Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
z58Swiftcopy_MT.bat.exe

Overview

General Information

Sample name:z58Swiftcopy_MT.bat.exe
Analysis ID:1586058
MD5:d82fc35769adac8d6c49087219b1cd93
SHA1:ff87686b1f399b3d68a580dc016e2c675b61d5c1
SHA256:8da8762a0f3794de100bd1800856136928880e8a9d0be42eb758809bca1bd0e3
Infos:

Detection

Remcos, GuLoader
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Detected unpacking (changes PE section rights)
Found malware configuration
Multi AV Scanner detection for submitted file
Sigma detected: Remcos
Suricata IDS alerts for network traffic
Yara detected GuLoader
Yara detected Remcos RAT
C2 URLs / IPs found in malware configuration
Installs a global keyboard hook
Machine Learning detection for sample
Maps a DLL or memory area into another process
Switches to a custom stack to bypass stack traces
Tries to detect Any.run
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Instant Messenger accounts or passwords
Tries to steal Mail credentials (via file / registry access)
Tries to steal Mail credentials (via file registry)
Uses dynamic DNS services
Yara detected WebBrowserPassView password recovery tool
Abnormal high CPU Usage
Contains functionality for read data from the clipboard
Contains functionality to call native functions
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to check the parent process ID (often done to detect debuggers and analysis systems)
Contains functionality to dynamically determine API calls
Contains functionality to modify clipboard data
Contains functionality to query CPU information (cpuid)
Contains functionality to read the PEB
Contains functionality to shutdown / reboot the system
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Creates a process in suspended mode (likely to inject code)
Creates files inside the system directory
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Drops PE files
Enables debug privileges
Extensive use of GetProcAddress (often used to hide API calls)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found dropped PE file which has not been started or loaded
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
HTTP GET or POST without a user agent
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Sleep loop found (likely to delay execution)
Suricata IDS alerts with low severity for network traffic
Uses 32bit PE files
Uses Microsoft's Enhanced Cryptographic Provider
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)

Classification

  • System is w10x64native
  • z58Swiftcopy_MT.bat.exe (PID: 2560 cmdline: "C:\Users\user\Desktop\z58Swiftcopy_MT.bat.exe" MD5: D82FC35769ADAC8D6C49087219B1CD93)
    • z58Swiftcopy_MT.bat.exe (PID: 5524 cmdline: "C:\Users\user\Desktop\z58Swiftcopy_MT.bat.exe" MD5: D82FC35769ADAC8D6C49087219B1CD93)
      • z58Swiftcopy_MT.bat.exe (PID: 2804 cmdline: C:\Users\user\Desktop\z58Swiftcopy_MT.bat.exe /stext "C:\Users\user\AppData\Local\Temp\hqupnmxiqgofocirvgzrkof" MD5: D82FC35769ADAC8D6C49087219B1CD93)
      • z58Swiftcopy_MT.bat.exe (PID: 6432 cmdline: C:\Users\user\Desktop\z58Swiftcopy_MT.bat.exe /stext "C:\Users\user\AppData\Local\Temp\rsiinfhkeogkqiwvmrmsntajnt" MD5: D82FC35769ADAC8D6C49087219B1CD93)
      • z58Swiftcopy_MT.bat.exe (PID: 4076 cmdline: C:\Users\user\Desktop\z58Swiftcopy_MT.bat.exe /stext "C:\Users\user\AppData\Local\Temp\umntoxsdzwyxawszvchuyguswzwofs" MD5: D82FC35769ADAC8D6C49087219B1CD93)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
Remcos, RemcosRATRemcos (acronym of Remote Control & Surveillance Software) is a commercial Remote Access Tool to remotely control computers.Remcos is advertised as legitimate software which can be used for surveillance and penetration testing purposes, but has been used in numerous hacking campaigns.Remcos, once installed, opens a backdoor on the computer, granting full access to the remote user.Remcos is developed by the cybersecurity company BreakingSecurity.
  • APT33
  • The Gorgon Group
  • UAC-0050
https://malpedia.caad.fkie.fraunhofer.de/details/win.remcos
NameDescriptionAttributionBlogpost URLsLink
CloudEyE, GuLoaderCloudEyE (initially named GuLoader) is a small VB5/6 downloader. It typically downloads RATs/Stealers, such as Agent Tesla, Arkei/Vidar, Formbook, Lokibot, Netwire and Remcos, often but not always from Google Drive. The downloaded payload is xored.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.cloudeye
{"Host:Port:Password": ["wealthabundance01.duckdns.org:3981:1", "wealthabundance01.duckdns.org:3980:0", "wealthabundance002..duckdns.org:3980:0"], "Assigned name": "WEALTHBILLIONAIRES", "Connect interval": "1", "Install flag": "Disable", "Setup HKCU\\Run": "Enable", "Setup HKLM\\Run": "Enable", "Install path": "Application path", "Copy file": "remcos.exe", "Startup value": "Disable", "Hide file": "Disable", "Mutex": "wealthymannow-3N54OZ", "Keylog flag": "1", "Keylog path": "Application path", "Keylog file": "logs.dat", "Keylog crypt": "Disable", "Hide keylog file": "Disable", "Screenshot flag": "Disable", "Screenshot time": "1", "Take Screenshot option": "Disable", "Take screenshot title": "", "Take screenshot time": "5", "Screenshot path": "AppData", "Screenshot file": "Screenshots", "Screenshot crypt": "Disable", "Mouse option": "Disable", "Delete file": "Disable", "Audio record time": "5", "Audio folder": "MicRecords", "Connect delay": "0", "Copy folder": "Remcos", "Keylog folder": "remcos"}
SourceRuleDescriptionAuthorStrings
C:\ProgramData\remcos\logs.datJoeSecurity_RemcosYara detected Remcos RATJoe Security
    C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\stvbrernes\Cementfabrikkerne\Objektsprogs.Jrg119JoeSecurity_GuLoader_5Yara detected GuLoaderJoe Security
      C:\Users\user\AppData\Local\Temp\nsm9317.tmpJoeSecurity_GuLoader_5Yara detected GuLoaderJoe Security
        SourceRuleDescriptionAuthorStrings
        00000002.00000002.32056932719.0000000002AF1000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_RemcosYara detected Remcos RATJoe Security
          00000002.00000003.28436005878.0000000002AE4000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_RemcosYara detected Remcos RATJoe Security
            00000002.00000003.28485763517.0000000002AEF000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_RemcosYara detected Remcos RATJoe Security
              00000002.00000002.32056784519.0000000002A77000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_RemcosYara detected Remcos RATJoe Security
                00000002.00000003.28436040290.0000000002A9A000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_RemcosYara detected Remcos RATJoe Security
                  Click to see the 16 entries

                  Stealing of Sensitive Information

                  barindex
                  Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Users\user\Desktop\z58Swiftcopy_MT.bat.exe, ProcessId: 5524, TargetFilename: C:\ProgramData\remcos\logs.dat
                  TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                  2025-01-08T17:13:17.032953+010020365941Malware Command and Control Activity Detected192.168.11.204974843.226.229.1963981TCP
                  2025-01-08T17:13:20.438465+010020365941Malware Command and Control Activity Detected192.168.11.204974943.226.229.1963981TCP
                  TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                  2025-01-08T17:13:19.851927+010028033043Unknown Traffic192.168.11.2049750178.237.33.5080TCP
                  TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                  2025-01-08T17:13:13.491271+010028032702Potentially Bad Traffic192.168.11.2049747109.99.162.14443TCP

                  Click to jump to signature section

                  Show All Signature Results

                  AV Detection

                  barindex
                  Source: 00000002.00000002.32056784519.0000000002A77000.00000004.00000020.00020000.00000000.sdmpMalware Configuration Extractor: Remcos {"Host:Port:Password": ["wealthabundance01.duckdns.org:3981:1", "wealthabundance01.duckdns.org:3980:0", "wealthabundance002..duckdns.org:3980:0"], "Assigned name": "WEALTHBILLIONAIRES", "Connect interval": "1", "Install flag": "Disable", "Setup HKCU\\Run": "Enable", "Setup HKLM\\Run": "Enable", "Install path": "Application path", "Copy file": "remcos.exe", "Startup value": "Disable", "Hide file": "Disable", "Mutex": "wealthymannow-3N54OZ", "Keylog flag": "1", "Keylog path": "Application path", "Keylog file": "logs.dat", "Keylog crypt": "Disable", "Hide keylog file": "Disable", "Screenshot flag": "Disable", "Screenshot time": "1", "Take Screenshot option": "Disable", "Take screenshot title": "", "Take screenshot time": "5", "Screenshot path": "AppData", "Screenshot file": "Screenshots", "Screenshot crypt": "Disable", "Mouse option": "Disable", "Delete file": "Disable", "Audio record time": "5", "Audio folder": "MicRecords", "Connect delay": "0", "Copy folder": "Remcos", "Keylog folder": "remcos"}
                  Source: z58Swiftcopy_MT.bat.exeReversingLabs: Detection: 21%
                  Source: Yara matchFile source: 00000002.00000002.32056932719.0000000002AF1000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000002.00000003.28436005878.0000000002AE4000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000002.00000003.28485763517.0000000002AEF000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000002.00000002.32056784519.0000000002A77000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000002.00000003.28436040290.0000000002A9A000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000002.00000002.32066409158.0000000032B2F000.00000004.00000010.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000002.00000002.32056932719.0000000002A9D000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000002.00000003.29410654098.0000000002A77000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000002.00000003.28486047899.0000000002AEF000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000002.00000003.28453587511.0000000002AE0000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000002.00000003.28390975053.0000000002A98000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000002.00000003.29410560082.0000000002AEF000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000002.00000003.29410588585.0000000002A9C000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: z58Swiftcopy_MT.bat.exe PID: 5524, type: MEMORYSTR
                  Source: Yara matchFile source: C:\ProgramData\remcos\logs.dat, type: DROPPED
                  Source: z58Swiftcopy_MT.bat.exeJoe Sandbox ML: detected
                  Source: C:\Users\user\Desktop\z58Swiftcopy_MT.bat.exeCode function: 3_2_00404423 GetProcAddress,FreeLibrary,CryptUnprotectData,3_2_00404423
                  Source: z58Swiftcopy_MT.bat.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
                  Source: unknownHTTPS traffic detected: 109.99.162.14:443 -> 192.168.11.20:49747 version: TLS 1.2
                  Source: z58Swiftcopy_MT.bat.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                  Source: Binary string: mshtml.pdb source: z58Swiftcopy_MT.bat.exe, 00000002.00000001.27691456198.0000000000649000.00000020.00000001.01000000.00000007.sdmp
                  Source: Binary string: mshtml.pdbUGP source: z58Swiftcopy_MT.bat.exe, 00000002.00000001.27691456198.0000000000649000.00000020.00000001.01000000.00000007.sdmp
                  Source: C:\Users\user\Desktop\z58Swiftcopy_MT.bat.exeCode function: 0_2_00405861 CloseHandle,GetTempPathA,DeleteFileA,lstrcatA,lstrcatA,lstrlenA,FindFirstFileA,FindNextFileA,FindClose,0_2_00405861
                  Source: C:\Users\user\Desktop\z58Swiftcopy_MT.bat.exeCode function: 0_2_0040639C FindFirstFileA,FindClose,0_2_0040639C
                  Source: C:\Users\user\Desktop\z58Swiftcopy_MT.bat.exeCode function: 0_2_004026F8 FindFirstFileA,0_2_004026F8
                  Source: C:\Users\user\Desktop\z58Swiftcopy_MT.bat.exeCode function: 2_2_33A710F1 lstrlenW,lstrlenW,lstrcatW,lstrlenW,lstrlenW,lstrlenW,FindFirstFileW,FindNextFileW,FindClose,2_2_33A710F1
                  Source: C:\Users\user\Desktop\z58Swiftcopy_MT.bat.exeCode function: 2_2_33A76580 FindFirstFileExA,2_2_33A76580
                  Source: C:\Users\user\Desktop\z58Swiftcopy_MT.bat.exeCode function: 3_2_0040AE51 FindFirstFileW,FindNextFileW,3_2_0040AE51
                  Source: C:\Users\user\Desktop\z58Swiftcopy_MT.bat.exeCode function: 4_2_00407EF8 FindFirstFileA,FindNextFileA,strlen,strlen,4_2_00407EF8
                  Source: C:\Users\user\Desktop\z58Swiftcopy_MT.bat.exeCode function: 5_2_00407898 FindFirstFileA,FindNextFileA,strlen,strlen,5_2_00407898

