Windows Analysis Report
SWIFTCOPYMT1030000000_pdf.exe

Overview

General Information

Sample name: SWIFTCOPYMT1030000000_pdf.exe
Analysis ID: 1432107
MD5: 1048340bcfae30df032c161ac52f8f0e
SHA1: 8a3370d01a170626ef43202f5fe54e27372abec4
SHA256: 47a75ba2cc69f372c816fb61d079ebe6e3a81eeeb16e72726725b088a59f4e94
Infos:

Detection

GuLoader
Score: 96
Range: 0 - 100
Whitelisted: false
Confidence: 100%

Signatures

Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Yara detected GuLoader
Initial sample is a PE file and has a suspicious name
Machine Learning detection for dropped file
Machine Learning detection for sample
Mass process execution to delay analysis
Obfuscated command line found
Sigma detected: New RUN Key Pointing to Suspicious Folder
Checks if the current process is being debugged
Contains functionality for read data from the clipboard
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains functionality to dynamically determine API calls
Contains functionality to shutdown / reboot the system
Creates a process in suspended mode (likely to inject code)
Creates files inside the system directory
Detected potential crypto function
Dropped file seen in connection with other malware
Drops PE files
Found dropped PE file which has not been started or loaded
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
One or more processes crash
PE / OLE file has an invalid certificate
PE file contains executable resources (Code or Archives)
Sigma detected: CurrentVersion Autorun Keys Modification
Too many similar processes found
Uses 32bit PE files
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)

