DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exeFile opened: C:\Users\user\Jump to behavior
              Source: C:\Users\user\Desktop\DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exeFile opened: C:\Users\user\AppData\Jump to behavior
              Source: C:\Users\user\Desktop\DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exeFile opened: C:\Users\user\AppData\Local\Jump to behavior
              Source: C:\Users\user\Desktop\DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exeFile opened: C:\Users\user\AppData\Local\Temp\gjyjxxzbufaiuhfuyvqhllqmJump to behavior

              Networking

              barindex
              Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.11.20:49760 -> 43.226.229.207:3980
              Source: Network trafficSuricata IDS: 2032777 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Server Response : 43.226.229.207:3980 -> 192.168.11.20:49760
              Source: Malware configuration extractorURLs: wealthabundance01.duckdns.org
              Source: Malware configuration extractorURLs: wealthabundance01.duckdns.org
              Source: Malware configuration extractorURLs: wealthabundance002..duckdns.org
              Source: global trafficTCP traffic: 43.226.229.204 ports 3980,3981,1,3,8,9
              Source: unknownDNS query: name: wealthabundance01.duckdns.org
              Source: global trafficTCP traffic: 192.168.11.20:49756 -> 43.226.229.204:3981
              Source: global trafficTCP traffic: 192.168.11.20:49760 -> 43.226.229.207:3980
              Source: global trafficHTTP traffic detected: GET /json.gp HTTP/1.1Host: geoplugin.netCache-Control: no-cache
              Source: Joe Sandbox ViewIP Address: 178.237.33.50 178.237.33.50
              Source: Joe Sandbox ViewASN Name: SOFTLAYERUS SOFTLAYERUS
              Source: Joe Sandbox ViewASN Name: SOFTLAYERUS SOFTLAYERUS
              Source: Joe Sandbox ViewJA3 fingerprint: 37f463bf4616ecd445d4a1937da06e19
              Source: Network trafficSuricata IDS: 2803304 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern HCa : 192.168.11.20:49762 -> 178.237.33.50:80
              Source: Network trafficSuricata IDS: 2803270 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UHCa : 192.168.11.20:49755 -> 109.99.162.14:443
              Source: global trafficHTTP traffic detected: GET /PmprpeY34.bin HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0Host: teldrum.roCache-Control: no-cache
              Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
              Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
              Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
              Source: unknownUDP traffic detected without corresponding DNS query: 9.9.9.9
              Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
              Source: unknownUDP traffic detected without corresponding DNS query: 9.9.9.9
              Source: global trafficHTTP traffic detected: GET /PmprpeY34.bin HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0Host: teldrum.roCache-Control: no-cache
              Source: global trafficHTTP traffic detected: GET /json.gp HTTP/1.1Host: geoplugin.netCache-Control: no-cache
              Source: DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exe, 00000003.00000003.72158591760.00000000023F8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: ","domain":"la7.it"},{"applied_policy":"OnlyExposeWidevine","domain":"xfinity.com"},{"applied_policy":"OnlyExposeWidevine","domain":"watchtv.cox.com"},{"applied_policy":"OnlyExposeWidevine","domain":"ignitetv.rogers.com"},{"applied_policy":"OnlyExposeWidevine","domain":"bluecurvetv.shaw.ca"},{"applied_policy":"OnlyExposeWidevine","domain":"helix.videotron.com"},{"applied_policy":"OnlyExposeWidevine","domain":"criterionchannel.com"},{"applied_policy":"OnlyExposeWidevine","domain":"ntathome.com"},{"applied_policy":"OnlyExposeWidevine","domain":"wowpresentsplus.com"},{"applied_policy":"OnlyExposeWidevine","domain":"vhx.tv"},{"applied_policy":"OnlyExposePlayReady","domain":"hulu.com"},{"applied_policy":"OnlyExposeWidevine","domain":"app.quickhelp.com"},{"applied_policy":"OnlyExposeWidevine","domain":"DishAnywhere.com"}],"policies":[{"name":"OnlyExposePlayReady","type":"Playready"},{"name":"OnlyExposeWidevine","type":"Widevine"}],"version":1},"codec_override":{"applications":[{"applied_policy":"HideMfHevcCodec","domain":"tv.apple.com"},{"applied_policy":"HideMfHevcCodec","domain":"nintendo.com"}],"policies":[{"name":"HideMfHevcCodec","type":"MfHevcCodec"}],"version":1},"content_filter_on_off_switch":{"applications":[{"applied_policy":"ContentFilter","domain":"microsoft.com"}],"policies":[{"name":"ContentFilter"}],"version":1},"ecp_override":{"applications":[{"applied_policy":"PlainTextURLsOnly","domain":"hangouts.google.com"},{"applied_policy":"PlainTextURLsOnly","domain":"chat.google.com"},{"applied_policy":"PlainTextURLsOnly","domain":"slack.com"},{"applied_policy":"PlainTextURLsOnly","domain":"facebook.com"},{"applied_policy":"PlainTextURLsOnly","domain":"wechat.com"},{"applied_policy":"PlainTextURLsOnly","domain":"weixin.com"},{"applied_policy":"PlainTextURLsOnly","domain":"qq.com"},{"applied_policy":"PlainTextURLsOnly","domain":"webex.com"},{"applied_policy":"PlainTextURLsOnly","domain":"wordpress.com"},{"applied_policy":"PlainTextURLsOnly","domain":"twitter.com"},{"applied_policy":"PlainTextURLsOnly","domain":"discord.com"}],"policies":[{"name":"PlainTextURLsOnly","type":"ECPOnlyPlaintextURLs"}],"version":1},"idl_override":{"applications":[{"applied_policy":"ExposePrefixedEME","domain":"netflix.com"},{"applied_policy":"ExposePrefixedEME","domain":"music.amazon.co.jp"},{"applied_policy":"ExposePrefixedEME","domain":"music.amazon.co.uk"},{"applied_policy":"ExposePrefixedEME","domain":"music.amazon.com"},{"applied_policy":"ExposePrefixedEME","domain":"music.amazon.de"},{"applied_policy":"ExposePrefixedEME","domain":"music.amazon.es"},{"applied_policy":"ExposePrefixedEME","domain":"music.amazon.fr"},{"applied_policy":"ExposePrefixedEME","domain":"music.amazon.in"},{"applied_policy":"ExposePrefixedEME","domain":"music.amazon.it"},{"applied_policy":"ExposePrefixedEME","domain":"music.amazon.ca"},{"applied_policy":"ExposePrefixedEME","domain":"music.amazon.com.br"},{"applied_policy":"ExposePrefixedEME","domain":"sling.com"},{"applied_policy":"ExposePre
              Source: DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exe, 00000003.00000003.72158591760.00000000023F8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: ","domain":"la7.it"},{"applied_policy":"OnlyExposeWidevine","domain":"xfinity.com"},{"applied_policy":"OnlyExposeWidevine","domain":"watchtv.cox.com"},{"applied_policy":"OnlyExposeWidevine","domain":"ignitetv.rogers.com"},{"applied_policy":"OnlyExposeWidevine","domain":"bluecurvetv.shaw.ca"},{"applied_policy":"OnlyExposeWidevine","domain":"helix.videotron.com"},{"applied_policy":"OnlyExposeWidevine","domain":"criterionchannel.com"},{"applied_policy":"OnlyExposeWidevine","domain":"ntathome.com"},{"applied_policy":"OnlyExposeWidevine","domain":"wowpresentsplus.com"},{"applied_policy":"OnlyExposeWidevine","domain":"vhx.tv"},{"applied_policy":"OnlyExposePlayReady","domain":"hulu.com"},{"applied_policy":"OnlyExposeWidevine","domain":"app.quickhelp.com"},{"applied_policy":"OnlyExposeWidevine","domain":"DishAnywhere.com"}],"policies":[{"name":"OnlyExposePlayReady","type":"Playready"},{"name":"OnlyExposeWidevine","type":"Widevine"}],"version":1},"codec_override":{"applications":[{"applied_policy":"HideMfHevcCodec","domain":"tv.apple.com"},{"applied_policy":"HideMfHevcCodec","domain":"nintendo.com"}],"policies":[{"name":"HideMfHevcCodec","type":"MfHevcCodec"}],"version":1},"content_filter_on_off_switch":{"applications":[{"applied_policy":"ContentFilter","domain":"microsoft.com"}],"policies":[{"name":"ContentFilter"}],"version":1},"ecp_override":{"applications":[{"applied_policy":"PlainTextURLsOnly","domain":"hangouts.google.com"},{"applied_policy":"PlainTextURLsOnly","domain":"chat.google.com"},{"applied_policy":"PlainTextURLsOnly","domain":"slack.com"},{"applied_policy":"PlainTextURLsOnly","domain":"facebook.com"},{"applied_policy":"PlainTextURLsOnly","domain":"wechat.com"},{"applied_policy":"PlainTextURLsOnly","domain":"weixin.com"},{"applied_policy":"PlainTextURLsOnly","domain":"qq.com"},{"applied_policy":"PlainTextURLsOnly","domain":"webex.com"},{"applied_policy":"PlainTextURLsOnly","domain":"wordpress.com"},{"applied_policy":"PlainTextURLsOnly","domain":"twitter.com"},{"applied_policy":"PlainTextURLsOnly","domain":"discord.com"}],"policies":[{"name":"PlainTextURLsOnly","type":"ECPOnlyPlaintextURLs"}],"version":1},"idl_override":{"applications":[{"applied_policy":"ExposePrefixedEME","domain":"netflix.com"},{"applied_policy":"ExposePrefixedEME","domain":"music.amazon.co.jp"},{"applied_policy":"ExposePrefixedEME","domain":"music.amazon.co.uk"},{"applied_policy":"ExposePrefixedEME","domain":"music.amazon.com"},{"applied_policy":"ExposePrefixedEME","domain":"music.amazon.de"},{"applied_policy":"ExposePrefixedEME","domain":"music.amazon.es"},{"applied_policy":"ExposePrefixedEME","domain":"music.amazon.fr"},{"applied_policy":"ExposePrefixedEME","domain":"music.amazon.in"},{"applied_policy":"ExposePrefixedEME","domain":"music.amazon.it"},{"applied_policy":"ExposePrefixedEME","domain":"music.amazon.ca"},{"applied_policy":"ExposePrefixedEME","domain":"music.amazon.com.br"},{"applied_policy":"ExposePrefixedEME","domain":"sling.com"},{"applied_policy":"ExposePre
              Source: DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exe, 00000005.00000002.72134012371.0000000000400000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: Software\America Online\AOL Instant Messenger (TM)\CurrentVersion\Users%s\Loginprpl-msnprpl-yahooprpl-jabberprpl-novellprpl-oscarprpl-ggprpl-ircaccounts.xmlaimaim_1icqicq_1jabberjabber_1msnmsn_1yahoogggg_1http://www.imvu.comhttp://www.ebuddy.comhttps://www.google.com equals www.ebuddy.com (eBuggy)
              Source: DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exe, 00000003.00000002.72162742419.0000000002BE0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: domain":"www.povarenok.ru"},{"applied_policy":"prompt","domain":"www.estadao.com.br"},{"applied_policy":"prompt","domain":"olxpakistan.os.tc"},{"applied_policy":"prompt","domain":"televisa.com"},{"applied_policy":"prompt","domain":"uol.com.br"},{"applied_policy":"prompt","domain":"www.axisbank.com"},{"applied_policy":"prompt","domain":"mutualfund.adityabirlacapital.com"},{"applied_policy":"prompt","domain":"www.facebook.com"},{"applied_policy":"prompt","domain":"www.instagram.com"},{"applied_policy":"promptk equals www.facebook.com (Facebook)
              Source: DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exe, DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exe, 00000005.00000002.72134012371.0000000000400000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: http://www.ebuddy.com equals www.ebuddy.com (eBuggy)
              Source: DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exeString found in binary or memory: http://www.facebook.com/ equals www.facebook.com (Facebook)
              Source: DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exe, 00000003.00000003.72158618198.00000000023E9000.00000004.00000020.00020000.00000000.sdmp, DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exe, 00000003.00000003.72161424009.00000000023ED000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.google.com/accounts/serviceloginhttp://www.facebook.com/https://login.yahoo.com/config/loginv!Tv!Tv equals www.facebook.com (Facebook)
              Source: DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exe, 00000003.00000003.72158618198.00000000023E9000.00000004.00000020.00020000.00000000.sdmp, DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exe, 00000003.00000003.72161424009.00000000023ED000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.google.com/accounts/serviceloginhttp://www.facebook.com/https://login.yahoo.com/config/loginv!Tv!Tv equals www.yahoo.com (Yahoo)
              Source: DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exe, 00000003.00000002.72161924446.0000000000400000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: ~@:9@0123456789ABCDEFURL index.datvisited:https://www.google.com/accounts/serviceloginhttp://www.facebook.com/https://login.yahoo.com/config/login$ equals www.facebook.com (Facebook)
              Source: DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exe, 00000003.00000002.72161924446.0000000000400000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: ~@:9@0123456789ABCDEFURL index.datvisited:https://www.google.com/accounts/serviceloginhttp://www.facebook.com/https://login.yahoo.com/config/login$ equals www.yahoo.com (Yahoo)
              Source: global trafficDNS traffic detected: DNS query: teldrum.ro
              Source: global trafficDNS traffic detected: DNS query: wealthabundance01.duckdns.org
              Source: global trafficDNS traffic detected: DNS query: geoplugin.net
              Source: bhv4A72.tmp.3.drString found in binary or memory: http://cacerts.digicert.com/CloudflareIncECCCA-3.crt0
              Source: bhv4A72.tmp.3.drString found in binary or memory: http://cacerts.digicert.com/DigiCertCloudServicesCA-1.crt0
              Source: bhv4A72.tmp.3.drString found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootCA.crt0
              Source: bhv4A72.tmp.3.drString found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootCA.crt0B
              Source: bhv4A72.tmp.3.drString found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootG2.crt0
              Source: bhv4A72.tmp.3.drString found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootG2.crt0B
              Source: bhv4A72.tmp.3.drString found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootG3.crt0
              Source: bhv4A72.tmp.3.drString found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootG3.crt0B
              Source: bhv4A72.tmp.3.drString found in binary or memory: http://cacerts.digicert.com/DigiCertSHA2HighAssuranceServerCA.crt0
              Source: bhv4A72.tmp.3.drString found in binary or memory: http://cacerts.digicert.com/DigiCertSHA2SecureServerCA-2.crt0
              Source: bhv4A72.tmp.3.drString found in binary or memory: http://cacerts.digicert.com/DigiCertSHA2SecureServerCA.crt0
              Source: bhv4A72.tmp.3.drString found in binary or memory: http://cacerts.digicert.com/DigiCertTLSHybridECCSHA3842020CA1-1.crt0
              Source: bhv4A72.tmp.3.drString found in binary or memory: http://cacerts.digicert.com/DigiCertTLSHybridECCSHA3842020CA1.crt0
              Source: bhv4A72.tmp.3.drString found in binary or memory: http://cacerts.digicert.com/DigiCertTLSRSASHA2562020CA1-1.crt0
              Source: bhv4A72.tmp.3.drString found in binary or memory: http://cacerts.digicert.com/DigiCertTLSRSASHA2562020CA1.crt0
              Source: bhv4A72.tmp.3.drString found in binary or memory: http://cacerts.geotrust.com/GeoTrustECCCA2018.crt0
              Source: bhv4A72.tmp.3.drString found in binary or memory: http://cacerts.thawte.com/ThawteRSACA2018.crt0
              Source: bhv4A72.tmp.3.drString found in binary or memory: http://cdp.geotrust.com/GeoTrustECCCA2018.crl0
              Source: bhv4A72.tmp.3.drString found in binary or memory: http://cdp.thawte.com/ThawteRSACA2018.crl0L
              Source: bhv4A72.tmp.3.drString found in binary or memory: http://certificates.godaddy.com/repository/0
              Source: bhv4A72.tmp.3.drString found in binary or memory: http://certificates.godaddy.com/repository/gdig2.crt0
              Source: bhv4A72.tmp.3.drString found in binary or memory: http://certs.godaddy.com/repository/1301
              Source: bhv4A72.tmp.3.drString found in binary or memory: http://contentstorage.osi.office.net/
              Source: DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exe, 00000002.00000003.71388238325.0000000003654000.00000004.00000020.00020000.00000000.sdmp, DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exe, 00000002.00000003.71388120426.0000000003654000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.comodo
              Source: bhv4A72.tmp.3.drString found in binary or memory: http://crl.comodoca.com/AAACertificateServices.crl04
              Source: DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exe, 00000002.00000003.73355415794.000000000364C000.00000004.00000020.00020000.00000000.sdmp, DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exe, 00000002.00000003.72131412308.0000000003644000.00000004.00000020.00020000.00000000.sdmp, DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exe, 00000002.00000003.72098425641.000000000364C000.00000004.00000020.00020000.00000000.sdmp, DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exe, 00000002.00000003.71388238325.0000000003654000.00000004.00000020.00020000.00000000.sdmp, DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exe, 00000002.00000003.72163777757.0000000003644000.00000004.00000020.00020000.00000000.sdmp, DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exe, 00000002.00000003.73365841768.0000000003644000.00000004.00000020.00020000.00000000.sdmp, DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exe, 00000002.00000003.71388120426.0000000003654000.00000004.00000020.00020000.00000000.sdmp, DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exe, 00000002.00000003.73355675137.000000000364C000.00000004.00000020.00020000.00000000.sdmp, DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exe, 00000002.00000003.73375358957.0000000003644000.00000004.00000020.00020000.00000000.sdmp, bhv4A72.tmp.3.drString found in binary or memory: http://crl.comodoca.com/AAACertificateServices.crl06
              Source: bhv4A72.tmp.3.drString found in binary or memory: http://crl.globalsign.com/gsgccr3dvtlsca2020.crl0#
              Source: bhv4A72.tmp.3.drString found in binary or memory: http://crl.globalsign.com/root-r3.crl0G
              Source: DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exe, 00000002.00000003.73355415794.000000000364C000.00000004.00000020.00020000.00000000.sdmp, DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exe, 00000002.00000003.72131412308.0000000003644000.00000004.00000020.00020000.00000000.sdmp, DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exe, 00000002.00000003.72098425641.000000000364C000.00000004.00000020.00020000.00000000.sdmp, DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exe, 00000002.00000003.71388238325.0000000003654000.00000004.00000020.00020000.00000000.sdmp, DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exe, 00000002.00000003.72163777757.0000000003644000.00000004.00000020.00020000.00000000.sdmp, DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exe, 00000002.00000003.73365841768.0000000003644000.00000004.00000020.00020000.00000000.sdmp, DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exe, 00000002.00000003.71388120426.0000000003654000.00000004.00000020.00020000.00000000.sdmp, DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exe, 00000002.00000003.73355675137.000000000364C000.00000004.00000020.00020000.00000000.sdmp, DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exe, 00000002.00000003.73375358957.0000000003644000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.globalsign.net/root-r2.crl0
              Source: bhv4A72.tmp.3.drString found in binary or memory: http://crl.godaddy.com/gdig2s1-2558.crl0
              Source: bhv4A72.tmp.3.drString found in binary or memory: http://crl.godaddy.com/gdroot-g2.crl0F
              Source: bhv4A72.tmp.3.drString found in binary or memory: http://crl.godaddy.com/gdroot.crl0F
              Source: DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exe, 00000002.00000003.71388238325.0000000003654000.00000004.00000020.00020000.00000000.sdmp, DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exe, 00000002.00000003.71388120426.0000000003654000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.micros
              Source: DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exe, 00000002.00000003.72131412308.0000000003644000.00000004.00000020.00020000.00000000.sdmp, DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exe, 00000002.00000003.72098425641.000000000364C000.00000004.00000020.00020000.00000000.sdmp, DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exe, 00000002.00000003.71388238325.0000000003654000.00000004.00000020.00020000.00000000.sdmp, DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exe, 00000002.00000003.71388120426.0000000003654000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.microsoft.
              Source: bhv4A72.tmp.3.drString found in binary or memory: http://crl.pki.goog/gsr1/gsr1.crl0;
              Source: bhv4A72.tmp.3.drString found in binary or memory: http://crl.pki.goog/gtsr1/gtsr1.crl0W
              Source: bhv4A72.tmp.3.drString found in binary or memory: http://crl.rootca1.amazontrust.com/rootca1.crl0
              Source: bhv4A72.tmp.3.drString found in binary or memory: http://crl.rootg2.amazontrust.com/rootg2.crl0
              Source: bhv4A72.tmp.3.drString found in binary or memory: http://crl.sca1b.amazontrust.com/sca1b.crl0
              Source: bhv4A72.tmp.3.drString found in binary or memory: http://crl3.digicert.com/CloudflareIncECCCA-3.crl07
              Source: bhv4A72.tmp.3.drString found in binary or memory: http://crl3.digicert.com/DigiCertCloudServicesCA-1-g1.crl0?
              Source: bhv4A72.tmp.3.drString found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootCA.crl07