                  Networking

                  barindex
                  Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.11.20:49748 -> 43.226.229.196:3981
                  Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.11.20:49749 -> 43.226.229.196:3981
                  Source: Malware configuration extractorURLs: wealthabundance01.duckdns.org
                  Source: Malware configuration extractorURLs: wealthabundance01.duckdns.org
                  Source: Malware configuration extractorURLs: wealthabundance002..duckdns.org
                  Source: unknownDNS query: name: wealthabundance01.duckdns.org
                  Source: global trafficTCP traffic: 192.168.11.20:49748 -> 43.226.229.196:3981
                  Source: global trafficHTTP traffic detected: GET /json.gp HTTP/1.1Host: geoplugin.netCache-Control: no-cache
                  Source: Joe Sandbox ViewIP Address: 178.237.33.50 178.237.33.50
                  Source: Joe Sandbox ViewASN Name: SOFTLAYERUS SOFTLAYERUS
                  Source: Joe Sandbox ViewJA3 fingerprint: 37f463bf4616ecd445d4a1937da06e19
                  Source: Network trafficSuricata IDS: 2803304 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern HCa : 192.168.11.20:49750 -> 178.237.33.50:80
                  Source: Network trafficSuricata IDS: 2803270 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UHCa : 192.168.11.20:49747 -> 109.99.162.14:443
                  Source: global trafficHTTP traffic detected: GET /PmprpeY34.bin HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0Host: teldrum.roCache-Control: no-cache
                  Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                  Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                  Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                  Source: global trafficHTTP traffic detected: GET /PmprpeY34.bin HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0Host: teldrum.roCache-Control: no-cache
                  Source: global trafficHTTP traffic detected: GET /json.gp HTTP/1.1Host: geoplugin.netCache-Control: no-cache
                  Source: z58Swiftcopy_MT.bat.exe, 00000003.00000003.28478148334.0000000002288000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: ","domain":"la7.it"},{"applied_policy":"OnlyExposeWidevine","domain":"xfinity.com"},{"applied_policy":"OnlyExposeWidevine","domain":"watchtv.cox.com"},{"applied_policy":"OnlyExposeWidevine","domain":"ignitetv.rogers.com"},{"applied_policy":"OnlyExposeWidevine","domain":"bluecurvetv.shaw.ca"},{"applied_policy":"OnlyExposeWidevine","domain":"helix.videotron.com"},{"applied_policy":"OnlyExposeWidevine","domain":"criterionchannel.com"},{"applied_policy":"OnlyExposeWidevine","domain":"ntathome.com"},{"applied_policy":"OnlyExposeWidevine","domain":"wowpresentsplus.com"},{"applied_policy":"OnlyExposeWidevine","domain":"vhx.tv"},{"applied_policy":"OnlyExposePlayReady","domain":"hulu.com"},{"applied_policy":"OnlyExposeWidevine","domain":"app.quickhelp.com"},{"applied_policy":"OnlyExposeWidevine","domain":"DishAnywhere.com"}],"policies":[{"name":"OnlyExposePlayReady","type":"Playready"},{"name":"OnlyExposeWidevine","type":"Widevine"}],"version":1},"codec_override":{"applications":[{"applied_policy":"HideMfHevcCodec","domain":"tv.apple.com"},{"applied_policy":"HideMfHevcCodec","domain":"nintendo.com"}],"policies":[{"name":"HideMfHevcCodec","type":"MfHevcCodec"}],"version":1},"content_filter_on_off_switch":{"applications":[{"applied_policy":"ContentFilter","domain":"microsoft.com"}],"policies":[{"name":"ContentFilter"}],"version":1},"ecp_override":{"applications":[{"applied_policy":"PlainTextURLsOnly","domain":"hangouts.google.com"},{"applied_policy":"PlainTextURLsOnly","domain":"chat.google.com"},{"applied_policy":"PlainTextURLsOnly","domain":"slack.com"},{"applied_policy":"PlainTextURLsOnly","domain":"facebook.com"},{"applied_policy":"PlainTextURLsOnly","domain":"wechat.com"},{"applied_policy":"PlainTextURLsOnly","domain":"weixin.com"},{"applied_policy":"PlainTextURLsOnly","domain":"qq.com"},{"applied_policy":"PlainTextURLsOnly","domain":"webex.com"},{"applied_policy":"PlainTextURLsOnly","domain":"wordpress.com"},{"applied_policy":"PlainTextURLsOnly","domain":"twitter.com"},{"applied_policy":"PlainTextURLsOnly","domain":"discord.com"}],"policies":[{"name":"PlainTextURLsOnly","type":"ECPOnlyPlaintextURLs"}],"version":1},"idl_override":{"applications":[{"applied_policy":"ExposePrefixedEME","domain":"netflix.com"},{"applied_policy":"ExposePrefixedEME","domain":"music.amazon.co.jp"},{"applied_policy":"ExposePrefixedEME","domain":"music.amazon.co.uk"},{"applied_policy":"ExposePrefixedEME","domain":"music.amazon.com"},{"applied_policy":"ExposePrefixedEME","domain":"music.amazon.de"},{"applied_policy":"ExposePrefixedEME","domain":"music.amazon.es"},{"applied_policy":"ExposePrefixedEME","domain":"music.amazon.fr"},{"applied_policy":"ExposePrefixedEME","domain":"music.amazon.in"},{"applied_policy":"ExposePrefixedEME","domain":"music.amazon.it"},{"applied_policy":"ExposePrefixedEME","domain":"music.amazon.ca"},{"applied_policy":"ExposePrefixedEME","domain":"music.amazon.com.br"},{"applied_policy":"ExposePrefixedEME","domain":"sling.com"},{"applied_policy":"ExposePre
                  Source: z58Swiftcopy_MT.bat.exe, 00000003.00000003.28478148334.0000000002288000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: ","domain":"la7.it"},{"applied_policy":"OnlyExposeWidevine","domain":"xfinity.com"},{"applied_policy":"OnlyExposeWidevine","domain":"watchtv.cox.com"},{"applied_policy":"OnlyExposeWidevine","domain":"ignitetv.rogers.com"},{"applied_policy":"OnlyExposeWidevine","domain":"bluecurvetv.shaw.ca"},{"applied_policy":"OnlyExposeWidevine","domain":"helix.videotron.com"},{"applied_policy":"OnlyExposeWidevine","domain":"criterionchannel.com"},{"applied_policy":"OnlyExposeWidevine","domain":"ntathome.com"},{"applied_policy":"OnlyExposeWidevine","domain":"wowpresentsplus.com"},{"applied_policy":"OnlyExposeWidevine","domain":"vhx.tv"},{"applied_policy":"OnlyExposePlayReady","domain":"hulu.com"},{"applied_policy":"OnlyExposeWidevine","domain":"app.quickhelp.com"},{"applied_policy":"OnlyExposeWidevine","domain":"DishAnywhere.com"}],"policies":[{"name":"OnlyExposePlayReady","type":"Playready"},{"name":"OnlyExposeWidevine","type":"Widevine"}],"version":1},"codec_override":{"applications":[{"applied_policy":"HideMfHevcCodec","domain":"tv.apple.com"},{"applied_policy":"HideMfHevcCodec","domain":"nintendo.com"}],"policies":[{"name":"HideMfHevcCodec","type":"MfHevcCodec"}],"version":1},"content_filter_on_off_switch":{"applications":[{"applied_policy":"ContentFilter","domain":"microsoft.com"}],"policies":[{"name":"ContentFilter"}],"version":1},"ecp_override":{"applications":[{"applied_policy":"PlainTextURLsOnly","domain":"hangouts.google.com"},{"applied_policy":"PlainTextURLsOnly","domain":"chat.google.com"},{"applied_policy":"PlainTextURLsOnly","domain":"slack.com"},{"applied_policy":"PlainTextURLsOnly","domain":"facebook.com"},{"applied_policy":"PlainTextURLsOnly","domain":"wechat.com"},{"applied_policy":"PlainTextURLsOnly","domain":"weixin.com"},{"applied_policy":"PlainTextURLsOnly","domain":"qq.com"},{"applied_policy":"PlainTextURLsOnly","domain":"webex.com"},{"applied_policy":"PlainTextURLsOnly","domain":"wordpress.com"},{"applied_policy":"PlainTextURLsOnly","domain":"twitter.com"},{"applied_policy":"PlainTextURLsOnly","domain":"discord.com"}],"policies":[{"name":"PlainTextURLsOnly","type":"ECPOnlyPlaintextURLs"}],"version":1},"idl_override":{"applications":[{"applied_policy":"ExposePrefixedEME","domain":"netflix.com"},{"applied_policy":"ExposePrefixedEME","domain":"music.amazon.co.jp"},{"applied_policy":"ExposePrefixedEME","domain":"music.amazon.co.uk"},{"applied_policy":"ExposePrefixedEME","domain":"music.amazon.com"},{"applied_policy":"ExposePrefixedEME","domain":"music.amazon.de"},{"applied_policy":"ExposePrefixedEME","domain":"music.amazon.es"},{"applied_policy":"ExposePrefixedEME","domain":"music.amazon.fr"},{"applied_policy":"ExposePrefixedEME","domain":"music.amazon.in"},{"applied_policy":"ExposePrefixedEME","domain":"music.amazon.it"},{"applied_policy":"ExposePrefixedEME","domain":"music.amazon.ca"},{"applied_policy":"ExposePrefixedEME","domain":"music.amazon.com.br"},{"applied_policy":"ExposePrefixedEME","domain":"sling.com"},{"applied_policy":"ExposePre
                  Source: z58Swiftcopy_MT.bat.exe, 00000002.00000002.32067121242.0000000033A40000.00000040.10000000.00040000.00000000.sdmp, z58Swiftcopy_MT.bat.exe, 00000005.00000002.28456405187.0000000000400000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: Software\America Online\AOL Instant Messenger (TM)\CurrentVersion\Users%s\Loginprpl-msnprpl-yahooprpl-jabberprpl-novellprpl-oscarprpl-ggprpl-ircaccounts.xmlaimaim_1icqicq_1jabberjabber_1msnmsn_1yahoogggg_1http://www.imvu.comhttp://www.ebuddy.comhttps://www.google.com equals www.ebuddy.com (eBuggy)
                  Source: z58Swiftcopy_MT.bat.exe, z58Swiftcopy_MT.bat.exe, 00000005.00000002.28456405187.0000000000400000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: http://www.ebuddy.com equals www.ebuddy.com (eBuggy)
                  Source: z58Swiftcopy_MT.bat.exeString found in binary or memory: http://www.facebook.com/ equals www.facebook.com (Facebook)
                  Source: z58Swiftcopy_MT.bat.exe, 00000003.00000003.28478272302.0000000002279000.00000004.00000020.00020000.00000000.sdmp, z58Swiftcopy_MT.bat.exe, 00000003.00000003.28478496438.0000000002277000.00000004.00000020.00020000.00000000.sdmp, z58Swiftcopy_MT.bat.exe, 00000003.00000003.28480920497.000000000227D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.google.com/accounts/serviceloginhttp://www.facebook.com/https://login.yahoo.com/config/loginv!Tv!Tv equals www.facebook.com (Facebook)
                  Source: z58Swiftcopy_MT.bat.exe, 00000003.00000003.28478272302.0000000002279000.00000004.00000020.00020000.00000000.sdmp, z58Swiftcopy_MT.bat.exe, 00000003.00000003.28478496438.0000000002277000.00000004.00000020.00020000.00000000.sdmp, z58Swiftcopy_MT.bat.exe, 00000003.00000003.28480920497.000000000227D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.google.com/accounts/serviceloginhttp://www.facebook.com/https://login.yahoo.com/config/loginv!Tv!Tv equals www.yahoo.com (Yahoo)
                  Source: z58Swiftcopy_MT.bat.exe, 00000003.00000003.28478527078.0000000002A94000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: policies":[{"name":"OnlyExposePlayReady","type":"Playready"},{"name":"OnlyExposeWidevine","type":"Widevine"}],"version":1},"codec_override":{"applications":[{"applied_policy":"HideMfHevcCodec","domain":"tv.apple.com"},{"applied_policy":"HideMfHevcCodec","domain":"nintendo.com"}],"policies":[{"name":"HideMfHevcCodec","type":"MfHevcCodec"}],"version":1},"content_filter_on_off_switch":{"applications":[{"applied_policy":"ContentFilter","domain":"microsoft.com"}],"policies":[{"name":"ContentFilter"}],"version":1},"ecp_override":{"applications":[{"applied_policy":"PlainTextURLsOnly","domain":"hangouts.google.com"},{"applied_policy":"PlainTextURLsOnly","domain":"chat.google.com"},{"applied_policy":"PlainTextURLsOnly","domain":"slack.com"},{"applied_policy":"PlainTextURLsOnly","domain":"facebook.com"},{"applied_policy":"PlainTextURLsOnly","domain":"wechat.com"},{"applied_policy":"PlainTextURLsOnly","domain":"weixin.com"},{"applied_policy":"PlainTextURLsOnly","domain":"qq.com"},{"applied_policy":"PlainTextURLsOnly","domain":"webex.com"},{"applied_policy":"PlainTextURLsOnly","domain":"wordpress.com"},{"applied_policy":"PlainTextURLsOnly","domain":"twitter.com"},{"applied_policy":"PlainTextURLsOnly","domain":"discord.com"}],"policies":[{"name":"PlainTextURLsOnly","type":"ECPOnlyPlaintextURLs"}],"version":1},"idl_override":{"applications":[{"applied_policy":"ExposePrefixedEME","domain":"netflix.com"},{"applied_policy":"ExposePrefixedEME","domain":"music.amazon.co.jp"},{"applied_policy":"ExposePrefixedEME","domain":"music.amazon.co.uk"},{"applied_policy":"ExposePrefixedEME","domain":"music.amazon.com"},{"applied_policy":"ExposePrefixedEME","domain":"music.amazon.de"},{"applied_policy":"ExposePrefixedEME","domain":"music.amazon.es"},{"applied_policy":"ExposePrefixedEME","domain":"music.amazon.fr"},{"applied_policy":"ExposePrefixedEME","domain":"music.amazon.in"},{"applied_policy":"ExposePrefixedEME","domain":"music.amazon.it"},{"applied_policy":"ExposePrefixedEME","domain":"music.amazon.ca"},{"applied_policy":"ExposePrefixedEME","domain":"music.amazon.com.br"},{"applied_policy":"ExposePrefixedEME","domain":"sling.com"},{"applied_policy":"ExposePrefixedEME","domain":"openidconnectweb.azurewebsites.net"}],"policies":[{"name":"ExposePrefixedEME","type":"PrefixedEme"}],"version":1},"media_foundation_override":{"applications":[{"applied_policy":"OptIn","domain":"youtube.com","path_exclude":["/shorts","/kids"],"subdomain_exclude":["tv.youtube.com","studio.youtube.com","vr.youtube.com"]}],"policies":[{"name":"OptIn","type":"MediaFoundationOptIn"},{"name":"OptOut","type":"MediaFoundationOptOut"}],"version":1},"web_notification_override":{"applications":[{"applied_policy":"prompt","domain":"www.reddit.com"},{"applied_policy":"prompt","domain":"www.telegraphindia.com"},{"applied_policy":"prompt","domain":"timesofindia.indiatimes.com"},{"applied_policy":"prompt","domain":"pushengage.com"},{"applied_policy":"prompt","domain":"www.timesnownews.com"},{"applied_policy":"prom
                  Source: z58Swiftcopy_MT.bat.exe, 00000003.00000003.28478527078.0000000002A94000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: policies":[{"name":"OnlyExposePlayReady","type":"Playready"},{"name":"OnlyExposeWidevine","type":"Widevine"}],"version":1},"codec_override":{"applications":[{"applied_policy":"HideMfHevcCodec","domain":"tv.apple.com"},{"applied_policy":"HideMfHevcCodec","domain":"nintendo.com"}],"policies":[{"name":"HideMfHevcCodec","type":"MfHevcCodec"}],"version":1},"content_filter_on_off_switch":{"applications":[{"applied_policy":"ContentFilter","domain":"microsoft.com"}],"policies":[{"name":"ContentFilter"}],"version":1},"ecp_override":{"applications":[{"applied_policy":"PlainTextURLsOnly","domain":"hangouts.google.com"},{"applied_policy":"PlainTextURLsOnly","domain":"chat.google.com"},{"applied_policy":"PlainTextURLsOnly","domain":"slack.com"},{"applied_policy":"PlainTextURLsOnly","domain":"facebook.com"},{"applied_policy":"PlainTextURLsOnly","domain":"wechat.com"},{"applied_policy":"PlainTextURLsOnly","domain":"weixin.com"},{"applied_policy":"PlainTextURLsOnly","domain":"qq.com"},{"applied_policy":"PlainTextURLsOnly","domain":"webex.com"},{"applied_policy":"PlainTextURLsOnly","domain":"wordpress.com"},{"applied_policy":"PlainTextURLsOnly","domain":"twitter.com"},{"applied_policy":"PlainTextURLsOnly","domain":"discord.com"}],"policies":[{"name":"PlainTextURLsOnly","type":"ECPOnlyPlaintextURLs"}],"version":1},"idl_override":{"applications":[{"applied_policy":"ExposePrefixedEME","domain":"netflix.com"},{"applied_policy":"ExposePrefixedEME","domain":"music.amazon.co.jp"},{"applied_policy":"ExposePrefixedEME","domain":"music.amazon.co.uk"},{"applied_policy":"ExposePrefixedEME","domain":"music.amazon.com"},{"applied_policy":"ExposePrefixedEME","domain":"music.amazon.de"},{"applied_policy":"ExposePrefixedEME","domain":"music.amazon.es"},{"applied_policy":"ExposePrefixedEME","domain":"music.amazon.fr"},{"applied_policy":"ExposePrefixedEME","domain":"music.amazon.in"},{"applied_policy":"ExposePrefixedEME","domain":"music.amazon.it"},{"applied_policy":"ExposePrefixedEME","domain":"music.amazon.ca"},{"applied_policy":"ExposePrefixedEME","domain":"music.amazon.com.br"},{"applied_policy":"ExposePrefixedEME","domain":"sling.com"},{"applied_policy":"ExposePrefixedEME","domain":"openidconnectweb.azurewebsites.net"}],"policies":[{"name":"ExposePrefixedEME","type":"PrefixedEme"}],"version":1},"media_foundation_override":{"applications":[{"applied_policy":"OptIn","domain":"youtube.com","path_exclude":["/shorts","/kids"],"subdomain_exclude":["tv.youtube.com","studio.youtube.com","vr.youtube.com"]}],"policies":[{"name":"OptIn","type":"MediaFoundationOptIn"},{"name":"OptOut","type":"MediaFoundationOptOut"}],"version":1},"web_notification_override":{"applications":[{"applied_policy":"prompt","domain":"www.reddit.com"},{"applied_policy":"prompt","domain":"www.telegraphindia.com"},{"applied_policy":"prompt","domain":"timesofindia.indiatimes.com"},{"applied_policy":"prompt","domain":"pushengage.com"},{"applied_policy":"prompt","domain":"www.timesnownews.com"},{"applied_policy":"prom
                  Source: z58Swiftcopy_MT.bat.exe, 00000002.00000002.32066847956.0000000033950000.00000040.10000000.00040000.00000000.sdmp, z58Swiftcopy_MT.bat.exe, 00000003.00000002.28481532531.0000000000400000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: ~@:9@0123456789ABCDEFURL index.datvisited:https://www.google.com/accounts/serviceloginhttp://www.facebook.com/https://login.yahoo.com/config/login$ equals www.facebook.com (Facebook)
                  Source: z58Swiftcopy_MT.bat.exe, 00000002.00000002.32066847956.0000000033950000.00000040.10000000.00040000.00000000.sdmp, z58Swiftcopy_MT.bat.exe, 00000003.00000002.28481532531.0000000000400000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: ~@:9@0123456789ABCDEFURL index.datvisited:https://www.google.com/accounts/serviceloginhttp://www.facebook.com/https://login.yahoo.com/config/login$ equals www.yahoo.com (Yahoo)
                  Source: global trafficDNS traffic detected: DNS query: teldrum.ro
                  Source: global trafficDNS traffic detected: DNS query: wealthabundance01.duckdns.org
                  Source: global trafficDNS traffic detected: DNS query: geoplugin.net
                  Source: bhvD739.tmp.3.drString found in binary or memory: http://c.pki.goog/r/r1.crl0
                  Source: bhvD739.tmp.3.drString found in binary or memory: http://c.pki.goog/wr2/9UVbN0w5E6Y.crl0
                  Source: bhvD739.tmp.3.drString found in binary or memory: http://cacerts.digicert.com/CloudflareIncECCCA-3.crt0
                  Source: bhvD739.tmp.3.drString found in binary or memory: http://cacerts.digicert.com/DigiCertCloudServicesCA-1.crt0
                  Source: bhvD739.tmp.3.drString found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootCA.crt0
                  Source: bhvD739.tmp.3.drString found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootCA.crt0B
                  Source: bhvD739.tmp.3.drString found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootG2.crt0
                  Source: bhvD739.tmp.3.drString found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootG2.crt0B
                  Source: bhvD739.tmp.3.drString found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootG3.crt0
                  Source: bhvD739.tmp.3.drString found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootG3.crt0B
                  Source: bhvD739.tmp.3.drString found in binary or memory: http://cacerts.digicert.com/DigiCertSHA2HighAssuranceServerCA.crt0
                  Source: bhvD739.tmp.3.drString found in binary or memory: http://cacerts.digicert.com/DigiCertSHA2SecureServerCA-2.crt0
                  Source: bhvD739.tmp.3.drString found in binary or memory: http://cacerts.digicert.com/DigiCertSHA2SecureServerCA.crt0
                  Source: bhvD739.tmp.3.drString found in binary or memory: http://cacerts.digicert.com/DigiCertTLSHybridECCSHA3842020CA1-1.crt0
                  Source: bhvD739.tmp.3.drString found in binary or memory: http://cacerts.digicert.com/DigiCertTLSHybridECCSHA3842020CA1.crt0
                  Source: bhvD739.tmp.3.drString found in binary or memory: http://cacerts.digicert.com/DigiCertTLSRSASHA2562020CA1-1.crt0
                  Source: bhvD739.tmp.3.drString found in binary or memory: http://cacerts.digicert.com/DigiCertTLSRSASHA2562020CA1.crt0
                  Source: bhvD739.tmp.3.drString found in binary or memory: http://cacerts.geotrust.com/GeoTrustECCCA2018.crt0
                  Source: bhvD739.tmp.3.drString found in binary or memory: http://cacerts.thawte.com/ThawteRSACA2018.crt0
                  Source: bhvD739.tmp.3.drString found in binary or memory: http://cdp.geotrust.com/GeoTrustECCCA2018.crl0
                  Source: bhvD739.tmp.3.drString found in binary or memory: http://cdp.thawte.com/ThawteRSACA2018.crl0L
                  Source: bhvD739.tmp.3.drString found in binary or memory: http://certificates.godaddy.com/repository/0
                  Source: bhvD739.tmp.3.drString found in binary or memory: http://certificates.godaddy.com/repository/gdig2.crt0
                  Source: bhvD739.tmp.3.drString found in binary or memory: http://certs.godaddy.com/repository/1301
                  Source: bhvD739.tmp.3.drString found in binary or memory: http://contentstorage.osi.office.net/
                  Source: bhvD739.tmp.3.drString found in binary or memory: http://crl.comodoca.com/AAACertificateServices.crl04
                  Source: z58Swiftcopy_MT.bat.exe, 00000002.00000003.28436040290.0000000002A9A000.00000004.00000020.00020000.00000000.sdmp, z58Swiftcopy_MT.bat.exe, 00000002.00000002.32056932719.0000000002A9D000.00000004.00000020.00020000.00000000.sdmp, z58Swiftcopy_MT.bat.exe, 00000002.00000003.28340161307.0000000002AA1000.00000004.00000020.00020000.00000000.sdmp, z58Swiftcopy_MT.bat.exe, 00000002.00000003.28390975053.0000000002A98000.00000004.00000020.00020000.00000000.sdmp, z58Swiftcopy_MT.bat.exe, 00000002.00000003.29410588585.0000000002A9C000.00000004.00000020.00020000.00000000.sdmp, bhvD739.tmp.3.drString found in binary or memory: http://crl.comodoca.com/AAACertificateServices.crl06
                  Source: bhvD739.tmp.3.drString found in binary or memory: http://crl.globalsign.com/gsgccr3dvtlsca2020.crl0#