Classification

AV Detection

barindex
Source: C:\Users\user\AppData\Local\Temp\Drikkelse\Nonaddicting.exe ReversingLabs: Detection: 15%
Source: C:\Users\user\AppData\Local\Temp\Drikkelse\Nonaddicting.exe Virustotal: Detection: 36% Perma Link
Source: SWIFTCOPYMT1030000000_pdf.exe ReversingLabs: Detection: 15%
Source: SWIFTCOPYMT1030000000_pdf.exe Virustotal: Detection: 36% Perma Link
Source: C:\Users\user\AppData\Local\Temp\Drikkelse\Nonaddicting.exe Joe Sandbox ML: detected
Source: SWIFTCOPYMT1030000000_pdf.exe Joe Sandbox ML: detected
Source: SWIFTCOPYMT1030000000_pdf.exe Static PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Code function: 6_2_00405454 GetTempPathA,DeleteFileA,lstrcatA,lstrcatA,lstrlenA,FindFirstFileA,FindNextFileA,FindClose, 6_2_00405454
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Code function: 6_2_00405E7B FindFirstFileA,FindClose, 6_2_00405E7B
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Code function: 6_2_0040264F FindFirstFileA, 6_2_0040264F
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Code function: 136_2_0040264F FindFirstFileA, 136_2_0040264F
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Code function: 136_2_00405454 DeleteFileA,lstrcatA,lstrcatA,lstrlenA,FindFirstFileA,FindNextFileA,FindClose, 136_2_00405454
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Code function: 136_2_00405E7B FindFirstFileA,FindClose, 136_2_00405E7B
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe File opened: C:\Users\user Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe File opened: C:\Users\user\AppData\Local\Temp\nsv10BA.tmp Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe File opened: C:\Users\user\udskriftskartotek\chiromancy\refalling\Nonessential\Uforstaaeligheds.Com Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe File opened: C:\Users\user\AppData\Local Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe File opened: C:\Users\user\AppData\Local\Temp Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe File opened: C:\Users\user\AppData Jump to behavior
Source: global traffic HTTP traffic detected: GET /yFtqL16.bin HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:121.0) Gecko/20100101 Firefox/121.0Host: 94.156.8.104Cache-Control: no-cache
Source: unknown TCP traffic detected without corresponding DNS query: 94.156.8.104
Source: unknown TCP traffic detected without corresponding DNS query: 94.156.8.104
Source: unknown TCP traffic detected without corresponding DNS query: 94.156.8.104
Source: unknown TCP traffic detected without corresponding DNS query: 94.156.8.104
Source: unknown TCP traffic detected without corresponding DNS query: 94.156.8.104
Source: unknown TCP traffic detected without corresponding DNS query: 94.156.8.104
Source: unknown TCP traffic detected without corresponding DNS query: 94.156.8.104
Source: unknown TCP traffic detected without corresponding DNS query: 94.156.8.104
Source: unknown TCP traffic detected without corresponding DNS query: 94.156.8.104
Source: unknown TCP traffic detected without corresponding DNS query: 94.156.8.104
Source: unknown TCP traffic detected without corresponding DNS query: 94.156.8.104
Source: unknown TCP traffic detected without corresponding DNS query: 94.156.8.104
Source: unknown TCP traffic detected without corresponding DNS query: 94.156.8.104
Source: unknown TCP traffic detected without corresponding DNS query: 94.156.8.104
Source: unknown TCP traffic detected without corresponding DNS query: 94.156.8.104
Source: unknown TCP traffic detected without corresponding DNS query: 94.156.8.104
Source: unknown TCP traffic detected without corresponding DNS query: 94.156.8.104
Source: unknown TCP traffic detected without corresponding DNS query: 94.156.8.104
Source: unknown TCP traffic detected without corresponding DNS query: 94.156.8.104
Source: unknown TCP traffic detected without corresponding DNS query: 94.156.8.104
Source: unknown TCP traffic detected without corresponding DNS query: 94.156.8.104
Source: unknown TCP traffic detected without corresponding DNS query: 94.156.8.104
Source: unknown TCP traffic detected without corresponding DNS query: 94.156.8.104
Source: unknown TCP traffic detected without corresponding DNS query: 94.156.8.104