              Source: bhv4A72.tmp.3.drString found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootCA.crl0=
              Source: bhv4A72.tmp.3.drString found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootG2.crl0
              Source: bhv4A72.tmp.3.drString found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootG2.crl07
              Source: bhv4A72.tmp.3.drString found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootG3.crl0
              Source: bhv4A72.tmp.3.drString found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootG3.crl07
              Source: bhv4A72.tmp.3.drString found in binary or memory: http://crl3.digicert.com/DigiCertSHA2SecureServerCA.crl0=
              Source: bhv4A72.tmp.3.drString found in binary or memory: http://crl3.digicert.com/DigiCertTLSHybridECCSHA3842020CA1-1.crl0F
              Source: bhv4A72.tmp.3.drString found in binary or memory: http://crl3.digicert.com/DigiCertTLSHybridECCSHA3842020CA1.crl0D
              Source: bhv4A72.tmp.3.drString found in binary or memory: http://crl3.digicert.com/DigiCertTLSRSASHA2562020CA1-1.crl0
              Source: bhv4A72.tmp.3.drString found in binary or memory: http://crl3.digicert.com/DigiCertTLSRSASHA2562020CA1-3.crl0
              Source: bhv4A72.tmp.3.drString found in binary or memory: http://crl3.digicert.com/DigiCertTLSRSASHA2562020CA1-4.crl0
              Source: bhv4A72.tmp.3.drString found in binary or memory: http://crl3.digicert.com/DigiCertTLSRSASHA2562020CA1.crl0
              Source: bhv4A72.tmp.3.drString found in binary or memory: http://crl3.digicert.com/DigicertSHA2SecureServerCA-1.crl0?
              Source: bhv4A72.tmp.3.drString found in binary or memory: http://crl3.digicert.com/Omniroot2025.crl0
              Source: bhv4A72.tmp.3.drString found in binary or memory: http://crl3.digicert.com/Omniroot2025.crl0=
              Source: bhv4A72.tmp.3.drString found in binary or memory: http://crl3.digicert.com/Omniroot2025.crl0m
              Source: bhv4A72.tmp.3.drString found in binary or memory: http://crl3.digicert.com/sha2-ha-server-g6.crl04
              Source: bhv4A72.tmp.3.drString found in binary or memory: http://crl3.digicert.com/ssca-sha2-g6.crl0/
              Source: bhv4A72.tmp.3.drString found in binary or memory: http://crl3.digicert.com/ssca-sha2-g7.crl0/
              Source: bhv4A72.tmp.3.drString found in binary or memory: http://crl4.digicert.com/CloudflareIncECCCA-3.crl0
              Source: bhv4A72.tmp.3.drString found in binary or memory: http://crl4.digicert.com/DigiCertCloudServicesCA-1-g1.crl0
              Source: bhv4A72.tmp.3.drString found in binary or memory: http://crl4.digicert.com/DigiCertCloudServicesCA-1-g1.crl0L
              Source: bhv4A72.tmp.3.drString found in binary or memory: http://crl4.digicert.com/DigiCertGlobalRootCA.crl00
              Source: bhv4A72.tmp.3.drString found in binary or memory: http://crl4.digicert.com/DigiCertGlobalRootCA.crl0=
              Source: bhv4A72.tmp.3.drString found in binary or memory: http://crl4.digicert.com/DigiCertGlobalRootG2.crl0
              Source: bhv4A72.tmp.3.drString found in binary or memory: http://crl4.digicert.com/DigiCertGlobalRootG3.crl0
              Source: bhv4A72.tmp.3.drString found in binary or memory: http://crl4.digicert.com/DigiCertHighAssuranceEVRootCA.crl0=
              Source: bhv4A72.tmp.3.drString found in binary or memory: http://crl4.digicert.com/DigiCertSHA2SecureServerCA.crl0
              Source: bhv4A72.tmp.3.drString found in binary or memory: http://crl4.digicert.com/DigiCertSHA2SecureServerCA.crl0L
              Source: bhv4A72.tmp.3.drString found in binary or memory: http://crl4.digicert.com/DigiCertTLSHybridECCSHA3842020CA1-1.crl0
              Source: bhv4A72.tmp.3.drString found in binary or memory: http://crl4.digicert.com/DigiCertTLSHybridECCSHA3842020CA1.crl0L
              Source: bhv4A72.tmp.3.drString found in binary or memory: http://crl4.digicert.com/DigiCertTLSRSASHA2562020CA1-1.crl0
              Source: bhv4A72.tmp.3.drString found in binary or memory: http://crl4.digicert.com/DigiCertTLSRSASHA2562020CA1-3.crl0
              Source: bhv4A72.tmp.3.drString found in binary or memory: http://crl4.digicert.com/DigiCertTLSRSASHA2562020CA1-4.crl0
              Source: bhv4A72.tmp.3.drString found in binary or memory: http://crl4.digicert.com/DigiCertTLSRSASHA2562020CA1.crl0L
              Source: bhv4A72.tmp.3.drString found in binary or memory: http://crl4.digicert.com/DigicertSHA2SecureServerCA-1.crl0~
              Source: bhv4A72.tmp.3.drString found in binary or memory: http://crl4.digicert.com/sha2-ha-server-g6.crl0
              Source: bhv4A72.tmp.3.drString found in binary or memory: http://crl4.digicert.com/ssca-sha2-g6.crl0L
              Source: bhv4A72.tmp.3.drString found in binary or memory: http://crl4.digicert.com/ssca-sha2-g7.crl0
              Source: bhv4A72.tmp.3.drString found in binary or memory: http://crls.pki.goog/gts1c3/QOvJ0N1sT2A.crl0
              Source: bhv4A72.tmp.3.drString found in binary or memory: http://crls.pki.goog/gts1c3/fVJxbV-Ktmk.crl0
              Source: bhv4A72.tmp.3.drString found in binary or memory: http://crls.pki.goog/gts1c3/zdATt0Ex_Fk.crl0
              Source: bhv4A72.tmp.3.drString found in binary or memory: http://crt.rootca1.amazontrust.com/rootca1.cer0?
              Source: bhv4A72.tmp.3.drString found in binary or memory: http://crt.rootg2.amazontrust.com/rootg2.cer0=
              Source: bhv4A72.tmp.3.drString found in binary or memory: http://crt.sca1b.amazontrust.com/sca1b.crt0
              Source: bhv4A72.tmp.3.drString found in binary or memory: http://crt.sectigo.com/SectigoRSADomainValidationSecureServerCA.crt0#
              Source: bhv4A72.tmp.3.drString found in binary or memory: http://csp.yahoo.com/beacon/csp?src=yahoocom-expect-ct-report-only
              Source: DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exe, 00000002.00000003.73375358957.0000000003644000.00000004.00000020.00020000.00000000.sdmp, bhv4A72.tmp.3.drString found in binary or memory: http://geoplugin.net/json.gp
              Source: DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exe, 00000002.00000003.73355415794.000000000364C000.00000004.00000020.00020000.00000000.sdmp, DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exe, 00000002.00000003.72131412308.0000000003644000.00000004.00000020.00020000.00000000.sdmp, DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exe, 00000002.00000003.72098425641.000000000364C000.00000004.00000020.00020000.00000000.sdmp, DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exe, 00000002.00000003.72163777757.0000000003644000.00000004.00000020.00020000.00000000.sdmp, DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exe, 00000002.00000003.73365841768.0000000003644000.00000004.00000020.00020000.00000000.sdmp, DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exe, 00000002.00000003.73355675137.000000000364C000.00000004.00000020.00020000.00000000.sdmp, DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exe, 00000002.00000003.73375358957.0000000003644000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://geoplugin.net/json.gpL:
              Source: DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exe, 00000002.00000003.73355415794.000000000364C000.00000004.00000020.00020000.00000000.sdmp, DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exe, 00000002.00000003.72131412308.0000000003644000.00000004.00000020.00020000.00000000.sdmp, DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exe, 00000002.00000003.72098425641.000000000364C000.00000004.00000020.00020000.00000000.sdmp, DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exe, 00000002.00000003.72163777757.0000000003644000.00000004.00000020.00020000.00000000.sdmp, DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exe, 00000002.00000003.73365841768.0000000003644000.00000004.00000020.00020000.00000000.sdmp, DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exe, 00000002.00000003.73355675137.000000000364C000.00000004.00000020.00020000.00000000.sdmp, DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exe, 00000002.00000003.73375358957.0000000003644000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://geoplugin.net/json.gpS:
              Source: DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exe, 00000002.00000003.73355828769.0000000003627000.00000004.00000020.00020000.00000000.sdmp, DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exe, 00000002.00000003.73357732368.0000000003627000.00000004.00000020.00020000.00000000.sdmp, DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exe, 00000002.00000003.72098503659.0000000003627000.00000004.00000020.00020000.00000000.sdmp, DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exe, 00000002.00000003.73355535275.0000000003627000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://geoplugin.net/json.gpVf
              Source: DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exe, 00000002.00000003.73355415794.000000000364C000.00000004.00000020.00020000.00000000.sdmp, DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exe, 00000002.00000003.72131412308.0000000003644000.00000004.00000020.00020000.00000000.sdmp, DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exe, 00000002.00000003.72098425641.000000000364C000.00000004.00000020.00020000.00000000.sdmp, DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exe, 00000002.00000003.72163777757.0000000003644000.00000004.00000020.00020000.00000000.sdmp, DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exe, 00000002.00000003.73365841768.0000000003644000.00000004.00000020.00020000.00000000.sdmp, DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exe, 00000002.00000003.73355675137.000000000364C000.00000004.00000020.00020000.00000000.sdmp, DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exe, 00000002.00000003.73375358957.0000000003644000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://geoplugin.net/son.gpFiles
              Source: DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exe, 00000002.00000001.71300341533.0000000000649000.00000020.00000001.01000000.00000007.sdmpString found in binary or memory: http://inference.location.live.com11111111-1111-1111-1111-111111111111https://partnernext-inference.
              Source: DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exeString found in binary or memory: http://nsis.sf.net/NSIS_Error
              Source: DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exeString found in binary or memory: http://nsis.sf.net/NSIS_ErrorError
              Source: bhv4A72.tmp.3.drString found in binary or memory: http://o.ss2.us/0
              Source: bhv4A72.tmp.3.drString found in binary or memory: http://ocsp.comodoca.com0
              Source: bhv4A72.tmp.3.drString found in binary or memory: http://ocsp.digicert.com0
              Source: bhv4A72.tmp.3.drString found in binary or memory: http://ocsp.digicert.com0:
              Source: bhv4A72.tmp.3.drString found in binary or memory: http://ocsp.digicert.com0B
              Source: bhv4A72.tmp.3.drString found in binary or memory: http://ocsp.digicert.com0F
              Source: bhv4A72.tmp.3.drString found in binary or memory: http://ocsp.digicert.com0G
              Source: bhv4A72.tmp.3.drString found in binary or memory: http://ocsp.digicert.com0H
              Source: bhv4A72.tmp.3.drString found in binary or memory: http://ocsp.digicert.com0I
              Source: bhv4A72.tmp.3.drString found in binary or memory: http://ocsp.digicert.com0K
              Source: bhv4A72.tmp.3.drString found in binary or memory: http://ocsp.digicert.com0M
              Source: bhv4A72.tmp.3.drString found in binary or memory: http://ocsp.digicert.com0O
              Source: bhv4A72.tmp.3.drString found in binary or memory: http://ocsp.globalsign.com/ca/gsovsha2g4r30
              Source: bhv4A72.tmp.3.drString found in binary or memory: http://ocsp.globalsign.com/gsgccr3dvtlsca20200V
              Source: bhv4A72.tmp.3.drString found in binary or memory: http://ocsp.godaddy.com/0
              Source: bhv4A72.tmp.3.drString found in binary or memory: http://ocsp.godaddy.com/02
              Source: bhv4A72.tmp.3.drString found in binary or memory: http://ocsp.godaddy.com/05
              Source: bhv4A72.tmp.3.drString found in binary or memory: http://ocsp.msocsp.com0
              Source: bhv4A72.tmp.3.drString found in binary or memory: http://ocsp.pki.goog/gsr10)
              Source: bhv4A72.tmp.3.drString found in binary or memory: http://ocsp.pki.goog/gts1c301
              Source: bhv4A72.tmp.3.drString found in binary or memory: http://ocsp.pki.goog/gtsr100
              Source: bhv4A72.tmp.3.drString found in binary or memory: http://ocsp.rootca1.amazontrust.com0:
              Source: bhv4A72.tmp.3.drString found in binary or memory: http://ocsp.rootg2.amazontrust.com08
              Source: bhv4A72.tmp.3.drString found in binary or memory: http://ocsp.sca1b.amazontrust.com06
              Source: bhv4A72.tmp.3.drString found in binary or memory: http://ocsp.sectigo.com0
              Source: bhv4A72.tmp.3.drString found in binary or memory: http://ocsp.sectigo.com0%
              Source: bhv4A72.tmp.3.drString found in binary or memory: http://ocsp2.globalsign.com/rootr306
              Source: bhv4A72.tmp.3.drString found in binary or memory: http://ocsp2.globalsign.com/rootr30;
              Source: bhv4A72.tmp.3.drString found in binary or memory: http://ocspx.digicert.com0E
              Source: bhv4A72.tmp.3.drString found in binary or memory: http://pki.goog/gsr1/gsr1.crt02
              Source: bhv4A72.tmp.3.drString found in binary or memory: http://pki.goog/repo/certs/gts1c3.der0
              Source: bhv4A72.tmp.3.drString found in binary or memory: http://pki.goog/repo/certs/gts1c3.der0$
              Source: bhv4A72.tmp.3.drString found in binary or memory: http://pki.goog/repo/certs/gts1c3.der07
              Source: bhv4A72.tmp.3.drString found in binary or memory: http://pki.goog/repo/certs/gtsr1.der04
              Source: bhv4A72.tmp.3.drString found in binary or memory: http://s.ss2.us/r.crl0
              Source: bhv4A72.tmp.3.drString found in binary or memory: http://secure.globalsign.com/cacert/gsgccr3dvtlsca2020.crt09
              Source: bhv4A72.tmp.3.drString found in binary or memory: http://secure.globalsign.com/cacert/gsovsha2g4r3.crt0
              Source: bhv4A72.tmp.3.drString found in binary or memory: http://secure.globalsign.com/cacert/root-r3.crt06
              Source: bhv4A72.tmp.3.drString found in binary or memory: http://status.geotrust.com0=
              Source: bhv4A72.tmp.3.drString found in binary or memory: http://status.thawte.com09
              Source: bhv4A72.tmp.3.drString found in binary or memory: http://www.digicert.com/CPS0
              Source: bhv4A72.tmp.3.drString found in binary or memory: http://www.digicert.com/CPS0u
              Source: bhv4A72.tmp.3.drString found in binary or memory: http://www.digicert.com/CPS0v
              Source: bhv4A72.tmp.3.drString found in binary or memory: http://www.digicert.com/CPS0~
              Source: DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exe, DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exe, 00000005.00000002.72134012371.0000000000400000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: http://www.ebuddy.com
              Source: DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exe, 00000002.00000001.71300341533.0000000000649000.00000020.00000001.01000000.00000007.sdmpString found in binary or memory: http://www.gopher.ftp://ftp.
              Source: DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exe, 00000002.00000001.71300341533.0000000000626000.00000020.00000001.01000000.00000007.sdmpString found in binary or memory: http://www.ibm.com/data/dtd/v11/ibmxhtml1-transitional.dtd-//W3O//DTD
              Source: DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exe, DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exe, 00000005.00000002.72134012371.0000000000400000.00000040.80000000.00040000.00000000.sdmp, DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exe, 00000005.00000003.72133752576.0000000000B3D000.00000004.00000020.00020000.00000000.sdmp, DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exe, 00000005.00000003.72133803045.0000000000B3D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.imvu.com
              Source: DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exe, 00000005.00000002.72133962515.000000000019C000.00000004.00000010.00020000.00000000.sdmpString found in binary or memory: http://www.imvu.com/
              Source: DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exe, 00000005.00000003.72133752576.0000000000B3D000.00000004.00000020.00020000.00000000.sdmp, DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exe, 00000005.00000003.72133803045.0000000000B3D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.imvu.comata
              Source: DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exe, 00000005.00000002.72134012371.0000000000400000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: http://www.imvu.comhttp://www.ebuddy.comhttps://www.google.com
              Source: DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exe, 00000005.00000002.72134012371.0000000000400000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: http://www.imvu.comr
              Source: DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exe, 00000003.00000002.72161812904.0000000000193000.00000004.00000010.00020000.00000000.sdmpString found in binary or memory: http://www.nirsoft.net
              Source: DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exe, 00000005.00000002.72134012371.0000000000400000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: http://www.nirsoft.net/
              Source: DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exe, 00000002.00000003.73355415794.000000000364C000.00000004.00000020.00020000.00000000.sdmp, DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exe, 00000002.00000003.72131412308.0000000003644000.00000004.00000020.00020000.00000000.sdmp, DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exe, 00000002.00000003.72098425641.000000000364C000.00000004.00000020.00020000.00000000.sdmp, DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exe, 00000002.00000003.71388238325.0000000003654000.00000004.00000020.00020000.00000000.sdmp, DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exe, 00000002.00000003.72163777757.0000000003644000.00000004.00000020.00020000.00000000.sdmp, DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exe, 00000002.00000003.73365841768.0000000003644000.00000004.00000020.00020000.00000000.sdmp, DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exe, 00000002.00000003.71388120426.0000000003654000.00000004.00000020.00020000.00000000.sdmp, DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exe, 00000002.00000003.73355675137.000000000364C000.00000004.00000020.00020000.00000000.sdmp, DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exe, 00000002.00000003.73375358957.0000000003644000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.quovadis.bm0
              Source: DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exe, 00000002.00000001.71300341533.00000000005F2000.00000020.00000001.01000000.00000007.sdmpString found in binary or memory: http://www.w3c.org/TR/1999/REC-html401-19991224/frameset.dtd
              Source: DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exe, 00000002.00000001.71300341533.00000000005F2000.00000020.00000001.01000000.00000007.sdmpString found in binary or memory: http://www.w3c.org/TR/1999/REC-html401-19991224/loose.dtd
              Source: bhv4A72.tmp.3.drString found in binary or memory: http://x.ss2.us/x.cer0&
              Source: DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exe, 00000003.00000003.72155537730.0000000002BE1000.00000004.00000020.00020000.00000000.sdmp, DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exe, 00000003.00000003.72156685235.00000000023E1000.00000004.00000020.00020000.00000000.sdmp, bhv4A72.tmp.3.drString found in binary or memory: https://2542116.fls.doubleclick.net/activityi;src=2542116;type=2542116;cat=chrom0;ord=8672137916610;
              Source: DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exe, 00000003.00000003.72156933086.00000000023FD000.00000004.00000020.00020000.00000000.sdmp, DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exe, 00000003.00000003.72156685235.00000000023FD000.00000004.00000020.00020000.00000000.sdmp, DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exe, 00000003.00000003.72156685235.00000000023E1000.00000004.00000020.00020000.00000000.sdmp, bhv4A72.tmp.3.drString found in binary or memory: https://2542116.fls.doubleclick.net/activityi;src=2542116;type=chrom322;cat=chrom01g;ord=37393684334
              Source: DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exe, 00000003.00000003.72155537730.0000000002BE1000.00000004.00000020.00020000.00000000.sdmp, DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exe, 00000003.00000003.72156685235.00000000023E1000.00000004.00000020.00020000.00000000.sdmp, bhv4A72.tmp.3.drString found in binary or memory: https://2542116.fls.doubleclick.net/activityi;src=2542116;type=clien612;cat=chromx;ord=1;num=7209567
              Source: bhv4A72.tmp.3.drString found in binary or memory: https://99c8cba043b829a5adbf3c95c1c0a87a.azr.footprintdns.com/apc/trans.gif?b463cc9221b0d1cf6b255213