                  Source: bhvD739.tmp.3.drString found in binary or memory: http://crl.globalsign.com/root-r3.crl0G
                  Source: z58Swiftcopy_MT.bat.exe, 00000002.00000003.28436040290.0000000002A9A000.00000004.00000020.00020000.00000000.sdmp, z58Swiftcopy_MT.bat.exe, 00000002.00000002.32056932719.0000000002A9D000.00000004.00000020.00020000.00000000.sdmp, z58Swiftcopy_MT.bat.exe, 00000002.00000003.28340161307.0000000002AA1000.00000004.00000020.00020000.00000000.sdmp, z58Swiftcopy_MT.bat.exe, 00000002.00000003.28390975053.0000000002A98000.00000004.00000020.00020000.00000000.sdmp, z58Swiftcopy_MT.bat.exe, 00000002.00000003.29410588585.0000000002A9C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.globalsign.net/root-r2.crl0
                  Source: bhvD739.tmp.3.drString found in binary or memory: http://crl.godaddy.com/gdig2s1-2558.crl0
                  Source: bhvD739.tmp.3.drString found in binary or memory: http://crl.godaddy.com/gdroot-g2.crl0F
                  Source: bhvD739.tmp.3.drString found in binary or memory: http://crl.godaddy.com/gdroot.crl0F
                  Source: bhvD739.tmp.3.drString found in binary or memory: http://crl.pki.goog/gsr1/gsr1.crl0;
                  Source: bhvD739.tmp.3.drString found in binary or memory: http://crl.pki.goog/gtsr1/gtsr1.crl0W
                  Source: bhvD739.tmp.3.drString found in binary or memory: http://crl.rootca1.amazontrust.com/rootca1.crl0
                  Source: bhvD739.tmp.3.drString found in binary or memory: http://crl.rootg2.amazontrust.com/rootg2.crl0
                  Source: bhvD739.tmp.3.drString found in binary or memory: http://crl.sca1b.amazontrust.com/sca1b.crl0
                  Source: bhvD739.tmp.3.drString found in binary or memory: http://crl3.digicert.com/CloudflareIncECCCA-3.crl07
                  Source: bhvD739.tmp.3.drString found in binary or memory: http://crl3.digicert.com/DigiCertCloudServicesCA-1-g1.crl0?
                  Source: bhvD739.tmp.3.drString found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootCA.crl07
                  Source: bhvD739.tmp.3.drString found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootCA.crl0=
                  Source: bhvD739.tmp.3.drString found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootG2.crl0
                  Source: bhvD739.tmp.3.drString found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootG2.crl07
                  Source: bhvD739.tmp.3.drString found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootG3.crl0
                  Source: bhvD739.tmp.3.drString found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootG3.crl07
                  Source: bhvD739.tmp.3.drString found in binary or memory: http://crl3.digicert.com/DigiCertSHA2SecureServerCA.crl0=
                  Source: bhvD739.tmp.3.drString found in binary or memory: http://crl3.digicert.com/DigiCertTLSHybridECCSHA3842020CA1-1.crl0F
                  Source: bhvD739.tmp.3.drString found in binary or memory: http://crl3.digicert.com/DigiCertTLSHybridECCSHA3842020CA1.crl0D
                  Source: bhvD739.tmp.3.drString found in binary or memory: http://crl3.digicert.com/DigiCertTLSRSASHA2562020CA1-1.crl0
                  Source: bhvD739.tmp.3.drString found in binary or memory: http://crl3.digicert.com/DigiCertTLSRSASHA2562020CA1-3.crl0
                  Source: bhvD739.tmp.3.drString found in binary or memory: http://crl3.digicert.com/DigiCertTLSRSASHA2562020CA1-4.crl0
                  Source: bhvD739.tmp.3.drString found in binary or memory: http://crl3.digicert.com/DigiCertTLSRSASHA2562020CA1.crl0
                  Source: bhvD739.tmp.3.drString found in binary or memory: http://crl3.digicert.com/DigicertSHA2SecureServerCA-1.crl0?
                  Source: bhvD739.tmp.3.drString found in binary or memory: http://crl3.digicert.com/Omniroot2025.crl0
                  Source: bhvD739.tmp.3.drString found in binary or memory: http://crl3.digicert.com/Omniroot2025.crl0=
                  Source: bhvD739.tmp.3.drString found in binary or memory: http://crl3.digicert.com/Omniroot2025.crl0m
                  Source: bhvD739.tmp.3.drString found in binary or memory: http://crl3.digicert.com/sha2-ha-server-g6.crl04
                  Source: bhvD739.tmp.3.drString found in binary or memory: http://crl3.digicert.com/ssca-sha2-g6.crl0/
                  Source: bhvD739.tmp.3.drString found in binary or memory: http://crl3.digicert.com/ssca-sha2-g7.crl0/
                  Source: bhvD739.tmp.3.drString found in binary or memory: http://crl4.digicert.com/CloudflareIncECCCA-3.crl0
                  Source: bhvD739.tmp.3.drString found in binary or memory: http://crl4.digicert.com/DigiCertCloudServicesCA-1-g1.crl0
                  Source: bhvD739.tmp.3.drString found in binary or memory: http://crl4.digicert.com/DigiCertCloudServicesCA-1-g1.crl0L
                  Source: bhvD739.tmp.3.drString found in binary or memory: http://crl4.digicert.com/DigiCertGlobalRootCA.crl00
                  Source: bhvD739.tmp.3.drString found in binary or memory: http://crl4.digicert.com/DigiCertGlobalRootCA.crl0=
                  Source: bhvD739.tmp.3.drString found in binary or memory: http://crl4.digicert.com/DigiCertGlobalRootG2.crl0
                  Source: bhvD739.tmp.3.drString found in binary or memory: http://crl4.digicert.com/DigiCertGlobalRootG3.crl0
                  Source: bhvD739.tmp.3.drString found in binary or memory: http://crl4.digicert.com/DigiCertHighAssuranceEVRootCA.crl0=
                  Source: bhvD739.tmp.3.drString found in binary or memory: http://crl4.digicert.com/DigiCertSHA2SecureServerCA.crl0
                  Source: bhvD739.tmp.3.drString found in binary or memory: http://crl4.digicert.com/DigiCertSHA2SecureServerCA.crl0L
                  Source: bhvD739.tmp.3.drString found in binary or memory: http://crl4.digicert.com/DigiCertTLSHybridECCSHA3842020CA1-1.crl0
                  Source: bhvD739.tmp.3.drString found in binary or memory: http://crl4.digicert.com/DigiCertTLSHybridECCSHA3842020CA1.crl0L
                  Source: bhvD739.tmp.3.drString found in binary or memory: http://crl4.digicert.com/DigiCertTLSRSASHA2562020CA1-1.crl0
                  Source: bhvD739.tmp.3.drString found in binary or memory: http://crl4.digicert.com/DigiCertTLSRSASHA2562020CA1-3.crl0
                  Source: bhvD739.tmp.3.drString found in binary or memory: http://crl4.digicert.com/DigiCertTLSRSASHA2562020CA1-4.crl0
                  Source: bhvD739.tmp.3.drString found in binary or memory: http://crl4.digicert.com/DigiCertTLSRSASHA2562020CA1.crl0L
                  Source: bhvD739.tmp.3.drString found in binary or memory: http://crl4.digicert.com/DigicertSHA2SecureServerCA-1.crl0~
                  Source: bhvD739.tmp.3.drString found in binary or memory: http://crl4.digicert.com/sha2-ha-server-g6.crl0
                  Source: bhvD739.tmp.3.drString found in binary or memory: http://crl4.digicert.com/ssca-sha2-g6.crl0L
                  Source: bhvD739.tmp.3.drString found in binary or memory: http://crl4.digicert.com/ssca-sha2-g7.crl0
                  Source: bhvD739.tmp.3.drString found in binary or memory: http://crls.pki.goog/gts1c3/QOvJ0N1sT2A.crl0
                  Source: bhvD739.tmp.3.drString found in binary or memory: http://crls.pki.goog/gts1c3/fVJxbV-Ktmk.crl0
                  Source: bhvD739.tmp.3.drString found in binary or memory: http://crls.pki.goog/gts1c3/zdATt0Ex_Fk.crl0
                  Source: bhvD739.tmp.3.drString found in binary or memory: http://crt.rootca1.amazontrust.com/rootca1.cer0?
                  Source: bhvD739.tmp.3.drString found in binary or memory: http://crt.rootg2.amazontrust.com/rootg2.cer0=
                  Source: bhvD739.tmp.3.drString found in binary or memory: http://crt.sca1b.amazontrust.com/sca1b.crt0
                  Source: bhvD739.tmp.3.drString found in binary or memory: http://crt.sectigo.com/SectigoRSADomainValidationSecureServerCA.crt0#
                  Source: bhvD739.tmp.3.drString found in binary or memory: http://csp.yahoo.com/beacon/csp?src=yahoocom-expect-ct-report-only
                  Source: z58Swiftcopy_MT.bat.exe, 00000002.00000003.29410588585.0000000002A9C000.00000004.00000020.00020000.00000000.sdmp, bhvD739.tmp.3.drString found in binary or memory: http://geoplugin.net/json.gp
                  Source: z58Swiftcopy_MT.bat.exe, 00000002.00000003.28436040290.0000000002A9A000.00000004.00000020.00020000.00000000.sdmp, z58Swiftcopy_MT.bat.exe, 00000002.00000002.32056932719.0000000002A9D000.00000004.00000020.00020000.00000000.sdmp, z58Swiftcopy_MT.bat.exe, 00000002.00000003.28390975053.0000000002A98000.00000004.00000020.00020000.00000000.sdmp, z58Swiftcopy_MT.bat.exe, 00000002.00000003.29410588585.0000000002A9C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://geoplugin.net/json.gp=N
                  Source: z58Swiftcopy_MT.bat.exe, 00000002.00000003.28390975053.0000000002A98000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://geoplugin.net/json.gpCn
                  Source: z58Swiftcopy_MT.bat.exe, 00000002.00000003.28436040290.0000000002A9A000.00000004.00000020.00020000.00000000.sdmp, z58Swiftcopy_MT.bat.exe, 00000002.00000002.32056932719.0000000002A9D000.00000004.00000020.00020000.00000000.sdmp, z58Swiftcopy_MT.bat.exe, 00000002.00000003.28390975053.0000000002A98000.00000004.00000020.00020000.00000000.sdmp, z58Swiftcopy_MT.bat.exe, 00000002.00000003.29410588585.0000000002A9C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://geoplugin.net/json.gpXN
                  Source: z58Swiftcopy_MT.bat.exe, 00000002.00000003.28436040290.0000000002A9A000.00000004.00000020.00020000.00000000.sdmp, z58Swiftcopy_MT.bat.exe, 00000002.00000002.32056932719.0000000002A9D000.00000004.00000020.00020000.00000000.sdmp, z58Swiftcopy_MT.bat.exe, 00000002.00000003.28390975053.0000000002A98000.00000004.00000020.00020000.00000000.sdmp, z58Swiftcopy_MT.bat.exe, 00000002.00000003.29410588585.0000000002A9C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://geoplugin.net/json.gpl
                  Source: bhvD739.tmp.3.drString found in binary or memory: http://i.pki.goog/r1.crt0
                  Source: bhvD739.tmp.3.drString found in binary or memory: http://i.pki.goog/wr2.crt0
                  Source: z58Swiftcopy_MT.bat.exe, 00000002.00000001.27691456198.0000000000649000.00000020.00000001.01000000.00000007.sdmpString found in binary or memory: http://inference.location.live.com11111111-1111-1111-1111-111111111111https://partnernext-inference.
                  Source: z58Swiftcopy_MT.bat.exeString found in binary or memory: http://nsis.sf.net/NSIS_Error
                  Source: z58Swiftcopy_MT.bat.exeString found in binary or memory: http://nsis.sf.net/NSIS_ErrorError
                  Source: bhvD739.tmp.3.drString found in binary or memory: http://o.pki.goog/wr20%
                  Source: bhvD739.tmp.3.drString found in binary or memory: http://o.ss2.us/0
                  Source: bhvD739.tmp.3.drString found in binary or memory: http://ocsp.comodoca.com0
                  Source: bhvD739.tmp.3.drString found in binary or memory: http://ocsp.digicert.com0
                  Source: bhvD739.tmp.3.drString found in binary or memory: http://ocsp.digicert.com0:
                  Source: bhvD739.tmp.3.drString found in binary or memory: http://ocsp.digicert.com0B
                  Source: bhvD739.tmp.3.drString found in binary or memory: http://ocsp.digicert.com0F
                  Source: bhvD739.tmp.3.drString found in binary or memory: http://ocsp.digicert.com0G
                  Source: bhvD739.tmp.3.drString found in binary or memory: http://ocsp.digicert.com0H
                  Source: bhvD739.tmp.3.drString found in binary or memory: http://ocsp.digicert.com0I
                  Source: bhvD739.tmp.3.drString found in binary or memory: http://ocsp.digicert.com0K
                  Source: bhvD739.tmp.3.drString found in binary or memory: http://ocsp.digicert.com0M
                  Source: bhvD739.tmp.3.drString found in binary or memory: http://ocsp.digicert.com0O
                  Source: bhvD739.tmp.3.drString found in binary or memory: http://ocsp.globalsign.com/ca/gsovsha2g4r30
                  Source: bhvD739.tmp.3.drString found in binary or memory: http://ocsp.globalsign.com/gsgccr3dvtlsca20200V
                  Source: bhvD739.tmp.3.drString found in binary or memory: http://ocsp.godaddy.com/0
                  Source: bhvD739.tmp.3.drString found in binary or memory: http://ocsp.godaddy.com/02
                  Source: bhvD739.tmp.3.drString found in binary or memory: http://ocsp.godaddy.com/05
                  Source: bhvD739.tmp.3.drString found in binary or memory: http://ocsp.msocsp.com0
                  Source: bhvD739.tmp.3.drString found in binary or memory: http://ocsp.pki.goog/gsr10)
                  Source: bhvD739.tmp.3.drString found in binary or memory: http://ocsp.pki.goog/gts1c301
                  Source: bhvD739.tmp.3.drString found in binary or memory: http://ocsp.pki.goog/gtsr100
                  Source: bhvD739.tmp.3.drString found in binary or memory: http://ocsp.rootca1.amazontrust.com0:
                  Source: bhvD739.tmp.3.drString found in binary or memory: http://ocsp.rootg2.amazontrust.com08
                  Source: bhvD739.tmp.3.drString found in binary or memory: http://ocsp.sca1b.amazontrust.com06
                  Source: bhvD739.tmp.3.drString found in binary or memory: http://ocsp.sectigo.com0
                  Source: bhvD739.tmp.3.drString found in binary or memory: http://ocsp.sectigo.com0%
                  Source: bhvD739.tmp.3.drString found in binary or memory: http://ocsp2.globalsign.com/rootr306
                  Source: bhvD739.tmp.3.drString found in binary or memory: http://ocsp2.globalsign.com/rootr30;
                  Source: bhvD739.tmp.3.drString found in binary or memory: http://ocspx.digicert.com0E
                  Source: bhvD739.tmp.3.drString found in binary or memory: http://pki.goog/gsr1/gsr1.crt02
                  Source: bhvD739.tmp.3.drString found in binary or memory: http://pki.goog/repo/certs/gts1c3.der0
                  Source: bhvD739.tmp.3.drString found in binary or memory: http://pki.goog/repo/certs/gts1c3.der0$
                  Source: bhvD739.tmp.3.drString found in binary or memory: http://pki.goog/repo/certs/gts1c3.der07
                  Source: bhvD739.tmp.3.drString found in binary or memory: http://pki.goog/repo/certs/gtsr1.der04
                  Source: bhvD739.tmp.3.drString found in binary or memory: http://s.ss2.us/r.crl0
                  Source: bhvD739.tmp.3.drString found in binary or memory: http://secure.globalsign.com/cacert/gsgccr3dvtlsca2020.crt09
                  Source: bhvD739.tmp.3.drString found in binary or memory: http://secure.globalsign.com/cacert/gsovsha2g4r3.crt0
                  Source: bhvD739.tmp.3.drString found in binary or memory: http://secure.globalsign.com/cacert/root-r3.crt06
                  Source: bhvD739.tmp.3.drString found in binary or memory: http://status.geotrust.com0=
                  Source: bhvD739.tmp.3.drString found in binary or memory: http://status.thawte.com09
                  Source: bhvD739.tmp.3.drString found in binary or memory: http://www.digicert.com/CPS0
                  Source: bhvD739.tmp.3.drString found in binary or memory: http://www.digicert.com/CPS0u
                  Source: bhvD739.tmp.3.drString found in binary or memory: http://www.digicert.com/CPS0v
                  Source: bhvD739.tmp.3.drString found in binary or memory: http://www.digicert.com/CPS0~
                  Source: z58Swiftcopy_MT.bat.exe, z58Swiftcopy_MT.bat.exe, 00000005.00000002.28456405187.0000000000400000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: http://www.ebuddy.com
                  Source: z58Swiftcopy_MT.bat.exe, 00000002.00000001.27691456198.0000000000649000.00000020.00000001.01000000.00000007.sdmpString found in binary or memory: http://www.gopher.ftp://ftp.
                  Source: z58Swiftcopy_MT.bat.exe, 00000002.00000001.27691456198.0000000000626000.00000020.00000001.01000000.00000007.sdmpString found in binary or memory: http://www.ibm.com/data/dtd/v11/ibmxhtml1-transitional.dtd-//W3O//DTD
                  Source: z58Swiftcopy_MT.bat.exe, z58Swiftcopy_MT.bat.exe, 00000005.00000003.28455900413.0000000000AFD000.00000004.00000020.00020000.00000000.sdmp, z58Swiftcopy_MT.bat.exe, 00000005.00000002.28456405187.0000000000400000.00000040.80000000.00040000.00000000.sdmp, z58Swiftcopy_MT.bat.exe, 00000005.00000003.28455853934.0000000000AFD000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.imvu.com
                  Source: z58Swiftcopy_MT.bat.exe, 00000005.00000002.28456329037.000000000019C000.00000004.00000010.00020000.00000000.sdmpString found in binary or memory: http://www.imvu.com/
                  Source: z58Swiftcopy_MT.bat.exe, 00000005.00000003.28455900413.0000000000AFD000.00000004.00000020.00020000.00000000.sdmp, z58Swiftcopy_MT.bat.exe, 00000005.00000003.28455853934.0000000000AFD000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.imvu.comata
                  Source: z58Swiftcopy_MT.bat.exe, 00000002.00000002.32067121242.0000000033A40000.00000040.10000000.00040000.00000000.sdmp, z58Swiftcopy_MT.bat.exe, 00000005.00000002.28456405187.0000000000400000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: http://www.imvu.comhttp://www.ebuddy.comhttps://www.google.com
                  Source: z58Swiftcopy_MT.bat.exe, 00000002.00000002.32067121242.0000000033A40000.00000040.10000000.00040000.00000000.sdmp, z58Swiftcopy_MT.bat.exe, 00000005.00000002.28456405187.0000000000400000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: http://www.imvu.comr
                  Source: z58Swiftcopy_MT.bat.exe, 00000003.00000002.28481442526.0000000000193000.00000004.00000010.00020000.00000000.sdmpString found in binary or memory: http://www.nirsoft.net
                  Source: z58Swiftcopy_MT.bat.exe, 00000005.00000002.28456405187.0000000000400000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: http://www.nirsoft.net/
                  Source: z58Swiftcopy_MT.bat.exe, 00000002.00000003.28436040290.0000000002A9A000.00000004.00000020.00020000.00000000.sdmp, z58Swiftcopy_MT.bat.exe, 00000002.00000002.32056932719.0000000002A9D000.00000004.00000020.00020000.00000000.sdmp, z58Swiftcopy_MT.bat.exe, 00000002.00000003.28340161307.0000000002AA1000.00000004.00000020.00020000.00000000.sdmp, z58Swiftcopy_MT.bat.exe, 00000002.00000003.28390975053.0000000002A98000.00000004.00000020.00020000.00000000.sdmp, z58Swiftcopy_MT.bat.exe, 00000002.00000003.29410588585.0000000002A9C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.quovadis.bm0
                  Source: z58Swiftcopy_MT.bat.exe, 00000002.00000001.27691456198.00000000005F2000.00000020.00000001.01000000.00000007.sdmpString found in binary or memory: http://www.w3c.org/TR/1999/REC-html401-19991224/frameset.dtd
                  Source: z58Swiftcopy_MT.bat.exe, 00000002.00000001.27691456198.00000000005F2000.00000020.00000001.01000000.00000007.sdmpString found in binary or memory: http://www.w3c.org/TR/1999/REC-html401-19991224/loose.dtd
                  Source: bhvD739.tmp.3.drString found in binary or memory: http://x.ss2.us/x.cer0&
                  Source: z58Swiftcopy_MT.bat.exe, 00000003.00000003.28475198040.0000000002A91000.00000004.00000020.00020000.00000000.sdmp, z58Swiftcopy_MT.bat.exe, 00000003.00000003.28476240349.0000000002271000.00000004.00000020.00020000.00000000.sdmp, bhvD739.tmp.3.drString found in binary or memory: https://2542116.fls.doubleclick.net/activityi;src=2542116;type=2542116;cat=chrom0;ord=8672137916610;
                  Source: z58Swiftcopy_MT.bat.exe, 00000003.00000003.28476240349.000000000228D000.00000004.00000020.00020000.00000000.sdmp, z58Swiftcopy_MT.bat.exe, 00000003.00000003.28476475209.000000000228D000.00000004.00000020.00020000.00000000.sdmp, z58Swiftcopy_MT.bat.exe, 00000003.00000003.28476240349.0000000002271000.00000004.00000020.00020000.00000000.sdmp, bhvD739.tmp.3.drString found in binary or memory: https://2542116.fls.doubleclick.net/activityi;src=2542116;type=chrom322;cat=chrom01g;ord=37393684334
                  Source: z58Swiftcopy_MT.bat.exe, 00000003.00000003.28475198040.0000000002A91000.00000004.00000020.00020000.00000000.sdmp, z58Swiftcopy_MT.bat.exe, 00000003.00000003.28476240349.0000000002271000.00000004.00000020.00020000.00000000.sdmp, bhvD739.tmp.3.drString found in binary or memory: https://2542116.fls.doubleclick.net/activityi;src=2542116;type=clien612;cat=chromx;ord=1;num=7209567
                  Source: bhvD739.tmp.3.drString found in binary or memory: https://99c8cba043b829a5adbf3c95c1c0a87a.azr.footprintdns.com/apc/trans.gif?b463cc9221b0d1cf6b255213
                  Source: bhvD739.tmp.3.drString found in binary or memory: https://99c8cba043b829a5adbf3c95c1c0a87a.azr.footprintdns.com/apc/trans.gif?d61d17a32b075ad284d0798e
                  Source: bhvD739.tmp.3.drString found in binary or memory: https://account.live.com/
                  Source: bhvD739.tmp.3.drString found in binary or memory: https://account.live.com/Resources/images/2_vD0yppaJX3jBnfbHF1hqXQ2.svg
                  Source: bhvD739.tmp.3.drString found in binary or memory: https://account.live.com/Resources/images/AppCentipede/AppCentipede_Microsoft_HFeToeM4u6fzMQF_f_rQ5Q
                  Source: bhvD739.tmp.3.drString found in binary or memory: https://account.live.com/Resources/images/AppCentipede/AppCentipede_Microsoft_white_ufRYlllWOw4YyDRi
                  Source: bhvD739.tmp.3.drString found in binary or memory: https://account.live.com/Resources/images/Arrows/left_qcwoJO81F7bEFg3Pj_fUEA2.svg