Source: unknown TCP traffic detected without corresponding DNS query: 94.156.8.104
Source: unknown TCP traffic detected without corresponding DNS query: 94.156.8.104
Source: unknown TCP traffic detected without corresponding DNS query: 94.156.8.104
Source: unknown TCP traffic detected without corresponding DNS query: 94.156.8.104
Source: unknown TCP traffic detected without corresponding DNS query: 94.156.8.104
Source: unknown TCP traffic detected without corresponding DNS query: 94.156.8.104
Source: unknown TCP traffic detected without corresponding DNS query: 94.156.8.104
Source: unknown TCP traffic detected without corresponding DNS query: 94.156.8.104
Source: unknown TCP traffic detected without corresponding DNS query: 94.156.8.104
Source: unknown TCP traffic detected without corresponding DNS query: 94.156.8.104
Source: unknown TCP traffic detected without corresponding DNS query: 94.156.8.104
Source: unknown TCP traffic detected without corresponding DNS query: 94.156.8.104
Source: unknown TCP traffic detected without corresponding DNS query: 94.156.8.104
Source: unknown TCP traffic detected without corresponding DNS query: 94.156.8.104
Source: unknown TCP traffic detected without corresponding DNS query: 94.156.8.104
Source: unknown TCP traffic detected without corresponding DNS query: 94.156.8.104
Source: unknown TCP traffic detected without corresponding DNS query: 94.156.8.104
Source: unknown TCP traffic detected without corresponding DNS query: 94.156.8.104
Source: unknown TCP traffic detected without corresponding DNS query: 94.156.8.104
Source: unknown TCP traffic detected without corresponding DNS query: 94.156.8.104
Source: unknown TCP traffic detected without corresponding DNS query: 94.156.8.104
Source: unknown TCP traffic detected without corresponding DNS query: 94.156.8.104
Source: unknown TCP traffic detected without corresponding DNS query: 94.156.8.104
Source: unknown TCP traffic detected without corresponding DNS query: 94.156.8.104
Source: unknown TCP traffic detected without corresponding DNS query: 94.156.8.104
Source: unknown TCP traffic detected without corresponding DNS query: 94.156.8.104
Source: global traffic HTTP traffic detected: GET /yFtqL16.bin HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:121.0) Gecko/20100101 Firefox/121.0Host: 94.156.8.104Cache-Control: no-cache
Source: SWIFTCOPYMT1030000000_pdf.exe, 00000088.00000002.134625856432.00000000076B0000.00000004.00000020.00020000.00000000.sdmp, SWIFTCOPYMT1030000000_pdf.exe, 00000088.00000002.134626594503.0000000009280000.00000004.00001000.00020000.00000000.sdmp String found in binary or memory: http://94.156.8.104/yFtqL16.bin
Source: SWIFTCOPYMT1030000000_pdf.exe, 00000088.00000002.134626594503.0000000009280000.00000004.00001000.00020000.00000000.sdmp String found in binary or memory: http://94.156.8.104/yFtqL16.binApokOpt103.78.0.98/yFtqL16.bin
Source: SWIFTCOPYMT1030000000_pdf.exe, SWIFTCOPYMT1030000000_pdf.exe, 00000088.00000002.134606727098.0000000000409000.00000008.00000001.01000000.00000004.sdmp String found in binary or memory: http://nsis.sf.net/NSIS_Error
Source: SWIFTCOPYMT1030000000_pdf.exe, 00000006.00000002.134273591463.0000000000409000.00000004.00000001.01000000.00000004.sdmp, SWIFTCOPYMT1030000000_pdf.exe, 00000006.00000000.133684224870.0000000000409000.00000008.00000001.01000000.00000004.sdmp, SWIFTCOPYMT1030000000_pdf.exe, 00000088.00000002.134606727098.0000000000409000.00000008.00000001.01000000.00000004.sdmp String found in binary or memory: http://nsis.sf.net/NSIS_ErrorError
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Code function: 6_2_00404FC2 GetDlgItem,GetDlgItem,GetDlgItem,GetDlgItem,GetClientRect,GetSystemMetrics,SendMessageA,SendMessageA,SendMessageA,SendMessageA,SendMessageA,SendMessageA,ShowWindow,ShowWindow,GetDlgItem,SendMessageA,SendMessageA,SendMessageA,GetDlgItem,CreateThread,FindCloseChangeNotification,ShowWindow,ShowWindow,ShowWindow,ShowWindow,SendMessageA,CreatePopupMenu,AppendMenuA,GetWindowRect,TrackPopupMenu,SendMessageA,OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,SendMessageA,GlobalUnlock,SetClipboardData,CloseClipboard, 6_2_00404FC2
Source: Conhost.exe Process created: 93