              Source: bhv4A72.tmp.3.drString found in binary or memory: https://99c8cba043b829a5adbf3c95c1c0a87a.azr.footprintdns.com/apc/trans.gif?d61d17a32b075ad284d0798e
              Source: bhv4A72.tmp.3.drString found in binary or memory: https://account.live.com/
              Source: bhv4A72.tmp.3.drString found in binary or memory: https://account.live.com/Resources/images/2_vD0yppaJX3jBnfbHF1hqXQ2.svg
              Source: bhv4A72.tmp.3.drString found in binary or memory: https://account.live.com/Resources/images/AppCentipede/AppCentipede_Microsoft_HFeToeM4u6fzMQF_f_rQ5Q
              Source: bhv4A72.tmp.3.drString found in binary or memory: https://account.live.com/Resources/images/AppCentipede/AppCentipede_Microsoft_white_ufRYlllWOw4YyDRi
              Source: bhv4A72.tmp.3.drString found in binary or memory: https://account.live.com/Resources/images/Arrows/left_qcwoJO81F7bEFg3Pj_fUEA2.svg
              Source: bhv4A72.tmp.3.drString found in binary or memory: https://account.live.com/Resources/images/Microsoft_Logotype_Gray_X-qkgtg8KmnQEvm_9mDTcw2.svg
              Source: bhv4A72.tmp.3.drString found in binary or memory: https://account.live.com/Resources/images/Microsoft_Logotype_White_4MYDQRab31HKDWWN-1HafA2.svg
              Source: bhv4A72.tmp.3.drString found in binary or memory: https://account.live.com/Resources/images/favicon.ico
              Source: bhv4A72.tmp.3.drString found in binary or memory: https://account.live.com/Resources/images/microsoft_logo_7lyNn7YkjJOP0NwZNw6QvQ2.svg
              Source: bhv4A72.tmp.3.drString found in binary or memory: https://account.live.com/identity/confirm?mkt=EN-US&uiflavor=win10host&client_id=1E0000480728C5&conn
              Source: bhv4A72.tmp.3.drString found in binary or memory: https://acctcdn.msftauth.net/accountcorepackage_hSxsZy9Ymkhjr2rMMwej_g2.js?v=1
              Source: bhv4A72.tmp.3.drString found in binary or memory: https://acctcdn.msftauth.net/bootstrapcomponentshim_yGKy8jAx8RL2bLqmBF063w2.js?v=1
              Source: bhv4A72.tmp.3.drString found in binary or memory: https://acctcdn.msftauth.net/bootstrapshim_IX6xrWCoGcREOsbbsQ1Yvg2.js?v=1
              Source: bhv4A72.tmp.3.drString found in binary or memory: https://acctcdn.msftauth.net/confirmidentity_9m6e3jBPkyZiRdJxglsYsA2.js?v=1
              Source: bhv4A72.tmp.3.drString found in binary or memory: https://acctcdn.msftauth.net/converged_ux_v2_nBE5FSqn9KpH44ZlTc3VqQ2.css?v=1
              Source: bhv4A72.tmp.3.drString found in binary or memory: https://acctcdn.msftauth.net/corewin10_Lmno_4TyJLm7Xee3gF3aOg2.js?v=1
              Source: bhv4A72.tmp.3.drString found in binary or memory: https://acctcdn.msftauth.net/datarequestpackage_h-_7C7UzwdefXJT9njDBTQ2.js
              Source: bhv4A72.tmp.3.drString found in binary or memory: https://acctcdn.msftauth.net/hostfooterpackage_FOuGbot8yZGKyYkh5yNQBA2.js?v=1
              Source: bhv4A72.tmp.3.drString found in binary or memory: https://acctcdn.msftauth.net/images/Arrows/left_qcwoJO81F7bEFg3Pj_fUEA2.svg
              Source: bhv4A72.tmp.3.drString found in binary or memory: https://acctcdn.msftauth.net/images/microsoft_logo_7lyNn7YkjJOP0NwZNw6QvQ2.svg
              Source: bhv4A72.tmp.3.drString found in binary or memory: https://acctcdn.msftauth.net/jqueryshim_hlu0tTfjWJFWYNt1WZrVqg2.js?v=1
              Source: bhv4A72.tmp.3.drString found in binary or memory: https://acctcdn.msftauth.net/oneds_MC5gQfpbTUjLu60sQCwU1w2.js?v=1
              Source: bhv4A72.tmp.3.drString found in binary or memory: https://acctcdn.msftauth.net/wlivepackagefull_stPwvW3-5mShoxrbkAw2qw2.js?v=1
              Source: bhv4A72.tmp.3.drString found in binary or memory: https://acdn.adnxs.com/dmp/async_usersync.html
              Source: bhv4A72.tmp.3.drString found in binary or memory: https://acdn.adnxs.com/dmp/async_usersync.html?gdpr=1&gdpr_consent=CPM7kC1PM7kC1AcABBENBQCsAP_AAELAA
              Source: DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exe, 00000003.00000003.72155537730.0000000002BE1000.00000004.00000020.00020000.00000000.sdmp, DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exe, 00000003.00000003.72156685235.00000000023E1000.00000004.00000020.00020000.00000000.sdmp, bhv4A72.tmp.3.drString found in binary or memory: https://adservice.google.co.uk/ddm/fls/i/src=2542116;type=chrom322;cat=chrom01g;ord=3739368433491;gt
              Source: DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exe, 00000003.00000003.72155537730.0000000002BE1000.00000004.00000020.00020000.00000000.sdmp, DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exe, 00000003.00000003.72156685235.00000000023E1000.00000004.00000020.00020000.00000000.sdmp, bhv4A72.tmp.3.drString found in binary or memory: https://adservice.google.com/ddm/fls/i/src=2542116;type=chrom322;cat=chrom01g;ord=3739368433491;gtm=
              Source: bhv4A72.tmp.3.drString found in binary or memory: https://aefd.nelreports.net/api/report?cat=bingaot
              Source: bhv4A72.tmp.3.drString found in binary or memory: https://aefd.nelreports.net/api/report?cat=bingaotak
              Source: bhv4A72.tmp.3.drString found in binary or memory: https://aefd.nelreports.net/api/report?cat=bingrms
              Source: bhv4A72.tmp.3.drString found in binary or memory: https://aefd.nelreports.net/api/report?cat=bingth
              Source: bhv4A72.tmp.3.drString found in binary or memory: https://aefd.nelreports.net/api/report?cat=bingth&ndcParam=QUZE
              Source: bhv4A72.tmp.3.drString found in binary or memory: https://aefd.nelreports.net/api/report?cat=wsb&ndcParam=QUZE
              Source: bhv4A72.tmp.3.drString found in binary or memory: https://aefd.nelreports.net/api/report?cat=wsb&ndcParam=QWthbWFp
              Source: bhv4A72.tmp.3.drString found in binary or memory: https://afdxtest.z01.azurefd.net/apc/trans.gif?daed76fa672ed2fa739774d44bb38da5
              Source: bhv4A72.tmp.3.drString found in binary or memory: https://afdxtest.z01.azurefd.net/apc/trans.gif?e77f8dc2c88b806ec91fb50956aeee97
              Source: bhv4A72.tmp.3.drString found in binary or memory: https://ajax.aspnetcdn.com/ajax/jquery/jquery-3.3.1.min.js
              Source: bhv4A72.tmp.3.drString found in binary or memory: https://api.msn.com/v1/News/Feed/Windows?apikey=qrUeHGGYvVowZJuHA3XaH0uUvg1ZJ0GUZnXk3mxxPF&ocid=wind
              Source: bhv4A72.tmp.3.drString found in binary or memory: https://assets.adobedtm.com/5ef092d1efb5/4d1d9f749fd3/2b6d8bd51279/RC028e72ad6b944b8183346fecb32a729
              Source: bhv4A72.tmp.3.drString found in binary or memory: https://assets.adobedtm.com/5ef092d1efb5/4d1d9f749fd3/2b6d8bd51279/RC05934b07a40a4d8a9a0cc7a79e85434
              Source: bhv4A72.tmp.3.drString found in binary or memory: https://assets.adobedtm.com/5ef092d1efb5/4d1d9f749fd3/2b6d8bd51279/RC0ee8c30f496b428a91d7f3289a2b8a2
              Source: bhv4A72.tmp.3.drString found in binary or memory: https://assets.adobedtm.com/5ef092d1efb5/4d1d9f749fd3/2b6d8bd51279/RC784fc6783b2f45a09cb8efa184cc684
              Source: bhv4A72.tmp.3.drString found in binary or memory: https://assets.adobedtm.com/5ef092d1efb5/4d1d9f749fd3/2b6d8bd51279/RC8cd6be4f72cf4da1aa891e7da23d144
              Source: bhv4A72.tmp.3.drString found in binary or memory: https://assets.adobedtm.com/5ef092d1efb5/4d1d9f749fd3/2b6d8bd51279/RC9fc5c8b8bfb94ba5833ba8065b1de35
              Source: bhv4A72.tmp.3.drString found in binary or memory: https://assets.adobedtm.com/5ef092d1efb5/4d1d9f749fd3/2b6d8bd51279/RCacc6c4ed30494f9fad065afe638a7ca
              Source: bhv4A72.tmp.3.drString found in binary or memory: https://assets.adobedtm.com/5ef092d1efb5/4d1d9f749fd3/2b6d8bd51279/RCd01d50cad19649bf857a22be5995480
              Source: bhv4A72.tmp.3.drString found in binary or memory: https://assets.adobedtm.com/5ef092d1efb5/4d1d9f749fd3/2b6d8bd51279/RCe691e5baee9945259179326d0658843
              Source: bhv4A72.tmp.3.drString found in binary or memory: https://assets.adobedtm.com/5ef092d1efb5/4d1d9f749fd3/2b6d8bd51279/RCefb91313fdae420ebbea45d8f044894
              Source: bhv4A72.tmp.3.drString found in binary or memory: https://assets.adobedtm.com/launch-EN7b3d710ac67a4a1195648458258f97dd.min.js
              Source: bhv4A72.tmp.3.drString found in binary or memory: https://az416426.vo.msecnd.net/scripts/a/ai.0.js
              Source: bhv4A72.tmp.3.drString found in binary or memory: https://az725175.vo.msecnd.net/scripts/jsll-4.js
              Source: bhv4A72.tmp.3.drString found in binary or memory: https://btloader.com/tag?o=6208086025961472&upapi=true
              Source: bhv4A72.tmp.3.drString found in binary or memory: https://capturemedia-assets.com/
              Source: bhv4A72.tmp.3.drString found in binary or memory: https://capturemedia-assets.com/ig-bank/ad-engagement/startAnimation/main/index.html
              Source: bhv4A72.tmp.3.drString found in binary or memory: https://cdnjs.cloudflare.com/ajax/libs/gsap/3.5.1/gsap.min.js
              Source: bhv4A72.tmp.3.drString found in binary or memory: https://certs.godaddy.com/repository/0
              Source: bhv4A72.tmp.3.drString found in binary or memory: https://config.edge.skype.com/config/v1/ODSP_Sync_Client/19.043.0304.0013?UpdateRing=Prod&OS=Win&OSV
              Source: bhv4A72.tmp.3.drString found in binary or memory: https://contentstorage.osi.office.net/dynamiccanvas/licensingui/index.html?mode=NewDeviceActivation
              Source: bhv4A72.tmp.3.drString found in binary or memory: https://contextual.media.net/
              Source: bhv4A72.tmp.3.drString found in binary or memory: https://contextual.media.net/48/nrrV39259.js
              Source: bhv4A72.tmp.3.drString found in binary or memory: https://contextual.media.net/checksync.php?&vsSync=1&cs=1&hb=1&cv=37&ndec=1&cid=8HBI57XIG&prvid=77%2
              Source: bhv4A72.tmp.3.drString found in binary or memory: https://contextual.media.net/medianet.php?cid=8CU157172&crid=722878611&size=306x271&https=1
              Source: bhv4A72.tmp.3.drString found in binary or memory: https://contextual.media.net/medianet.php?cid=8CU157172&crid=858412214&size=306x271&https=1
              Source: bhv4A72.tmp.3.drString found in binary or memory: https://csp.withgoogle.com/csp/active-view-scs-read-write-acl
              Source: bhv4A72.tmp.3.drString found in binary or memory: https://csp.withgoogle.com/csp/ads-programmable
              Source: bhv4A72.tmp.3.drString found in binary or memory: https://csp.withgoogle.com/csp/recaptcha/1
              Source: bhv4A72.tmp.3.drString found in binary or memory: https://csp.withgoogle.com/csp/report-to/active-view-scs-read-write-acl
              Source: bhv4A72.tmp.3.drString found in binary or memory: https://csp.withgoogle.com/csp/report-to/ads-programmable
              Source: bhv4A72.tmp.3.drString found in binary or memory: https://csp.withgoogle.com/csp/report-to/adspam-signals-scs
              Source: bhv4A72.tmp.3.drString found in binary or memory: https://csp.withgoogle.com/csp/report-to/recaptcha
              Source: bhv4A72.tmp.3.drString found in binary or memory: https://cvision.media.net/new/300x300/2/45/221/3/7d5dc6a9-5325-442d-926e-f2c668b8e65e.jpg?v=9
              Source: bhv4A72.tmp.3.drString found in binary or memory: https://cvision.media.net/new/300x300/2/75/165/127/fefc2984-60ee-407b-a704-0db527f30f53.jpg?v=9
              Source: bhv4A72.tmp.3.drString found in binary or memory: https://cvision.media.net/new/300x300/3/167/174/27/39ab3103-8560-4a55-bfc4-401f897cf6f2.jpg?v=9
              Source: bhv4A72.tmp.3.drString found in binary or memory: https://cxcs.microsoft.net/api/gs/en-US/xmlv2/storyset?platform=desktop&release=20h2&schema=3.0&sku=
              Source: bhv4A72.tmp.3.drString found in binary or memory: https://cxcs.microsoft.net/api/gs/en-US/xmlv2/tip-contentset?platform=desktop&release=20h2&schema=3.
              Source: bhv4A72.tmp.3.drString found in binary or memory: https://cxcs.microsoft.net/static/public/tips/neutral/5c08e5e7-4cfd-4901-acbc-79925276672c/33c540c16
              Source: bhv4A72.tmp.3.drString found in binary or memory: https://cxcs.microsoft.net/static/public/tips/neutral/6c6740da-0bfe-48a6-83fc-c98d1919b060/3addf02b7
              Source: bhv4A72.tmp.3.drString found in binary or memory: https://cxcs.microsoft.net/static/public/tips/neutral/fb5aa6fc-fb0f-43c0-9aba-9bf4642cdd05/9a3b4a8d1
              Source: bhv4A72.tmp.3.drString found in binary or memory: https://deff.nelreports.net/api/report?cat=msn
              Source: bhv4A72.tmp.3.drString found in binary or memory: https://dl.google.com/update2/installers/icons/%7B8a69d345-d564-463c-aff1-a69d9e530f96%7D.bmp?lang=e
              Source: bhv4A72.tmp.3.drString found in binary or memory: https://dsm09prdapp01-canary-opaph.netmon.azure.com/apc/trans.gif?8f6ec558c7d1c621e0d5881446d586b0
              Source: bhv4A72.tmp.3.drString found in binary or memory: https://dsm09prdapp01-canary-opaph.netmon.azure.com/apc/trans.gif?bbc9af5ecc12954d59c63a1771114562
              Source: DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exe, 00000003.00000003.72155537730.0000000002BE1000.00000004.00000020.00020000.00000000.sdmp, DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exe, 00000003.00000003.72156685235.00000000023E1000.00000004.00000020.00020000.00000000.sdmp, bhv4A72.tmp.3.drString found in binary or memory: https://eb2.3lift.com/sync?
              Source: bhv4A72.tmp.3.drString found in binary or memory: https://ecs.nel.measure.office.net?TenantId=ODSP_Sync_Client&DestinationEndpoint=Edge-Prod-BY3&Front
              Source: bhv4A72.tmp.3.drString found in binary or memory: https://ecs.nel.measure.office.net?TenantId=ODSP_Sync_Client&DestinationEndpoint=Edge-Prod-TEB31r4b&
              Source: bhv4A72.tmp.3.drString found in binary or memory: https://evoke-windowsservices-tas.msedge.net/ab
              Source: bhv4A72.tmp.3.drString found in binary or memory: https://fp-vp-nocache.azureedge.net/apc/trans.gif?6e329cf6426f83c8ee02e2bc96bdb46d
              Source: bhv4A72.tmp.3.drString found in binary or memory: https://fp-vp-nocache.azureedge.net/apc/trans.gif?d2c6e729d235d3f335d1d4751bb8eb91
              Source: bhv4A72.tmp.3.drString found in binary or memory: https://fp.msedge.net/conf/v1/asgw/fpconfig.min.json
              Source: bhv4A72.tmp.3.drString found in binary or memory: https://fp.msedge.net/conf/v2/asgw/fpconfig.min.json?monitorId=asgw
              Source: bhv4A72.tmp.3.drString found in binary or memory: https://geolocation.onetrust.com/cookieconsentpub/v1/geo/location
              Source: bhv4A72.tmp.3.drString found in binary or memory: https://googleads.g.doubleclick.net/pagead/ads?gdpr=1&gdpr_consent=CPM7kC1PM7kC1AcABBENBQCsAP_AAELAA
              Source: DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exe, 00000003.00000003.72158618198.00000000023E9000.00000004.00000020.00020000.00000000.sdmp, DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exe, 00000003.00000003.72158464140.00000000023E9000.00000004.00000020.00020000.00000000.sdmp, DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exe, 00000003.00000003.72158081050.00000000023E9000.00000004.00000020.00020000.00000000.sdmp, DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exe, 00000003.00000003.72158147333.00000000023E9000.00000004.00000020.00020000.00000000.sdmp, DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exe, 00000003.00000003.72156685235.00000000023E1000.00000004.00000020.00020000.00000000.sdmp, bhv4A72.tmp.3.drString found in binary or memory: https://googleads.g.doubleclick.net/pagead/drt/s?v=r20120211
              Source: DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exe, 00000003.00000003.72158618198.00000000023E9000.00000004.00000020.00020000.00000000.sdmp, DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exe, 00000003.00000003.72156421850.00000000023ED000.00000004.00000020.00020000.00000000.sdmp, DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exe, 00000003.00000003.72161424009.00000000023ED000.00000004.00000020.00020000.00000000.sdmp, DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exe, 00000003.00000003.72160589460.00000000023E5000.00000004.00000020.00020000.00000000.sdmp, DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exe, 00000003.00000003.72158464140.00000000023E9000.00000004.00000020.00020000.00000000.sdmp, DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exe, 00000003.00000003.72158936505.00000000023E4000.00000004.00000020.00020000.00000000.sdmp, DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exe, 00000003.00000003.72158718600.00000000023E9000.00000004.00000020.00020000.00000000.sdmp, DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exe, 00000003.00000003.72158081050.00000000023E9000.00000004.00000020.00020000.00000000.sdmp, DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exe, 00000003.00000003.72156262260.0000000002BE6000.00000004.00000020.00020000.00000000.sdmp, DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exe, 00000003.00000003.72156368659.0000000002BE6000.00000004.00000020.00020000.00000000.sdmp, DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exe, 00000003.00000003.72161071438.00000000023E5000.00000004.00000020.00020000.00000000.sdmp, DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exe, 00000003.00000003.72158147333.00000000023E9000.00000004.00000020.00020000.00000000.sdmp, DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exe, 00000003.00000003.72156470796.0000000002BE6000.00000004.00000020.00020000.00000000.sdmp, DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exe, 00000003.00000003.72160204683.00000000023E5000.00000004.00000020.00020000.00000000.sdmp, DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exe, 00000003.00000003.72156685235.00000000023E1000.00000004.00000020.00020000.00000000.sdmp, DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exe, 00000003.00000003.72156210903.0000000002BE6000.00000004.00000020.00020000.00000000.sdmp, DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exe, 00000003.00000003.72159712663.00000000023E4000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://googleads.g.doubleclick.net/pagead/drt/s?v=r20120211https://googleads.g.doubleclick.net/page
              Source: bhv4A72.tmp.3.drString found in binary or memory: https://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml
              Source: bhv4A72.tmp.3.drString found in binary or memory: https://ib.3lift.com/sync.js
              Source: bhv4A72.tmp.3.drString found in binary or memory: https://ib.adnxs.com/
              Source: DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exe, 00000003.00000003.72156685235.00000000023E1000.00000004.00000020.00020000.00000000.sdmp, bhv4A72.tmp.3.drString found in binary or memory: https://ib.adnxs.com/async_usersync_file
              Source: bhv4A72.tmp.3.drString found in binary or memory: https://img-prod-cms-rt-microsoft-com.akamaized.net/cms/api/am/imageFileData/RE1Mu3b?ver=5c31
              Source: bhv4A72.tmp.3.drString found in binary or memory: https://img-prod-cms-rt-microsoft-com.akamaized.net/cms/api/am/imageFileData/RE4DnuZ
              Source: bhv4A72.tmp.3.drString found in binary or memory: https://img-prod-cms-rt-microsoft-com.akamaized.net/cms/api/am/imageFileData/RE4Dnv6
              Source: bhv4A72.tmp.3.drString found in binary or memory: https://img-prod-cms-rt-microsoft-com.akamaized.net/cms/api/am/imageFileData/RE4DsDH
              Source: bhv4A72.tmp.3.drString found in binary or memory: https://img-prod-cms-rt-microsoft-com.akamaized.net/cms/api/am/imageFileData/RE4GhRT?ver=5f90
              Source: bhv4A72.tmp.3.drString found in binary or memory: https://img-prod-cms-rt-microsoft-com.akamaized.net/cms/api/am/imageFileData/RE4GhRY?ver=52e8
              Source: bhv4A72.tmp.3.drString found in binary or memory: https://img-prod-cms-rt-microsoft-com.akamaized.net/cms/api/am/imageFileData/RE4OALs
              Source: bhv4A72.tmp.3.drString found in binary or memory: https://img-prod-cms-rt-microsoft-com.akamaized.net/cms/api/am/imageFileData/RE4OAdg?ver=1c49
              Source: bhv4A72.tmp.3.drString found in binary or memory: https://img-prod-cms-rt-microsoft-com.akamaized.net/cms/api/am/imageFileData/RE4OFrw?ver=d941
              Source: bhv4A72.tmp.3.drString found in binary or memory: https://img-prod-cms-rt-microsoft-com.akamaized.net/cms/api/am/imageFileData/RE4OFrz?ver=8427
              Source: bhv4A72.tmp.3.drString found in binary or memory: https://img-prod-cms-rt-microsoft-com.akamaized.net/cms/api/am/imageFileData/RE4OI51?ver=0686
              Source: bhv4A72.tmp.3.drString found in binary or memory: https://img-prod-cms-rt-microsoft-com.akamaized.net/cms/api/am/imageFileData/RE4ONWz
              Source: bhv4A72.tmp.3.drString found in binary or memory: https://img-prod-cms-rt-microsoft-com.akamaized.net/cms/api/am/imageFileData/RE4n1yl
              Source: bhv4A72.tmp.3.drString found in binary or memory: https://img-prod-cms-rt-microsoft-com.akamaized.net/cms/api/am/imageFileData/RE4ncJ7
              Source: bhv4A72.tmp.3.drString found in binary or memory: https://img-prod-cms-rt-microsoft-com.akamaized.net/cms/api/am/imageFileData/RE4ncJa
              Source: bhv4A72.tmp.3.drString found in binary or memory: https://img-prod-cms-rt-microsoft-com.akamaized.net/cms/api/am/imageFileData/RE4nqTh
              Source: bhv4A72.tmp.3.drString found in binary or memory: https://img-prod-cms-rt-microsoft-com.akamaized.net/cms/api/am/imageFileData/RWB7v5
              Source: bhv4A72.tmp.3.drString found in binary or memory: https://img-prod-cms-rt-microsoft-com.akamaized.net/cms/api/am/imageFileData/RWFNIa