                  Source: bhvD739.tmp.3.drString found in binary or memory: https://account.live.com/Resources/images/Microsoft_Logotype_Gray_X-qkgtg8KmnQEvm_9mDTcw2.svg
                  Source: bhvD739.tmp.3.drString found in binary or memory: https://account.live.com/Resources/images/Microsoft_Logotype_White_4MYDQRab31HKDWWN-1HafA2.svg
                  Source: bhvD739.tmp.3.drString found in binary or memory: https://account.live.com/Resources/images/favicon.ico
                  Source: bhvD739.tmp.3.drString found in binary or memory: https://account.live.com/Resources/images/microsoft_logo_7lyNn7YkjJOP0NwZNw6QvQ2.svg
                  Source: bhvD739.tmp.3.drString found in binary or memory: https://account.live.com/identity/confirm?mkt=EN-US&uiflavor=win10host&client_id=1E0000480728C5&conn
                  Source: bhvD739.tmp.3.drString found in binary or memory: https://acctcdn.msftauth.net/accountcorepackage_hSxsZy9Ymkhjr2rMMwej_g2.js?v=1
                  Source: bhvD739.tmp.3.drString found in binary or memory: https://acctcdn.msftauth.net/bootstrapcomponentshim_yGKy8jAx8RL2bLqmBF063w2.js?v=1
                  Source: bhvD739.tmp.3.drString found in binary or memory: https://acctcdn.msftauth.net/bootstrapshim_IX6xrWCoGcREOsbbsQ1Yvg2.js?v=1
                  Source: bhvD739.tmp.3.drString found in binary or memory: https://acctcdn.msftauth.net/confirmidentity_9m6e3jBPkyZiRdJxglsYsA2.js?v=1
                  Source: bhvD739.tmp.3.drString found in binary or memory: https://acctcdn.msftauth.net/converged_ux_v2_nBE5FSqn9KpH44ZlTc3VqQ2.css?v=1
                  Source: bhvD739.tmp.3.drString found in binary or memory: https://acctcdn.msftauth.net/corewin10_Lmno_4TyJLm7Xee3gF3aOg2.js?v=1
                  Source: bhvD739.tmp.3.drString found in binary or memory: https://acctcdn.msftauth.net/datarequestpackage_h-_7C7UzwdefXJT9njDBTQ2.js
                  Source: bhvD739.tmp.3.drString found in binary or memory: https://acctcdn.msftauth.net/hostfooterpackage_FOuGbot8yZGKyYkh5yNQBA2.js?v=1
                  Source: bhvD739.tmp.3.drString found in binary or memory: https://acctcdn.msftauth.net/images/Arrows/left_qcwoJO81F7bEFg3Pj_fUEA2.svg
                  Source: bhvD739.tmp.3.drString found in binary or memory: https://acctcdn.msftauth.net/images/microsoft_logo_7lyNn7YkjJOP0NwZNw6QvQ2.svg
                  Source: bhvD739.tmp.3.drString found in binary or memory: https://acctcdn.msftauth.net/jqueryshim_hlu0tTfjWJFWYNt1WZrVqg2.js?v=1
                  Source: bhvD739.tmp.3.drString found in binary or memory: https://acctcdn.msftauth.net/oneds_MC5gQfpbTUjLu60sQCwU1w2.js?v=1
                  Source: bhvD739.tmp.3.drString found in binary or memory: https://acctcdn.msftauth.net/wlivepackagefull_stPwvW3-5mShoxrbkAw2qw2.js?v=1
                  Source: bhvD739.tmp.3.drString found in binary or memory: https://acdn.adnxs.com/dmp/async_usersync.html
                  Source: bhvD739.tmp.3.drString found in binary or memory: https://acdn.adnxs.com/dmp/async_usersync.html?gdpr=1&gdpr_consent=CPM7kC1PM7kC1AcABBENBQCsAP_AAELAA
                  Source: z58Swiftcopy_MT.bat.exe, 00000003.00000003.28475198040.0000000002A91000.00000004.00000020.00020000.00000000.sdmp, z58Swiftcopy_MT.bat.exe, 00000003.00000003.28476240349.0000000002271000.00000004.00000020.00020000.00000000.sdmp, bhvD739.tmp.3.drString found in binary or memory: https://adservice.google.co.uk/ddm/fls/i/src=2542116;type=chrom322;cat=chrom01g;ord=3739368433491;gt
                  Source: z58Swiftcopy_MT.bat.exe, 00000003.00000003.28475198040.0000000002A91000.00000004.00000020.00020000.00000000.sdmp, z58Swiftcopy_MT.bat.exe, 00000003.00000003.28476240349.0000000002271000.00000004.00000020.00020000.00000000.sdmp, bhvD739.tmp.3.drString found in binary or memory: https://adservice.google.com/ddm/fls/i/src=2542116;type=chrom322;cat=chrom01g;ord=3739368433491;gtm=
                  Source: bhvD739.tmp.3.drString found in binary or memory: https://aefd.nelreports.net/api/report?cat=bingaot
                  Source: bhvD739.tmp.3.drString found in binary or memory: https://aefd.nelreports.net/api/report?cat=bingaotak
                  Source: bhvD739.tmp.3.drString found in binary or memory: https://aefd.nelreports.net/api/report?cat=bingrms
                  Source: bhvD739.tmp.3.drString found in binary or memory: https://aefd.nelreports.net/api/report?cat=bingth
                  Source: bhvD739.tmp.3.drString found in binary or memory: https://aefd.nelreports.net/api/report?cat=bingth&ndcParam=QUZE
                  Source: bhvD739.tmp.3.drString found in binary or memory: https://aefd.nelreports.net/api/report?cat=wsb&ndcParam=QUZE
                  Source: bhvD739.tmp.3.drString found in binary or memory: https://aefd.nelreports.net/api/report?cat=wsb&ndcParam=QWthbWFp
                  Source: bhvD739.tmp.3.drString found in binary or memory: https://afdxtest.z01.azurefd.net/apc/trans.gif?daed76fa672ed2fa739774d44bb38da5
                  Source: bhvD739.tmp.3.drString found in binary or memory: https://afdxtest.z01.azurefd.net/apc/trans.gif?e77f8dc2c88b806ec91fb50956aeee97
                  Source: bhvD739.tmp.3.drString found in binary or memory: https://ajax.aspnetcdn.com/ajax/jquery/jquery-3.3.1.min.js
                  Source: bhvD739.tmp.3.drString found in binary or memory: https://api.msn.com/v1/News/Feed/Windows?apikey=qrUeHGGYvVowZJuHA3XaH0uUvg1ZJ0GUZnXk3mxxPF&ocid=wind
                  Source: bhvD739.tmp.3.drString found in binary or memory: https://assets.adobedtm.com/5ef092d1efb5/4d1d9f749fd3/2b6d8bd51279/RC028e72ad6b944b8183346fecb32a729
                  Source: bhvD739.tmp.3.drString found in binary or memory: https://assets.adobedtm.com/5ef092d1efb5/4d1d9f749fd3/2b6d8bd51279/RC05934b07a40a4d8a9a0cc7a79e85434
                  Source: bhvD739.tmp.3.drString found in binary or memory: https://assets.adobedtm.com/5ef092d1efb5/4d1d9f749fd3/2b6d8bd51279/RC0ee8c30f496b428a91d7f3289a2b8a2
                  Source: bhvD739.tmp.3.drString found in binary or memory: https://assets.adobedtm.com/5ef092d1efb5/4d1d9f749fd3/2b6d8bd51279/RC784fc6783b2f45a09cb8efa184cc684
                  Source: bhvD739.tmp.3.drString found in binary or memory: https://assets.adobedtm.com/5ef092d1efb5/4d1d9f749fd3/2b6d8bd51279/RC8cd6be4f72cf4da1aa891e7da23d144
                  Source: bhvD739.tmp.3.drString found in binary or memory: https://assets.adobedtm.com/5ef092d1efb5/4d1d9f749fd3/2b6d8bd51279/RC9fc5c8b8bfb94ba5833ba8065b1de35
                  Source: bhvD739.tmp.3.drString found in binary or memory: https://assets.adobedtm.com/5ef092d1efb5/4d1d9f749fd3/2b6d8bd51279/RCacc6c4ed30494f9fad065afe638a7ca
                  Source: bhvD739.tmp.3.drString found in binary or memory: https://assets.adobedtm.com/5ef092d1efb5/4d1d9f749fd3/2b6d8bd51279/RCd01d50cad19649bf857a22be5995480
                  Source: bhvD739.tmp.3.drString found in binary or memory: https://assets.adobedtm.com/5ef092d1efb5/4d1d9f749fd3/2b6d8bd51279/RCe691e5baee9945259179326d0658843
                  Source: bhvD739.tmp.3.drString found in binary or memory: https://assets.adobedtm.com/5ef092d1efb5/4d1d9f749fd3/2b6d8bd51279/RCefb91313fdae420ebbea45d8f044894
                  Source: bhvD739.tmp.3.drString found in binary or memory: https://assets.adobedtm.com/launch-EN7b3d710ac67a4a1195648458258f97dd.min.js
                  Source: bhvD739.tmp.3.drString found in binary or memory: https://az416426.vo.msecnd.net/scripts/a/ai.0.js
                  Source: bhvD739.tmp.3.drString found in binary or memory: https://az725175.vo.msecnd.net/scripts/jsll-4.js
                  Source: bhvD739.tmp.3.drString found in binary or memory: https://btloader.com/tag?o=6208086025961472&upapi=true
                  Source: bhvD739.tmp.3.drString found in binary or memory: https://capturemedia-assets.com/
                  Source: bhvD739.tmp.3.drString found in binary or memory: https://capturemedia-assets.com/ig-bank/ad-engagement/startAnimation/main/index.html
                  Source: bhvD739.tmp.3.drString found in binary or memory: https://cdnjs.cloudflare.com/ajax/libs/gsap/3.5.1/gsap.min.js
                  Source: bhvD739.tmp.3.drString found in binary or memory: https://certs.godaddy.com/repository/0
                  Source: bhvD739.tmp.3.drString found in binary or memory: https://config.edge.skype.com/config/v1/ODSP_Sync_Client/19.043.0304.0013?UpdateRing=Prod&OS=Win&OSV
                  Source: bhvD739.tmp.3.drString found in binary or memory: https://contentstorage.osi.office.net/dynamiccanvas/licensingui/index.html?mode=NewDeviceActivation
                  Source: bhvD739.tmp.3.drString found in binary or memory: https://contextual.media.net/
                  Source: bhvD739.tmp.3.drString found in binary or memory: https://contextual.media.net/48/nrrV39259.js
                  Source: bhvD739.tmp.3.drString found in binary or memory: https://contextual.media.net/checksync.php?&vsSync=1&cs=1&hb=1&cv=37&ndec=1&cid=8HBI57XIG&prvid=77%2
                  Source: bhvD739.tmp.3.drString found in binary or memory: https://contextual.media.net/medianet.php?cid=8CU157172&crid=722878611&size=306x271&https=1
                  Source: bhvD739.tmp.3.drString found in binary or memory: https://contextual.media.net/medianet.php?cid=8CU157172&crid=858412214&size=306x271&https=1
                  Source: bhvD739.tmp.3.drString found in binary or memory: https://csp.withgoogle.com/csp/active-view-scs-read-write-acl
                  Source: bhvD739.tmp.3.drString found in binary or memory: https://csp.withgoogle.com/csp/ads-programmable
                  Source: bhvD739.tmp.3.drString found in binary or memory: https://csp.withgoogle.com/csp/recaptcha/1
                  Source: bhvD739.tmp.3.drString found in binary or memory: https://csp.withgoogle.com/csp/report-to/active-view-scs-read-write-acl
                  Source: bhvD739.tmp.3.drString found in binary or memory: https://csp.withgoogle.com/csp/report-to/ads-programmable
                  Source: bhvD739.tmp.3.drString found in binary or memory: https://csp.withgoogle.com/csp/report-to/adspam-signals-scs
                  Source: bhvD739.tmp.3.drString found in binary or memory: https://csp.withgoogle.com/csp/report-to/recaptcha
                  Source: bhvD739.tmp.3.drString found in binary or memory: https://cvision.media.net/new/300x300/2/45/221/3/7d5dc6a9-5325-442d-926e-f2c668b8e65e.jpg?v=9
                  Source: bhvD739.tmp.3.drString found in binary or memory: https://cvision.media.net/new/300x300/2/75/165/127/fefc2984-60ee-407b-a704-0db527f30f53.jpg?v=9
                  Source: bhvD739.tmp.3.drString found in binary or memory: https://cvision.media.net/new/300x300/3/167/174/27/39ab3103-8560-4a55-bfc4-401f897cf6f2.jpg?v=9
                  Source: bhvD739.tmp.3.drString found in binary or memory: https://cxcs.microsoft.net/api/gs/en-US/xmlv2/storyset?platform=desktop&release=20h2&schema=3.0&sku=
                  Source: bhvD739.tmp.3.drString found in binary or memory: https://cxcs.microsoft.net/api/gs/en-US/xmlv2/tip-contentset?platform=desktop&release=20h2&schema=3.
                  Source: bhvD739.tmp.3.drString found in binary or memory: https://cxcs.microsoft.net/static/public/tips/neutral/5c08e5e7-4cfd-4901-acbc-79925276672c/33c540c16
                  Source: bhvD739.tmp.3.drString found in binary or memory: https://cxcs.microsoft.net/static/public/tips/neutral/6c6740da-0bfe-48a6-83fc-c98d1919b060/3addf02b7
                  Source: bhvD739.tmp.3.drString found in binary or memory: https://cxcs.microsoft.net/static/public/tips/neutral/fb5aa6fc-fb0f-43c0-9aba-9bf4642cdd05/9a3b4a8d1
                  Source: bhvD739.tmp.3.drString found in binary or memory: https://deff.nelreports.net/api/report?cat=msn
                  Source: bhvD739.tmp.3.drString found in binary or memory: https://dl.google.com/update2/installers/icons/%7B8a69d345-d564-463c-aff1-a69d9e530f96%7D.bmp?lang=e
                  Source: bhvD739.tmp.3.drString found in binary or memory: https://dsm09prdapp01-canary-opaph.netmon.azure.com/apc/trans.gif?8f6ec558c7d1c621e0d5881446d586b0
                  Source: bhvD739.tmp.3.drString found in binary or memory: https://dsm09prdapp01-canary-opaph.netmon.azure.com/apc/trans.gif?bbc9af5ecc12954d59c63a1771114562
                  Source: z58Swiftcopy_MT.bat.exe, 00000003.00000003.28475198040.0000000002A91000.00000004.00000020.00020000.00000000.sdmp, z58Swiftcopy_MT.bat.exe, 00000003.00000003.28476240349.0000000002271000.00000004.00000020.00020000.00000000.sdmp, bhvD739.tmp.3.drString found in binary or memory: https://eb2.3lift.com/sync?
                  Source: bhvD739.tmp.3.drString found in binary or memory: https://ecs.nel.measure.office.net?TenantId=ODSP_Sync_Client&DestinationEndpoint=Edge-Prod-BY3&Front
                  Source: bhvD739.tmp.3.drString found in binary or memory: https://ecs.nel.measure.office.net?TenantId=ODSP_Sync_Client&DestinationEndpoint=Edge-Prod-TEB31r4b&
                  Source: bhvD739.tmp.3.drString found in binary or memory: https://evoke-windowsservices-tas.msedge.net/ab
                  Source: bhvD739.tmp.3.drString found in binary or memory: https://fp-vp-nocache.azureedge.net/apc/trans.gif?6e329cf6426f83c8ee02e2bc96bdb46d
                  Source: bhvD739.tmp.3.drString found in binary or memory: https://fp-vp-nocache.azureedge.net/apc/trans.gif?d2c6e729d235d3f335d1d4751bb8eb91
                  Source: bhvD739.tmp.3.drString found in binary or memory: https://fp.msedge.net/conf/v1/asgw/fpconfig.min.json
                  Source: bhvD739.tmp.3.drString found in binary or memory: https://fp.msedge.net/conf/v2/asgw/fpconfig.min.json?monitorId=asgw
                  Source: bhvD739.tmp.3.drString found in binary or memory: https://geolocation.onetrust.com/cookieconsentpub/v1/geo/location
                  Source: bhvD739.tmp.3.drString found in binary or memory: https://googleads.g.doubleclick.net/pagead/ads?gdpr=1&gdpr_consent=CPM7kC1PM7kC1AcABBENBQCsAP_AAELAA
                  Source: z58Swiftcopy_MT.bat.exe, 00000003.00000003.28478173593.0000000002279000.00000004.00000020.00020000.00000000.sdmp, z58Swiftcopy_MT.bat.exe, 00000003.00000003.28477694523.0000000002279000.00000004.00000020.00020000.00000000.sdmp, z58Swiftcopy_MT.bat.exe, 00000003.00000003.28476240349.0000000002271000.00000004.00000020.00020000.00000000.sdmp, z58Swiftcopy_MT.bat.exe, 00000003.00000003.28477629885.0000000002279000.00000004.00000020.00020000.00000000.sdmp, z58Swiftcopy_MT.bat.exe, 00000003.00000003.28478024679.0000000002279000.00000004.00000020.00020000.00000000.sdmp, bhvD739.tmp.3.drString found in binary or memory: https://googleads.g.doubleclick.net/pagead/drt/s?v=r20120211
                  Source: z58Swiftcopy_MT.bat.exe, 00000003.00000003.28475954920.0000000002A96000.00000004.00000020.00020000.00000000.sdmp, z58Swiftcopy_MT.bat.exe, 00000003.00000003.28475803985.0000000002A96000.00000004.00000020.00020000.00000000.sdmp, z58Swiftcopy_MT.bat.exe, 00000003.00000003.28478272302.0000000002279000.00000004.00000020.00020000.00000000.sdmp, z58Swiftcopy_MT.bat.exe, 00000003.00000003.28476050726.0000000002A96000.00000004.00000020.00020000.00000000.sdmp, z58Swiftcopy_MT.bat.exe, 00000003.00000003.28478496438.0000000002277000.00000004.00000020.00020000.00000000.sdmp, z58Swiftcopy_MT.bat.exe, 00000003.00000003.28476004168.000000000227D000.00000004.00000020.00020000.00000000.sdmp, z58Swiftcopy_MT.bat.exe, 00000003.00000003.28475853439.0000000002A96000.00000004.00000020.00020000.00000000.sdmp, z58Swiftcopy_MT.bat.exe, 00000003.00000003.28480920497.000000000227D000.00000004.00000020.00020000.00000000.sdmp, z58Swiftcopy_MT.bat.exe, 00000003.00000003.28478173593.0000000002279000.00000004.00000020.00020000.00000000.sdmp, z58Swiftcopy_MT.bat.exe, 00000003.00000003.28477694523.0000000002279000.00000004.00000020.00020000.00000000.sdmp, z58Swiftcopy_MT.bat.exe, 00000003.00000003.28476240349.0000000002271000.00000004.00000020.00020000.00000000.sdmp, z58Swiftcopy_MT.bat.exe, 00000003.00000003.28478442693.0000000002272000.00000004.00000020.00020000.00000000.sdmp, z58Swiftcopy_MT.bat.exe, 00000003.00000003.28477629885.0000000002279000.00000004.00000020.00020000.00000000.sdmp, z58Swiftcopy_MT.bat.exe, 00000003.00000003.28478024679.0000000002279000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://googleads.g.doubleclick.net/pagead/drt/s?v=r20120211https://googleads.g.doubleclick.net/page
                  Source: bhvD739.tmp.3.drString found in binary or memory: https://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml
                  Source: bhvD739.tmp.3.drString found in binary or memory: https://ib.3lift.com/sync.js
                  Source: bhvD739.tmp.3.drString found in binary or memory: https://ib.adnxs.com/
                  Source: z58Swiftcopy_MT.bat.exe, 00000003.00000003.28476240349.0000000002271000.00000004.00000020.00020000.00000000.sdmp, bhvD739.tmp.3.drString found in binary or memory: https://ib.adnxs.com/async_usersync_file
                  Source: bhvD739.tmp.3.drString found in binary or memory: https://img-prod-cms-rt-microsoft-com.akamaized.net/cms/api/am/imageFileData/RE1Mu3b?ver=5c31
                  Source: bhvD739.tmp.3.drString found in binary or memory: https://img-prod-cms-rt-microsoft-com.akamaized.net/cms/api/am/imageFileData/RE4Dnv6
                  Source: bhvD739.tmp.3.drString found in binary or memory: https://img-prod-cms-rt-microsoft-com.akamaized.net/cms/api/am/imageFileData/RE4GhRT?ver=5f90
                  Source: bhvD739.tmp.3.drString found in binary or memory: https://img-prod-cms-rt-microsoft-com.akamaized.net/cms/api/am/imageFileData/RE4GhRY?ver=52e8
                  Source: bhvD739.tmp.3.drString found in binary or memory: https://img-prod-cms-rt-microsoft-com.akamaized.net/cms/api/am/imageFileData/RE4OALs
                  Source: bhvD739.tmp.3.drString found in binary or memory: https://img-prod-cms-rt-microsoft-com.akamaized.net/cms/api/am/imageFileData/RE4OAdg?ver=1c49
                  Source: bhvD739.tmp.3.drString found in binary or memory: https://img-prod-cms-rt-microsoft-com.akamaized.net/cms/api/am/imageFileData/RE4OFrw?ver=d941
                  Source: bhvD739.tmp.3.drString found in binary or memory: https://img-prod-cms-rt-microsoft-com.akamaized.net/cms/api/am/imageFileData/RE4OFrz?ver=8427
                  Source: bhvD739.tmp.3.drString found in binary or memory: https://img-prod-cms-rt-microsoft-com.akamaized.net/cms/api/am/imageFileData/RE4OI51?ver=0686
                  Source: bhvD739.tmp.3.drString found in binary or memory: https://img-prod-cms-rt-microsoft-com.akamaized.net/cms/api/am/imageFileData/RE4ONWz
                  Source: bhvD739.tmp.3.drString found in binary or memory: https://img-prod-cms-rt-microsoft-com.akamaized.net/cms/api/am/imageFileData/RE4n1yl
                  Source: bhvD739.tmp.3.drString found in binary or memory: https://img-prod-cms-rt-microsoft-com.akamaized.net/cms/api/am/imageFileData/RE4ncJ7
                  Source: bhvD739.tmp.3.drString found in binary or memory: https://img-prod-cms-rt-microsoft-com.akamaized.net/cms/api/am/imageFileData/RE4ncJa
                  Source: bhvD739.tmp.3.drString found in binary or memory: https://img-prod-cms-rt-microsoft-com.akamaized.net/cms/api/am/imageFileData/RWB7v5
                  Source: bhvD739.tmp.3.drString found in binary or memory: https://img-prod-cms-rt-microsoft-com.akamaized.net/cms/api/am/imageFileData/RWFNIa
                  Source: bhvD739.tmp.3.drString found in binary or memory: https://img-prod-cms-rt-microsoft-com.akamaized.net/cms/api/am/imageFileData/RWFNIj
                  Source: bhvD739.tmp.3.drString found in binary or memory: https://img-prod-cms-rt-microsoft-com.akamaized.net/cms/api/am/imageFileData/RWG0VH
                  Source: bhvD739.tmp.3.drString found in binary or memory: https://img-prod-cms-rt-microsoft-com.akamaized.net/cms/api/am/imageFileData/RWLuYO
                  Source: bhvD739.tmp.3.drString found in binary or memory: https://img-s-msn-com.akamaized.net/tenant/amp/entityid/AAKp8YX?h=16&w=16&m=6&q=60&u=t&o=t&l=f&f=png
                  Source: bhvD739.tmp.3.drString found in binary or memory: https://img-s-msn-com.akamaized.net/tenant/amp/entityid/AAMqFmF?h=16&w=16&m=6&q=60&u=t&o=t&l=f&f=png
                  Source: bhvD739.tmp.3.drString found in binary or memory: https://img-s-msn-com.akamaized.net/tenant/amp/entityid/AANf6qa.img?h=16&w=16&m=6&q=60&u=t&o=t&l=f&f
                  Source: bhvD739.tmp.3.drString found in binary or memory: https://img-s-msn-com.akamaized.net/tenant/amp/entityid/AANf6qa?h=16&w=16&m=6&q=60&u=t&o=t&l=f&f=png
                  Source: bhvD739.tmp.3.drString found in binary or memory: https://img-s-msn-com.akamaized.net/tenant/amp/entityid/AAODMk8?h=75&w=100&m=6&q=60&u=t&o=t&l=f&f=jp
                  Source: bhvD739.tmp.3.drString found in binary or memory: https://img-s-msn-com.akamaized.net/tenant/amp/entityid/AAODQmd?h=75&w=100&m=6&q=60&u=t&o=t&l=f&f=jp
                  Source: bhvD739.tmp.3.drString found in binary or memory: https://img-s-msn-com.akamaized.net/tenant/amp/entityid/AAODept?h=75&w=100&m=6&q=60&u=t&o=t&l=f
                  Source: bhvD739.tmp.3.drString found in binary or memory: https://img-s-msn-com.akamaized.net/tenant/amp/entityid/AAOEFck?h=75&w=100&m=6&q=60&u=t&o=t&l=f&x=82
                  Source: bhvD739.tmp.3.drString found in binary or memory: https://img-s-msn-com.akamaized.net/tenant/amp/entityid/AAOEQ0I?h=368&w=622&m=6&q=60&u=t&o=t&l=f&f=j
                  Source: bhvD739.tmp.3.drString found in binary or memory: https://img-s-msn-com.akamaized.net/tenant/amp/entityid/AAOF4WR?h=75&w=100&m=6&q=60&u=t&o=t&l=f
                  Source: bhvD739.tmp.3.drString found in binary or memory: https://img-s-msn-com.akamaized.net/tenant/amp/entityid/AAOF4Xx?h=368&w=622&m=6&q=60&u=t&o=t&l=f&f=j