System Summary

barindex
Source: initial sample Static PE information: Filename: SWIFTCOPYMT1030000000_pdf.exe
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Code function: 6_2_004030EF EntryPoint,#17,SetErrorMode,OleInitialize,SHGetFileInfoA,GetCommandLineA,GetModuleHandleA,CharNextA,GetTempPathA,GetTempPathA,GetWindowsDirectoryA,lstrcatA,GetTempPathA,lstrcatA,SetEnvironmentVariableA,SetEnvironmentVariableA,SetEnvironmentVariableA,DeleteFileA,OleUninitialize,ExitProcess,lstrcatA,lstrcmpiA,CreateDirectoryA,SetCurrentDirectoryA,DeleteFileA,CopyFileA,CloseHandle,GetCurrentProcess,ExitWindowsEx,ExitProcess, 6_2_004030EF
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Code function: 136_2_00403188 CharNextA,GetTempPathA,GetTempPathA,GetWindowsDirectoryA,lstrcatA,GetTempPathA,lstrcatA,SetEnvironmentVariableA,SetEnvironmentVariableA,SetEnvironmentVariableA,DeleteFileA,OleUninitialize,ExitProcess,lstrcatA,lstrcmpiA,CreateDirectoryA,SetCurrentDirectoryA,DeleteFileA,CopyFileA,CloseHandle,GetCurrentProcess,ExitWindowsEx,ExitProcess, 136_2_00403188
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe File created: C:\Windows\resources\0409 Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe File created: C:\Windows\resources\0409\gashanens.ini Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Code function: 6_2_00404801 6_2_00404801
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Code function: 136_2_00404801 136_2_00404801
Source: Joe Sandbox View Dropped File: C:\Users\user\AppData\Local\Temp\nsv10BA.tmp\System.dll B9631423A50C666FAF2CC6901C5A8D6EB2FECD306FDD2524256B7E2E37B251C2
Source: Joe Sandbox View Dropped File: C:\Users\user\AppData\Local\Temp\nsv10BA.tmp\nsExec.dll 9A1A5C6F598247BFA52624CD793B9EF4FB85863CC9DFD69EB7EF671CACC906C9
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Code function: String function: 00402A07 appears 51 times
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 1268 -s 1092
Source: SWIFTCOPYMT1030000000_pdf.exe Static PE information: invalid certificate
Source: SWIFTCOPYMT1030000000_pdf.exe Static PE information: Resource name: RT_VERSION type: x86 executable not stripped
Source: Nonaddicting.exe.136.dr Static PE information: Resource name: RT_VERSION type: x86 executable not stripped
Source: SWIFTCOPYMT1030000000_pdf.exe Static PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
Source: classification engine Classification label: mal96.troj.evad.winEXE@396/18@0/1
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Code function: 6_2_004042C5 GetDlgItem,SetWindowTextA,SHBrowseForFolderA,CoTaskMemFree,lstrcmpiA,lstrcatA,SetDlgItemTextA,GetDiskFreeSpaceA,MulDiv,SetDlgItemTextA, 6_2_004042C5
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Code function: 6_2_00402036 CoCreateInstance,MultiByteToWideChar, 6_2_00402036
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe File created: C:\Users\user\udskriftskartotek Jump to behavior
Source: C:\Windows\SysWOW64\WerFault.exe Mutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess1268
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe File created: C:\Users\user\AppData\Local\Temp\nsaF52.tmp Jump to behavior
Source: SWIFTCOPYMT1030000000_pdf.exe Static PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe File read: C:\Users\desktop.ini Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Key opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers Jump to behavior
Source: SWIFTCOPYMT1030000000_pdf.exe ReversingLabs: Detection: 15%
Source: SWIFTCOPYMT1030000000_pdf.exe Virustotal: Detection: 36%
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe File read: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Jump to behavior
Source: unknown Process created: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe "C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe"
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "250^177"
Source: C:\Windows\SysWOW64\cmd.exe Process created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "244^177"
Source: C:\Windows\SysWOW64\cmd.exe Process created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "227^177"
Source: C:\Windows\SysWOW64\cmd.exe Process created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "255^177"
Source: C:\Windows\SysWOW64\cmd.exe Process created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "244^177"
Source: C:\Windows\SysWOW64\cmd.exe Process created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "253^177"
Source: C:\Windows\SysWOW64\cmd.exe Process created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "130^177"
Source: C:\Windows\SysWOW64\cmd.exe Process created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "131^177"
Source: C:\Windows\SysWOW64\cmd.exe Process created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "139^177"
Source: C:\Windows\SysWOW64\cmd.exe Process created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "139^177"
Source: C:\Windows\SysWOW64\cmd.exe Process created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "242^177"
Source: C:\Windows\SysWOW64\cmd.exe Process created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Windows\SysWOW64\cmd.exe Process created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Windows\SysWOW64\cmd.exe Process created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Windows\SysWOW64\cmd.exe Process created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Windows\SysWOW64\cmd.exe Process created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "212^177"
Source: C:\Windows\SysWOW64\cmd.exe Process created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "247^177"
Source: C:\Windows\SysWOW64\cmd.exe Process created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "216^177"
Source: C:\Windows\SysWOW64\cmd.exe Process created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "221^177"
Source: C:\Windows\SysWOW64\cmd.exe Process created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "212^177"
Source: C:\Windows\SysWOW64\cmd.exe Process created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "240^177"
Source: C:\Windows\SysWOW64\cmd.exe Process created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "153^177"
Source: C:\Windows\SysWOW64\cmd.exe Process created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "220^177"
Source: C:\Windows\SysWOW64\cmd.exe Process created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "145^177"
Source: C:\Windows\SysWOW64\cmd.exe Process created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "195^177"
Source: C:\Windows\SysWOW64\cmd.exe Process created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "133^177"
Source: C:\Windows\SysWOW64\cmd.exe Process created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "145^177"
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "157^177"
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "145^177"
Source: C:\Windows\SysWOW64\cmd.exe Process created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "216^177"
Source: C:\Windows\SysWOW64\cmd.exe Process created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "145^177"
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "129^177"
Source: C:\Windows\SysWOW64\cmd.exe Process created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Windows\SysWOW64\cmd.exe Process created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "137^177"
Source: C:\Windows\SysWOW64\cmd.exe Process created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "129^177"
Source: C:\Windows\SysWOW64\cmd.exe Process created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "129^177"
Source: C:\Windows\SysWOW64\cmd.exe Process created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "129^177"
Source: C:\Windows\SysWOW64\cmd.exe Process created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "129^177"
Source: C:\Windows\SysWOW64\cmd.exe Process created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "129^177"
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "129^177"
Source: C:\Windows\SysWOW64\cmd.exe Process created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "129^177"
Source: C:\Windows\SysWOW64\cmd.exe Process created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "157^177"
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "129^177"
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "157^177"
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "145^177"
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "193^177"
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "145^177"
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "129^177"
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "157^177"
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "145^177"
Source: C:\Windows\SysWOW64\cmd.exe Process created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Windows\SysWOW64\cmd.exe Process created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "133^177"
Source: C:\Windows\SysWOW64\cmd.exe Process created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Windows\SysWOW64\cmd.exe Process created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Windows\SysWOW64\cmd.exe Process created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "216^177"
Source: C:\Windows\SysWOW64\cmd.exe Process created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "145^177"
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "129^177"
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "201^177"
Source: C:\Windows\SysWOW64\cmd.exe Process created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "137^177"
Source: C:\Windows\SysWOW64\cmd.exe Process created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "129^177"
Source: C:\Windows\SysWOW64\cmd.exe Process created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe "C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe"
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 1268 -s 1092