              Source: bhv4A72.tmp.3.drString found in binary or memory: https://img-prod-cms-rt-microsoft-com.akamaized.net/cms/api/am/imageFileData/RWFNIj
              Source: bhv4A72.tmp.3.drString found in binary or memory: https://img-prod-cms-rt-microsoft-com.akamaized.net/cms/api/am/imageFileData/RWG0VH
              Source: bhv4A72.tmp.3.drString found in binary or memory: https://img-prod-cms-rt-microsoft-com.akamaized.net/cms/api/am/imageFileData/RWLuYO
              Source: bhv4A72.tmp.3.drString found in binary or memory: https://img-s-msn-com.akamaized.net/tenant/amp/entityid/AAKp8YX?h=16&w=16&m=6&q=60&u=t&o=t&l=f&f=png
              Source: bhv4A72.tmp.3.drString found in binary or memory: https://img-s-msn-com.akamaized.net/tenant/amp/entityid/AAMqFmF?h=16&w=16&m=6&q=60&u=t&o=t&l=f&f=png
              Source: bhv4A72.tmp.3.drString found in binary or memory: https://img-s-msn-com.akamaized.net/tenant/amp/entityid/AANf6qa.img?h=16&w=16&m=6&q=60&u=t&o=t&l=f&f
              Source: bhv4A72.tmp.3.drString found in binary or memory: https://img-s-msn-com.akamaized.net/tenant/amp/entityid/AANf6qa?h=16&w=16&m=6&q=60&u=t&o=t&l=f&f=png
              Source: bhv4A72.tmp.3.drString found in binary or memory: https://img-s-msn-com.akamaized.net/tenant/amp/entityid/AAODMk8?h=75&w=100&m=6&q=60&u=t&o=t&l=f&f=jp
              Source: bhv4A72.tmp.3.drString found in binary or memory: https://img-s-msn-com.akamaized.net/tenant/amp/entityid/AAODQmd?h=75&w=100&m=6&q=60&u=t&o=t&l=f&f=jp
              Source: bhv4A72.tmp.3.drString found in binary or memory: https://img-s-msn-com.akamaized.net/tenant/amp/entityid/AAODept?h=75&w=100&m=6&q=60&u=t&o=t&l=f
              Source: bhv4A72.tmp.3.drString found in binary or memory: https://img-s-msn-com.akamaized.net/tenant/amp/entityid/AAOEFck?h=75&w=100&m=6&q=60&u=t&o=t&l=f&x=82
              Source: bhv4A72.tmp.3.drString found in binary or memory: https://img-s-msn-com.akamaized.net/tenant/amp/entityid/AAOEQ0I?h=368&w=622&m=6&q=60&u=t&o=t&l=f&f=j
              Source: bhv4A72.tmp.3.drString found in binary or memory: https://img-s-msn-com.akamaized.net/tenant/amp/entityid/AAOF4WR?h=75&w=100&m=6&q=60&u=t&o=t&l=f
              Source: bhv4A72.tmp.3.drString found in binary or memory: https://img-s-msn-com.akamaized.net/tenant/amp/entityid/AAOF4Xx?h=368&w=622&m=6&q=60&u=t&o=t&l=f&f=j
              Source: bhv4A72.tmp.3.drString found in binary or memory: https://img-s-msn-com.akamaized.net/tenant/amp/entityid/AAOFBrV?h=75&w=100&m=6&q=60&u=t&o=t&l=f
              Source: bhv4A72.tmp.3.drString found in binary or memory: https://img-s-msn-com.akamaized.net/tenant/amp/entityid/AAOFC5q?h=75&w=100&m=6&q=60&u=t&o=t&l=f
              Source: bhv4A72.tmp.3.drString found in binary or memory: https://img-s-msn-com.akamaized.net/tenant/amp/entityid/AAOFCgW?h=250&w=300&m=6&q=60&u=t&o=t&l=f&f=j
              Source: bhv4A72.tmp.3.drString found in binary or memory: https://img-s-msn-com.akamaized.net/tenant/amp/entityid/AAOFCgW?h=75&w=100&m=6&q=60&u=t&o=t&l=f&f=jp
              Source: bhv4A72.tmp.3.drString found in binary or memory: https://img-s-msn-com.akamaized.net/tenant/amp/entityid/AAOFE0J?h=75&w=100&m=6&q=60&u=t&o=t&l=f&x=70
              Source: bhv4A72.tmp.3.drString found in binary or memory: https://img-s-msn-com.akamaized.net/tenant/amp/entityid/AAOFENj?h=75&w=100&m=6&q=60&u=t&o=t&l=f&f=jp
              Source: bhv4A72.tmp.3.drString found in binary or memory: https://img-s-msn-com.akamaized.net/tenant/amp/entityid/AAOFJFJ?h=75&w=100&m=6&q=60&u=t&o=t&l=f&f=jp
              Source: bhv4A72.tmp.3.drString found in binary or memory: https://img-s-msn-com.akamaized.net/tenant/amp/entityid/AAOFLk7?h=75&w=100&m=6&q=60&u=t&o=t&l=f&x=43
              Source: bhv4A72.tmp.3.drString found in binary or memory: https://img-s-msn-com.akamaized.net/tenant/amp/entityid/AAOFWV8?h=75&w=100&m=6&q=60&u=t&o=t&l=f&f=jp
              Source: bhv4A72.tmp.3.drString found in binary or memory: https://img-s-msn-com.akamaized.net/tenant/amp/entityid/AAOFhty?h=368&w=622&m=6&q=60&u=t&o=t&l=f&f=j
              Source: bhv4A72.tmp.3.drString found in binary or memory: https://img-s-msn-com.akamaized.net/tenant/amp/entityid/AAOFsUC?h=250&w=300&m=6&q=60&u=t&o=t&l=f&f=j
              Source: bhv4A72.tmp.3.drString found in binary or memory: https://img-s-msn-com.akamaized.net/tenant/amp/entityid/AAOFu51?h=75&w=100&m=6&q=60&u=t&o=t&l=f&f=jp
              Source: bhv4A72.tmp.3.drString found in binary or memory: https://img-s-msn-com.akamaized.net/tenant/amp/entityid/AAOFy7B?h=75&w=100&m=6&q=60&u=t&o=t&l=f
              Source: bhv4A72.tmp.3.drString found in binary or memory: https://img-s-msn-com.akamaized.net/tenant/amp/entityid/AAOFyKG?h=75&w=100&m=6&q=60&u=t&o=t&l=f&x=60
              Source: bhv4A72.tmp.3.drString found in binary or memory: https://img-s-msn-com.akamaized.net/tenant/amp/entityid/AAOG3Y7?h=250&w=300&m=6&q=60&u=t&o=t&l=f&f=j
              Source: bhv4A72.tmp.3.drString found in binary or memory: https://img-s-msn-com.akamaized.net/tenant/amp/entityid/AAOG88s?h=75&w=100&m=6&q=60&u=t&o=t&l=f&f=jp
              Source: bhv4A72.tmp.3.drString found in binary or memory: https://img-s-msn-com.akamaized.net/tenant/amp/entityid/AAOGPXq?h=194&w=300&m=6&q=60&u=t&o=t&l=f
              Source: bhv4A72.tmp.3.drString found in binary or memory: https://img-s-msn-com.akamaized.net/tenant/amp/entityid/AAOGQtJ?h=75&w=100&m=6&q=60&u=t&o=t&l=f
              Source: bhv4A72.tmp.3.drString found in binary or memory: https://img-s-msn-com.akamaized.net/tenant/amp/entityid/AAOGV90?h=194&w=300&m=6&q=60&u=t&o=t&l=f&x=5
              Source: bhv4A72.tmp.3.drString found in binary or memory: https://img-s-msn-com.akamaized.net/tenant/amp/entityid/AAOGapF?h=75&w=100&m=6&q=60&u=t&o=t&l=f&f=jp
              Source: bhv4A72.tmp.3.drString found in binary or memory: https://img-s-msn-com.akamaized.net/tenant/amp/entityid/AAOGlbE?h=75&w=100&m=6&q=60&u=t&o=t&l=f&f=jp
              Source: bhv4A72.tmp.3.drString found in binary or memory: https://img-s-msn-com.akamaized.net/tenant/amp/entityid/AAOGmTG?h=75&w=100&m=6&q=60&u=t&o=t&l=f&f=jp
              Source: bhv4A72.tmp.3.drString found in binary or memory: https://img-s-msn-com.akamaized.net/tenant/amp/entityid/AAOGyYN?h=194&w=300&m=6&q=60&u=t&o=t&l=f
              Source: bhv4A72.tmp.3.drString found in binary or memory: https://img-s-msn-com.akamaized.net/tenant/amp/entityid/AAOH2Ml?h=194&w=300&m=6&q=60&u=t&o=t&l=f
              Source: bhv4A72.tmp.3.drString found in binary or memory: https://img-s-msn-com.akamaized.net/tenant/amp/entityid/AAOH6xB?h=75&w=100&m=6&q=60&u=t&o=t&l=f
              Source: bhv4A72.tmp.3.drString found in binary or memory: https://img-s-msn-com.akamaized.net/tenant/amp/entityid/BB10MkbM.img?h=16&w=16&m=6&q=60&u=t&o=t&l=f&
              Source: bhv4A72.tmp.3.drString found in binary or memory: https://img-s-msn-com.akamaized.net/tenant/amp/entityid/BB10MkbM?h=16&w=16&m=6&q=60&u=t&o=t&l=f&f=pn
              Source: bhv4A72.tmp.3.drString found in binary or memory: https://img-s-msn-com.akamaized.net/tenant/amp/entityid/BB14hq0P?h=368&w=622&m=6&q=60&u=t&o=t&l=f&f=
              Source: bhv4A72.tmp.3.drString found in binary or memory: https://img-s-msn-com.akamaized.net/tenant/amp/entityid/BB1aXBV1?h=27&w=27&m=6&q=60&u=t&o=t&l=f&f=pn
              Source: bhv4A72.tmp.3.drString found in binary or memory: https://img-s-msn-com.akamaized.net/tenant/amp/entityid/BB1cEP3G?h=27&w=27&m=6&q=60&u=t&o=t&l=f&f=pn
              Source: bhv4A72.tmp.3.drString found in binary or memory: https://img-s-msn-com.akamaized.net/tenant/amp/entityid/BB1cG73h?h=27&w=27&m=6&q=60&u=t&o=t&l=f&f=pn
              Source: bhv4A72.tmp.3.drString found in binary or memory: https://img-s-msn-com.akamaized.net/tenant/amp/entityid/BB1ftEY0?h=16&w=16&m=6&q=60&u=t&o=t&l=f&f=pn
              Source: bhv4A72.tmp.3.drString found in binary or memory: https://img-s-msn-com.akamaized.net/tenant/amp/entityid/BB1gEFcn?h=16&w=16&m=6&q=60&u=t&o=t&l=f&f=pn
              Source: bhv4A72.tmp.3.drString found in binary or memory: https://img-s-msn-com.akamaized.net/tenant/amp/entityid/BB1kc8s?m=6&o=true&u=true&n=true&w=30&h=30
              Source: bhv4A72.tmp.3.drString found in binary or memory: https://img-s-msn-com.akamaized.net/tenant/amp/entityid/BB7gRE?h=16&w=16&m=6&q=60&u=t&o=t&l=f&f=png
              Source: bhv4A72.tmp.3.drString found in binary or memory: https://img-s-msn-com.akamaized.net/tenant/amp/entityid/BB7hg4?h=16&w=16&m=6&q=60&u=t&o=t&l=f&f=png
              Source: bhv4A72.tmp.3.drString found in binary or memory: https://img-s-msn-com.akamaized.net/tenant/amp/entityid/BBPfCZL?h=27&w=27&m=6&q=60&u=t&o=t&l=f&f=png
              Source: bhv4A72.tmp.3.drString found in binary or memory: https://img-s-msn-com.akamaized.net/tenant/amp/entityid/BBVuddh?h=16&w=16&m=6&q=60&u=t&o=t&l=f&f=png
              Source: bhv4A72.tmp.3.drString found in binary or memory: https://img-s-msn-com.akamaized.net/tenant/amp/entityid/BBX2afX?h=27&w=27&m=6&q=60&u=t&o=t&l=f&f=png
              Source: bhv4A72.tmp.3.drString found in binary or memory: https://img-s-msn-com.akamaized.net/tenant/amp/entityid/BBkwUr.img?h=16&w=16&m=6&q=60&u=t&o=t&l=f&f=
              Source: bhv4A72.tmp.3.drString found in binary or memory: https://img-s-msn-com.akamaized.net/tenant/amp/entityid/BBkwUr?h=16&w=16&m=6&q=60&u=t&o=t&l=f&f=png
              Source: bhv4A72.tmp.3.drString found in binary or memory: https://img.img-taboola.com/taboola/image/fetch/f_jpg%2Cq_auto%2Ce_sharpen%2Ch_311%2Cw_207%2Cc_pad%2
              Source: bhv4A72.tmp.3.drString found in binary or memory: https://img.img-taboola.com/taboola/image/fetch/f_jpg%2Cq_auto%2Ch_311%2Cw_207%2Cc_fill%2Cg_faces:au
              Source: bhv4A72.tmp.3.drString found in binary or memory: https://img.img-taboola.com/taboola/image/fetch/f_jpg%2Cq_auto%2Ch_368%2Cw_622%2Cc_fill%2Cg_faces:au
              Source: bhv4A72.tmp.3.drString found in binary or memory: https://ims-na1.adobelogin.com/ims/authorize/v1?locale=en_us&client_id=AdobeReader9&redirect_uri=htt
              Source: DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exe, 00000002.00000001.71300341533.0000000000649000.00000020.00000001.01000000.00000007.sdmpString found in binary or memory: https://inference.location.live.net/inferenceservice/v21/Pox/GetLocationUsingFingerprinte1e71f6b-214
              Source: DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exe, 00000003.00000002.72161812904.0000000000193000.00000004.00000010.00020000.00000000.sdmp, DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exe, 00000003.00000003.72161071438.00000000023E2000.00000004.00000020.00020000.00000000.sdmp, bhv4A72.tmp.3.drString found in binary or memory: https://login.live.com/
              Source: DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exe, 00000003.00000003.72161071438.00000000023E2000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com//
              Source: DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exe, 00000003.00000002.72161812904.0000000000193000.00000004.00000010.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/TI
              Source: DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exe, 00000003.00000003.72156685235.00000000023E1000.00000004.00000020.00020000.00000000.sdmp, DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exe, 00000003.00000003.72156102680.0000000002BE6000.00000004.00000020.00020000.00000000.sdmp, DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exe, 00000003.00000003.72156210903.0000000002BE6000.00000004.00000020.00020000.00000000.sdmp, DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exe, 00000003.00000003.72159712663.00000000023E4000.00000004.00000020.00020000.00000000.sdmp, bhv4A72.tmp.3.drString found in binary or memory: https://login.live.com/login.srf?wa=wsignin1.0&rpsnv=13&checkda=1&ct=1632306842&rver=7.0.6730.0&wp=l
              Source: DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exe, 00000003.00000003.72156421850.00000000023ED000.00000004.00000020.00020000.00000000.sdmp, DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exe, 00000003.00000003.72161424009.00000000023ED000.00000004.00000020.00020000.00000000.sdmp, DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exe, 00000003.00000003.72155993194.00000000023ED000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/login.srfhttps://www.google.com/pagead/drt/uihttps://www.google.com/recaptcha
              Source: bhv4A72.tmp.3.drString found in binary or memory: https://login.live.com/ppsecure/InlineClientAuth.srf?route=C512_BAY&stsid=S.BC4837E917425070&uaid=d9
              Source: bhv4A72.tmp.3.drString found in binary or memory: https://login.live.com/ppsecure/InlineClientAuth.srf?stsft=-DhB9Gg0Em7s2jvLPGG9crywwB
              Source: bhv4A72.tmp.3.drString found in binary or memory: https://login.live.com/ppsecure/InlineLogin.srf?id=80604&scid=1&mkt=en-US&Platform=Windows10&clienti
              Source: bhv4A72.tmp.3.drString found in binary or memory: https://login.live.com/ppsecure/InlineLogin.srf?route=C512_BAY&uaid=b6de8762e4ae48b19a7d0d74ba392110
              Source: bhv4A72.tmp.3.drString found in binary or memory: https://login.live.com/ppsecure/post.srf?mkt=en-US&platform=Windows10&id=80604&clientid=000000004807
              Source: DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exe, 00000003.00000003.72161071438.00000000023E2000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/v104
              Source: DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exeString found in binary or memory: https://login.yahoo.com/config/login
              Source: bhv4A72.tmp.3.drString found in binary or memory: https://logincdn.msauth.net/16.000/Converged_v21033_mG-wAdV--_sq1kXms675SA2.css
              Source: bhv4A72.tmp.3.drString found in binary or memory: https://logincdn.msauth.net/16.000/content/js/ConvergedFinishStrings.en_n0x1vWZ9nk5hsb6ZgnoOdw2.js
              Source: bhv4A72.tmp.3.drString found in binary or memory: https://logincdn.msauth.net/16.000/content/js/ConvergedLoginPaginatedStrings.en_VjBVCmhpr777yb9vmuAJ
              Source: bhv4A72.tmp.3.drString found in binary or memory: https://logincdn.msauth.net/16.000/content/js/WinJS_vcvx4TydCFioSeM4NLxTDw2.js
              Source: bhv4A72.tmp.3.drString found in binary or memory: https://logincdn.msauth.net/shared/1.0/content/images/arrow_left_43280e0ba671a1d8b5e34f1931c4fe4b.sv
              Source: bhv4A72.tmp.3.drString found in binary or memory: https://logincdn.msauth.net/shared/1.0/content/images/backgrounds/2_11d9e3bcdfede9ce5ce5ace2d129f1c4
              Source: bhv4A72.tmp.3.drString found in binary or memory: https://logincdn.msauth.net/shared/1.0/content/images/marching_ants_986f40b5a9dc7d39ef8396797f61b323
              Source: bhv4A72.tmp.3.drString found in binary or memory: https://logincdn.msauth.net/shared/1.0/content/images/marching_ants_white_8257b0707cbe1d0bd2661b8006
              Source: bhv4A72.tmp.3.drString found in binary or memory: https://logincdn.msauth.net/shared/1.0/content/images/microsoft_logo_564db913a7fa0ca42727161c6d031be
              Source: bhv4A72.tmp.3.drString found in binary or memory: https://logincdn.msauth.net/shared/1.0/content/js/Win10HostFinish_PCore_uuJCSTysLQ9JSYLCWmrHPQ2.js
              Source: bhv4A72.tmp.3.drString found in binary or memory: https://logincdn.msauth.net/shared/1.0/content/js/Win10HostLogin_PCore_3J49gjRV3LSCVj6qj73kPQ2.js
              Source: bhv4A72.tmp.3.drString found in binary or memory: https://logincdn.msauth.net/shared/1.0/content/js/asyncchunk/win10hostlogin_ppassword_0901d04301714f
              Source: bhv4A72.tmp.3.drString found in binary or memory: https://logincdn.msauth.net/shared/1.0/content/js/oneDs_f2e0f4a029670f10d892.js
              Source: bhv4A72.tmp.3.drString found in binary or memory: https://logincdn.msftauth.net/16.000/Converged_v21033_mG-wAdV--_sq1kXms675SA2.css
              Source: bhv4A72.tmp.3.drString found in binary or memory: https://maps.windows.com/.well-known/windows-app-web-link
              Source: DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exe, 00000002.00000003.73355415794.000000000364C000.00000004.00000020.00020000.00000000.sdmp, DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exe, 00000002.00000003.72131412308.0000000003644000.00000004.00000020.00020000.00000000.sdmp, DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exe, 00000002.00000003.72098425641.000000000364C000.00000004.00000020.00020000.00000000.sdmp, DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exe, 00000002.00000003.71388238325.0000000003654000.00000004.00000020.00020000.00000000.sdmp, DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exe, 00000002.00000003.72163777757.0000000003644000.00000004.00000020.00020000.00000000.sdmp, DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exe, 00000002.00000003.73365841768.0000000003644000.00000004.00000020.00020000.00000000.sdmp, DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exe, 00000002.00000003.71388120426.0000000003654000.00000004.00000020.00020000.00000000.sdmp, DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exe, 00000002.00000003.73355675137.000000000364C000.00000004.00000020.00020000.00000000.sdmp, DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exe, 00000002.00000003.73375358957.0000000003644000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://ocsp.quovadisoffshore.com0
              Source: bhv4A72.tmp.3.drString found in binary or memory: https://odc.officeapps.live.com/odc/v2.1/hrd?lcid=1033&syslcid=2057&uilcid=1033&app=0&ver=16&build=1
              Source: bhv4A72.tmp.3.drString found in binary or memory: https://odc.officeapps.live.com/odc/v2.1/hrd?lcid=1033&syslcid=2057&uilcid=1033&app=1&ver=16&build=1
              Source: DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exe, 00000003.00000003.72156262260.0000000002BE6000.00000004.00000020.00020000.00000000.sdmp, DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exe, 00000003.00000003.72156470796.0000000002BE6000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://odc.officeapps.live.com/odc/v2.1/hrdres://C:
              Source: bhv4A72.tmp.3.drString found in binary or memory: https://oneclient.sfx.ms/PreSignInSettings/Prod/2022-09-17-00-05-23/PreSignInSettingsConfig.json
              Source: bhv4A72.tmp.3.drString found in binary or memory: https://outlookmobile-office365-tas.msedge.net/ab?clientId=512A4435-60B8-42A2-80D3-582B6B7FB6C0&ig=1
              Source: bhv4A72.tmp.3.drString found in binary or memory: https://ow1.res.office365.com/apc/trans.gif?2787436b358dbd81d7fd0a0cccb05788
              Source: bhv4A72.tmp.3.drString found in binary or memory: https://ow1.res.office365.com/apc/trans.gif?2f068a709ecd1f0c000b440d901cea9b
              Source: bhv4A72.tmp.3.drString found in binary or memory: https://pagead2.googlesyndication.com/pagead/gen_csp?id=adbundle&qqi=CPuOuO2wkvMCFQDJuwgdDw4EyQ&gqi=
              Source: bhv4A72.tmp.3.drString found in binary or memory: https://pki.goog/repository/0
              Source: bhv4A72.tmp.3.drString found in binary or memory: https://polyfill.io/v3/polyfill.min.js?features=2CElement.prototype.matches%2CElement.prototype.clos
              Source: bhv4A72.tmp.3.drString found in binary or memory: https://px.ads.linkedin.com/setuid?partner=tripleliftdbredirect&tlUid=13122329571212727769&dbredirec
              Source: bhv4A72.tmp.3.drString found in binary or memory: https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct
              Source: bhv4A72.tmp.3.drString found in binary or memory: https://s.yimg.com/lo/api/res/1.2/7zPvmktG8JzqA0vnWzpk_g--~A/Zmk9Zml0O3c9NjIyO2g9MzY4O2FwcGlkPWdlbWl
              Source: bhv4A72.tmp.3.drString found in binary or memory: https://s1.adform.net/Banners/Elements/Files/2070608/10170131/bvpath_258/pics/footer.png
              Source: bhv4A72.tmp.3.drString found in binary or memory: https://s1.adform.net/Banners/Elements/Files/2070608/10170131/bvpath_258/pics/k2.jpg
              Source: bhv4A72.tmp.3.drString found in binary or memory: https://s1.adform.net/Banners/Elements/Files/2070608/10170131/bvpath_258/pics/k3.jpg
              Source: bhv4A72.tmp.3.drString found in binary or memory: https://s1.adform.net/Banners/Elements/Files/2070608/10170131/bvpath_258/pics/k4.jpg
              Source: bhv4A72.tmp.3.drString found in binary or memory: https://s1.adform.net/banners/scripts/rmb/Adform.DHTML.js?bv=626
              Source: bhv4A72.tmp.3.drString found in binary or memory: https://sectigo.com/CPS0
              Source: DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exe, 00000003.00000003.72156685235.00000000023E1000.00000004.00000020.00020000.00000000.sdmp, DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exe, 00000003.00000003.72156102680.0000000002BE6000.00000004.00000020.00020000.00000000.sdmp, DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exe, 00000003.00000003.72156210903.0000000002BE6000.00000004.00000020.00020000.00000000.sdmp, DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exe, 00000003.00000003.72159712663.00000000023E4000.00000004.00000020.00020000.00000000.sdmp, bhv4A72.tmp.3.drString found in binary or memory: https://servedby.flashtalking.com/imp/8/106228;3700839;201;jsiframe;Adobe;1000x463DESKTOPACROBATREAD
              Source: bhv4A72.tmp.3.drString found in binary or memory: https://srtb.msn.com/auction?a=de-ch&b=4aeddfea844042999a22bdcca1fba378&c=MSN&d=https%3A%2F%2Fwww.ms