                  Source: bhvD739.tmp.3.drString found in binary or memory: https://img-s-msn-com.akamaized.net/tenant/amp/entityid/AAOFBrV?h=75&w=100&m=6&q=60&u=t&o=t&l=f
                  Source: bhvD739.tmp.3.drString found in binary or memory: https://img-s-msn-com.akamaized.net/tenant/amp/entityid/AAOFC5q?h=75&w=100&m=6&q=60&u=t&o=t&l=f
                  Source: bhvD739.tmp.3.drString found in binary or memory: https://img-s-msn-com.akamaized.net/tenant/amp/entityid/AAOFCgW?h=250&w=300&m=6&q=60&u=t&o=t&l=f&f=j
                  Source: bhvD739.tmp.3.drString found in binary or memory: https://img-s-msn-com.akamaized.net/tenant/amp/entityid/AAOFCgW?h=75&w=100&m=6&q=60&u=t&o=t&l=f&f=jp
                  Source: bhvD739.tmp.3.drString found in binary or memory: https://img-s-msn-com.akamaized.net/tenant/amp/entityid/AAOFE0J?h=75&w=100&m=6&q=60&u=t&o=t&l=f&x=70
                  Source: bhvD739.tmp.3.drString found in binary or memory: https://img-s-msn-com.akamaized.net/tenant/amp/entityid/AAOFENj?h=75&w=100&m=6&q=60&u=t&o=t&l=f&f=jp
                  Source: bhvD739.tmp.3.drString found in binary or memory: https://img-s-msn-com.akamaized.net/tenant/amp/entityid/AAOFJFJ?h=75&w=100&m=6&q=60&u=t&o=t&l=f&f=jp
                  Source: bhvD739.tmp.3.drString found in binary or memory: https://img-s-msn-com.akamaized.net/tenant/amp/entityid/AAOFLk7?h=75&w=100&m=6&q=60&u=t&o=t&l=f&x=43
                  Source: bhvD739.tmp.3.drString found in binary or memory: https://img-s-msn-com.akamaized.net/tenant/amp/entityid/AAOFWV8?h=75&w=100&m=6&q=60&u=t&o=t&l=f&f=jp
                  Source: bhvD739.tmp.3.drString found in binary or memory: https://img-s-msn-com.akamaized.net/tenant/amp/entityid/AAOFhty?h=368&w=622&m=6&q=60&u=t&o=t&l=f&f=j
                  Source: bhvD739.tmp.3.drString found in binary or memory: https://img-s-msn-com.akamaized.net/tenant/amp/entityid/AAOFsUC?h=250&w=300&m=6&q=60&u=t&o=t&l=f&f=j
                  Source: bhvD739.tmp.3.drString found in binary or memory: https://img-s-msn-com.akamaized.net/tenant/amp/entityid/AAOFu51?h=75&w=100&m=6&q=60&u=t&o=t&l=f&f=jp
                  Source: bhvD739.tmp.3.drString found in binary or memory: https://img-s-msn-com.akamaized.net/tenant/amp/entityid/AAOFy7B?h=75&w=100&m=6&q=60&u=t&o=t&l=f
                  Source: bhvD739.tmp.3.drString found in binary or memory: https://img-s-msn-com.akamaized.net/tenant/amp/entityid/AAOFyKG?h=75&w=100&m=6&q=60&u=t&o=t&l=f&x=60
                  Source: bhvD739.tmp.3.drString found in binary or memory: https://img-s-msn-com.akamaized.net/tenant/amp/entityid/AAOG3Y7?h=250&w=300&m=6&q=60&u=t&o=t&l=f&f=j
                  Source: bhvD739.tmp.3.drString found in binary or memory: https://img-s-msn-com.akamaized.net/tenant/amp/entityid/AAOG88s?h=75&w=100&m=6&q=60&u=t&o=t&l=f&f=jp
                  Source: bhvD739.tmp.3.drString found in binary or memory: https://img-s-msn-com.akamaized.net/tenant/amp/entityid/AAOGPXq?h=194&w=300&m=6&q=60&u=t&o=t&l=f
                  Source: bhvD739.tmp.3.drString found in binary or memory: https://img-s-msn-com.akamaized.net/tenant/amp/entityid/AAOGQtJ?h=75&w=100&m=6&q=60&u=t&o=t&l=f
                  Source: bhvD739.tmp.3.drString found in binary or memory: https://img-s-msn-com.akamaized.net/tenant/amp/entityid/AAOGV90?h=194&w=300&m=6&q=60&u=t&o=t&l=f&x=5
                  Source: bhvD739.tmp.3.drString found in binary or memory: https://img-s-msn-com.akamaized.net/tenant/amp/entityid/AAOGapF?h=75&w=100&m=6&q=60&u=t&o=t&l=f&f=jp
                  Source: bhvD739.tmp.3.drString found in binary or memory: https://img-s-msn-com.akamaized.net/tenant/amp/entityid/AAOGlbE?h=75&w=100&m=6&q=60&u=t&o=t&l=f&f=jp
                  Source: bhvD739.tmp.3.drString found in binary or memory: https://img-s-msn-com.akamaized.net/tenant/amp/entityid/AAOGmTG?h=75&w=100&m=6&q=60&u=t&o=t&l=f&f=jp
                  Source: bhvD739.tmp.3.drString found in binary or memory: https://img-s-msn-com.akamaized.net/tenant/amp/entityid/AAOGyYN?h=194&w=300&m=6&q=60&u=t&o=t&l=f
                  Source: bhvD739.tmp.3.drString found in binary or memory: https://img-s-msn-com.akamaized.net/tenant/amp/entityid/AAOH2Ml?h=194&w=300&m=6&q=60&u=t&o=t&l=f
                  Source: bhvD739.tmp.3.drString found in binary or memory: https://img-s-msn-com.akamaized.net/tenant/amp/entityid/AAOH6xB?h=75&w=100&m=6&q=60&u=t&o=t&l=f
                  Source: bhvD739.tmp.3.drString found in binary or memory: https://img-s-msn-com.akamaized.net/tenant/amp/entityid/BB10MkbM.img?h=16&w=16&m=6&q=60&u=t&o=t&l=f&
                  Source: bhvD739.tmp.3.drString found in binary or memory: https://img-s-msn-com.akamaized.net/tenant/amp/entityid/BB10MkbM?h=16&w=16&m=6&q=60&u=t&o=t&l=f&f=pn
                  Source: bhvD739.tmp.3.drString found in binary or memory: https://img-s-msn-com.akamaized.net/tenant/amp/entityid/BB14hq0P?h=368&w=622&m=6&q=60&u=t&o=t&l=f&f=
                  Source: bhvD739.tmp.3.drString found in binary or memory: https://img-s-msn-com.akamaized.net/tenant/amp/entityid/BB1aXBV1?h=27&w=27&m=6&q=60&u=t&o=t&l=f&f=pn
                  Source: bhvD739.tmp.3.drString found in binary or memory: https://img-s-msn-com.akamaized.net/tenant/amp/entityid/BB1cEP3G?h=27&w=27&m=6&q=60&u=t&o=t&l=f&f=pn
                  Source: bhvD739.tmp.3.drString found in binary or memory: https://img-s-msn-com.akamaized.net/tenant/amp/entityid/BB1cG73h?h=27&w=27&m=6&q=60&u=t&o=t&l=f&f=pn
                  Source: bhvD739.tmp.3.drString found in binary or memory: https://img-s-msn-com.akamaized.net/tenant/amp/entityid/BB1ftEY0?h=16&w=16&m=6&q=60&u=t&o=t&l=f&f=pn
                  Source: bhvD739.tmp.3.drString found in binary or memory: https://img-s-msn-com.akamaized.net/tenant/amp/entityid/BB1gEFcn?h=16&w=16&m=6&q=60&u=t&o=t&l=f&f=pn
                  Source: bhvD739.tmp.3.drString found in binary or memory: https://img-s-msn-com.akamaized.net/tenant/amp/entityid/BB1kc8s?m=6&o=true&u=true&n=true&w=30&h=30
                  Source: bhvD739.tmp.3.drString found in binary or memory: https://img-s-msn-com.akamaized.net/tenant/amp/entityid/BB7gRE?h=16&w=16&m=6&q=60&u=t&o=t&l=f&f=png
                  Source: bhvD739.tmp.3.drString found in binary or memory: https://img-s-msn-com.akamaized.net/tenant/amp/entityid/BB7hg4?h=16&w=16&m=6&q=60&u=t&o=t&l=f&f=png
                  Source: bhvD739.tmp.3.drString found in binary or memory: https://img-s-msn-com.akamaized.net/tenant/amp/entityid/BBPfCZL?h=27&w=27&m=6&q=60&u=t&o=t&l=f&f=png
                  Source: bhvD739.tmp.3.drString found in binary or memory: https://img-s-msn-com.akamaized.net/tenant/amp/entityid/BBVuddh?h=16&w=16&m=6&q=60&u=t&o=t&l=f&f=png
                  Source: bhvD739.tmp.3.drString found in binary or memory: https://img-s-msn-com.akamaized.net/tenant/amp/entityid/BBX2afX?h=27&w=27&m=6&q=60&u=t&o=t&l=f&f=png
                  Source: bhvD739.tmp.3.drString found in binary or memory: https://img-s-msn-com.akamaized.net/tenant/amp/entityid/BBkwUr.img?h=16&w=16&m=6&q=60&u=t&o=t&l=f&f=
                  Source: bhvD739.tmp.3.drString found in binary or memory: https://img-s-msn-com.akamaized.net/tenant/amp/entityid/BBkwUr?h=16&w=16&m=6&q=60&u=t&o=t&l=f&f=png
                  Source: bhvD739.tmp.3.drString found in binary or memory: https://img.img-taboola.com/taboola/image/fetch/f_jpg%2Cq_auto%2Ce_sharpen%2Ch_311%2Cw_207%2Cc_pad%2
                  Source: bhvD739.tmp.3.drString found in binary or memory: https://img.img-taboola.com/taboola/image/fetch/f_jpg%2Cq_auto%2Ch_311%2Cw_207%2Cc_fill%2Cg_faces:au
                  Source: bhvD739.tmp.3.drString found in binary or memory: https://img.img-taboola.com/taboola/image/fetch/f_jpg%2Cq_auto%2Ch_368%2Cw_622%2Cc_fill%2Cg_faces:au
                  Source: bhvD739.tmp.3.drString found in binary or memory: https://ims-na1.adobelogin.com/ims/authorize/v1?locale=en_us&client_id=AdobeReader9&redirect_uri=htt
                  Source: z58Swiftcopy_MT.bat.exe, 00000002.00000001.27691456198.0000000000649000.00000020.00000001.01000000.00000007.sdmpString found in binary or memory: https://inference.location.live.net/inferenceservice/v21/Pox/GetLocationUsingFingerprinte1e71f6b-214
                  Source: z58Swiftcopy_MT.bat.exe, 00000003.00000002.28481442526.0000000000193000.00000004.00000010.00020000.00000000.sdmp, z58Swiftcopy_MT.bat.exe, 00000003.00000003.28481006058.000000000226C000.00000004.00000020.00020000.00000000.sdmp, z58Swiftcopy_MT.bat.exe, 00000003.00000003.28481039246.000000000226C000.00000004.00000020.00020000.00000000.sdmp, z58Swiftcopy_MT.bat.exe, 00000003.00000003.28481200929.000000000226C000.00000004.00000020.00020000.00000000.sdmp, z58Swiftcopy_MT.bat.exe, 00000003.00000003.28481236030.000000000226F000.00000004.00000020.00020000.00000000.sdmp, z58Swiftcopy_MT.bat.exe, 00000003.00000003.28481123706.000000000226C000.00000004.00000020.00020000.00000000.sdmp, z58Swiftcopy_MT.bat.exe, 00000003.00000002.28481986828.0000000002271000.00000004.00000020.00020000.00000000.sdmp, z58Swiftcopy_MT.bat.exe, 00000003.00000003.28480970839.000000000226C000.00000004.00000020.00020000.00000000.sdmp, bhvD739.tmp.3.drString found in binary or memory: https://login.live.com/
                  Source: z58Swiftcopy_MT.bat.exe, 00000003.00000003.28481006058.000000000226C000.00000004.00000020.00020000.00000000.sdmp, z58Swiftcopy_MT.bat.exe, 00000003.00000003.28481039246.000000000226C000.00000004.00000020.00020000.00000000.sdmp, z58Swiftcopy_MT.bat.exe, 00000003.00000003.28481200929.000000000226C000.00000004.00000020.00020000.00000000.sdmp, z58Swiftcopy_MT.bat.exe, 00000003.00000003.28481236030.000000000226F000.00000004.00000020.00020000.00000000.sdmp, z58Swiftcopy_MT.bat.exe, 00000003.00000003.28481123706.000000000226C000.00000004.00000020.00020000.00000000.sdmp, z58Swiftcopy_MT.bat.exe, 00000003.00000002.28481986828.0000000002271000.00000004.00000020.00020000.00000000.sdmp, z58Swiftcopy_MT.bat.exe, 00000003.00000003.28480970839.000000000226C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com//
                  Source: z58Swiftcopy_MT.bat.exe, 00000003.00000002.28481442526.0000000000193000.00000004.00000010.00020000.00000000.sdmp, z58Swiftcopy_MT.bat.exe, 00000003.00000003.28480424352.0000000002AAD000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/TI
                  Source: z58Swiftcopy_MT.bat.exe, 00000003.00000003.28476240349.0000000002271000.00000004.00000020.00020000.00000000.sdmp, z58Swiftcopy_MT.bat.exe, 00000003.00000003.28480970839.000000000226C000.00000004.00000020.00020000.00000000.sdmp, z58Swiftcopy_MT.bat.exe, 00000003.00000003.28478442693.0000000002272000.00000004.00000020.00020000.00000000.sdmp, z58Swiftcopy_MT.bat.exe, 00000003.00000003.28477629885.0000000002279000.00000004.00000020.00020000.00000000.sdmp, z58Swiftcopy_MT.bat.exe, 00000003.00000003.28475707662.0000000002A96000.00000004.00000020.00020000.00000000.sdmp, z58Swiftcopy_MT.bat.exe, 00000003.00000003.28478024679.0000000002279000.00000004.00000020.00020000.00000000.sdmp, bhvD739.tmp.3.drString found in binary or memory: https://login.live.com/login.srf?wa=wsignin1.0&rpsnv=13&checkda=1&ct=1632306842&rver=7.0.6730.0&wp=l
                  Source: z58Swiftcopy_MT.bat.exe, 00000003.00000003.28475613079.000000000227D000.00000004.00000020.00020000.00000000.sdmp, z58Swiftcopy_MT.bat.exe, 00000003.00000003.28476004168.000000000227D000.00000004.00000020.00020000.00000000.sdmp, z58Swiftcopy_MT.bat.exe, 00000003.00000003.28480920497.000000000227D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/login.srfhttps://www.google.com/pagead/drt/uihttps://www.google.com/recaptcha
                  Source: bhvD739.tmp.3.drString found in binary or memory: https://login.live.com/ppsecure/InlineClientAuth.srf?route=C512_BAY&stsid=S.BC4837E917425070&uaid=d9
                  Source: bhvD739.tmp.3.drString found in binary or memory: https://login.live.com/ppsecure/InlineClientAuth.srf?stsft=-DhB9Gg0Em7s2jvLPGG9crywwB
                  Source: bhvD739.tmp.3.drString found in binary or memory: https://login.live.com/ppsecure/InlineLogin.srf?id=80604&scid=1&mkt=en-US&Platform=Windows10&clienti
                  Source: bhvD739.tmp.3.drString found in binary or memory: https://login.live.com/ppsecure/InlineLogin.srf?route=C512_BAY&uaid=b6de8762e4ae48b19a7d0d74ba392110
                  Source: bhvD739.tmp.3.drString found in binary or memory: https://login.live.com/ppsecure/post.srf?mkt=en-US&platform=Windows10&id=80604&clientid=000000004807
                  Source: z58Swiftcopy_MT.bat.exe, 00000003.00000003.28481006058.000000000226C000.00000004.00000020.00020000.00000000.sdmp, z58Swiftcopy_MT.bat.exe, 00000003.00000003.28481039246.000000000226C000.00000004.00000020.00020000.00000000.sdmp, z58Swiftcopy_MT.bat.exe, 00000003.00000003.28481200929.000000000226C000.00000004.00000020.00020000.00000000.sdmp, z58Swiftcopy_MT.bat.exe, 00000003.00000003.28481236030.000000000226F000.00000004.00000020.00020000.00000000.sdmp, z58Swiftcopy_MT.bat.exe, 00000003.00000003.28481123706.000000000226C000.00000004.00000020.00020000.00000000.sdmp, z58Swiftcopy_MT.bat.exe, 00000003.00000002.28481986828.0000000002271000.00000004.00000020.00020000.00000000.sdmp, z58Swiftcopy_MT.bat.exe, 00000003.00000003.28480970839.000000000226C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/v104
                  Source: z58Swiftcopy_MT.bat.exeString found in binary or memory: https://login.yahoo.com/config/login
                  Source: bhvD739.tmp.3.drString found in binary or memory: https://logincdn.msauth.net/16.000/Converged_v21033_mG-wAdV--_sq1kXms675SA2.css
                  Source: bhvD739.tmp.3.drString found in binary or memory: https://logincdn.msauth.net/16.000/content/js/ConvergedFinishStrings.en_n0x1vWZ9nk5hsb6ZgnoOdw2.js
                  Source: bhvD739.tmp.3.drString found in binary or memory: https://logincdn.msauth.net/16.000/content/js/ConvergedLoginPaginatedStrings.en_VjBVCmhpr777yb9vmuAJ
                  Source: bhvD739.tmp.3.drString found in binary or memory: https://logincdn.msauth.net/16.000/content/js/WinJS_vcvx4TydCFioSeM4NLxTDw2.js
                  Source: bhvD739.tmp.3.drString found in binary or memory: https://logincdn.msauth.net/shared/1.0/content/images/arrow_left_43280e0ba671a1d8b5e34f1931c4fe4b.sv
                  Source: bhvD739.tmp.3.drString found in binary or memory: https://logincdn.msauth.net/shared/1.0/content/images/backgrounds/2_11d9e3bcdfede9ce5ce5ace2d129f1c4
                  Source: bhvD739.tmp.3.drString found in binary or memory: https://logincdn.msauth.net/shared/1.0/content/images/marching_ants_986f40b5a9dc7d39ef8396797f61b323
                  Source: bhvD739.tmp.3.drString found in binary or memory: https://logincdn.msauth.net/shared/1.0/content/images/marching_ants_white_8257b0707cbe1d0bd2661b8006
                  Source: bhvD739.tmp.3.drString found in binary or memory: https://logincdn.msauth.net/shared/1.0/content/images/microsoft_logo_564db913a7fa0ca42727161c6d031be
                  Source: bhvD739.tmp.3.drString found in binary or memory: https://logincdn.msauth.net/shared/1.0/content/js/Win10HostFinish_PCore_uuJCSTysLQ9JSYLCWmrHPQ2.js
                  Source: bhvD739.tmp.3.drString found in binary or memory: https://logincdn.msauth.net/shared/1.0/content/js/Win10HostLogin_PCore_3J49gjRV3LSCVj6qj73kPQ2.js
                  Source: bhvD739.tmp.3.drString found in binary or memory: https://logincdn.msauth.net/shared/1.0/content/js/asyncchunk/win10hostlogin_ppassword_0901d04301714f
                  Source: bhvD739.tmp.3.drString found in binary or memory: https://logincdn.msauth.net/shared/1.0/content/js/oneDs_f2e0f4a029670f10d892.js
                  Source: bhvD739.tmp.3.drString found in binary or memory: https://logincdn.msftauth.net/16.000/Converged_v21033_mG-wAdV--_sq1kXms675SA2.css
                  Source: z58Swiftcopy_MT.bat.exe, 00000002.00000003.28436040290.0000000002A9A000.00000004.00000020.00020000.00000000.sdmp, z58Swiftcopy_MT.bat.exe, 00000002.00000002.32056932719.0000000002A9D000.00000004.00000020.00020000.00000000.sdmp, z58Swiftcopy_MT.bat.exe, 00000002.00000003.28340161307.0000000002AA1000.00000004.00000020.00020000.00000000.sdmp, z58Swiftcopy_MT.bat.exe, 00000002.00000003.28390975053.0000000002A98000.00000004.00000020.00020000.00000000.sdmp, z58Swiftcopy_MT.bat.exe, 00000002.00000003.29410588585.0000000002A9C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://ocsp.quovadisoffshore.com0
                  Source: bhvD739.tmp.3.drString found in binary or memory: https://odc.officeapps.live.com/odc/v2.1/hrd?lcid=1033&syslcid=2057&uilcid=1033&app=0&ver=16&build=1
                  Source: z58Swiftcopy_MT.bat.exe, 00000003.00000003.28475954920.0000000002A96000.00000004.00000020.00020000.00000000.sdmp, z58Swiftcopy_MT.bat.exe, 00000003.00000003.28475613079.000000000227D000.00000004.00000020.00020000.00000000.sdmp, z58Swiftcopy_MT.bat.exe, 00000003.00000003.28475803985.0000000002A96000.00000004.00000020.00020000.00000000.sdmp, z58Swiftcopy_MT.bat.exe, 00000003.00000003.28478272302.0000000002279000.00000004.00000020.00020000.00000000.sdmp, z58Swiftcopy_MT.bat.exe, 00000003.00000003.28481006058.000000000226C000.00000004.00000020.00020000.00000000.sdmp, z58Swiftcopy_MT.bat.exe, 00000003.00000003.28474962908.0000000002271000.00000004.00000020.00020000.00000000.sdmp, z58Swiftcopy_MT.bat.exe, 00000003.00000003.28481039246.000000000226C000.00000004.00000020.00020000.00000000.sdmp, z58Swiftcopy_MT.bat.exe, 00000003.00000003.28481200929.000000000226C000.00000004.00000020.00020000.00000000.sdmp, z58Swiftcopy_MT.bat.exe, 00000003.00000003.28478496438.0000000002277000.00000004.00000020.00020000.00000000.sdmp, z58Swiftcopy_MT.bat.exe, 00000003.00000003.28481236030.000000000226F000.00000004.00000020.00020000.00000000.sdmp, z58Swiftcopy_MT.bat.exe, 00000003.00000003.28475567204.0000000002A96000.00000004.00000020.00020000.00000000.sdmp, z58Swiftcopy_MT.bat.exe, 00000003.00000003.28481123706.000000000226C000.00000004.00000020.00020000.00000000.sdmp, z58Swiftcopy_MT.bat.exe, 00000003.00000003.28478173593.0000000002279000.00000004.00000020.00020000.00000000.sdmp, z58Swiftcopy_MT.bat.exe, 00000003.00000003.28477694523.0000000002279000.00000004.00000020.00020000.00000000.sdmp, z58Swiftcopy_MT.bat.exe, 00000003.00000002.28481986828.0000000002271000.00000004.00000020.00020000.00000000.sdmp, z58Swiftcopy_MT.bat.exe, 00000003.00000003.28476240349.0000000002271000.00000004.00000020.00020000.00000000.sdmp, z58Swiftcopy_MT.bat.exe, 00000003.00000003.28480970839.000000000226C000.00000004.00000020.00020000.00000000.sdmp, z58Swiftcopy_MT.bat.exe, 00000003.00000003.28478442693.0000000002272000.00000004.00000020.00020000.00000000.sdmp, z58Swiftcopy_MT.bat.exe, 00000003.00000003.28477629885.0000000002279000.00000004.00000020.00020000.00000000.sdmp, z58Swiftcopy_MT.bat.exe, 00000003.00000003.28475707662.0000000002A96000.00000004.00000020.00020000.00000000.sdmp, z58Swiftcopy_MT.bat.exe, 00000003.00000003.28478024679.0000000002279000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://odc.officeapps.live.com/odc/v2.1/hrd?lcid=1033&syslcid=2057&uilcid=1033&app=1&ver=16&build=1
                  Source: z58Swiftcopy_MT.bat.exe, 00000003.00000003.28476050726.0000000002A96000.00000004.00000020.00020000.00000000.sdmp, z58Swiftcopy_MT.bat.exe, 00000003.00000003.28475853439.0000000002A96000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://odc.officeapps.live.com/odc/v2.1/hrdres://C:
                  Source: bhvD739.tmp.3.drString found in binary or memory: https://oneclient.sfx.ms/PreSignInSettings/Prod/2022-09-17-00-05-23/PreSignInSettingsConfig.json
                  Source: bhvD739.tmp.3.drString found in binary or memory: https://outlookmobile-office365-tas.msedge.net/ab?clientId=512A4435-60B8-42A2-80D3-582B6B7FB6C0&ig=1
                  Source: bhvD739.tmp.3.drString found in binary or memory: https://ow1.res.office365.com/apc/trans.gif?2787436b358dbd81d7fd0a0cccb05788
                  Source: bhvD739.tmp.3.drString found in binary or memory: https://ow1.res.office365.com/apc/trans.gif?2f068a709ecd1f0c000b440d901cea9b
                  Source: bhvD739.tmp.3.drString found in binary or memory: https://pagead2.googlesyndication.com/pagead/gen_csp?id=adbundle&qqi=CPuOuO2wkvMCFQDJuwgdDw4EyQ&gqi=
                  Source: bhvD739.tmp.3.drString found in binary or memory: https://pki.goog/repository/0
                  Source: bhvD739.tmp.3.drString found in binary or memory: https://polyfill.io/v3/polyfill.min.js?features=2CElement.prototype.matches%2CElement.prototype.clos
                  Source: bhvD739.tmp.3.drString found in binary or memory: https://px.ads.linkedin.com/setuid?partner=tripleliftdbredirect&tlUid=13122329571212727769&dbredirec
                  Source: bhvD739.tmp.3.drString found in binary or memory: https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct
                  Source: bhvD739.tmp.3.drString found in binary or memory: https://s.yimg.com/lo/api/res/1.2/7zPvmktG8JzqA0vnWzpk_g--~A/Zmk9Zml0O3c9NjIyO2g9MzY4O2FwcGlkPWdlbWl
                  Source: bhvD739.tmp.3.drString found in binary or memory: https://s1.adform.net/Banners/Elements/Files/2070608/10170131/bvpath_258/pics/footer.png
                  Source: bhvD739.tmp.3.drString found in binary or memory: https://s1.adform.net/Banners/Elements/Files/2070608/10170131/bvpath_258/pics/k2.jpg
                  Source: bhvD739.tmp.3.drString found in binary or memory: https://s1.adform.net/Banners/Elements/Files/2070608/10170131/bvpath_258/pics/k3.jpg
                  Source: bhvD739.tmp.3.drString found in binary or memory: https://s1.adform.net/Banners/Elements/Files/2070608/10170131/bvpath_258/pics/k4.jpg
                  Source: bhvD739.tmp.3.drString found in binary or memory: https://s1.adform.net/banners/scripts/rmb/Adform.DHTML.js?bv=626