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "250^177" Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "244^177" Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "227^177" Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "255^177" Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "244^177" Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "253^177" Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "130^177" Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "131^177" Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "139^177" Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "139^177" Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "242^177" Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "250^177" Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "244^177" Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "227^177" Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "255^177" Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "212^177" Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "247^177" Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "216^177" Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "221^177" Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "212^177" Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "240^177" Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "153^177" Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "220^177" Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "145^177" Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "195^177" Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "133^177" Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "145^177" Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "157^177" Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "145^177" Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "216^177" Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "145^177" Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "129^177" Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "253^177" Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "137^177" Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "129^177" Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "129^177" Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "129^177" Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "129^177" Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "129^177" Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "129^177" Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "242^177" Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "153^177" Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "220^177" Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "157^177" Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "145^177" Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "193^177" Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "145^177" Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "129^177" Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "145^177" Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "129^177" Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "129^177" Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "133^177" Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "242^177" Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "145^177" Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "201^177" Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "137^177" Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "250^177" Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "255^177" Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "129^177" Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "145^177" Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "137^177" Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "253^177" Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "195^177" Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "145^177" Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "212^177" Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "153^177" Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "220^177" Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "131^177" Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "129^177" Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "157^177" Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "242^177" Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "212^177" Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "145^177" Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "145^177" Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "157^177" Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "137^177" Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "145^177" Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "145^177" Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "129^177" Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "227^177" Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "129^177" Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "216^177" Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "129^177" Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "131^177" Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "157^177" Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "145^177" Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "145^177" Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "253^177" Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "221^177" Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "242^177" Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "129^177" Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "242^177" Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 1268 -s 1092 Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "145^177" Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "240^177" Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "250^177" Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe "C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe" Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "129^177" Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "201^177" Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "253^177" Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "255^177" Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe "C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe" Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Section loaded: apphelp.dll Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Section loaded: version.dll Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Section loaded: edgegdi.dll Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Section loaded: kernel.appcore.dll Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Section loaded: uxtheme.dll Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Section loaded: shfolder.dll Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Section loaded: windows.storage.dll Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Section loaded: wldp.dll Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Section loaded: propsys.dll Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Section loaded: profapi.dll Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Section loaded: riched20.dll Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Section loaded: usp10.dll Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Section loaded: msls31.dll Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Section loaded: textinputframework.dll Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Section loaded: coreuicomponents.dll Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Section loaded: coremessaging.dll Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Section loaded: ntmarta.dll Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Section loaded: wintypes.dll Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Section loaded: wintypes.dll Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Section loaded: wintypes.dll Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Section loaded: textshaping.dll Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Section loaded: version.dll Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Section loaded: edgegdi.dll Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Section loaded: windows.storage.dll Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Section loaded: wldp.dll Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Section loaded: kernel.appcore.dll Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Section loaded: uxtheme.dll Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Section loaded: wininet.dll Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Section loaded: iertutil.dll Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Section loaded: sspicli.dll Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Section loaded: profapi.dll Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Section loaded: ondemandconnroutehelper.dll Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Section loaded: winhttp.dll Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Section loaded: mswsock.dll Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Section loaded: iphlpapi.dll Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Section loaded: winnsi.dll Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Section loaded: urlmon.dll Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Section loaded: srvcli.dll Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Section loaded: netutils.dll Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Section loaded: winmm.dll Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Section loaded: rstrtmgr.dll Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Section loaded: ncrypt.dll Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Section loaded: ntasn1.dll Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Key value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f486a52-3cb1-48fd-8f50-b8dc300d9f9d}\InProcServer32 Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe File written: C:\Windows\Resources\0409\gashanens.ini Jump to behavior