              Source: bhv4A72.tmp.3.drString found in binary or memory: https://srtb.msn.com/auction?a=de-ch&b=838b780a64e64b0d92d628632c1c377c&c=MSN&d=https%3A%2F%2Fwww.ms
              Source: bhv4A72.tmp.3.drString found in binary or memory: https://srtb.msn.com/auction?a=de-ch&b=bba24733ba4a487f8f8706bf3811269e&c=MSN&d=https%3A%2F%2Fwww.ms
              Source: bhv4A72.tmp.3.drString found in binary or memory: https://static-ecst.licdn.com/apc/trans.gif?ae11829b3d6e895a2a3516fac536a339
              Source: bhv4A72.tmp.3.drString found in binary or memory: https://static-ecst.licdn.com/apc/trans.gif?fa0d4adae7a556f7d0d03112de822178
              Source: bhv4A72.tmp.3.drString found in binary or memory: https://static-global-s-msn-com.akamaized.net/hp-neu/_h/975a7d20/webcore/externalscripts/jquery/jque
              Source: bhv4A72.tmp.3.drString found in binary or memory: https://static-global-s-msn-com.akamaized.net/hp-neu/de-ch/homepage/_sc/css/f60532dd-d68e7b58/direct
              Source: bhv4A72.tmp.3.drString found in binary or memory: https://static-global-s-msn-com.akamaized.net/hp-neu/de-ch/homepage/_sc/js/f60532dd-2923b6c2/directi
              Source: bhv4A72.tmp.3.drString found in binary or memory: https://static-global-s-msn-com.akamaized.net/hp-neu/de-ch/homepage/_sc/js/f60532dd-d017f019/directi
              Source: bhv4A72.tmp.3.drString found in binary or memory: https://static-global-s-msn-com.akamaized.net/hp-neu/sc/2b/a5ea21.ico
              Source: bhv4A72.tmp.3.drString found in binary or memory: https://static-global-s-msn-com.akamaized.net/hp-neu/sc/64/a8a064.gif
              Source: bhv4A72.tmp.3.drString found in binary or memory: https://static-global-s-msn-com.akamaized.net/hp-neu/sc/9b/e151e5.gif
              Source: bhv4A72.tmp.3.drString found in binary or memory: https://static-global-s-msn-com.akamaized.net/hp-neu/sc/c6/cfdbd9.png
              Source: bhv4A72.tmp.3.drString found in binary or memory: https://static-global-s-msn-com.akamaized.net/hp-neu/sc/ea/4996b9.woff
              Source: bhv4A72.tmp.3.drString found in binary or memory: https://static-global-s-msn-com.akamaized.net/img-resizer/tenant/amp/entityid/AAKp8YX.img?h=16&w=16&
              Source: bhv4A72.tmp.3.drString found in binary or memory: https://static-global-s-msn-com.akamaized.net/img-resizer/tenant/amp/entityid/AAMqFmF.img?h=16&w=16&
              Source: bhv4A72.tmp.3.drString found in binary or memory: https://static-global-s-msn-com.akamaized.net/img-resizer/tenant/amp/entityid/AAODMk8.img?h=75&w=100
              Source: bhv4A72.tmp.3.drString found in binary or memory: https://static-global-s-msn-com.akamaized.net/img-resizer/tenant/amp/entityid/AAODQmd.img?h=75&w=100
              Source: bhv4A72.tmp.3.drString found in binary or memory: https://static-global-s-msn-com.akamaized.net/img-resizer/tenant/amp/entityid/AAODept.img?h=75&w=100
              Source: bhv4A72.tmp.3.drString found in binary or memory: https://static-global-s-msn-com.akamaized.net/img-resizer/tenant/amp/entityid/AAOEFck.img?h=75&w=100
              Source: bhv4A72.tmp.3.drString found in binary or memory: https://static-global-s-msn-com.akamaized.net/img-resizer/tenant/amp/entityid/AAOEQ0I.img?h=368&w=62
              Source: bhv4A72.tmp.3.drString found in binary or memory: https://static-global-s-msn-com.akamaized.net/img-resizer/tenant/amp/entityid/AAOF4WR.img?h=75&w=100
              Source: bhv4A72.tmp.3.drString found in binary or memory: https://static-global-s-msn-com.akamaized.net/img-resizer/tenant/amp/entityid/AAOF4Xx.img?h=368&w=62
              Source: bhv4A72.tmp.3.drString found in binary or memory: https://static-global-s-msn-com.akamaized.net/img-resizer/tenant/amp/entityid/AAOFBrV.img?h=75&w=100
              Source: bhv4A72.tmp.3.drString found in binary or memory: https://static-global-s-msn-com.akamaized.net/img-resizer/tenant/amp/entityid/AAOFC5q.img?h=75&w=100
              Source: bhv4A72.tmp.3.drString found in binary or memory: https://static-global-s-msn-com.akamaized.net/img-resizer/tenant/amp/entityid/AAOFCgW.img?h=250&w=30
              Source: bhv4A72.tmp.3.drString found in binary or memory: https://static-global-s-msn-com.akamaized.net/img-resizer/tenant/amp/entityid/AAOFCgW.img?h=75&w=100
              Source: bhv4A72.tmp.3.drString found in binary or memory: https://static-global-s-msn-com.akamaized.net/img-resizer/tenant/amp/entityid/AAOFE0J.img?h=75&w=100
              Source: bhv4A72.tmp.3.drString found in binary or memory: https://static-global-s-msn-com.akamaized.net/img-resizer/tenant/amp/entityid/AAOFENj.img?h=75&w=100
              Source: bhv4A72.tmp.3.drString found in binary or memory: https://static-global-s-msn-com.akamaized.net/img-resizer/tenant/amp/entityid/AAOFJFJ.img?h=75&w=100
              Source: bhv4A72.tmp.3.drString found in binary or memory: https://static-global-s-msn-com.akamaized.net/img-resizer/tenant/amp/entityid/AAOFLk7.img?h=75&w=100
              Source: bhv4A72.tmp.3.drString found in binary or memory: https://static-global-s-msn-com.akamaized.net/img-resizer/tenant/amp/entityid/AAOFWV8.img?h=75&w=100
              Source: bhv4A72.tmp.3.drString found in binary or memory: https://static-global-s-msn-com.akamaized.net/img-resizer/tenant/amp/entityid/AAOFhty.img?h=368&w=62
              Source: bhv4A72.tmp.3.drString found in binary or memory: https://static-global-s-msn-com.akamaized.net/img-resizer/tenant/amp/entityid/AAOFsUC.img?h=250&w=30
              Source: bhv4A72.tmp.3.drString found in binary or memory: https://static-global-s-msn-com.akamaized.net/img-resizer/tenant/amp/entityid/AAOFu51.img?h=75&w=100
              Source: bhv4A72.tmp.3.drString found in binary or memory: https://static-global-s-msn-com.akamaized.net/img-resizer/tenant/amp/entityid/AAOFy7B.img?h=75&w=100
              Source: bhv4A72.tmp.3.drString found in binary or memory: https://static-global-s-msn-com.akamaized.net/img-resizer/tenant/amp/entityid/AAOFyKG.img?h=75&w=100
              Source: bhv4A72.tmp.3.drString found in binary or memory: https://static-global-s-msn-com.akamaized.net/img-resizer/tenant/amp/entityid/AAOG3Y7.img?h=250&w=30
              Source: bhv4A72.tmp.3.drString found in binary or memory: https://static-global-s-msn-com.akamaized.net/img-resizer/tenant/amp/entityid/AAOG88s.img?h=75&w=100
              Source: bhv4A72.tmp.3.drString found in binary or memory: https://static-global-s-msn-com.akamaized.net/img-resizer/tenant/amp/entityid/AAOGPXq.img?h=194&w=30
              Source: bhv4A72.tmp.3.drString found in binary or memory: https://static-global-s-msn-com.akamaized.net/img-resizer/tenant/amp/entityid/AAOGQtJ.img?h=75&w=100
              Source: bhv4A72.tmp.3.drString found in binary or memory: https://static-global-s-msn-com.akamaized.net/img-resizer/tenant/amp/entityid/AAOGV90.img?h=194&w=30
              Source: bhv4A72.tmp.3.drString found in binary or memory: https://static-global-s-msn-com.akamaized.net/img-resizer/tenant/amp/entityid/AAOGapF.img?h=75&w=100
              Source: bhv4A72.tmp.3.drString found in binary or memory: https://static-global-s-msn-com.akamaized.net/img-resizer/tenant/amp/entityid/AAOGlbE.img?h=75&w=100
              Source: bhv4A72.tmp.3.drString found in binary or memory: https://static-global-s-msn-com.akamaized.net/img-resizer/tenant/amp/entityid/AAOGmTG.img?h=75&w=100
              Source: bhv4A72.tmp.3.drString found in binary or memory: https://static-global-s-msn-com.akamaized.net/img-resizer/tenant/amp/entityid/AAOGyYN.img?h=194&w=30
              Source: bhv4A72.tmp.3.drString found in binary or memory: https://static-global-s-msn-com.akamaized.net/img-resizer/tenant/amp/entityid/AAOH2Ml.img?h=194&w=30
              Source: bhv4A72.tmp.3.drString found in binary or memory: https://static-global-s-msn-com.akamaized.net/img-resizer/tenant/amp/entityid/AAOH6xB.img?h=75&w=100
              Source: bhv4A72.tmp.3.drString found in binary or memory: https://static-global-s-msn-com.akamaized.net/img-resizer/tenant/amp/entityid/BB14hq0P.img?h=368&w=6
              Source: bhv4A72.tmp.3.drString found in binary or memory: https://static-global-s-msn-com.akamaized.net/img-resizer/tenant/amp/entityid/BB1aXBV1.img?h=27&w=27
              Source: bhv4A72.tmp.3.drString found in binary or memory: https://static-global-s-msn-com.akamaized.net/img-resizer/tenant/amp/entityid/BB1cEP3G.img?h=27&w=27
              Source: bhv4A72.tmp.3.drString found in binary or memory: https://static-global-s-msn-com.akamaized.net/img-resizer/tenant/amp/entityid/BB1cG73h.img?h=27&w=27
              Source: bhv4A72.tmp.3.drString found in binary or memory: https://static-global-s-msn-com.akamaized.net/img-resizer/tenant/amp/entityid/BB1ftEY0.img?h=16&w=16
              Source: bhv4A72.tmp.3.drString found in binary or memory: https://static-global-s-msn-com.akamaized.net/img-resizer/tenant/amp/entityid/BB1gEFcn.img?h=16&w=16
              Source: bhv4A72.tmp.3.drString found in binary or memory: https://static-global-s-msn-com.akamaized.net/img-resizer/tenant/amp/entityid/BB1kc8s.img?m=6&o=true
              Source: bhv4A72.tmp.3.drString found in binary or memory: https://static-global-s-msn-com.akamaized.net/img-resizer/tenant/amp/entityid/BB7gRE.img?h=16&w=16&m
              Source: bhv4A72.tmp.3.drString found in binary or memory: https://static-global-s-msn-com.akamaized.net/img-resizer/tenant/amp/entityid/BB7hg4.img?h=16&w=16&m
              Source: bhv4A72.tmp.3.drString found in binary or memory: https://static-global-s-msn-com.akamaized.net/img-resizer/tenant/amp/entityid/BBPfCZL.img?h=27&w=27&
              Source: bhv4A72.tmp.3.drString found in binary or memory: https://static-global-s-msn-com.akamaized.net/img-resizer/tenant/amp/entityid/BBVuddh.img?h=16&w=16&
              Source: bhv4A72.tmp.3.drString found in binary or memory: https://static-global-s-msn-com.akamaized.net/img-resizer/tenant/amp/entityid/BBX2afX.img?h=27&w=27&
              Source: bhv4A72.tmp.3.drString found in binary or memory: https://static-spartan-neu-s-msn-com.akamaized.net/_h/975a7d20/webcore/externalscripts/jquery/jquery
              Source: bhv4A72.tmp.3.drString found in binary or memory: https://static-spartan-neu-s-msn-com.akamaized.net/spartan/en-gb/_ssc/css/b5dff51-e7c3b187/kernel-9c
              Source: bhv4A72.tmp.3.drString found in binary or memory: https://static-spartan-neu-s-msn-com.akamaized.net/spartan/en-gb/_ssc/js/b5dff51-96897e59/kernel-1e4
              Source: bhv4A72.tmp.3.drString found in binary or memory: https://static.doubleclick.net/dynamic/5/283983386/11928812572019506176_2845462151855228713.jpeg
              Source: bhv4A72.tmp.3.drString found in binary or memory: https://static.doubleclick.net/dynamic/5/283983386/2578937774238713912_2802581922324906360.jpeg
              Source: bhv4A72.tmp.3.drString found in binary or memory: https://static.doubleclick.net/dynamic/5/283983386/6852827437855218848_345419970373613283.jpeg
              Source: bhv4A72.tmp.3.drString found in binary or memory: https://static2.sharepointonline.com/files/fabric/assets/fonts/segoeui-westeuropean/segoeui-bold.wof
              Source: bhv4A72.tmp.3.drString found in binary or memory: https://static2.sharepointonline.com/files/fabric/assets/fonts/segoeui-westeuropean/segoeui-light.wo
              Source: bhv4A72.tmp.3.drString found in binary or memory: https://static2.sharepointonline.com/files/fabric/assets/fonts/segoeui-westeuropean/segoeui-regular.
              Source: bhv4A72.tmp.3.drString found in binary or memory: https://static2.sharepointonline.com/files/fabric/assets/fonts/segoeui-westeuropean/segoeui-semibold
              Source: bhv4A72.tmp.3.drString found in binary or memory: https://static2.sharepointonline.com/files/fabric/assets/fonts/segoeui-westeuropean/segoeui-semiligh
              Source: DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exe, 00000003.00000003.72160589460.00000000023E5000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://support.google.com/chrome/?p=plugin_flash
              Source: bhv4A72.tmp.3.drString found in binary or memory: https://sync-t1.taboola.com/sg/criteortb-network/1/rtb-h/?taboola_hm=b2df1cf6-0873-4430-916b-9612e80
              Source: bhv4A72.tmp.3.drString found in binary or memory: https://t-ring-fallback.msedge.net/apc/trans.gif?3d88065febcc552cae09e5e8b74c55d5
              Source: bhv4A72.tmp.3.drString found in binary or memory: https://t-ring-fallback.msedge.net/apc/trans.gif?7616d616e1c668bb563496121e660bee
              Source: bhv4A72.tmp.3.drString found in binary or memory: https://t-ring.msedge.net/apc/trans.gif?01af3f8dd36bcb49643452aa096ff6c0
              Source: bhv4A72.tmp.3.drString found in binary or memory: https://t-ring.msedge.net/apc/trans.gif?7de2246f1808e47769e35183d0153a7a
              Source: bhv4A72.tmp.3.drString found in binary or memory: https://t-ring.msedge.net/apc/trans.gif?d0400e0387468531bdf7da710e2ae325
              Source: bhv4A72.tmp.3.drString found in binary or memory: https://t-ring.msedge.net/apc/trans.gif?f0f9f226f444e2e246f9075ea908a633
              Source: DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exe, 00000002.00000003.72098503659.0000000003608000.00000004.00000020.00020000.00000000.sdmp, DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exe, 00000002.00000003.73355535275.0000000003608000.00000004.00000020.00020000.00000000.sdmp, DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exe, 00000002.00000003.73357732368.0000000003608000.00000004.00000020.00020000.00000000.sdmp, DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exe, 00000002.00000003.73355828769.0000000003608000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://teldrum.ro/PmprpeY34.bin
              Source: DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exe, 00000002.00000003.72098503659.0000000003608000.00000004.00000020.00020000.00000000.sdmp, DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exe, 00000002.00000003.73355535275.0000000003608000.00000004.00000020.00020000.00000000.sdmp, DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exe, 00000002.00000003.73357732368.0000000003608000.00000004.00000020.00020000.00000000.sdmp, DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exe, 00000002.00000003.73355828769.0000000003608000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://teldrum.ro/PmprpeY34.binT
              Source: DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exe, 00000002.00000003.72098503659.0000000003608000.00000004.00000020.00020000.00000000.sdmp, DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exe, 00000002.00000003.73355535275.0000000003608000.00000004.00000020.00020000.00000000.sdmp, DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exe, 00000002.00000003.73357732368.0000000003608000.00000004.00000020.00020000.00000000.sdmp, DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exe, 00000002.00000003.73355828769.0000000003608000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://teldrum.ro/PmprpeY34.binh
              Source: bhv4A72.tmp.3.drString found in binary or memory: https://tpc.googlesyndication.com/pagead/gadgets/html5/ssrh.js
              Source: bhv4A72.tmp.3.drString found in binary or memory: https://tpc.googlesyndication.com/pagead/gadgets/in_page_full_auto_V1/Responsive_Monte_GpaSingleIfra
              Source: bhv4A72.tmp.3.drString found in binary or memory: https://tpc.googlesyndication.com/pagead/js/r20210916/r20110914/abg_lite.js
              Source: bhv4A72.tmp.3.drString found in binary or memory: https://tpc.googlesyndication.com/pagead/js/r20210916/r20110914/client/qs_click_protection.js
              Source: bhv4A72.tmp.3.drString found in binary or memory: https://tpc.googlesyndication.com/pagead/js/r20210916/r20110914/client/window_focus.js
              Source: bhv4A72.tmp.3.drString found in binary or memory: https://tpc.googlesyndication.com/simgad/14585816484902221120
              Source: bhv4A72.tmp.3.drString found in binary or memory: https://tpc.googlesyndication.com/sodar/sodar2.js
              Source: bhv4A72.tmp.3.drString found in binary or memory: https://tpc.googlesyndication.com/sodar/sodar2/224/runner.html
              Source: bhv4A72.tmp.3.drString found in binary or memory: https://use.typekit.net/af/40207f/0000000000000000000176ff/27/d?subset_id=2&fvd=n3&v=3
              Source: bhv4A72.tmp.3.drString found in binary or memory: https://use.typekit.net/af/cb695f/000000000000000000017701/27/d?subset_id=2&fvd=n4&v=3
              Source: bhv4A72.tmp.3.drString found in binary or memory: https://use.typekit.net/af/eaf09c/000000000000000000017703/27/d?subset_id=2&fvd=n7&v=3
              Source: bhv4A72.tmp.3.drString found in binary or memory: https://use.typekit.net/ecr2zvs.js
              Source: bhv4A72.tmp.3.drString found in binary or memory: https://widgets.outbrain.com/external/publishers/msn/MSNIdSync.js
              Source: bhv4A72.tmp.3.drString found in binary or memory: https://www.digicert.com/CPS0
              Source: bhv4A72.tmp.3.drString found in binary or memory: https://www.globalsign.com/repository/0
              Source: DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exe, DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exe, 00000005.00000002.72134012371.0000000000400000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: https://www.google.com
              Source: bhv4A72.tmp.3.drString found in binary or memory: https://www.google.com/
              Source: DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exeString found in binary or memory: https://www.google.com/accounts/servicelogin
              Source: DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exe, 00000003.00000003.72156685235.00000000023E1000.00000004.00000020.00020000.00000000.sdmp, bhv4A72.tmp.3.drString found in binary or memory: https://www.google.com/chrome/
              Source: DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exe, 00000003.00000003.72156685235.00000000023E1000.00000004.00000020.00020000.00000000.sdmp, bhv4A72.tmp.3.drString found in binary or memory: https://www.google.com/chrome/thank-you.html?statcb=0&installdataindex=empty&defaultbrowser=0
              Source: DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exe, 00000003.00000003.72158618198.00000000023E9000.00000004.00000020.00020000.00000000.sdmp, DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exe, 00000003.00000003.72158464140.00000000023E9000.00000004.00000020.00020000.00000000.sdmp, DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exe, 00000003.00000003.72158081050.00000000023E9000.00000004.00000020.00020000.00000000.sdmp, DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exe, 00000003.00000003.72158147333.00000000023E9000.00000004.00000020.00020000.00000000.sdmp, DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exe, 00000003.00000003.72156685235.00000000023E1000.00000004.00000020.00020000.00000000.sdmp, bhv4A72.tmp.3.drString found in binary or memory: https://www.google.com/pagead/drt/ui
              Source: bhv4A72.tmp.3.drString found in binary or memory: https://www.google.com/recaptcha/api2/aframe
              Source: bhv4A72.tmp.3.drString found in binary or memory: https://www.googleadservices.com/pagead/p3p.xml
              Source: bhv4A72.tmp.3.drString found in binary or memory: https://www.googletagservices.com/activeview/js/current/osd.js
              Source: bhv4A72.tmp.3.drString found in binary or memory: https://www.googletagservices.com/activeview/js/current/rx_lidar.js?cache=r20110914
              Source: bhv4A72.tmp.3.drString found in binary or memory: https://www.msn.com
              Source: bhv4A72.tmp.3.drString found in binary or memory: https://www.msn.com/
              Source: DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exe, 00000003.00000003.72155537730.0000000002BE1000.00000004.00000020.00020000.00000000.sdmp, DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exe, 00000003.00000003.72155270934.00000000023E1000.00000004.00000020.00020000.00000000.sdmp, DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exe, 00000003.00000003.72155044832.0000000002BE1000.00000004.00000020.00020000.00000000.sdmp, DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exe, 00000003.00000003.72156685235.00000000023E1000.00000004.00000020.00020000.00000000.sdmp, bhv4A72.tmp.3.drString found in binary or memory: https://www.msn.com/?ocid=iehp
              Source: bhv4A72.tmp.3.drString found in binary or memory: https://www.msn.com/_h/9c38ab9f/webcore/externalscripts/oneTrustV2/consent/55a804ab-e5c6-4b97-9319-8
              Source: bhv4A72.tmp.3.drString found in binary or memory: https://www.msn.com/_h/9c38ab9f/webcore/externalscripts/oneTrustV2/scripttemplates/6.4.0/otBannerSdk
              Source: bhv4A72.tmp.3.drString found in binary or memory: https://www.msn.com/_h/9c38ab9f/webcore/externalscripts/oneTrustV2/scripttemplates/6.4.0/otTCF-ie.js
              Source: bhv4A72.tmp.3.drString found in binary or memory: https://www.msn.com/de-ch/?ocid=iehp
              Source: bhv4A72.tmp.3.drString found in binary or memory: https://www.msn.com/spartan/en-gb/kernel/appcache/cache.appcache?locale=en-GB&market=GB&enableregula
              Source: bhv4A72.tmp.3.drString found in binary or memory: https://www.msn.com/spartan/ientp?locale=en-GB&market=GB&enableregulatorypsm=0&enablecpsm=0&NTLogo=1
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49755
              Source: unknownNetwork traffic detected: HTTP traffic on port 49755 -> 443
              Source: unknownHTTPS traffic detected: 109.99.162.14:443 -> 192.168.11.20:49755 version: TLS 1.2