                  Source: bhvD739.tmp.3.drString found in binary or memory: https://sectigo.com/CPS0
                  Source: z58Swiftcopy_MT.bat.exe, 00000003.00000003.28476240349.0000000002271000.00000004.00000020.00020000.00000000.sdmp, z58Swiftcopy_MT.bat.exe, 00000003.00000003.28478442693.0000000002272000.00000004.00000020.00020000.00000000.sdmp, z58Swiftcopy_MT.bat.exe, 00000003.00000003.28477629885.0000000002279000.00000004.00000020.00020000.00000000.sdmp, z58Swiftcopy_MT.bat.exe, 00000003.00000003.28475707662.0000000002A96000.00000004.00000020.00020000.00000000.sdmp, z58Swiftcopy_MT.bat.exe, 00000003.00000003.28478024679.0000000002279000.00000004.00000020.00020000.00000000.sdmp, bhvD739.tmp.3.drString found in binary or memory: https://servedby.flashtalking.com/imp/8/106228;3700839;201;jsiframe;Adobe;1000x463DESKTOPACROBATREAD
                  Source: bhvD739.tmp.3.drString found in binary or memory: https://srtb.msn.com/auction?a=de-ch&b=4aeddfea844042999a22bdcca1fba378&c=MSN&d=https%3A%2F%2Fwww.ms
                  Source: bhvD739.tmp.3.drString found in binary or memory: https://srtb.msn.com/auction?a=de-ch&b=838b780a64e64b0d92d628632c1c377c&c=MSN&d=https%3A%2F%2Fwww.ms
                  Source: bhvD739.tmp.3.drString found in binary or memory: https://srtb.msn.com/auction?a=de-ch&b=bba24733ba4a487f8f8706bf3811269e&c=MSN&d=https%3A%2F%2Fwww.ms
                  Source: bhvD739.tmp.3.drString found in binary or memory: https://static-ecst.licdn.com/apc/trans.gif?ae11829b3d6e895a2a3516fac536a339
                  Source: bhvD739.tmp.3.drString found in binary or memory: https://static-ecst.licdn.com/apc/trans.gif?fa0d4adae7a556f7d0d03112de822178
                  Source: bhvD739.tmp.3.drString found in binary or memory: https://static-global-s-msn-com.akamaized.net/hp-neu/_h/975a7d20/webcore/externalscripts/jquery/jque
                  Source: bhvD739.tmp.3.drString found in binary or memory: https://static-global-s-msn-com.akamaized.net/hp-neu/de-ch/homepage/_sc/css/f60532dd-d68e7b58/direct
                  Source: bhvD739.tmp.3.drString found in binary or memory: https://static-global-s-msn-com.akamaized.net/hp-neu/de-ch/homepage/_sc/js/f60532dd-2923b6c2/directi
                  Source: bhvD739.tmp.3.drString found in binary or memory: https://static-global-s-msn-com.akamaized.net/hp-neu/de-ch/homepage/_sc/js/f60532dd-d017f019/directi
                  Source: bhvD739.tmp.3.drString found in binary or memory: https://static-global-s-msn-com.akamaized.net/hp-neu/sc/2b/a5ea21.ico
                  Source: bhvD739.tmp.3.drString found in binary or memory: https://static-global-s-msn-com.akamaized.net/hp-neu/sc/64/a8a064.gif
                  Source: bhvD739.tmp.3.drString found in binary or memory: https://static-global-s-msn-com.akamaized.net/hp-neu/sc/9b/e151e5.gif
                  Source: bhvD739.tmp.3.drString found in binary or memory: https://static-global-s-msn-com.akamaized.net/hp-neu/sc/c6/cfdbd9.png
                  Source: bhvD739.tmp.3.drString found in binary or memory: https://static-global-s-msn-com.akamaized.net/hp-neu/sc/ea/4996b9.woff
                  Source: bhvD739.tmp.3.drString found in binary or memory: https://static-global-s-msn-com.akamaized.net/img-resizer/tenant/amp/entityid/AAKp8YX.img?h=16&w=16&
                  Source: bhvD739.tmp.3.drString found in binary or memory: https://static-global-s-msn-com.akamaized.net/img-resizer/tenant/amp/entityid/AAMqFmF.img?h=16&w=16&
                  Source: bhvD739.tmp.3.drString found in binary or memory: https://static-global-s-msn-com.akamaized.net/img-resizer/tenant/amp/entityid/AAODMk8.img?h=75&w=100
                  Source: bhvD739.tmp.3.drString found in binary or memory: https://static-global-s-msn-com.akamaized.net/img-resizer/tenant/amp/entityid/AAODQmd.img?h=75&w=100
                  Source: bhvD739.tmp.3.drString found in binary or memory: https://static-global-s-msn-com.akamaized.net/img-resizer/tenant/amp/entityid/AAODept.img?h=75&w=100
                  Source: bhvD739.tmp.3.drString found in binary or memory: https://static-global-s-msn-com.akamaized.net/img-resizer/tenant/amp/entityid/AAOEFck.img?h=75&w=100
                  Source: bhvD739.tmp.3.drString found in binary or memory: https://static-global-s-msn-com.akamaized.net/img-resizer/tenant/amp/entityid/AAOEQ0I.img?h=368&w=62
                  Source: bhvD739.tmp.3.drString found in binary or memory: https://static-global-s-msn-com.akamaized.net/img-resizer/tenant/amp/entityid/AAOF4WR.img?h=75&w=100
                  Source: bhvD739.tmp.3.drString found in binary or memory: https://static-global-s-msn-com.akamaized.net/img-resizer/tenant/amp/entityid/AAOF4Xx.img?h=368&w=62
                  Source: bhvD739.tmp.3.drString found in binary or memory: https://static-global-s-msn-com.akamaized.net/img-resizer/tenant/amp/entityid/AAOFBrV.img?h=75&w=100
                  Source: bhvD739.tmp.3.drString found in binary or memory: https://static-global-s-msn-com.akamaized.net/img-resizer/tenant/amp/entityid/AAOFC5q.img?h=75&w=100
                  Source: bhvD739.tmp.3.drString found in binary or memory: https://static-global-s-msn-com.akamaized.net/img-resizer/tenant/amp/entityid/AAOFCgW.img?h=250&w=30
                  Source: bhvD739.tmp.3.drString found in binary or memory: https://static-global-s-msn-com.akamaized.net/img-resizer/tenant/amp/entityid/AAOFCgW.img?h=75&w=100
                  Source: bhvD739.tmp.3.drString found in binary or memory: https://static-global-s-msn-com.akamaized.net/img-resizer/tenant/amp/entityid/AAOFE0J.img?h=75&w=100
                  Source: bhvD739.tmp.3.drString found in binary or memory: https://static-global-s-msn-com.akamaized.net/img-resizer/tenant/amp/entityid/AAOFENj.img?h=75&w=100
                  Source: bhvD739.tmp.3.drString found in binary or memory: https://static-global-s-msn-com.akamaized.net/img-resizer/tenant/amp/entityid/AAOFJFJ.img?h=75&w=100
                  Source: bhvD739.tmp.3.drString found in binary or memory: https://static-global-s-msn-com.akamaized.net/img-resizer/tenant/amp/entityid/AAOFLk7.img?h=75&w=100
                  Source: bhvD739.tmp.3.drString found in binary or memory: https://static-global-s-msn-com.akamaized.net/img-resizer/tenant/amp/entityid/AAOFWV8.img?h=75&w=100
                  Source: bhvD739.tmp.3.drString found in binary or memory: https://static-global-s-msn-com.akamaized.net/img-resizer/tenant/amp/entityid/AAOFhty.img?h=368&w=62
                  Source: bhvD739.tmp.3.drString found in binary or memory: https://static-global-s-msn-com.akamaized.net/img-resizer/tenant/amp/entityid/AAOFsUC.img?h=250&w=30
                  Source: bhvD739.tmp.3.drString found in binary or memory: https://static-global-s-msn-com.akamaized.net/img-resizer/tenant/amp/entityid/AAOFu51.img?h=75&w=100
                  Source: bhvD739.tmp.3.drString found in binary or memory: https://static-global-s-msn-com.akamaized.net/img-resizer/tenant/amp/entityid/AAOFy7B.img?h=75&w=100
                  Source: bhvD739.tmp.3.drString found in binary or memory: https://static-global-s-msn-com.akamaized.net/img-resizer/tenant/amp/entityid/AAOFyKG.img?h=75&w=100
                  Source: bhvD739.tmp.3.drString found in binary or memory: https://static-global-s-msn-com.akamaized.net/img-resizer/tenant/amp/entityid/AAOG3Y7.img?h=250&w=30
                  Source: bhvD739.tmp.3.drString found in binary or memory: https://static-global-s-msn-com.akamaized.net/img-resizer/tenant/amp/entityid/AAOG88s.img?h=75&w=100
                  Source: bhvD739.tmp.3.drString found in binary or memory: https://static-global-s-msn-com.akamaized.net/img-resizer/tenant/amp/entityid/AAOGPXq.img?h=194&w=30
                  Source: bhvD739.tmp.3.drString found in binary or memory: https://static-global-s-msn-com.akamaized.net/img-resizer/tenant/amp/entityid/AAOGQtJ.img?h=75&w=100
                  Source: bhvD739.tmp.3.drString found in binary or memory: https://static-global-s-msn-com.akamaized.net/img-resizer/tenant/amp/entityid/AAOGV90.img?h=194&w=30
                  Source: bhvD739.tmp.3.drString found in binary or memory: https://static-global-s-msn-com.akamaized.net/img-resizer/tenant/amp/entityid/AAOGapF.img?h=75&w=100
                  Source: bhvD739.tmp.3.drString found in binary or memory: https://static-global-s-msn-com.akamaized.net/img-resizer/tenant/amp/entityid/AAOGlbE.img?h=75&w=100
                  Source: bhvD739.tmp.3.drString found in binary or memory: https://static-global-s-msn-com.akamaized.net/img-resizer/tenant/amp/entityid/AAOGmTG.img?h=75&w=100
                  Source: bhvD739.tmp.3.drString found in binary or memory: https://static-global-s-msn-com.akamaized.net/img-resizer/tenant/amp/entityid/AAOGyYN.img?h=194&w=30
                  Source: bhvD739.tmp.3.drString found in binary or memory: https://static-global-s-msn-com.akamaized.net/img-resizer/tenant/amp/entityid/AAOH2Ml.img?h=194&w=30
                  Source: bhvD739.tmp.3.drString found in binary or memory: https://static-global-s-msn-com.akamaized.net/img-resizer/tenant/amp/entityid/AAOH6xB.img?h=75&w=100
                  Source: bhvD739.tmp.3.drString found in binary or memory: https://static-global-s-msn-com.akamaized.net/img-resizer/tenant/amp/entityid/BB14hq0P.img?h=368&w=6
                  Source: bhvD739.tmp.3.drString found in binary or memory: https://static-global-s-msn-com.akamaized.net/img-resizer/tenant/amp/entityid/BB1aXBV1.img?h=27&w=27
                  Source: bhvD739.tmp.3.drString found in binary or memory: https://static-global-s-msn-com.akamaized.net/img-resizer/tenant/amp/entityid/BB1cEP3G.img?h=27&w=27
                  Source: bhvD739.tmp.3.drString found in binary or memory: https://static-global-s-msn-com.akamaized.net/img-resizer/tenant/amp/entityid/BB1cG73h.img?h=27&w=27
                  Source: bhvD739.tmp.3.drString found in binary or memory: https://static-global-s-msn-com.akamaized.net/img-resizer/tenant/amp/entityid/BB1ftEY0.img?h=16&w=16
                  Source: bhvD739.tmp.3.drString found in binary or memory: https://static-global-s-msn-com.akamaized.net/img-resizer/tenant/amp/entityid/BB1gEFcn.img?h=16&w=16
                  Source: bhvD739.tmp.3.drString found in binary or memory: https://static-global-s-msn-com.akamaized.net/img-resizer/tenant/amp/entityid/BB1kc8s.img?m=6&o=true
                  Source: bhvD739.tmp.3.drString found in binary or memory: https://static-global-s-msn-com.akamaized.net/img-resizer/tenant/amp/entityid/BB7gRE.img?h=16&w=16&m
                  Source: bhvD739.tmp.3.drString found in binary or memory: https://static-global-s-msn-com.akamaized.net/img-resizer/tenant/amp/entityid/BB7hg4.img?h=16&w=16&m
                  Source: bhvD739.tmp.3.drString found in binary or memory: https://static-global-s-msn-com.akamaized.net/img-resizer/tenant/amp/entityid/BBPfCZL.img?h=27&w=27&
                  Source: bhvD739.tmp.3.drString found in binary or memory: https://static-global-s-msn-com.akamaized.net/img-resizer/tenant/amp/entityid/BBVuddh.img?h=16&w=16&
                  Source: bhvD739.tmp.3.drString found in binary or memory: https://static-global-s-msn-com.akamaized.net/img-resizer/tenant/amp/entityid/BBX2afX.img?h=27&w=27&
                  Source: bhvD739.tmp.3.drString found in binary or memory: https://static-spartan-neu-s-msn-com.akamaized.net/_h/975a7d20/webcore/externalscripts/jquery/jquery
                  Source: bhvD739.tmp.3.drString found in binary or memory: https://static-spartan-neu-s-msn-com.akamaized.net/spartan/en-gb/_ssc/css/b5dff51-e7c3b187/kernel-9c
                  Source: bhvD739.tmp.3.drString found in binary or memory: https://static-spartan-neu-s-msn-com.akamaized.net/spartan/en-gb/_ssc/js/b5dff51-96897e59/kernel-1e4
                  Source: bhvD739.tmp.3.drString found in binary or memory: https://static.doubleclick.net/dynamic/5/283983386/11928812572019506176_2845462151855228713.jpeg
                  Source: bhvD739.tmp.3.drString found in binary or memory: https://static.doubleclick.net/dynamic/5/283983386/2578937774238713912_2802581922324906360.jpeg
                  Source: bhvD739.tmp.3.drString found in binary or memory: https://static.doubleclick.net/dynamic/5/283983386/6852827437855218848_345419970373613283.jpeg
                  Source: bhvD739.tmp.3.drString found in binary or memory: https://static2.sharepointonline.com/files/fabric/assets/fonts/segoeui-westeuropean/segoeui-bold.wof
                  Source: bhvD739.tmp.3.drString found in binary or memory: https://static2.sharepointonline.com/files/fabric/assets/fonts/segoeui-westeuropean/segoeui-light.wo
                  Source: bhvD739.tmp.3.drString found in binary or memory: https://static2.sharepointonline.com/files/fabric/assets/fonts/segoeui-westeuropean/segoeui-regular.
                  Source: bhvD739.tmp.3.drString found in binary or memory: https://static2.sharepointonline.com/files/fabric/assets/fonts/segoeui-westeuropean/segoeui-semibold
                  Source: bhvD739.tmp.3.drString found in binary or memory: https://static2.sharepointonline.com/files/fabric/assets/fonts/segoeui-westeuropean/segoeui-semiligh
                  Source: z58Swiftcopy_MT.bat.exe, 00000003.00000003.28479679200.0000000002AFA000.00000004.00000020.00020000.00000000.sdmp, z58Swiftcopy_MT.bat.exe, 00000003.00000003.28479825849.0000000002A91000.00000004.00000020.00020000.00000000.sdmp, z58Swiftcopy_MT.bat.exe, 00000003.00000003.28479591434.0000000002AAD000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://support.google.com/chrome/?p=plugin_flash
                  Source: bhvD739.tmp.3.drString found in binary or memory: https://sync-t1.taboola.com/sg/criteortb-network/1/rtb-h/?taboola_hm=b2df1cf6-0873-4430-916b-9612e80
                  Source: bhvD739.tmp.3.drString found in binary or memory: https://t-ring-fallback.msedge.net/apc/trans.gif?3d88065febcc552cae09e5e8b74c55d5
                  Source: bhvD739.tmp.3.drString found in binary or memory: https://t-ring-fallback.msedge.net/apc/trans.gif?7616d616e1c668bb563496121e660bee
                  Source: bhvD739.tmp.3.drString found in binary or memory: https://t-ring.msedge.net/apc/trans.gif?01af3f8dd36bcb49643452aa096ff6c0
                  Source: bhvD739.tmp.3.drString found in binary or memory: https://t-ring.msedge.net/apc/trans.gif?7de2246f1808e47769e35183d0153a7a
                  Source: bhvD739.tmp.3.drString found in binary or memory: https://t-ring.msedge.net/apc/trans.gif?d0400e0387468531bdf7da710e2ae325
                  Source: bhvD739.tmp.3.drString found in binary or memory: https://t-ring.msedge.net/apc/trans.gif?f0f9f226f444e2e246f9075ea908a633
                  Source: z58Swiftcopy_MT.bat.exe, 00000002.00000002.32056632494.0000000002A18000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://teldrum.ro/
                  Source: z58Swiftcopy_MT.bat.exe, 00000002.00000002.32057397168.0000000002C60000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://teldrum.ro/PmprpeY34.bin
                  Source: z58Swiftcopy_MT.bat.exe, 00000002.00000002.32056632494.0000000002A59000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://teldrum.ro/PmprpeY34.bin0Pf
                  Source: z58Swiftcopy_MT.bat.exe, 00000002.00000002.32056632494.0000000002A59000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://teldrum.ro/PmprpeY34.bin:Pl
                  Source: z58Swiftcopy_MT.bat.exe, 00000002.00000002.32057397168.0000000002C60000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://teldrum.ro/PmprpeY34.binTrilsRexcrestereamuschilor.ro/PmprpeY34.bin
                  Source: bhvD739.tmp.3.drString found in binary or memory: https://tpc.googlesyndication.com/pagead/gadgets/html5/ssrh.js
                  Source: bhvD739.tmp.3.drString found in binary or memory: https://tpc.googlesyndication.com/pagead/gadgets/in_page_full_auto_V1/Responsive_Monte_GpaSingleIfra
                  Source: bhvD739.tmp.3.drString found in binary or memory: https://tpc.googlesyndication.com/pagead/js/r20210916/r20110914/abg_lite.js
                  Source: bhvD739.tmp.3.drString found in binary or memory: https://tpc.googlesyndication.com/pagead/js/r20210916/r20110914/client/qs_click_protection.js
                  Source: bhvD739.tmp.3.drString found in binary or memory: https://tpc.googlesyndication.com/pagead/js/r20210916/r20110914/client/window_focus.js
                  Source: bhvD739.tmp.3.drString found in binary or memory: https://tpc.googlesyndication.com/simgad/14585816484902221120
                  Source: bhvD739.tmp.3.drString found in binary or memory: https://tpc.googlesyndication.com/sodar/sodar2.js
                  Source: bhvD739.tmp.3.drString found in binary or memory: https://tpc.googlesyndication.com/sodar/sodar2/224/runner.html
                  Source: bhvD739.tmp.3.drString found in binary or memory: https://use.typekit.net/af/40207f/0000000000000000000176ff/27/d?subset_id=2&fvd=n3&v=3
                  Source: bhvD739.tmp.3.drString found in binary or memory: https://use.typekit.net/af/cb695f/000000000000000000017701/27/d?subset_id=2&fvd=n4&v=3
                  Source: bhvD739.tmp.3.drString found in binary or memory: https://use.typekit.net/af/eaf09c/000000000000000000017703/27/d?subset_id=2&fvd=n7&v=3
                  Source: bhvD739.tmp.3.drString found in binary or memory: https://use.typekit.net/ecr2zvs.js
                  Source: bhvD739.tmp.3.drString found in binary or memory: https://widgets.outbrain.com/external/publishers/msn/MSNIdSync.js
                  Source: bhvD739.tmp.3.drString found in binary or memory: https://www.digicert.com/CPS0
                  Source: bhvD739.tmp.3.drString found in binary or memory: https://www.globalsign.com/repository/0
                  Source: z58Swiftcopy_MT.bat.exe, z58Swiftcopy_MT.bat.exe, 00000005.00000002.28456405187.0000000000400000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: https://www.google.com
                  Source: bhvD739.tmp.3.drString found in binary or memory: https://www.google.com/
                  Source: z58Swiftcopy_MT.bat.exeString found in binary or memory: https://www.google.com/accounts/servicelogin
                  Source: z58Swiftcopy_MT.bat.exe, 00000003.00000003.28476240349.0000000002271000.00000004.00000020.00020000.00000000.sdmp, bhvD739.tmp.3.drString found in binary or memory: https://www.google.com/chrome/
                  Source: z58Swiftcopy_MT.bat.exe, 00000003.00000003.28476240349.0000000002271000.00000004.00000020.00020000.00000000.sdmp, bhvD739.tmp.3.drString found in binary or memory: https://www.google.com/chrome/thank-you.html?statcb=0&installdataindex=empty&defaultbrowser=0
                  Source: z58Swiftcopy_MT.bat.exe, 00000003.00000003.28478173593.0000000002279000.00000004.00000020.00020000.00000000.sdmp, z58Swiftcopy_MT.bat.exe, 00000003.00000003.28477694523.0000000002279000.00000004.00000020.00020000.00000000.sdmp, z58Swiftcopy_MT.bat.exe, 00000003.00000003.28476240349.0000000002271000.00000004.00000020.00020000.00000000.sdmp, z58Swiftcopy_MT.bat.exe, 00000003.00000003.28477629885.0000000002279000.00000004.00000020.00020000.00000000.sdmp, z58Swiftcopy_MT.bat.exe, 00000003.00000003.28478024679.0000000002279000.00000004.00000020.00020000.00000000.sdmp, bhvD739.tmp.3.drString found in binary or memory: https://www.google.com/pagead/drt/ui
                  Source: bhvD739.tmp.3.drString found in binary or memory: https://www.google.com/recaptcha/api2/aframe
                  Source: bhvD739.tmp.3.drString found in binary or memory: https://www.googleadservices.com/pagead/p3p.xml
                  Source: bhvD739.tmp.3.drString found in binary or memory: https://www.googletagservices.com/activeview/js/current/osd.js
                  Source: bhvD739.tmp.3.drString found in binary or memory: https://www.googletagservices.com/activeview/js/current/rx_lidar.js?cache=r20110914
                  Source: bhvD739.tmp.3.drString found in binary or memory: https://www.msn.com
                  Source: bhvD739.tmp.3.drString found in binary or memory: https://www.msn.com/
                  Source: z58Swiftcopy_MT.bat.exe, 00000003.00000003.28474962908.0000000002271000.00000004.00000020.00020000.00000000.sdmp, z58Swiftcopy_MT.bat.exe, 00000003.00000003.28475198040.0000000002A91000.00000004.00000020.00020000.00000000.sdmp, z58Swiftcopy_MT.bat.exe, 00000003.00000003.28476240349.0000000002271000.00000004.00000020.00020000.00000000.sdmp, z58Swiftcopy_MT.bat.exe, 00000003.00000003.28474770977.0000000002A91000.00000004.00000020.00020000.00000000.sdmp, bhvD739.tmp.3.drString found in binary or memory: https://www.msn.com/?ocid=iehp
                  Source: bhvD739.tmp.3.drString found in binary or memory: https://www.msn.com/_h/9c38ab9f/webcore/externalscripts/oneTrustV2/consent/55a804ab-e5c6-4b97-9319-8
                  Source: bhvD739.tmp.3.drString found in binary or memory: https://www.msn.com/_h/9c38ab9f/webcore/externalscripts/oneTrustV2/scripttemplates/6.4.0/otBannerSdk
                  Source: bhvD739.tmp.3.drString found in binary or memory: https://www.msn.com/_h/9c38ab9f/webcore/externalscripts/oneTrustV2/scripttemplates/6.4.0/otTCF-ie.js
                  Source: bhvD739.tmp.3.drString found in binary or memory: https://www.msn.com/de-ch/?ocid=iehp
                  Source: bhvD739.tmp.3.drString found in binary or memory: https://www.msn.com/spartan/en-gb/kernel/appcache/cache.appcache?locale=en-GB&market=GB&enableregula
                  Source: bhvD739.tmp.3.drString found in binary or memory: https://www.msn.com/spartan/ientp?locale=en-GB&market=GB&enableregulatorypsm=0&enablecpsm=0&NTLogo=1
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49747 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49747
                  Source: unknownHTTPS traffic detected: 109.99.162.14:443 -> 192.168.11.20:49747 version: TLS 1.2