Data Obfuscation

barindex
Source: Yara match File source: 00000006.00000002.134275655794.00000000085F6000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000006.00000002.134274135976.0000000000863000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000006.00000002.134274135976.000000000081E000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: Process Memory Space: SWIFTCOPYMT1030000000_pdf.exe PID: 1976, type: MEMORYSTR
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "250^177"
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "244^177"
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "227^177"
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "255^177"
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "244^177"
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "253^177"
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "130^177"
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "131^177"
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "139^177"
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "139^177"
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "242^177"
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "212^177"
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "247^177"
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "216^177"
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "221^177"
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "212^177"
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "240^177"
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "153^177"
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "220^177"
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "145^177"
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "195^177"
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "133^177"
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "145^177"
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "157^177"
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "145^177"
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "216^177"
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "145^177"
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "129^177"
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "137^177"
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "129^177"
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "129^177"
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "129^177"
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "129^177"
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "129^177"
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "129^177"
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "129^177"
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "157^177"
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "129^177"
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "157^177"
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "145^177"
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "193^177"
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "145^177"
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "129^177"
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "157^177"
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "145^177"
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "133^177"
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "216^177"
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "145^177"
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "129^177"
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "201^177"
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "137^177"
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "129^177"
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "250^177" Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "244^177" Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "227^177" Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "255^177" Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "244^177" Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "253^177" Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "130^177" Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "131^177" Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "139^177" Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "139^177" Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "242^177" Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "250^177" Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "244^177" Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "227^177" Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "255^177" Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "212^177" Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "247^177" Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "216^177" Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "221^177" Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "212^177" Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "240^177" Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "153^177" Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "220^177" Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "145^177" Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "195^177" Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "133^177" Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "145^177" Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "157^177" Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "145^177" Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "216^177" Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "145^177" Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "129^177" Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "253^177" Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "137^177" Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "129^177" Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "129^177" Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "129^177" Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "129^177" Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "129^177" Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "129^177" Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "242^177" Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "153^177" Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "220^177" Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "157^177" Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "145^177" Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "193^177" Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "145^177" Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "129^177" Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "145^177" Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "129^177" Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "129^177" Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "133^177" Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "242^177" Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "145^177" Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "201^177" Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "137^177" Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "250^177" Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "255^177" Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "129^177" Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "145^177" Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "137^177" Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "253^177" Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "195^177" Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "145^177" Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "212^177" Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "153^177" Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "220^177" Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "131^177" Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "129^177" Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "157^177" Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "242^177" Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "212^177" Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "145^177" Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "145^177" Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "157^177" Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "137^177" Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "145^177" Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "145^177" Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "129^177" Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "227^177" Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "129^177" Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "216^177" Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "129^177" Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "131^177" Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "157^177" Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "145^177" Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "145^177" Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "253^177" Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "221^177" Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "242^177" Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "129^177" Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "242^177" Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "145^177" Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "240^177" Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "250^177" Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "129^177" Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "201^177" Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "253^177" Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "255^177" Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Code function: 6_2_00405EA2 GetModuleHandleA,LoadLibraryA,GetProcAddress, 6_2_00405EA2
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Code function: 6_2_10002CE0 push eax; ret 6_2_10002D0E
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe File created: C:\Users\user\AppData\Local\Temp\nsv10BA.tmp\nsExec.dll Jump to dropped file
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe File created: C:\Users\user\AppData\Local\Temp\nsv10BA.tmp\System.dll Jump to dropped file
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe File created: C:\Users\user\AppData\Local\Temp\Drikkelse\Nonaddicting.exe Jump to dropped file
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Registry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce Blankbook Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Registry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce Blankbook Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Registry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce Blankbook Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Registry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce Blankbook Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX

Malware Analysis System Evasion

barindex
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "250^177"
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "244^177"
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "227^177"
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "255^177"
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "244^177"
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "253^177"
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "130^177"
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "131^177"
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "139^177"
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "139^177"
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Dropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\nsv10BA.tmp\nsExec.dll Jump to dropped file
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Dropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\nsv10BA.tmp\System.dll Jump to dropped file
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe API coverage: 0.2 %
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Code function: 6_2_00405454 GetTempPathA,DeleteFileA,lstrcatA,lstrcatA,lstrlenA,FindFirstFileA,FindNextFileA,FindClose, 6_2_00405454
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Code function: 6_2_00405E7B FindFirstFileA,FindClose, 6_2_00405E7B
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Code function: 6_2_0040264F FindFirstFileA, 6_2_0040264F
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Code function: 136_2_0040264F FindFirstFileA, 136_2_0040264F
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Code function: 136_2_00405454 DeleteFileA,lstrcatA,lstrcatA,lstrlenA,FindFirstFileA,FindNextFileA,FindClose, 136_2_00405454
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Code function: 136_2_00405E7B FindFirstFileA,FindClose, 136_2_00405E7B
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe File opened: C:\Users\user Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe File opened: C:\Users\user\AppData\Local\Temp\nsv10BA.tmp Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe File opened: C:\Users\user\udskriftskartotek\chiromancy\refalling\Nonessential\Uforstaaeligheds.Com Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe File opened: C:\Users\user\AppData\Local Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe File opened: C:\Users\user\AppData\Local\Temp Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe File opened: C:\Users\user\AppData Jump to behavior
Source: SWIFTCOPYMT1030000000_pdf.exe, 00000088.00000002.134625856432.00000000076BA000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: Hyper-V RAW
Source: SWIFTCOPYMT1030000000_pdf.exe, 00000088.00000002.134625856432.00000000076BA000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: Hyper-V RAWk
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe API call chain: ExitProcess graph end node
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe API call chain: ExitProcess graph end node
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe API call chain: ExitProcess graph end node
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe API call chain: ExitProcess graph end node
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process queried: DebugPort Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Code function: 6_2_00402C33 GetTempPathA,GetTickCount,GetModuleFileNameA,GetFileSize,LdrInitializeThunk,GlobalAlloc,SetFilePointer, 6_2_00402C33
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Code function: 6_2_00405EA2 GetModuleHandleA,LoadLibraryA,GetProcAddress, 6_2_00405EA2
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "250^177" Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "244^177" Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "227^177" Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "255^177" Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "244^177" Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "253^177" Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "130^177" Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "131^177" Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "139^177" Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "139^177" Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "242^177" Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "250^177" Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "244^177" Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "227^177" Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "255^177" Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "212^177" Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "247^177" Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "216^177" Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "221^177" Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "212^177" Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "240^177" Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "153^177" Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "220^177" Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "145^177" Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "195^177" Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "133^177" Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "145^177" Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "157^177" Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "145^177" Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "216^177" Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "145^177" Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "129^177" Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "253^177" Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "137^177" Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "129^177" Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "129^177" Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "129^177" Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "129^177" Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "129^177" Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "129^177" Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "242^177" Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "153^177" Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "220^177" Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "157^177" Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "145^177" Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "193^177" Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "145^177" Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "129^177" Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "145^177" Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "129^177" Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "129^177" Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "133^177" Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "242^177" Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "145^177" Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "201^177" Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "137^177" Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "250^177" Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "255^177" Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "129^177" Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "145^177" Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "137^177" Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "253^177" Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "195^177" Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "145^177" Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "212^177" Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "153^177" Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "220^177" Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "131^177" Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "129^177" Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "157^177" Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "242^177" Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "212^177" Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "145^177" Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "145^177" Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "157^177" Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "137^177" Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "145^177" Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "145^177" Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "129^177" Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "227^177" Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "129^177" Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "216^177" Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "129^177" Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "131^177" Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "157^177" Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "145^177" Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "145^177" Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "253^177" Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "221^177" Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "242^177" Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "129^177" Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "242^177" Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 1268 -s 1092 Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "145^177" Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "240^177" Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "250^177" Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe "C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe" Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "129^177" Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "201^177" Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "253^177" Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "255^177" Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Process created: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe "C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe" Jump to behavior
Source: C:\Users\user\Desktop\SWIFTCOPYMT1030000000_pdf.exe Code function: 6_2_00405B99 GetVersion,GetSystemDirectoryA,GetWindowsDirectoryA,SHGetSpecialFolderLocation,SHGetPathFromIDListA,CoTaskMemFree,lstrcatA,lstrlenA, 6_2_00405B99
  • No. of IPs < 25%
  • 25% < No. of IPs < 50%
  • 50% < No. of IPs < 75%
  • 75% < No. of IPs