              Key, Mouse, Clipboard, Microphone and Screen Capturing

              barindex
              Source: C:\Users\user\Desktop\DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exeWindows user hook set: 0 keyboard low level C:\Users\user\Desktop\DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exeJump to behavior
              Source: C:\Users\user\Desktop\DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exeCode function: 0_2_004052FE GetDlgItem,GetDlgItem,GetDlgItem,GetDlgItem,GetClientRect,GetSystemMetrics,SendMessageA,SendMessageA,SendMessageA,SendMessageA,SendMessageA,SendMessageA,ShowWindow,ShowWindow,GetDlgItem,SendMessageA,SendMessageA,SendMessageA,GetDlgItem,CreateThread,CloseHandle,ShowWindow,ShowWindow,ShowWindow,ShowWindow,SendMessageA,CreatePopupMenu,AppendMenuA,GetWindowRect,TrackPopupMenu,SendMessageA,OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,SendMessageA,GlobalUnlock,SetClipboardData,CloseClipboard,0_2_004052FE
              Source: C:\Users\user\Desktop\DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exeCode function: 3_2_0040987A EmptyClipboard,wcslen,GlobalAlloc,GlobalLock,memcpy,GlobalUnlock,SetClipboardData,CloseClipboard,3_2_0040987A
              Source: C:\Users\user\Desktop\DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exeCode function: 3_2_004098E2 EmptyClipboard,GetFileSize,GlobalAlloc,GlobalLock,ReadFile,GlobalUnlock,SetClipboardData,GetLastError,CloseHandle,GetLastError,CloseClipboard,3_2_004098E2
              Source: C:\Users\user\Desktop\DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exeCode function: 4_2_00406DFC EmptyClipboard,GetFileSize,GlobalAlloc,GlobalLock,ReadFile,GlobalUnlock,SetClipboardData,GetLastError,CloseHandle,GetLastError,CloseClipboard,4_2_00406DFC
              Source: C:\Users\user\Desktop\DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exeCode function: 4_2_00406E9F EmptyClipboard,strlen,GlobalAlloc,GlobalLock,memcpy,GlobalUnlock,SetClipboardData,CloseClipboard,4_2_00406E9F
              Source: C:\Users\user\Desktop\DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exeCode function: 5_2_004068B5 EmptyClipboard,GetFileSize,GlobalAlloc,GlobalLock,ReadFile,GlobalUnlock,SetClipboardData,GetLastError,CloseHandle,GetLastError,CloseClipboard,5_2_004068B5
              Source: C:\Users\user\Desktop\DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exeCode function: 5_2_004072B5 EmptyClipboard,strlen,GlobalAlloc,GlobalLock,memcpy,GlobalUnlock,SetClipboardData,CloseClipboard,5_2_004072B5

              E-Banking Fraud

              barindex
              Source: Yara matchFile source: 00000002.00000003.73355415794.000000000364C000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000002.00000003.72131412308.0000000003644000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000002.00000003.72098425641.000000000364C000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000002.00000003.72098503659.0000000003608000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000002.00000003.73355535275.0000000003608000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000002.00000003.73357732368.0000000003608000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000002.00000003.73355828769.0000000003627000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000002.00000003.73365841768.0000000003644000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000002.00000003.72163777757.0000000003644000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000002.00000003.73357732368.0000000003627000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000002.00000003.72098503659.0000000003627000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000002.00000003.73355535275.0000000003627000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000002.00000003.73355828769.0000000003608000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000002.00000003.73355675137.000000000364C000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000002.00000003.73375358957.0000000003644000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exe PID: 8060, type: MEMORYSTR
              Source: Yara matchFile source: C:\ProgramData\remcos\logs.dat, type: DROPPED