                  Key, Mouse, Clipboard, Microphone and Screen Capturing

                  barindex
                  Source: C:\Users\user\Desktop\z58Swiftcopy_MT.bat.exeWindows user hook set: 0 keyboard low level C:\Users\user\Desktop\z58Swiftcopy_MT.bat.exeJump to behavior
                  Source: C:\Users\user\Desktop\z58Swiftcopy_MT.bat.exeCode function: 0_2_004052FE GetDlgItem,GetDlgItem,GetDlgItem,GetDlgItem,GetClientRect,GetSystemMetrics,SendMessageA,SendMessageA,SendMessageA,SendMessageA,SendMessageA,SendMessageA,ShowWindow,ShowWindow,GetDlgItem,SendMessageA,SendMessageA,SendMessageA,GetDlgItem,CreateThread,CloseHandle,ShowWindow,ShowWindow,ShowWindow,ShowWindow,SendMessageA,CreatePopupMenu,AppendMenuA,GetWindowRect,TrackPopupMenu,SendMessageA,OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,SendMessageA,GlobalUnlock,SetClipboardData,CloseClipboard,0_2_004052FE
                  Source: C:\Users\user\Desktop\z58Swiftcopy_MT.bat.exeCode function: 3_2_0040987A EmptyClipboard,wcslen,GlobalAlloc,GlobalLock,memcpy,GlobalUnlock,SetClipboardData,CloseClipboard,3_2_0040987A
                  Source: C:\Users\user\Desktop\z58Swiftcopy_MT.bat.exeCode function: 3_2_004098E2 EmptyClipboard,GetFileSize,GlobalAlloc,GlobalLock,ReadFile,GlobalUnlock,SetClipboardData,GetLastError,CloseHandle,GetLastError,CloseClipboard,3_2_004098E2
                  Source: C:\Users\user\Desktop\z58Swiftcopy_MT.bat.exeCode function: 4_2_00406DFC EmptyClipboard,GetFileSize,GlobalAlloc,GlobalLock,ReadFile,GlobalUnlock,SetClipboardData,GetLastError,CloseHandle,GetLastError,CloseClipboard,4_2_00406DFC
                  Source: C:\Users\user\Desktop\z58Swiftcopy_MT.bat.exeCode function: 4_2_00406E9F EmptyClipboard,strlen,GlobalAlloc,GlobalLock,memcpy,GlobalUnlock,SetClipboardData,CloseClipboard,4_2_00406E9F
                  Source: C:\Users\user\Desktop\z58Swiftcopy_MT.bat.exeCode function: 5_2_004068B5 EmptyClipboard,GetFileSize,GlobalAlloc,GlobalLock,ReadFile,GlobalUnlock,SetClipboardData,GetLastError,CloseHandle,GetLastError,CloseClipboard,5_2_004068B5
                  Source: C:\Users\user\Desktop\z58Swiftcopy_MT.bat.exeCode function: 5_2_004072B5 EmptyClipboard,strlen,GlobalAlloc,GlobalLock,memcpy,GlobalUnlock,SetClipboardData,CloseClipboard,5_2_004072B5