              System Summary

              barindex
              Source: initial sampleStatic PE information: Filename: DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exe
              Source: initial sampleStatic PE information: Filename: DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exe
              Source: DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exeStatic file information: Suspicious name
              Source: C:\Users\user\Desktop\DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exeProcess Stats: CPU usage > 6%
              Source: C:\Users\user\Desktop\DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exeCode function: 3_2_0040DD85 memset,CreateFileW,NtQuerySystemInformation,NtQuerySystemInformation,CloseHandle,GetCurrentProcessId,_wcsicmp,_wcsicmp,_wcsicmp,OpenProcess,GetCurrentProcess,DuplicateHandle,memset,NtQueryObject,CloseHandle,_wcsicmp,CloseHandle,3_2_0040DD85
              Source: C:\Users\user\Desktop\DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exeCode function: 3_2_00401806 NtdllDefWindowProc_W,3_2_00401806
              Source: C:\Users\user\Desktop\DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exeCode function: 3_2_004018C0 NtdllDefWindowProc_W,3_2_004018C0
              Source: C:\Users\user\Desktop\DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exeCode function: 4_2_004016FD NtdllDefWindowProc_A,4_2_004016FD
              Source: C:\Users\user\Desktop\DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exeCode function: 4_2_004017B7 NtdllDefWindowProc_A,4_2_004017B7
              Source: C:\Users\user\Desktop\DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exeCode function: 5_2_00402CAC NtdllDefWindowProc_A,5_2_00402CAC
              Source: C:\Users\user\Desktop\DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exeCode function: 5_2_00402D66 NtdllDefWindowProc_A,5_2_00402D66
              Source: C:\Users\user\Desktop\DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exeCode function: 0_2_0040330D EntryPoint,SetErrorMode,GetVersion,lstrlenA,#17,OleInitialize,SHGetFileInfoA,GetCommandLineA,GetModuleHandleA,CharNextA,GetTempPathA,GetTempPathA,GetWindowsDirectoryA,lstrcatA,GetTempPathA,lstrcatA,SetEnvironmentVariableA,SetEnvironmentVariableA,SetEnvironmentVariableA,DeleteFileA,OleUninitialize,ExitProcess,lstrcatA,lstrcatA,lstrcatA,lstrcmpiA,SetCurrentDirectoryA,DeleteFileA,CopyFileA,CloseHandle,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,0_2_0040330D
              Source: C:\Users\user\Desktop\DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exeFile created: C:\Windows\resources\0409Jump to behavior
              Source: C:\Users\user\Desktop\DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exeCode function: 0_2_004067250_2_00406725
              Source: C:\Users\user\Desktop\DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exeCode function: 0_2_00404B3D0_2_00404B3D
              Source: C:\Users\user\Desktop\DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exeCode function: 3_2_00406E8F3_2_00406E8F
              Source: C:\Users\user\Desktop\DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exeCode function: 3_2_0044B0403_2_0044B040
              Source: C:\Users\user\Desktop\DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exeCode function: 3_2_0043610D3_2_0043610D
              Source: C:\Users\user\Desktop\DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exeCode function: 3_2_004473103_2_00447310
              Source: C:\Users\user\Desktop\DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exeCode function: 3_2_0044A4903_2_0044A490
              Source: C:\Users\user\Desktop\DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exeCode function: 3_2_0040755A3_2_0040755A
              Source: C:\Users\user\Desktop\DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exeCode function: 3_2_0043C5603_2_0043C560
              Source: C:\Users\user\Desktop\DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exeCode function: 3_2_0044B6103_2_0044B610
              Source: C:\Users\user\Desktop\DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exeCode function: 3_2_0044D6C03_2_0044D6C0
              Source: C:\Users\user\Desktop\DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exeCode function: 3_2_004476F03_2_004476F0
              Source: C:\Users\user\Desktop\DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exeCode function: 3_2_0044B8703_2_0044B870
              Source: C:\Users\user\Desktop\DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exeCode function: 3_2_0044081D3_2_0044081D
              Source: C:\Users\user\Desktop\DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exeCode function: 3_2_004149573_2_00414957
              Source: C:\Users\user\Desktop\DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exeCode function: 3_2_004079EE3_2_004079EE
              Source: C:\Users\user\Desktop\DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exeCode function: 3_2_00407AEB3_2_00407AEB
              Source: C:\Users\user\Desktop\DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exeCode function: 3_2_0044AA803_2_0044AA80
              Source: C:\Users\user\Desktop\DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exeCode function: 3_2_00412AA93_2_00412AA9
              Source: C:\Users\user\Desktop\DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exeCode function: 3_2_00404B743_2_00404B74
              Source: C:\Users\user\Desktop\DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exeCode function: 3_2_00404B033_2_00404B03
              Source: C:\Users\user\Desktop\DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exeCode function: 3_2_0044BBD83_2_0044BBD8
              Source: C:\Users\user\Desktop\DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exeCode function: 3_2_00404BE53_2_00404BE5
              Source: C:\Users\user\Desktop\DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exeCode function: 3_2_00404C763_2_00404C76
              Source: C:\Users\user\Desktop\DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exeCode function: 3_2_00415CFE3_2_00415CFE
              Source: C:\Users\user\Desktop\DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exeCode function: 3_2_00416D723_2_00416D72
              Source: C:\Users\user\Desktop\DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exeCode function: 3_2_00446D303_2_00446D30
              Source: C:\Users\user\Desktop\DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exeCode function: 3_2_00446D8B3_2_00446D8B
              Source: C:\Users\user\Desktop\DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exeCode function: 4_2_004050384_2_00405038
              Source: C:\Users\user\Desktop\DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exeCode function: 4_2_0041208C4_2_0041208C
              Source: C:\Users\user\Desktop\DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exeCode function: 4_2_004050A94_2_004050A9
              Source: C:\Users\user\Desktop\DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exeCode function: 4_2_0040511A4_2_0040511A
              Source: C:\Users\user\Desktop\DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exeCode function: 4_2_0043C13A4_2_0043C13A
              Source: C:\Users\user\Desktop\DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exeCode function: 4_2_004051AB4_2_004051AB
              Source: C:\Users\user\Desktop\DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exeCode function: 4_2_004493004_2_00449300
              Source: C:\Users\user\Desktop\DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exeCode function: 4_2_0040D3224_2_0040D322
              Source: C:\Users\user\Desktop\DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exeCode function: 4_2_0044A4F04_2_0044A4F0
              Source: C:\Users\user\Desktop\DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exeCode function: 4_2_0043A5AB4_2_0043A5AB
              Source: C:\Users\user\Desktop\DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exeCode function: 4_2_004136314_2_00413631
              Source: C:\Users\user\Desktop\DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exeCode function: 4_2_004466904_2_00446690
              Source: C:\Users\user\Desktop\DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exeCode function: 4_2_0044A7304_2_0044A730
              Source: C:\Users\user\Desktop\DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exeCode function: 4_2_004398D84_2_004398D8
              Source: C:\Users\user\Desktop\DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exeCode function: 4_2_004498E04_2_004498E0
              Source: C:\Users\user\Desktop\DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exeCode function: 4_2_0044A8864_2_0044A886
              Source: C:\Users\user\Desktop\DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exeCode function: 4_2_0043DA094_2_0043DA09
              Source: C:\Users\user\Desktop\DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exeCode function: 4_2_00438D5E4_2_00438D5E
              Source: C:\Users\user\Desktop\DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exeCode function: 4_2_00449ED04_2_00449ED0
              Source: C:\Users\user\Desktop\DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exeCode function: 4_2_0041FE834_2_0041FE83
              Source: C:\Users\user\Desktop\DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exeCode function: 4_2_00430F544_2_00430F54
              Source: C:\Users\user\Desktop\DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exeCode function: 5_2_004050C25_2_004050C2
              Source: C:\Users\user\Desktop\DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exeCode function: 5_2_004014AB5_2_004014AB
              Source: C:\Users\user\Desktop\DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exeCode function: 5_2_004051335_2_00405133
              Source: C:\Users\user\Desktop\DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exeCode function: 5_2_004051A45_2_004051A4
              Source: C:\Users\user\Desktop\DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exeCode function: 5_2_004012465_2_00401246
              Source: C:\Users\user\Desktop\DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exeCode function: 5_2_0040CA465_2_0040CA46
              Source: C:\Users\user\Desktop\DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exeCode function: 5_2_004052355_2_00405235
              Source: C:\Users\user\Desktop\DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exeCode function: 5_2_004032C85_2_004032C8
              Source: C:\Users\user\Desktop\DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exeCode function: 5_2_004222D95_2_004222D9
              Source: C:\Users\user\Desktop\DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exeCode function: 5_2_004016895_2_00401689
              Source: C:\Users\user\Desktop\DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exeCode function: 5_2_00402F605_2_00402F60
              Source: C:\Users\user\Desktop\DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exeCode function: String function: 004169A7 appears 87 times
              Source: C:\Users\user\Desktop\DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exeCode function: String function: 0044DB70 appears 41 times
              Source: C:\Users\user\Desktop\DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exeCode function: String function: 004165FF appears 35 times
              Source: C:\Users\user\Desktop\DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exeCode function: String function: 00422297 appears 42 times
              Source: C:\Users\user\Desktop\DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exeCode function: String function: 00444B5A appears 37 times
              Source: C:\Users\user\Desktop\DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exeCode function: String function: 00413025 appears 79 times
              Source: C:\Users\user\Desktop\DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exeCode function: String function: 00416760 appears 69 times
              Source: DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exeBinary or memory string: OriginalFileName vs DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exe
              Source: DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exeBinary or memory string: OriginalFilename vs DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exe
              Source: DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exe, 00000005.00000002.72134012371.000000000041B000.00000040.80000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenamemspass.exe8 vs DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exe
              Source: DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
              Source: classification engineClassification label: mal100.phis.troj.spyw.evad.winEXE@11/13@6/4
              Source: C:\Users\user\Desktop\DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exeCode function: 3_2_004182CE GetLastError,FormatMessageW,FormatMessageA,LocalFree,free,3_2_004182CE
              Source: C:\Users\user\Desktop\DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exeCode function: 0_2_0040330D EntryPoint,SetErrorMode,GetVersion,lstrlenA,#17,OleInitialize,SHGetFileInfoA,GetCommandLineA,GetModuleHandleA,CharNextA,GetTempPathA,GetTempPathA,GetWindowsDirectoryA,lstrcatA,GetTempPathA,lstrcatA,SetEnvironmentVariableA,SetEnvironmentVariableA,SetEnvironmentVariableA,DeleteFileA,OleUninitialize,ExitProcess,lstrcatA,lstrcatA,lstrcatA,lstrcmpiA,SetCurrentDirectoryA,DeleteFileA,CopyFileA,CloseHandle,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,0_2_0040330D
              Source: C:\Users\user\Desktop\DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exeCode function: 5_2_00410DE1 GetCurrentProcess,GetLastError,GetProcAddress,GetProcAddress,LookupPrivilegeValueA,GetProcAddress,AdjustTokenPrivileges,CloseHandle,5_2_00410DE1
              Source: C:\Users\user\Desktop\DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exeCode function: 0_2_004045CA GetDlgItem,SetWindowTextA,SHBrowseForFolderA,CoTaskMemFree,lstrcmpiA,lstrcatA,SetDlgItemTextA,GetDiskFreeSpaceA,MulDiv,SetDlgItemTextA,0_2_004045CA
              Source: C:\Users\user\Desktop\DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exeCode function: 3_2_00413D4C CreateToolhelp32Snapshot,memset,Process32FirstW,OpenProcess,memset,GetModuleHandleW,GetProcAddress,CloseHandle,free,Process32NextW,CloseHandle,3_2_00413D4C
              Source: C:\Users\user\Desktop\DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exeCode function: 0_2_004020CB CoCreateInstance,MultiByteToWideChar,0_2_004020CB
              Source: C:\Users\user\Desktop\DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exeCode function: 3_2_0040B58D GetModuleHandleW,FindResourceW,LoadResource,SizeofResource,LockResource,memcpy,3_2_0040B58D
              Source: C:\Users\user\Desktop\DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exeFile created: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\stvbrernesJump to behavior
              Source: C:\Users\user\Desktop\DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exeMutant created: \Sessions\1\BaseNamedObjects\wealthymannow-3N54OZ
              Source: C:\Users\user\Desktop\DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exeFile created: C:\Users\user\AppData\Local\Temp\nsf8D9F.tmpJump to behavior
              Source: C:\Users\user\Desktop\DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exeProcess created: C:\Windows\SysWOW64\wscript.exe "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Local\Temp\cjjbdefodddngoym.vbs"
              Source: DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
              Source: C:\Users\user\Desktop\DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exeSystem information queried: HandleInformationJump to behavior
              Source: C:\Users\user\Desktop\DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exeFile read: C:\Users\desktop.iniJump to behavior
              Source: C:\Users\user\Desktop\DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
              Source: DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exe, DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exe, 00000003.00000002.72161924446.0000000000400000.00000040.80000000.00040000.00000000.sdmpBinary or memory string: SELECT 'INSERT INTO vacuum_db.' || quote(name) || ' SELECT * FROM main.' || quote(name) || ';' FROM vacuum_db.sqlite_master WHERE name=='sqlite_sequence';
              Source: DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exe, DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exe, 00000004.00000002.72132758186.0000000000400000.00000040.80000000.00040000.00000000.sdmpBinary or memory string: INSERT INTO %Q.%s VALUES('index',%Q,%Q,#%d,%Q);
              Source: DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exe, 00000003.00000002.72161924446.0000000000400000.00000040.80000000.00040000.00000000.sdmpBinary or memory string: UPDATE %Q.%s SET sql = CASE WHEN type = 'trigger' THEN sqlite_rename_trigger(sql, %Q)ELSE sqlite_rename_table(sql, %Q) END, tbl_name = %Q, name = CASE WHEN type='table' THEN %Q WHEN name LIKE 'sqlite_autoindex%%' AND type='index' THEN 'sqlite_autoindex_' || %Q || substr(name,%d+18) ELSE name END WHERE tbl_name=%Q AND (type='table' OR type='index' OR type='trigger');
              Source: DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exe, DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exe, 00000003.00000002.72161924446.0000000000400000.00000040.80000000.00040000.00000000.sdmpBinary or memory string: SELECT 'INSERT INTO vacuum_db.' || quote(name) || ' SELECT * FROM main.' || quote(name) || ';'FROM main.sqlite_master WHERE type = 'table' AND name!='sqlite_sequence' AND rootpage>0
              Source: DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exe, 00000003.00000003.72160072604.0000000002BE8000.00000004.00000020.00020000.00000000.sdmp, DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exe, 00000003.00000003.72160976044.0000000002BE8000.00000004.00000020.00020000.00000000.sdmp, DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exe, 00000003.00000002.72162769344.0000000002BF4000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: CREATE TABLE benefit_merchant_domains (benefit_id VARCHAR NOT NULL, merchant_domain VARCHAR NOT NULL)U;
              Source: DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exe, DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exe, 00000003.00000002.72161924446.0000000000400000.00000040.80000000.00040000.00000000.sdmpBinary or memory string: UPDATE "%w".%s SET sql = sqlite_rename_parent(sql, %Q, %Q) WHERE %s;
              Source: DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exe, DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exe, 00000003.00000002.72161924446.0000000000400000.00000040.80000000.00040000.00000000.sdmpBinary or memory string: UPDATE sqlite_temp_master SET sql = sqlite_rename_trigger(sql, %Q), tbl_name = %Q WHERE %s;
              Source: DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exe, 00000003.00000003.72161071438.00000000023E2000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: CREATE TABLE password_notes (id INTEGER PRIMARY KEY AUTOINCREMENT, parent_id INTEGER NOT NULL REFERENCES logins ON UPDATE CASCADE ON DELETE CASCADE DEFERRABLE INITIALLY DEFERRED, key VARCHAR NOT NULL, value BLOB, date_created INTEGER NOT NULL, confidential INTEGER, UNIQUE (parent_id, key));
              Source: DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exe, DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exe, 00000003.00000002.72161924446.0000000000400000.00000040.80000000.00040000.00000000.sdmpBinary or memory string: SELECT 'DELETE FROM vacuum_db.' || quote(name) || ';' FROM vacuum_db.sqlite_master WHERE name='sqlite_sequence'
              Source: DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exeVirustotal: Detection: 23%
              Source: DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exeReversingLabs: Detection: 13%
              Source: C:\Users\user\Desktop\DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exeFile read: C:\Users\user\Desktop\DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exeJump to behavior
              Source: C:\Users\user\Desktop\DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exeEvasive API call chain: __getmainargs,DecisionNodes,exitgraph_4-33205
              Source: unknownProcess created: C:\Users\user\Desktop\DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exe "C:\Users\user\Desktop\DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exe"
              Source: C:\Users\user\Desktop\DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exeProcess created: C:\Users\user\Desktop\DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exe "C:\Users\user\Desktop\DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exe"
              Source: C:\Users\user\Desktop\DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exeProcess created: C:\Users\user\Desktop\DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exe C:\Users\user\Desktop\DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exe /stext "C:\Users\user\AppData\Local\Temp\gjyjxxzbufaiuhfuyvqhllqm"
              Source: C:\Users\user\Desktop\DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exeProcess created: C:\Users\user\Desktop\DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exe C:\Users\user\Desktop\DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exe /stext "C:\Users\user\AppData\Local\Temp\jpzokfvjc"
              Source: C:\Users\user\Desktop\DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exeProcess created: C:\Users\user\Desktop\DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exe C:\Users\user\Desktop\DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exe /stext "C:\Users\user\AppData\Local\Temp\zbiszrwxdwiv"
              Source: C:\Users\user\Desktop\DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exeProcess created: C:\Windows\SysWOW64\wscript.exe "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Local\Temp\cjjbdefodddngoym.vbs"
              Source: C:\Users\user\Desktop\DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exeProcess created: C:\Users\user\Desktop\DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exe "C:\Users\user\Desktop\DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exe"Jump to behavior
              Source: C:\Users\user\Desktop\DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exeProcess created: C:\Users\user\Desktop\DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exe C:\Users\user\Desktop\DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exe /stext "C:\Users\user\AppData\Local\Temp\gjyjxxzbufaiuhfuyvqhllqm"Jump to behavior
              Source: C:\Users\user\Desktop\DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exeProcess created: C:\Users\user\Desktop\DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exe C:\Users\user\Desktop\DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exe /stext "C:\Users\user\AppData\Local\Temp\jpzokfvjc"Jump to behavior
              Source: C:\Users\user\Desktop\DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exeProcess created: C:\Users\user\Desktop\DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exe C:\Users\user\Desktop\DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exe /stext "C:\Users\user\AppData\Local\Temp\zbiszrwxdwiv"Jump to behavior
              Source: C:\Users\user\Desktop\DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exeProcess created: C:\Windows\SysWOW64\wscript.exe "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Local\Temp\cjjbdefodddngoym.vbs" Jump to behavior
              Source: C:\Users\user\Desktop\DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exeSection loaded: edgegdi.dllJump to behavior
              Source: C:\Users\user\Desktop\DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exeSection loaded: uxtheme.dllJump to behavior
              Source: C:\Users\user\Desktop\DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exeSection loaded: userenv.dllJump to behavior
              Source: C:\Users\user\Desktop\DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exeSection loaded: apphelp.dllJump to behavior
              Source: C:\Users\user\Desktop\DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exeSection loaded: propsys.dllJump to behavior
              Source: C:\Users\user\Desktop\DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exeSection loaded: dwmapi.dllJump to behavior
              Source: C:\Users\user\Desktop\DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exeSection loaded: cryptbase.dllJump to behavior
              Source: C:\Users\user\Desktop\DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exeSection loaded: oleacc.dllJump to behavior
              Source: C:\Users\user\Desktop\DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exeSection loaded: version.dllJump to behavior
              Source: C:\Users\user\Desktop\DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exeSection loaded: shfolder.dllJump to behavior
              Source: C:\Users\user\Desktop\DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exeSection loaded: kernel.appcore.dllJump to behavior
              Source: C:\Users\user\Desktop\DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exeSection loaded: windows.storage.dllJump to behavior
              Source: C:\Users\user\Desktop\DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exeSection loaded: wldp.dllJump to behavior
              Source: C:\Users\user\Desktop\DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exeSection loaded: msi.dllJump to behavior
              Source: C:\Users\user\Desktop\DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exeSection loaded: iertutil.dllJump to behavior
              Source: C:\Users\user\Desktop\DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exeSection loaded: sspicli.dllJump to behavior
              Source: C:\Users\user\Desktop\DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exeSection loaded: powrprof.dllJump to behavior
              Source: C:\Users\user\Desktop\DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exeSection loaded: winhttp.dllJump to behavior
              Source: C:\Users\user\Desktop\DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exeSection loaded: wkscli.dllJump to behavior
              Source: C:\Users\user\Desktop\DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exeSection loaded: netutils.dllJump to behavior
              Source: C:\Users\user\Desktop\DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exeSection loaded: edgegdi.dllJump to behavior
              Source: C:\Users\user\Desktop\DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exeSection loaded: umpdc.dllJump to behavior
              Source: C:\Users\user\Desktop\DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exeSection loaded: msi.dllJump to behavior
              Source: C:\Users\user\Desktop\DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exeSection loaded: wininet.dllJump to behavior
              Source: C:\Users\user\Desktop\DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exeSection loaded: windows.storage.dllJump to behavior
              Source: C:\Users\user\Desktop\DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exeSection loaded: wldp.dllJump to behavior
              Source: C:\Users\user\Desktop\DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exeSection loaded: profapi.dllJump to behavior
              Source: C:\Users\user\Desktop\DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exeSection loaded: kernel.appcore.dllJump to behavior
              Source: C:\Users\user\Desktop\DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
              Source: C:\Users\user\Desktop\DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exeSection loaded: mswsock.dllJump to behavior
              Source: C:\Users\user\Desktop\DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exeSection loaded: iphlpapi.dllJump to behavior
              Source: C:\Users\user\Desktop\DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exeSection loaded: winnsi.dllJump to behavior
              Source: C:\Users\user\Desktop\DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exeSection loaded: urlmon.dllJump to behavior
              Source: C:\Users\user\Desktop\DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exeSection loaded: srvcli.dllJump to behavior
              Source: C:\Users\user\Desktop\DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exeSection loaded: dnsapi.dllJump to behavior
              Source: C:\Users\user\Desktop\DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exeSection loaded: rasadhlp.dllJump to behavior
              Source: C:\Users\user\Desktop\DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exeSection loaded: fwpuclnt.dllJump to behavior
              Source: C:\Users\user\Desktop\DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exeSection loaded: schannel.dllJump to behavior
              Source: C:\Users\user\Desktop\DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exeSection loaded: mskeyprotect.dllJump to behavior
              Source: C:\Users\user\Desktop\DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exeSection loaded: ntasn1.dllJump to behavior
              Source: C:\Users\user\Desktop\DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exeSection loaded: msasn1.dllJump to behavior
              Source: C:\Users\user\Desktop\DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exeSection loaded: dpapi.dllJump to behavior
              Source: C:\Users\user\Desktop\DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exeSection loaded: cryptsp.dllJump to behavior
              Source: C:\Users\user\Desktop\DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exeSection loaded: rsaenh.dllJump to behavior
              Source: C:\Users\user\Desktop\DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exeSection loaded: cryptbase.dllJump to behavior
              Source: C:\Users\user\Desktop\DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exeSection loaded: gpapi.dllJump to behavior
              Source: C:\Users\user\Desktop\DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exeSection loaded: ncrypt.dllJump to behavior
              Source: C:\Users\user\Desktop\DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exeSection loaded: ncryptsslp.dllJump to behavior
              Source: C:\Users\user\Desktop\DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exeSection loaded: winmm.dllJump to behavior
              Source: C:\Users\user\Desktop\DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exeSection loaded: uxtheme.dllJump to behavior
              Source: C:\Users\user\Desktop\DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exeSection loaded: windowscodecs.dllJump to behavior
              Source: C:\Users\user\Desktop\DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exeSection loaded: propsys.dllJump to behavior
              Source: C:\Users\user\Desktop\DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exeSection loaded: edputil.dllJump to behavior
              Source: C:\Users\user\Desktop\DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exeSection loaded: windows.staterepositoryps.dllJump to behavior
              Source: C:\Users\user\Desktop\DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exeSection loaded: policymanager.dllJump to behavior
              Source: C:\Users\user\Desktop\DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exeSection loaded: msvcp110_win.dllJump to behavior
              Source: C:\Users\user\Desktop\DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exeSection loaded: wintypes.dllJump to behavior
              Source: C:\Users\user\Desktop\DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exeSection loaded: appresolver.dllJump to behavior
              Source: C:\Users\user\Desktop\DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exeSection loaded: bcp47langs.dllJump to behavior
              Source: C:\Users\user\Desktop\DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exeSection loaded: slc.dllJump to behavior
              Source: C:\Users\user\Desktop\DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exeSection loaded: userenv.dllJump to behavior
              Source: C:\Users\user\Desktop\DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exeSection loaded: sppc.dllJump to behavior
              Source: C:\Users\user\Desktop\DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exeSection loaded: onecorecommonproxystub.dllJump to behavior
              Source: C:\Users\user\Desktop\DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
              Source: C:\Users\user\Desktop\DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exeSection loaded: version.dllJump to behavior
              Source: C:\Users\user\Desktop\DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exeSection loaded: wininet.dllJump to behavior
              Source: C:\Users\user\Desktop\DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exeSection loaded: edgegdi.dllJump to behavior
              Source: C:\Users\user\Desktop\DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exeSection loaded: windows.storage.dllJump to behavior
              Source: C:\Users\user\Desktop\DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exeSection loaded: wldp.dllJump to behavior
              Source: C:\Users\user\Desktop\DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exeSection loaded: cryptsp.dllJump to behavior
              Source: C:\Users\user\Desktop\DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exeSection loaded: rsaenh.dllJump to behavior
              Source: C:\Users\user\Desktop\DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exeSection loaded: cryptbase.dllJump to behavior
              Source: C:\Users\user\Desktop\DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exeSection loaded: pstorec.dllJump to behavior
              Source: C:\Users\user\Desktop\DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exeSection loaded: vaultcli.dllJump to behavior
              Source: C:\Users\user\Desktop\DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exeSection loaded: wintypes.dllJump to behavior
              Source: C:\Users\user\Desktop\DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exeSection loaded: dpapi.dllJump to behavior
              Source: C:\Users\user\Desktop\DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exeSection loaded: msasn1.dllJump to behavior
              Source: C:\Users\user\Desktop\DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exeSection loaded: edgegdi.dllJump to behavior
              Source: C:\Users\user\Desktop\DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exeSection loaded: windows.storage.dllJump to behavior
              Source: C:\Users\user\Desktop\DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exeSection loaded: wldp.dllJump to behavior
              Source: C:\Users\user\Desktop\DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exeSection loaded: pstorec.dllJump to behavior
              Source: C:\Users\user\Desktop\DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exeSection loaded: sspicli.dllJump to behavior
              Source: C:\Users\user\Desktop\DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exeSection loaded: msasn1.dllJump to behavior
              Source: C:\Users\user\Desktop\DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exeSection loaded: msasn1.dllJump to behavior
              Source: C:\Users\user\Desktop\DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exeSection loaded: edgegdi.dllJump to behavior
              Source: C:\Users\user\Desktop\DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exeSection loaded: windows.storage.dllJump to behavior
              Source: C:\Users\user\Desktop\DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exeSection loaded: wldp.dllJump to behavior
              Source: C:\Users\user\Desktop\DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exeSection loaded: msasn1.dllJump to behavior
              Source: C:\Users\user\Desktop\DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exeSection loaded: sspicli.dllJump to behavior
              Source: C:\Users\user\Desktop\DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exeSection loaded: cryptsp.dllJump to behavior
              Source: C:\Users\user\Desktop\DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exeSection loaded: rsaenh.dllJump to behavior
              Source: C:\Users\user\Desktop\DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exeSection loaded: cryptbase.dllJump to behavior
              Source: C:\Windows\SysWOW64\wscript.exeSection loaded: version.dllJump to behavior
              Source: C:\Windows\SysWOW64\wscript.exeSection loaded: edgegdi.dllJump to behavior
              Source: C:\Windows\SysWOW64\wscript.exeSection loaded: kernel.appcore.dllJump to behavior
              Source: C:\Windows\SysWOW64\wscript.exeSection loaded: uxtheme.dllJump to behavior
              Source: C:\Windows\SysWOW64\wscript.exeSection loaded: sxs.dllJump to behavior
              Source: C:\Windows\SysWOW64\wscript.exeSection loaded: vbscript.dllJump to behavior
              Source: C:\Windows\SysWOW64\wscript.exeSection loaded: amsi.dllJump to behavior
              Source: C:\Windows\SysWOW64\wscript.exeSection loaded: userenv.dllJump to behavior
              Source: C:\Windows\SysWOW64\wscript.exeSection loaded: profapi.dllJump to behavior
              Source: C:\Windows\SysWOW64\wscript.exeSection loaded: wldp.dllJump to behavior
              Source: C:\Windows\SysWOW64\wscript.exeSection loaded: msasn1.dllJump to behavior
              Source: C:\Windows\SysWOW64\wscript.exeSection loaded: cryptsp.dllJump to behavior
              Source: C:\Windows\SysWOW64\wscript.exeSection loaded: rsaenh.dllJump to behavior
              Source: C:\Windows\SysWOW64\wscript.exeSection loaded: cryptbase.dllJump to behavior
              Source: C:\Windows\SysWOW64\wscript.exeSection loaded: msisip.dllJump to behavior
              Source: C:\Windows\SysWOW64\wscript.exeSection loaded: wshext.dllJump to behavior
              Source: C:\Windows\SysWOW64\wscript.exeSection loaded: scrobj.dllJump to behavior
              Source: C:\Windows\SysWOW64\wscript.exeSection loaded: mlang.dllJump to behavior
              Source: C:\Windows\SysWOW64\wscript.exeSection loaded: scrrun.dllJump to behavior
              Source: C:\Users\user\Desktop\DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f486a52-3cb1-48fd-8f50-b8dc300d9f9d}\InProcServer32Jump to behavior
              Source: C:\Users\user\Desktop\DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exeFile written: C:\Users\user\AppData\Local\Temp\Setup.iniJump to behavior
              Source: C:\Users\user\Desktop\DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exeFile opened: C:\Users\user\Desktop\DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.cfgJump to behavior
              Source: C:\Users\user\Desktop\DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\Outlook\OMI Account Manager\AccountsJump to behavior
              Source: DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
              Source: Binary string: mshtml.pdb source: DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exe, 00000002.00000001.71300341533.0000000000649000.00000020.00000001.01000000.00000007.sdmp
              Source: Binary string: mshtml.pdbUGP source: DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exe, 00000002.00000001.71300341533.0000000000649000.00000020.00000001.01000000.00000007.sdmp

              Data Obfuscation

              barindex
              Source: C:\Users\user\Desktop\DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exeUnpacked PE file: 3.2.DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exe.400000.0.unpack .text:ER;.rdata:R;.data:W;.ndata:W;.rsrc:R; vs .MPRESS1:ER;.MPRESS2:ER;.rsrc:W;
              Source: C:\Users\user\Desktop\DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exeUnpacked PE file: 4.2.DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exe.400000.0.unpack .text:ER;.rdata:R;.data:W;.ndata:W;.rsrc:R; vs .MPRESS1:ER;.MPRESS2:ER;.rsrc:W;
              Source: C:\Users\user\Desktop\DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exeUnpacked PE file: 5.2.DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exe.400000.0.unpack .text:ER;.rdata:R;.data:W;.ndata:W;.rsrc:R; vs .MPRESS1:ER;.MPRESS2:ER;.rsrc:W;
              Source: Yara matchFile source: 00000000.00000002.71301956430.00000000032D6000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
              Source: C:\Users\user\Desktop\DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exeCode function: 0_2_10001A5D GlobalAlloc,lstrcpyA,lstrcpyA,GlobalFree,GlobalFree,GlobalFree,GlobalFree,GlobalFree,GlobalFree,lstrcpyA,GetModuleHandleA,LoadLibraryA,GetProcAddress,lstrlenA,0_2_10001A5D
              Source: C:\Users\user\Desktop\DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exeCode function: 0_2_10002D20 push eax; ret 0_2_10002D4E
              Source: C:\Users\user\Desktop\DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exeCode function: 2_2_01757594 push ds; retf 2_2_01757598
              Source: C:\Users\user\Desktop\DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exeCode function: 2_2_0175A594 push ds; retf 2_2_0175A598
              Source: C:\Users\user\Desktop\DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exeCode function: 3_2_0044693D push ecx; ret 3_2_0044694D
              Source: C:\Users\user\Desktop\DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exeCode function: 3_2_0044DB70 push eax; ret 3_2_0044DB84
              Source: C:\Users\user\Desktop\DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exeCode function: 3_2_0044DB70 push eax; ret 3_2_0044DBAC
              Source: C:\Users\user\Desktop\DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exeCode function: 3_2_00451D54 push eax; ret 3_2_00451D61
              Source: C:\Users\user\Desktop\DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exeCode function: 4_2_0044B090 push eax; ret 4_2_0044B0A4
              Source: C:\Users\user\Desktop\DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exeCode function: 4_2_0044B090 push eax; ret 4_2_0044B0CC
              Source: C:\Users\user\Desktop\DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exeCode function: 4_2_00451D34 push eax; ret 4_2_00451D41
              Source: C:\Users\user\Desktop\DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exeCode function: 4_2_00444E71 push ecx; ret 4_2_00444E81
              Source: C:\Users\user\Desktop\DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exeCode function: 5_2_00414060 push eax; ret 5_2_00414074
              Source: C:\Users\user\Desktop\DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exeCode function: 5_2_00414060 push eax; ret 5_2_0041409C
              Source: C:\Users\user\Desktop\DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exeCode function: 5_2_00414039 push ecx; ret 5_2_00414049
              Source: C:\Users\user\Desktop\DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exeCode function: 5_2_004164EB push 0000006Ah; retf 5_2_004165C4
              Source: C:\Users\user\Desktop\DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exeCode function: 5_2_00416553 push 0000006Ah; retf 5_2_004165C4
              Source: C:\Users\user\Desktop\DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exeCode function: 5_2_00416555 push 0000006Ah; retf 5_2_004165C4
              Source: C:\Users\user\Desktop\DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exeFile created: C:\Users\user\AppData\Local\Temp\nsu8DB0.tmp\System.dllJump to dropped file

              Hooking and other Techniques for Hiding and Protection

              barindex
              Source: C:\Windows\SysWOW64\wscript.exeFile deleted: c:\users\user\desktop\dhl_awb_shipping_invoice_doc_010720257820020031808174cn1800301072025.bat.exeJump to behavior
              Source: C:\Users\user\Desktop\DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exeCode function: 4_2_004047CB LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,4_2_004047CB
              Source: C:\Users\user\Desktop\DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

              Malware Analysis System Evasion

              barindex
              Source: C:\Users\user\Desktop\DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exeAPI/Special instruction interceptor: Address: 362176C
              Source: C:\Users\user\Desktop\DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exeAPI/Special instruction interceptor: Address: 1AA176C
              Source: C:\Users\user\Desktop\DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exeFile opened: C:\Program Files\Qemu-ga\qemu-ga.exeJump to behavior
              Source: C:\Users\user\Desktop\DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exeFile opened: C:\Program Files\qga\qga.exeJump to behavior
              Source: C:\Users\user\Desktop\DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exeFile opened: C:\Program Files\Qemu-ga\qemu-ga.exeJump to behavior
              Source: C:\Users\user\Desktop\DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exeFile opened: C:\Program Files\qga\qga.exeJump to behavior
              Source: DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exe, 00000000.00000002.71307346682.0000000004E40000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: 9C:\PROGRAM FILES\QEMU-GA\QEMU-GA.EXE
              Source: DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exe, 00000000.00000002.71300987165.00000000005E8000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: C:\PROGRAM FILES\QEMU-GA\QEMU-GA.EXESK
              Source: C:\Users\user\Desktop\DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exeCode function: 3_2_0040DD85 memset,CreateFileW,NtQuerySystemInformation,NtQuerySystemInformation,CloseHandle,GetCurrentProcessId,_wcsicmp,_wcsicmp,_wcsicmp,OpenProcess,GetCurrentProcess,DuplicateHandle,memset,NtQueryObject,CloseHandle,_wcsicmp,CloseHandle,3_2_0040DD85
              Source: C:\Windows\SysWOW64\wscript.exeWindow found: window name: WSH-TimerJump to behavior
              Source: C:\Users\user\Desktop\DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exeWindow / User API: threadDelayed 3637Jump to behavior
              Source: C:\Users\user\Desktop\DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exeWindow / User API: threadDelayed 5373Jump to behavior
              Source: C:\Users\user\Desktop\DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exeWindow / User API: foregroundWindowGot 1769Jump to behavior
              Source: C:\Users\user\Desktop\DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\nsu8DB0.tmp\System.dllJump to dropped file
              Source: C:\Users\user\Desktop\DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exe TID: 6684Thread sleep time: -35000s >= -30000sJump to behavior
              Source: C:\Users\user\Desktop\DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exe TID: 8176Thread sleep time: -16119000s >= -30000sJump to behavior
              Source: C:\Users\user\Desktop\DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exeThread sleep count: Count: 3637 delay: -5Jump to behavior
              Source: C:\Users\user\Desktop\DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exeCode function: 0_2_00405861 CloseHandle,GetTempPathA,DeleteFileA,lstrcatA,lstrcatA,lstrlenA,FindFirstFileA,FindNextFileA,FindClose,0_2_00405861
              Source: C:\Users\user\Desktop\DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exeCode function: 0_2_0040639C FindFirstFileA,FindClose,0_2_0040639C
              Source: C:\Users\user\Desktop\DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exeCode function: 0_2_004026F8 FindFirstFileA,0_2_004026F8
              Source: C:\Users\user\Desktop\DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exeCode function: 3_2_0040AE51 FindFirstFileW,FindNextFileW,3_2_0040AE51
              Source: C:\Users\user\Desktop\DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exeCode function: 4_2_00407EF8 FindFirstFileA,FindNextFileA,strlen,strlen,4_2_00407EF8
              Source: C:\Users\user\Desktop\DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exeCode function: 5_2_00407898 FindFirstFileA,FindNextFileA,strlen,strlen,5_2_00407898
              Source: C:\Users\user\Desktop\DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exeCode function: 3_2_00418981 memset,GetSystemInfo,3_2_00418981
              Source: C:\Users\user\Desktop\DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exeFile opened: C:\Users\user\AppData\Local\Temp\jpzokfvjcJump to behavior
              Source: C:\Users\user\Desktop\DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exeFile opened: C:\Users\user\AppData\Local\Temp\zbiszrwxdwivJump to behavior
              Source: C:\Users\user\Desktop\DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exeFile opened: C:\Users\user\Jump to behavior
              Source: C:\Users\user\Desktop\DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exeFile opened: C:\Users\user\AppData\Jump to behavior
              Source: C:\Users\user\Desktop\DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exeFile opened: C:\Users\user\AppData\Local\Jump to behavior
              Source: C:\Users\user\Desktop\DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exeFile opened: C:\Users\user\AppData\Local\Temp\gjyjxxzbufaiuhfuyvqhllqmJump to behavior
              Source: DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exe, 00000000.00000002.71307742156.0000000010059000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Hyper-V Guest Shutdown Service
              Source: DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exe, 00000000.00000002.71307742156.0000000010059000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Hyper-V Remote Desktop Virtualization Service
              Source: DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exe, 00000000.00000002.71307742156.0000000010059000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: vmicshutdown
              Source: DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exe, 00000000.00000002.71307742156.0000000010059000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Hyper-V Volume Shadow Copy Requestor
              Source: DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exe, 00000002.00000003.73355535275.00000000035F4000.00000004.00000020.00020000.00000000.sdmp, DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exe, 00000002.00000003.72098503659.00000000035F4000.00000004.00000020.00020000.00000000.sdmp, DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exe, 00000002.00000003.73355828769.00000000035F5000.00000004.00000020.00020000.00000000.sdmp, DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exe, 00000002.00000003.73357732368.00000000035F5000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW0
              Source: DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exe, 00000000.00000002.71307742156.0000000010059000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Hyper-V PowerShell Direct Service
              Source: DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exe, 00000000.00000002.71307742156.0000000010059000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Hyper-V Time Synchronization Service
              Source: DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exe, 00000000.00000002.71307346682.0000000004E40000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: 9C:\Program Files\Qemu-ga\qemu-ga.exe
              Source: DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exe, 00000000.00000002.71307742156.0000000010059000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: vmicvss
              Source: DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exe, 00000002.00000003.73355535275.0000000003637000.00000004.00000020.00020000.00000000.sdmp, DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exe, 00000002.00000003.73357732368.0000000003637000.00000004.00000020.00020000.00000000.sdmp, DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exe, 00000002.00000003.73355828769.0000000003637000.00000004.00000020.00020000.00000000.sdmp, DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exe, 00000002.00000003.72098503659.0000000003637000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
              Source: DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exe, 00000000.00000002.71307742156.0000000010059000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Hyper-V Data Exchange Service
              Source: DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exe, 00000000.00000002.71307742156.0000000010059000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Hyper-V Heartbeat Service
              Source: DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exe, 00000000.00000002.71300987165.00000000005E8000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: C:\Program Files\Qemu-ga\qemu-ga.exesk
              Source: DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exe, 00000000.00000002.71307742156.0000000010059000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Hyper-V Guest Service Interface
              Source: DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exe, 00000000.00000002.71307742156.0000000010059000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: vmicheartbeat
              Source: C:\Users\user\Desktop\DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exeAPI call chain: ExitProcess graph end nodegraph_0-4128
              Source: C:\Users\user\Desktop\DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exeAPI call chain: ExitProcess graph end nodegraph_0-4306
              Source: C:\Users\user\Desktop\DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exeAPI call chain: ExitProcess graph end nodegraph_4-34112
              Source: C:\Users\user\Desktop\DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exeProcess information queried: ProcessInformationJump to behavior
              Source: C:\Users\user\Desktop\DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exeCode function: 3_2_0040DD85 memset,CreateFileW,NtQuerySystemInformation,NtQuerySystemInformation,CloseHandle,GetCurrentProcessId,_wcsicmp,_wcsicmp,_wcsicmp,OpenProcess,GetCurrentProcess,DuplicateHandle,memset,NtQueryObject,CloseHandle,_wcsicmp,CloseHandle,3_2_0040DD85
              Source: C:\Users\user\Desktop\DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exeCode function: 0_2_10001A5D GlobalAlloc,lstrcpyA,lstrcpyA,GlobalFree,GlobalFree,GlobalFree,GlobalFree,GlobalFree,GlobalFree,lstrcpyA,GetModuleHandleA,LoadLibraryA,GetProcAddress,lstrlenA,0_2_10001A5D
              Source: C:\Users\user\Desktop\DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exeProcess token adjusted: DebugJump to behavior

              HIPS / PFW / Operating System Protection Evasion

              barindex
              Source: C:\Users\user\Desktop\DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exeSection loaded: NULL target: C:\Users\user\Desktop\DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exe protection: execute and read and writeJump to behavior
              Source: C:\Users\user\Desktop\DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exeSection loaded: NULL target: C:\Users\user\Desktop\DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exe protection: execute and read and writeJump to behavior
              Source: C:\Users\user\Desktop\DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exeSection loaded: NULL target: C:\Users\user\Desktop\DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exe protection: execute and read and writeJump to behavior
              Source: C:\Users\user\Desktop\DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exeProcess created: C:\Users\user\Desktop\DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exe "C:\Users\user\Desktop\DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exe"Jump to behavior
              Source: C:\Users\user\Desktop\DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exeProcess created: C:\Users\user\Desktop\DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exe C:\Users\user\Desktop\DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exe /stext "C:\Users\user\AppData\Local\Temp\gjyjxxzbufaiuhfuyvqhllqm"Jump to behavior
              Source: C:\Users\user\Desktop\DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exeProcess created: C:\Users\user\Desktop\DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exe C:\Users\user\Desktop\DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exe /stext "C:\Users\user\AppData\Local\Temp\jpzokfvjc"Jump to behavior
              Source: C:\Users\user\Desktop\DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exeProcess created: C:\Users\user\Desktop\DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exe C:\Users\user\Desktop\DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exe /stext "C:\Users\user\AppData\Local\Temp\zbiszrwxdwiv"Jump to behavior
              Source: C:\Users\user\Desktop\DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exeProcess created: C:\Windows\SysWOW64\wscript.exe "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Local\Temp\cjjbdefodddngoym.vbs" Jump to behavior
              Source: DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exe, 00000002.00000003.73355415794.000000000364C000.00000004.00000020.00020000.00000000.sdmp, DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exe, 00000002.00000003.72131412308.0000000003644000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Manager#
              Source: DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exe, 00000002.00000003.73357732368.0000000003608000.00000004.00000020.00020000.00000000.sdmp, DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exe, 00000002.00000003.73365841768.0000000003644000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Manager
              Source: DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exe, 00000002.00000003.73355535275.0000000003608000.00000004.00000020.00020000.00000000.sdmp, DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exe, 00000002.00000003.73355828769.0000000003608000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Manager;"
              Source: DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exe, 00000002.00000003.73355535275.0000000003608000.00000004.00000020.00020000.00000000.sdmp, DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exe, 00000002.00000003.73357732368.0000000003608000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Manager"`I
              Source: DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exe, 00000002.00000003.73357732368.0000000003608000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program ManagerE"
              Source: DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exe, 00000002.00000003.72131412308.0000000003644000.00000004.00000020.00020000.00000000.sdmp, DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exe, 00000002.00000003.72098425641.000000000364C000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: |Program Manager|
              Source: DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exe, 00000002.00000003.73355535275.0000000003608000.00000004.00000020.00020000.00000000.sdmp, DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exe, 00000002.00000003.73357732368.0000000003608000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Manager'"
              Source: DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exe, 00000002.00000003.73375358957.0000000003644000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Manager^
              Source: DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exe, 00000002.00000003.73355535275.0000000003608000.00000004.00000020.00020000.00000000.sdmp, DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exe, 00000002.00000003.73357732368.0000000003608000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program ManagerH"
              Source: logs.dat.2.drBinary or memory string: [Program Manager]
              Source: C:\Users\user\Desktop\DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exeQueries volume information: C:\ VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exeCode function: 3_2_0041881C GetSystemTime,memcpy,GetCurrentProcessId,memcpy,GetTickCount,memcpy,QueryPerformanceCounter,memcpy,3_2_0041881C
              Source: C:\Users\user\Desktop\DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exeCode function: 4_2_004082CD memset,memset,memset,memset,GetComputerNameA,GetUserNameA,MultiByteToWideChar,MultiByteToWideChar,MultiByteToWideChar,strlen,strlen,memcpy,4_2_004082CD
              Source: C:\Users\user\Desktop\DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exeCode function: 0_2_0040330D EntryPoint,SetErrorMode,GetVersion,lstrlenA,#17,OleInitialize,SHGetFileInfoA,GetCommandLineA,GetModuleHandleA,CharNextA,GetTempPathA,GetTempPathA,GetWindowsDirectoryA,lstrcatA,GetTempPathA,lstrcatA,SetEnvironmentVariableA,SetEnvironmentVariableA,SetEnvironmentVariableA,DeleteFileA,OleUninitialize,ExitProcess,lstrcatA,lstrcatA,lstrcatA,lstrcmpiA,SetCurrentDirectoryA,DeleteFileA,CopyFileA,CloseHandle,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,0_2_0040330D
              Source: C:\Users\user\Desktop\DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

              Stealing of Sensitive Information

              barindex
              Source: Yara matchFile source: 00000002.00000003.73355415794.000000000364C000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000002.00000003.72131412308.0000000003644000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000002.00000003.72098425641.000000000364C000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000002.00000003.72098503659.0000000003608000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000002.00000003.73355535275.0000000003608000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000002.00000003.73357732368.0000000003608000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000002.00000003.73355828769.0000000003627000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000002.00000003.73365841768.0000000003644000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000002.00000003.72163777757.0000000003644000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000002.00000003.73357732368.0000000003627000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000002.00000003.72098503659.0000000003627000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000002.00000003.73355535275.0000000003627000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000002.00000003.73355828769.0000000003608000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000002.00000003.73355675137.000000000364C000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000002.00000003.73375358957.0000000003644000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exe PID: 8060, type: MEMORYSTR
              Source: Yara matchFile source: C:\ProgramData\remcos\logs.dat, type: DROPPED
              Source: C:\Users\user\Desktop\DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\ol7uiqa8.default-release\places.sqliteJump to behavior
              Source: C:\Users\user\Desktop\DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\ol7uiqa8.default-release\key4.dbJump to behavior
              Source: C:\Users\user\Desktop\DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login DataJump to behavior
              Source: C:\Users\user\Desktop\DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web DataJump to behavior
              Source: C:\Users\user\Desktop\DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.iniJump to behavior
              Source: C:\Users\user\Desktop\DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
              Source: C:\Users\user\Desktop\DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exeKey opened: HKEY_CURRENT_USER\Software\Google\Google Talk\AccountsJump to behavior
              Source: C:\Users\user\Desktop\DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Dynamic SaltJump to behavior
              Source: C:\Users\user\Desktop\DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Dynamic SaltJump to behavior
              Source: C:\Users\user\Desktop\DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exeKey opened: HKEY_CURRENT_USER\Software\Google\Google Talk\AccountsJump to behavior
              Source: C:\Users\user\Desktop\DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exeKey opened: HKEY_CURRENT_USER\Software\PaltalkJump to behavior
              Source: C:\Users\user\Desktop\DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\Outlook\OMI Account Manager\AccountsJump to behavior
              Source: C:\Users\user\Desktop\DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\ProfilesJump to behavior
              Source: C:\Users\user\Desktop\DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exeKey opened: HKEY_CURRENT_USER\Software\IncrediMail\IdentitiesJump to behavior
              Source: C:\Users\user\Desktop\DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows Live MailJump to behavior
              Source: C:\Users\user\Desktop\DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exeCode function: ESMTPPassword4_2_004033F0
              Source: C:\Users\user\Desktop\DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exeCode function: _mbscpy,_mbscpy,_mbscpy,_mbscpy,RegCloseKey, PopPassword4_2_00402DB3
              Source: C:\Users\user\Desktop\DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exeCode function: _mbscpy,_mbscpy,_mbscpy,_mbscpy,RegCloseKey, SMTPPassword4_2_00402DB3
              Source: Yara matchFile source: Process Memory Space: DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exe PID: 3592, type: MEMORYSTR

              Remote Access Functionality

              barindex
              Source: Yara matchFile source: 00000002.00000003.73355415794.000000000364C000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000002.00000003.72131412308.0000000003644000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000002.00000003.72098425641.000000000364C000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000002.00000003.72098503659.0000000003608000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000002.00000003.73355535275.0000000003608000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000002.00000003.73357732368.0000000003608000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000002.00000003.73355828769.0000000003627000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000002.00000003.73365841768.0000000003644000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000002.00000003.72163777757.0000000003644000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000002.00000003.73357732368.0000000003627000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000002.00000003.72098503659.0000000003627000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000002.00000003.73355535275.0000000003627000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000002.00000003.73355828769.0000000003608000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000002.00000003.73355675137.000000000364C000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000002.00000003.73375358957.0000000003644000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exe PID: 8060, type: MEMORYSTR
              Source: Yara matchFile source: C:\ProgramData\remcos\logs.dat, type: DROPPED
              ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
              Gather Victim Identity Information11
              Scripting
              Valid Accounts11
              Native API
              11
              Scripting
              1
              DLL Side-Loading
              1
              Deobfuscate/Decode Files or Information
              1
              OS Credential Dumping
              1
              System Time Discovery
              Remote Services1
              Archive Collected Data
              1
              Ingress Tool Transfer
              Exfiltration Over Other Network Medium1
              System Shutdown/Reboot
              CredentialsDomainsDefault Accounts2
              Command and Scripting Interpreter
              1
              DLL Side-Loading
              1
              Access Token Manipulation
              2
              Obfuscated Files or Information
              11
              Input Capture
              1
              Account Discovery
              Remote Desktop Protocol1
              Data from Local System
              21
              Encrypted Channel
              Exfiltration Over BluetoothNetwork Denial of Service
              Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)112
              Process Injection
              1
              Software Packing
              2
              Credentials in Registry
              4
              File and Directory Discovery
              SMB/Windows Admin Shares1
              Email Collection
              1
              Non-Standard Port
              Automated ExfiltrationData Encrypted for Impact
              Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
              DLL Side-Loading
              1
              Credentials In Files
              118
              System Information Discovery
              Distributed Component Object Model11
              Input Capture
              2
              Non-Application Layer Protocol
              Traffic DuplicationData Destruction
              Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
              File Deletion
              LSA Secrets311
              Security Software Discovery
              SSH2
              Clipboard Data
              213
              Application Layer Protocol
              Scheduled TransferData Encrypted for Impact
              Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts11
              Masquerading
              Cached Domain Credentials12
              Virtualization/Sandbox Evasion
              VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
              DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items12
              Virtualization/Sandbox Evasion
              DCSync4
              Process Discovery
              Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
              Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job1
              Access Token Manipulation
              Proc Filesystem1
              Application Window Discovery
              Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
              Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAt112
              Process Injection
              /etc/passwd and /etc/shadow1
              System Owner/User Discovery
              Direct Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
              Hide Legend

              Legend:

              • Process
              • Signature
              • Created File
              • DNS/IP Info
              • Is Dropped
              • Is Windows Process
              • Number of created Registry Values
              • Number of created Files
              • Visual Basic
              • Delphi
              • Java
              • .Net C# or VB.NET
              • C, C++ or other language
              • Is malicious
              • Internet
              behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1585896 Sample: DHL_Awb_Shipping_Invoice_do... Startdate: 08/01/2025 Architecture: WINDOWS Score: 100 32 wealthabundance01.duckdns.org 2->32 34 teldrum.ro 2->34 36 geoplugin.net 2->36 52 Suricata IDS alerts for network traffic 2->52 54 Found malware configuration 2->54 56 Multi AV Scanner detection for submitted file 2->56 60 12 other signatures 2->60 8 DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exe 1 34 2->8         started        signatures3 58 Uses dynamic DNS services 32->58 process4 file5 26 C:\Users\user\AppData\Local\...\System.dll, PE32 8->26 dropped 62 Detected unpacking (changes PE section rights) 8->62 64 Tries to steal Mail credentials (via file registry) 8->64 66 Tries to detect sandboxes and other dynamic analysis tools (process name or module or function) 8->66 68 2 other signatures 8->68 12 DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exe 7 18 8->12         started        signatures6 process7 dnsIp8 38 wealthabundance01.duckdns.org 43.226.229.204, 3980, 3981 SOFTLAYERUS Hong Kong 12->38 40 43.226.229.207, 3980, 49760, 49761 SOFTLAYERUS Hong Kong 12->40 42 2 other IPs or domains 12->42 28 C:\Users\user\...\cjjbdefodddngoym.vbs, data 12->28 dropped 30 C:\ProgramData\remcos\logs.dat, data 12->30 dropped 70 Tries to detect Any.run 12->70 72 Maps a DLL or memory area into another process 12->72 74 Installs a global keyboard hook 12->74 17 DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exe 1 12->17         started        20 DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exe 1 12->20         started        22 DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exe 2 12->22         started        24 wscript.exe 12->24         started        file9 signatures10 process11 signatures12 44 Tries to steal Instant Messenger accounts or passwords 17->44 46 Tries to harvest and steal browser information (history, passwords, etc) 17->46 48 Tries to steal Mail credentials (via file / registry access) 20->48 50 Deletes itself after installation 24->50

              This section contains all screenshots as thumbnails, including those not shown in the slideshow.