                  E-Banking Fraud

                  barindex
                  Source: Yara matchFile source: 00000002.00000002.32056932719.0000000002AF1000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000002.00000003.28436005878.0000000002AE4000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000002.00000003.28485763517.0000000002AEF000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000002.00000002.32056784519.0000000002A77000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000002.00000003.28436040290.0000000002A9A000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000002.00000002.32066409158.0000000032B2F000.00000004.00000010.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000002.00000002.32056932719.0000000002A9D000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000002.00000003.29410654098.0000000002A77000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000002.00000003.28486047899.0000000002AEF000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000002.00000003.28453587511.0000000002AE0000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000002.00000003.28390975053.0000000002A98000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000002.00000003.29410560082.0000000002AEF000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000002.00000003.29410588585.0000000002A9C000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: z58Swiftcopy_MT.bat.exe PID: 5524, type: MEMORYSTR
                  Source: Yara matchFile source: C:\ProgramData\remcos\logs.dat, type: DROPPED
                  Source: C:\Users\user\Desktop\z58Swiftcopy_MT.bat.exeProcess Stats: CPU usage > 6%
                  Source: C:\Users\user\Desktop\z58Swiftcopy_MT.bat.exeCode function: 3_2_0040DD85 memset,CreateFileW,NtQuerySystemInformation,NtQuerySystemInformation,CloseHandle,GetCurrentProcessId,_wcsicmp,_wcsicmp,_wcsicmp,OpenProcess,GetCurrentProcess,DuplicateHandle,memset,NtQueryObject,CloseHandle,_wcsicmp,CloseHandle,3_2_0040DD85
                  Source: C:\Users\user\Desktop\z58Swiftcopy_MT.bat.exeCode function: 3_2_00401806 NtdllDefWindowProc_W,3_2_00401806
                  Source: C:\Users\user\Desktop\z58Swiftcopy_MT.bat.exeCode function: 3_2_004018C0 NtdllDefWindowProc_W,3_2_004018C0
                  Source: C:\Users\user\Desktop\z58Swiftcopy_MT.bat.exeCode function: 4_2_004016FD NtdllDefWindowProc_A,4_2_004016FD
                  Source: C:\Users\user\Desktop\z58Swiftcopy_MT.bat.exeCode function: 4_2_004017B7 NtdllDefWindowProc_A,4_2_004017B7
                  Source: C:\Users\user\Desktop\z58Swiftcopy_MT.bat.exeCode function: 5_2_00402CAC NtdllDefWindowProc_A,5_2_00402CAC
                  Source: C:\Users\user\Desktop\z58Swiftcopy_MT.bat.exeCode function: 5_2_00402D66 NtdllDefWindowProc_A,5_2_00402D66
                  Source: C:\Users\user\Desktop\z58Swiftcopy_MT.bat.exeCode function: 0_2_0040330D EntryPoint,SetErrorMode,GetVersion,lstrlenA,#17,OleInitialize,SHGetFileInfoA,GetCommandLineA,GetModuleHandleA,CharNextA,GetTempPathA,GetTempPathA,GetWindowsDirectoryA,lstrcatA,GetTempPathA,lstrcatA,SetEnvironmentVariableA,SetEnvironmentVariableA,SetEnvironmentVariableA,DeleteFileA,OleUninitialize,ExitProcess,lstrcatA,lstrcatA,lstrcatA,lstrcmpiA,SetCurrentDirectoryA,DeleteFileA,CopyFileA,CloseHandle,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,0_2_0040330D
                  Source: C:\Users\user\Desktop\z58Swiftcopy_MT.bat.exeFile created: C:\Windows\resources\0409Jump to behavior
                  Source: C:\Users\user\Desktop\z58Swiftcopy_MT.bat.exeCode function: 0_2_004067250_2_00406725
                  Source: C:\Users\user\Desktop\z58Swiftcopy_MT.bat.exeCode function: 0_2_00404B3D0_2_00404B3D
                  Source: C:\Users\user\Desktop\z58Swiftcopy_MT.bat.exeCode function: 2_2_33A871942_2_33A87194
                  Source: C:\Users\user\Desktop\z58Swiftcopy_MT.bat.exeCode function: 2_2_33A7B5C12_2_33A7B5C1
                  Source: C:\Users\user\Desktop\z58Swiftcopy_MT.bat.exeCode function: 2_2_33A800002_2_33A80000
                  Source: C:\Users\user\Desktop\z58Swiftcopy_MT.bat.exeCode function: 3_2_00406E8F3_2_00406E8F
                  Source: C:\Users\user\Desktop\z58Swiftcopy_MT.bat.exeCode function: 3_2_0044B0403_2_0044B040
                  Source: C:\Users\user\Desktop\z58Swiftcopy_MT.bat.exeCode function: 3_2_0043610D3_2_0043610D
                  Source: C:\Users\user\Desktop\z58Swiftcopy_MT.bat.exeCode function: 3_2_004473103_2_00447310
                  Source: C:\Users\user\Desktop\z58Swiftcopy_MT.bat.exeCode function: 3_2_0044A4903_2_0044A490
                  Source: C:\Users\user\Desktop\z58Swiftcopy_MT.bat.exeCode function: 3_2_0040755A3_2_0040755A
                  Source: C:\Users\user\Desktop\z58Swiftcopy_MT.bat.exeCode function: 3_2_0043C5603_2_0043C560
                  Source: C:\Users\user\Desktop\z58Swiftcopy_MT.bat.exeCode function: 3_2_0044B6103_2_0044B610
                  Source: C:\Users\user\Desktop\z58Swiftcopy_MT.bat.exeCode function: 3_2_0044D6C03_2_0044D6C0
                  Source: C:\Users\user\Desktop\z58Swiftcopy_MT.bat.exeCode function: 3_2_004476F03_2_004476F0
                  Source: C:\Users\user\Desktop\z58Swiftcopy_MT.bat.exeCode function: 3_2_0044B8703_2_0044B870
                  Source: C:\Users\user\Desktop\z58Swiftcopy_MT.bat.exeCode function: 3_2_0044081D3_2_0044081D
                  Source: C:\Users\user\Desktop\z58Swiftcopy_MT.bat.exeCode function: 3_2_004149573_2_00414957
                  Source: C:\Users\user\Desktop\z58Swiftcopy_MT.bat.exeCode function: 3_2_004079EE3_2_004079EE
                  Source: C:\Users\user\Desktop\z58Swiftcopy_MT.bat.exeCode function: 3_2_00407AEB3_2_00407AEB
                  Source: C:\Users\user\Desktop\z58Swiftcopy_MT.bat.exeCode function: 3_2_0044AA803_2_0044AA80
                  Source: C:\Users\user\Desktop\z58Swiftcopy_MT.bat.exeCode function: 3_2_00412AA93_2_00412AA9
                  Source: C:\Users\user\Desktop\z58Swiftcopy_MT.bat.exeCode function: 3_2_00404B743_2_00404B74
                  Source: C:\Users\user\Desktop\z58Swiftcopy_MT.bat.exeCode function: 3_2_00404B033_2_00404B03
                  Source: C:\Users\user\Desktop\z58Swiftcopy_MT.bat.exeCode function: 3_2_0044BBD83_2_0044BBD8
                  Source: C:\Users\user\Desktop\z58Swiftcopy_MT.bat.exeCode function: 3_2_00404BE53_2_00404BE5
                  Source: C:\Users\user\Desktop\z58Swiftcopy_MT.bat.exeCode function: 3_2_00404C763_2_00404C76
                  Source: C:\Users\user\Desktop\z58Swiftcopy_MT.bat.exeCode function: 3_2_00415CFE3_2_00415CFE
                  Source: C:\Users\user\Desktop\z58Swiftcopy_MT.bat.exeCode function: 3_2_00416D723_2_00416D72
                  Source: C:\Users\user\Desktop\z58Swiftcopy_MT.bat.exeCode function: 3_2_00446D303_2_00446D30
                  Source: C:\Users\user\Desktop\z58Swiftcopy_MT.bat.exeCode function: 3_2_00446D8B3_2_00446D8B
                  Source: C:\Users\user\Desktop\z58Swiftcopy_MT.bat.exeCode function: 4_2_004050384_2_00405038
                  Source: C:\Users\user\Desktop\z58Swiftcopy_MT.bat.exeCode function: 4_2_0041208C4_2_0041208C
                  Source: C:\Users\user\Desktop\z58Swiftcopy_MT.bat.exeCode function: 4_2_004050A94_2_004050A9
                  Source: C:\Users\user\Desktop\z58Swiftcopy_MT.bat.exeCode function: 4_2_0040511A4_2_0040511A
                  Source: C:\Users\user\Desktop\z58Swiftcopy_MT.bat.exeCode function: 4_2_0043C13A4_2_0043C13A
                  Source: C:\Users\user\Desktop\z58Swiftcopy_MT.bat.exeCode function: 4_2_004051AB4_2_004051AB
                  Source: C:\Users\user\Desktop\z58Swiftcopy_MT.bat.exeCode function: 4_2_004493004_2_00449300
                  Source: C:\Users\user\Desktop\z58Swiftcopy_MT.bat.exeCode function: 4_2_0040D3224_2_0040D322
                  Source: C:\Users\user\Desktop\z58Swiftcopy_MT.bat.exeCode function: 4_2_0044A4F04_2_0044A4F0
                  Source: C:\Users\user\Desktop\z58Swiftcopy_MT.bat.exeCode function: 4_2_0043A5AB4_2_0043A5AB
                  Source: C:\Users\user\Desktop\z58Swiftcopy_MT.bat.exeCode function: 4_2_004136314_2_00413631
                  Source: C:\Users\user\Desktop\z58Swiftcopy_MT.bat.exeCode function: 4_2_004466904_2_00446690
                  Source: C:\Users\user\Desktop\z58Swiftcopy_MT.bat.exeCode function: 4_2_0044A7304_2_0044A730
                  Source: C:\Users\user\Desktop\z58Swiftcopy_MT.bat.exeCode function: 4_2_004398D84_2_004398D8
                  Source: C:\Users\user\Desktop\z58Swiftcopy_MT.bat.exeCode function: 4_2_004498E04_2_004498E0
                  Source: C:\Users\user\Desktop\z58Swiftcopy_MT.bat.exeCode function: 4_2_0044A8864_2_0044A886
                  Source: C:\Users\user\Desktop\z58Swiftcopy_MT.bat.exeCode function: 4_2_0043DA094_2_0043DA09
                  Source: C:\Users\user\Desktop\z58Swiftcopy_MT.bat.exeCode function: 4_2_00438D5E4_2_00438D5E
                  Source: C:\Users\user\Desktop\z58Swiftcopy_MT.bat.exeCode function: 4_2_00449ED04_2_00449ED0
                  Source: C:\Users\user\Desktop\z58Swiftcopy_MT.bat.exeCode function: 4_2_0041FE834_2_0041FE83
                  Source: C:\Users\user\Desktop\z58Swiftcopy_MT.bat.exeCode function: 4_2_00430F544_2_00430F54
                  Source: C:\Users\user\Desktop\z58Swiftcopy_MT.bat.exeCode function: 5_2_004050C25_2_004050C2
                  Source: C:\Users\user\Desktop\z58Swiftcopy_MT.bat.exeCode function: 5_2_004014AB5_2_004014AB
                  Source: C:\Users\user\Desktop\z58Swiftcopy_MT.bat.exeCode function: 5_2_004051335_2_00405133
                  Source: C:\Users\user\Desktop\z58Swiftcopy_MT.bat.exeCode function: 5_2_004051A45_2_004051A4
                  Source: C:\Users\user\Desktop\z58Swiftcopy_MT.bat.exeCode function: 5_2_004012465_2_00401246
                  Source: C:\Users\user\Desktop\z58Swiftcopy_MT.bat.exeCode function: 5_2_0040CA465_2_0040CA46
                  Source: C:\Users\user\Desktop\z58Swiftcopy_MT.bat.exeCode function: 5_2_004052355_2_00405235
                  Source: C:\Users\user\Desktop\z58Swiftcopy_MT.bat.exeCode function: 5_2_004032C85_2_004032C8
                  Source: C:\Users\user\Desktop\z58Swiftcopy_MT.bat.exeCode function: 5_2_004222D95_2_004222D9
                  Source: C:\Users\user\Desktop\z58Swiftcopy_MT.bat.exeCode function: 5_2_004016895_2_00401689
                  Source: C:\Users\user\Desktop\z58Swiftcopy_MT.bat.exeCode function: 5_2_00402F605_2_00402F60
                  Source: C:\Users\user\Desktop\z58Swiftcopy_MT.bat.exeCode function: String function: 004169A7 appears 87 times
                  Source: C:\Users\user\Desktop\z58Swiftcopy_MT.bat.exeCode function: String function: 0044DB70 appears 41 times
                  Source: C:\Users\user\Desktop\z58Swiftcopy_MT.bat.exeCode function: String function: 004165FF appears 35 times
                  Source: C:\Users\user\Desktop\z58Swiftcopy_MT.bat.exeCode function: String function: 00422297 appears 42 times
                  Source: C:\Users\user\Desktop\z58Swiftcopy_MT.bat.exeCode function: String function: 00444B5A appears 37 times
                  Source: C:\Users\user\Desktop\z58Swiftcopy_MT.bat.exeCode function: String function: 00413025 appears 79 times
                  Source: C:\Users\user\Desktop\z58Swiftcopy_MT.bat.exeCode function: String function: 00416760 appears 69 times
                  Source: z58Swiftcopy_MT.bat.exe, 00000002.00000003.28485763517.0000000002AEF000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenamemspass.exe8 vs z58Swiftcopy_MT.bat.exe
                  Source: z58Swiftcopy_MT.bat.exe, 00000002.00000003.28486179209.0000000002AF8000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenamemspass.exe8 vs z58Swiftcopy_MT.bat.exe
                  Source: z58Swiftcopy_MT.bat.exe, 00000002.00000003.28486047899.0000000002AEF000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenamemspass.exe8 vs z58Swiftcopy_MT.bat.exe
                  Source: z58Swiftcopy_MT.bat.exe, 00000002.00000003.28453587511.0000000002AE0000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenamemspass.exe8 vs z58Swiftcopy_MT.bat.exe
                  Source: z58Swiftcopy_MT.bat.exe, 00000002.00000002.32067121242.0000000033A5B000.00000040.10000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenamemspass.exe8 vs z58Swiftcopy_MT.bat.exe
                  Source: z58Swiftcopy_MT.bat.exeBinary or memory string: OriginalFileName vs z58Swiftcopy_MT.bat.exe
                  Source: z58Swiftcopy_MT.bat.exeBinary or memory string: OriginalFilename vs z58Swiftcopy_MT.bat.exe
                  Source: z58Swiftcopy_MT.bat.exe, 00000005.00000002.28456405187.000000000041B000.00000040.80000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenamemspass.exe8 vs z58Swiftcopy_MT.bat.exe
                  Source: z58Swiftcopy_MT.bat.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
                  Source: classification engineClassification label: mal100.phis.troj.spyw.evad.winEXE@9/12@3/3
                  Source: C:\Users\user\Desktop\z58Swiftcopy_MT.bat.exeCode function: 3_2_004182CE GetLastError,FormatMessageW,FormatMessageA,LocalFree,free,3_2_004182CE
                  Source: C:\Users\user\Desktop\z58Swiftcopy_MT.bat.exeCode function: 0_2_0040330D EntryPoint,SetErrorMode,GetVersion,lstrlenA,#17,OleInitialize,SHGetFileInfoA,GetCommandLineA,GetModuleHandleA,CharNextA,GetTempPathA,GetTempPathA,GetWindowsDirectoryA,lstrcatA,GetTempPathA,lstrcatA,SetEnvironmentVariableA,SetEnvironmentVariableA,SetEnvironmentVariableA,DeleteFileA,OleUninitialize,ExitProcess,lstrcatA,lstrcatA,lstrcatA,lstrcmpiA,SetCurrentDirectoryA,DeleteFileA,CopyFileA,CloseHandle,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,0_2_0040330D
                  Source: C:\Users\user\Desktop\z58Swiftcopy_MT.bat.exeCode function: 5_2_00410DE1 GetCurrentProcess,GetLastError,GetProcAddress,GetProcAddress,LookupPrivilegeValueA,GetProcAddress,AdjustTokenPrivileges,CloseHandle,5_2_00410DE1
                  Source: C:\Users\user\Desktop\z58Swiftcopy_MT.bat.exeCode function: 0_2_004045CA GetDlgItem,SetWindowTextA,SHBrowseForFolderA,CoTaskMemFree,lstrcmpiA,lstrcatA,SetDlgItemTextA,GetDiskFreeSpaceA,MulDiv,SetDlgItemTextA,0_2_004045CA
                  Source: C:\Users\user\Desktop\z58Swiftcopy_MT.bat.exeCode function: 3_2_00413D4C CreateToolhelp32Snapshot,memset,Process32FirstW,OpenProcess,memset,GetModuleHandleW,GetProcAddress,CloseHandle,free,Process32NextW,CloseHandle,3_2_00413D4C
                  Source: C:\Users\user\Desktop\z58Swiftcopy_MT.bat.exeCode function: 0_2_004020CB CoCreateInstance,MultiByteToWideChar,0_2_004020CB
                  Source: C:\Users\user\Desktop\z58Swiftcopy_MT.bat.exeCode function: 3_2_0040B58D GetModuleHandleW,FindResourceW,LoadResource,SizeofResource,LockResource,memcpy,3_2_0040B58D
                  Source: C:\Users\user\Desktop\z58Swiftcopy_MT.bat.exeFile created: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\stvbrernesJump to behavior
                  Source: C:\Users\user\Desktop\z58Swiftcopy_MT.bat.exeMutant created: \Sessions\1\BaseNamedObjects\wealthymannow-3N54OZ
                  Source: C:\Users\user\Desktop\z58Swiftcopy_MT.bat.exeFile created: C:\Users\user\AppData\Local\Temp\nsm9316.tmpJump to behavior
                  Source: z58Swiftcopy_MT.bat.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                  Source: C:\Users\user\Desktop\z58Swiftcopy_MT.bat.exeSystem information queried: HandleInformationJump to behavior
                  Source: C:\Users\user\Desktop\z58Swiftcopy_MT.bat.exeFile read: C:\Users\desktop.iniJump to behavior
                  Source: C:\Users\user\Desktop\z58Swiftcopy_MT.bat.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                  Source: z58Swiftcopy_MT.bat.exe, z58Swiftcopy_MT.bat.exe, 00000003.00000002.28481532531.0000000000400000.00000040.80000000.00040000.00000000.sdmpBinary or memory string: SELECT 'INSERT INTO vacuum_db.' || quote(name) || ' SELECT * FROM main.' || quote(name) || ';' FROM vacuum_db.sqlite_master WHERE name=='sqlite_sequence';
                  Source: z58Swiftcopy_MT.bat.exe, z58Swiftcopy_MT.bat.exe, 00000004.00000002.28454828693.0000000000400000.00000040.80000000.00040000.00000000.sdmpBinary or memory string: INSERT INTO %Q.%s VALUES('index',%Q,%Q,#%d,%Q);
                  Source: z58Swiftcopy_MT.bat.exe, 00000002.00000002.32066847956.0000000033950000.00000040.10000000.00040000.00000000.sdmp, z58Swiftcopy_MT.bat.exe, 00000003.00000002.28481532531.0000000000400000.00000040.80000000.00040000.00000000.sdmpBinary or memory string: UPDATE %Q.%s SET sql = CASE WHEN type = 'trigger' THEN sqlite_rename_trigger(sql, %Q)ELSE sqlite_rename_table(sql, %Q) END, tbl_name = %Q, name = CASE WHEN type='table' THEN %Q WHEN name LIKE 'sqlite_autoindex%%' AND type='index' THEN 'sqlite_autoindex_' || %Q || substr(name,%d+18) ELSE name END WHERE tbl_name=%Q AND (type='table' OR type='index' OR type='trigger');
                  Source: z58Swiftcopy_MT.bat.exe, z58Swiftcopy_MT.bat.exe, 00000003.00000002.28481532531.0000000000400000.00000040.80000000.00040000.00000000.sdmpBinary or memory string: SELECT 'INSERT INTO vacuum_db.' || quote(name) || ' SELECT * FROM main.' || quote(name) || ';'FROM main.sqlite_master WHERE type = 'table' AND name!='sqlite_sequence' AND rootpage>0
                  Source: z58Swiftcopy_MT.bat.exe, 00000003.00000003.28479559586.0000000002A91000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: CREATE TABLE benefit_merchant_domains (benefit_id VARCHAR NOT NULL, merchant_domain VARCHAR NOT NULL)U;
                  Source: z58Swiftcopy_MT.bat.exe, z58Swiftcopy_MT.bat.exe, 00000003.00000002.28481532531.0000000000400000.00000040.80000000.00040000.00000000.sdmpBinary or memory string: UPDATE "%w".%s SET sql = sqlite_rename_parent(sql, %Q, %Q) WHERE %s;
                  Source: z58Swiftcopy_MT.bat.exe, z58Swiftcopy_MT.bat.exe, 00000003.00000002.28481532531.0000000000400000.00000040.80000000.00040000.00000000.sdmpBinary or memory string: UPDATE sqlite_temp_master SET sql = sqlite_rename_trigger(sql, %Q), tbl_name = %Q WHERE %s;
                  Source: z58Swiftcopy_MT.bat.exe, 00000003.00000003.28480507737.0000000002A91000.00000004.00000020.00020000.00000000.sdmp, z58Swiftcopy_MT.bat.exe, 00000003.00000002.28482162830.0000000002A92000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: CREATE TABLE password_notes (id INTEGER PRIMARY KEY AUTOINCREMENT, parent_id INTEGER NOT NULL REFERENCES logins ON UPDATE CASCADE ON DELETE CASCADE DEFERRABLE INITIALLY DEFERRED, key VARCHAR NOT NULL, value BLOB, date_created INTEGER NOT NULL, confidential INTEGER, UNIQUE (parent_id, key));
                  Source: z58Swiftcopy_MT.bat.exe, z58Swiftcopy_MT.bat.exe, 00000003.00000002.28481532531.0000000000400000.00000040.80000000.00040000.00000000.sdmpBinary or memory string: SELECT 'DELETE FROM vacuum_db.' || quote(name) || ';' FROM vacuum_db.sqlite_master WHERE name='sqlite_sequence'
                  Source: z58Swiftcopy_MT.bat.exe, 00000003.00000003.28478473558.0000000002A91000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: CREATE TABLE "autofill_profile_edge_extended" ( guid VARCHAR PRIMARY KEY, date_of_birth_day VARCHAR, date_of_birth_month VARCHAR, date_of_birth_year VARCHAR, source INTEGER NOT NULL DEFAULT 0, source_id VARCHAR)[;
                  Source: z58Swiftcopy_MT.bat.exeReversingLabs: Detection: 21%
                  Source: C:\Users\user\Desktop\z58Swiftcopy_MT.bat.exeFile read: C:\Users\user\Desktop\z58Swiftcopy_MT.bat.exeJump to behavior
                  Source: C:\Users\user\Desktop\z58Swiftcopy_MT.bat.exeEvasive API call chain: __getmainargs,DecisionNodes,exitgraph_4-33208
                  Source: unknownProcess created: C:\Users\user\Desktop\z58Swiftcopy_MT.bat.exe "C:\Users\user\Desktop\z58Swiftcopy_MT.bat.exe"
                  Source: C:\Users\user\Desktop\z58Swiftcopy_MT.bat.exeProcess created: C:\Users\user\Desktop\z58Swiftcopy_MT.bat.exe "C:\Users\user\Desktop\z58Swiftcopy_MT.bat.exe"
                  Source: C:\Users\user\Desktop\z58Swiftcopy_MT.bat.exeProcess created: C:\Users\user\Desktop\z58Swiftcopy_MT.bat.exe C:\Users\user\Desktop\z58Swiftcopy_MT.bat.exe /stext "C:\Users\user\AppData\Local\Temp\hqupnmxiqgofocirvgzrkof"
                  Source: C:\Users\user\Desktop\z58Swiftcopy_MT.bat.exeProcess created: C:\Users\user\Desktop\z58Swiftcopy_MT.bat.exe C:\Users\user\Desktop\z58Swiftcopy_MT.bat.exe /stext "C:\Users\user\AppData\Local\Temp\rsiinfhkeogkqiwvmrmsntajnt"
                  Source: C:\Users\user\Desktop\z58Swiftcopy_MT.bat.exeProcess created: C:\Users\user\Desktop\z58Swiftcopy_MT.bat.exe C:\Users\user\Desktop\z58Swiftcopy_MT.bat.exe /stext "C:\Users\user\AppData\Local\Temp\umntoxsdzwyxawszvchuyguswzwofs"
                  Source: C:\Users\user\Desktop\z58Swiftcopy_MT.bat.exeProcess created: C:\Users\user\Desktop\z58Swiftcopy_MT.bat.exe "C:\Users\user\Desktop\z58Swiftcopy_MT.bat.exe"Jump to behavior
                  Source: C:\Users\user\Desktop\z58Swiftcopy_MT.bat.exeProcess created: C:\Users\user\Desktop\z58Swiftcopy_MT.bat.exe C:\Users\user\Desktop\z58Swiftcopy_MT.bat.exe /stext "C:\Users\user\AppData\Local\Temp\hqupnmxiqgofocirvgzrkof"Jump to behavior
                  Source: C:\Users\user\Desktop\z58Swiftcopy_MT.bat.exeProcess created: C:\Users\user\Desktop\z58Swiftcopy_MT.bat.exe C:\Users\user\Desktop\z58Swiftcopy_MT.bat.exe /stext "C:\Users\user\AppData\Local\Temp\rsiinfhkeogkqiwvmrmsntajnt"Jump to behavior
                  Source: C:\Users\user\Desktop\z58Swiftcopy_MT.bat.exeProcess created: C:\Users\user\Desktop\z58Swiftcopy_MT.bat.exe C:\Users\user\Desktop\z58Swiftcopy_MT.bat.exe /stext "C:\Users\user\AppData\Local\Temp\umntoxsdzwyxawszvchuyguswzwofs"Jump to behavior
                  Source: C:\Users\user\Desktop\z58Swiftcopy_MT.bat.exeSection loaded: edgegdi.dllJump to behavior
                  Source: C:\Users\user\Desktop\z58Swiftcopy_MT.bat.exeSection loaded: uxtheme.dllJump to behavior
                  Source: C:\Users\user\Desktop\z58Swiftcopy_MT.bat.exeSection loaded: userenv.dllJump to behavior
                  Source: C:\Users\user\Desktop\z58Swiftcopy_MT.bat.exeSection loaded: apphelp.dllJump to behavior
                  Source: C:\Users\user\Desktop\z58Swiftcopy_MT.bat.exeSection loaded: propsys.dllJump to behavior
                  Source: C:\Users\user\Desktop\z58Swiftcopy_MT.bat.exeSection loaded: dwmapi.dllJump to behavior
                  Source: C:\Users\user\Desktop\z58Swiftcopy_MT.bat.exeSection loaded: cryptbase.dllJump to behavior
                  Source: C:\Users\user\Desktop\z58Swiftcopy_MT.bat.exeSection loaded: oleacc.dllJump to behavior
                  Source: C:\Users\user\Desktop\z58Swiftcopy_MT.bat.exeSection loaded: version.dllJump to behavior
                  Source: C:\Users\user\Desktop\z58Swiftcopy_MT.bat.exeSection loaded: shfolder.dllJump to behavior
                  Source: C:\Users\user\Desktop\z58Swiftcopy_MT.bat.exeSection loaded: kernel.appcore.dllJump to behavior
                  Source: C:\Users\user\Desktop\z58Swiftcopy_MT.bat.exeSection loaded: windows.storage.dllJump to behavior
                  Source: C:\Users\user\Desktop\z58Swiftcopy_MT.bat.exeSection loaded: wldp.dllJump to behavior
                  Source: C:\Users\user\Desktop\z58Swiftcopy_MT.bat.exeSection loaded: msi.dllJump to behavior
                  Source: C:\Users\user\Desktop\z58Swiftcopy_MT.bat.exeSection loaded: iertutil.dllJump to behavior
                  Source: C:\Users\user\Desktop\z58Swiftcopy_MT.bat.exeSection loaded: sspicli.dllJump to behavior
                  Source: C:\Users\user\Desktop\z58Swiftcopy_MT.bat.exeSection loaded: powrprof.dllJump to behavior
                  Source: C:\Users\user\Desktop\z58Swiftcopy_MT.bat.exeSection loaded: winhttp.dllJump to behavior
                  Source: C:\Users\user\Desktop\z58Swiftcopy_MT.bat.exeSection loaded: wkscli.dllJump to behavior
                  Source: C:\Users\user\Desktop\z58Swiftcopy_MT.bat.exeSection loaded: netutils.dllJump to behavior
                  Source: C:\Users\user\Desktop\z58Swiftcopy_MT.bat.exeSection loaded: edgegdi.dllJump to behavior
                  Source: C:\Users\user\Desktop\z58Swiftcopy_MT.bat.exeSection loaded: umpdc.dllJump to behavior
                  Source: C:\Users\user\Desktop\z58Swiftcopy_MT.bat.exeSection loaded: msi.dllJump to behavior
                  Source: C:\Users\user\Desktop\z58Swiftcopy_MT.bat.exeSection loaded: wininet.dllJump to behavior
                  Source: C:\Users\user\Desktop\z58Swiftcopy_MT.bat.exeSection loaded: windows.storage.dllJump to behavior
                  Source: C:\Users\user\Desktop\z58Swiftcopy_MT.bat.exeSection loaded: wldp.dllJump to behavior
                  Source: C:\Users\user\Desktop\z58Swiftcopy_MT.bat.exeSection loaded: profapi.dllJump to behavior
                  Source: C:\Users\user\Desktop\z58Swiftcopy_MT.bat.exeSection loaded: kernel.appcore.dllJump to behavior
                  Source: C:\Users\user\Desktop\z58Swiftcopy_MT.bat.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                  Source: C:\Users\user\Desktop\z58Swiftcopy_MT.bat.exeSection loaded: mswsock.dllJump to behavior
                  Source: C:\Users\user\Desktop\z58Swiftcopy_MT.bat.exeSection loaded: iphlpapi.dllJump to behavior
                  Source: C:\Users\user\Desktop\z58Swiftcopy_MT.bat.exeSection loaded: winnsi.dllJump to behavior
                  Source: C:\Users\user\Desktop\z58Swiftcopy_MT.bat.exeSection loaded: urlmon.dllJump to behavior
                  Source: C:\Users\user\Desktop\z58Swiftcopy_MT.bat.exeSection loaded: srvcli.dllJump to behavior
                  Source: C:\Users\user\Desktop\z58Swiftcopy_MT.bat.exeSection loaded: dnsapi.dllJump to behavior
                  Source: C:\Users\user\Desktop\z58Swiftcopy_MT.bat.exeSection loaded: rasadhlp.dllJump to behavior
                  Source: C:\Users\user\Desktop\z58Swiftcopy_MT.bat.exeSection loaded: fwpuclnt.dllJump to behavior
                  Source: C:\Users\user\Desktop\z58Swiftcopy_MT.bat.exeSection loaded: schannel.dllJump to behavior
                  Source: C:\Users\user\Desktop\z58Swiftcopy_MT.bat.exeSection loaded: mskeyprotect.dllJump to behavior
                  Source: C:\Users\user\Desktop\z58Swiftcopy_MT.bat.exeSection loaded: ntasn1.dllJump to behavior
                  Source: C:\Users\user\Desktop\z58Swiftcopy_MT.bat.exeSection loaded: msasn1.dllJump to behavior
                  Source: C:\Users\user\Desktop\z58Swiftcopy_MT.bat.exeSection loaded: dpapi.dllJump to behavior
                  Source: C:\Users\user\Desktop\z58Swiftcopy_MT.bat.exeSection loaded: cryptsp.dllJump to behavior
                  Source: C:\Users\user\Desktop\z58Swiftcopy_MT.bat.exeSection loaded: rsaenh.dllJump to behavior
                  Source: C:\Users\user\Desktop\z58Swiftcopy_MT.bat.exeSection loaded: cryptbase.dllJump to behavior
                  Source: C:\Users\user\Desktop\z58Swiftcopy_MT.bat.exeSection loaded: gpapi.dllJump to behavior
                  Source: C:\Users\user\Desktop\z58Swiftcopy_MT.bat.exeSection loaded: ncrypt.dllJump to behavior
                  Source: C:\Users\user\Desktop\z58Swiftcopy_MT.bat.exeSection loaded: ncryptsslp.dllJump to behavior
                  Source: C:\Users\user\Desktop\z58Swiftcopy_MT.bat.exeSection loaded: winmm.dllJump to behavior
                  Source: C:\Users\user\Desktop\z58Swiftcopy_MT.bat.exeSection loaded: version.dllJump to behavior
                  Source: C:\Users\user\Desktop\z58Swiftcopy_MT.bat.exeSection loaded: wininet.dllJump to behavior
                  Source: C:\Users\user\Desktop\z58Swiftcopy_MT.bat.exeSection loaded: edgegdi.dllJump to behavior
                  Source: C:\Users\user\Desktop\z58Swiftcopy_MT.bat.exeSection loaded: windows.storage.dllJump to behavior
                  Source: C:\Users\user\Desktop\z58Swiftcopy_MT.bat.exeSection loaded: wldp.dllJump to behavior
                  Source: C:\Users\user\Desktop\z58Swiftcopy_MT.bat.exeSection loaded: cryptsp.dllJump to behavior
                  Source: C:\Users\user\Desktop\z58Swiftcopy_MT.bat.exeSection loaded: rsaenh.dllJump to behavior
                  Source: C:\Users\user\Desktop\z58Swiftcopy_MT.bat.exeSection loaded: cryptbase.dllJump to behavior
                  Source: C:\Users\user\Desktop\z58Swiftcopy_MT.bat.exeSection loaded: pstorec.dllJump to behavior
                  Source: C:\Users\user\Desktop\z58Swiftcopy_MT.bat.exeSection loaded: vaultcli.dllJump to behavior
                  Source: C:\Users\user\Desktop\z58Swiftcopy_MT.bat.exeSection loaded: wintypes.dllJump to behavior
                  Source: C:\Users\user\Desktop\z58Swiftcopy_MT.bat.exeSection loaded: dpapi.dllJump to behavior
                  Source: C:\Users\user\Desktop\z58Swiftcopy_MT.bat.exeSection loaded: msasn1.dllJump to behavior
                  Source: C:\Users\user\Desktop\z58Swiftcopy_MT.bat.exeSection loaded: edgegdi.dllJump to behavior
                  Source: C:\Users\user\Desktop\z58Swiftcopy_MT.bat.exeSection loaded: windows.storage.dllJump to behavior
                  Source: C:\Users\user\Desktop\z58Swiftcopy_MT.bat.exeSection loaded: wldp.dllJump to behavior
                  Source: C:\Users\user\Desktop\z58Swiftcopy_MT.bat.exeSection loaded: pstorec.dllJump to behavior
                  Source: C:\Users\user\Desktop\z58Swiftcopy_MT.bat.exeSection loaded: sspicli.dllJump to behavior
                  Source: C:\Users\user\Desktop\z58Swiftcopy_MT.bat.exeSection loaded: msasn1.dllJump to behavior
                  Source: C:\Users\user\Desktop\z58Swiftcopy_MT.bat.exeSection loaded: msasn1.dllJump to behavior
                  Source: C:\Users\user\Desktop\z58Swiftcopy_MT.bat.exeSection loaded: edgegdi.dllJump to behavior
                  Source: C:\Users\user\Desktop\z58Swiftcopy_MT.bat.exeSection loaded: windows.storage.dllJump to behavior
                  Source: C:\Users\user\Desktop\z58Swiftcopy_MT.bat.exeSection loaded: wldp.dllJump to behavior
                  Source: C:\Users\user\Desktop\z58Swiftcopy_MT.bat.exeSection loaded: msasn1.dllJump to behavior
                  Source: C:\Users\user\Desktop\z58Swiftcopy_MT.bat.exeSection loaded: sspicli.dllJump to behavior
                  Source: C:\Users\user\Desktop\z58Swiftcopy_MT.bat.exeSection loaded: cryptsp.dllJump to behavior
                  Source: C:\Users\user\Desktop\z58Swiftcopy_MT.bat.exeSection loaded: rsaenh.dllJump to behavior
                  Source: C:\Users\user\Desktop\z58Swiftcopy_MT.bat.exeSection loaded: cryptbase.dllJump to behavior
                  Source: C:\Users\user\Desktop\z58Swiftcopy_MT.bat.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f486a52-3cb1-48fd-8f50-b8dc300d9f9d}\InProcServer32Jump to behavior
                  Source: C:\Users\user\Desktop\z58Swiftcopy_MT.bat.exeFile written: C:\Users\user\AppData\Local\Temp\Setup.iniJump to behavior
                  Source: C:\Users\user\Desktop\z58Swiftcopy_MT.bat.exeFile opened: C:\Users\user\Desktop\z58Swiftcopy_MT.bat.cfgJump to behavior
                  Source: C:\Users\user\Desktop\z58Swiftcopy_MT.bat.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\Outlook\OMI Account Manager\AccountsJump to behavior
                  Source: z58Swiftcopy_MT.bat.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                  Source: Binary string: mshtml.pdb source: z58Swiftcopy_MT.bat.exe, 00000002.00000001.27691456198.0000000000649000.00000020.00000001.01000000.00000007.sdmp
                  Source: Binary string: mshtml.pdbUGP source: z58Swiftcopy_MT.bat.exe, 00000002.00000001.27691456198.0000000000649000.00000020.00000001.01000000.00000007.sdmp

                  Data Obfuscation

                  barindex
                  Source: C:\Users\user\Desktop\z58Swiftcopy_MT.bat.exeUnpacked PE file: 3.2.z58Swiftcopy_MT.bat.exe.400000.0.unpack .text:ER;.rdata:R;.data:W;.ndata:W;.rsrc:R; vs .MPRESS1:ER;.MPRESS2:ER;.rsrc:W;
                  Source: C:\Users\user\Desktop\z58Swiftcopy_MT.bat.exeUnpacked PE file: 4.2.z58Swiftcopy_MT.bat.exe.400000.0.unpack .text:ER;.rdata:R;.data:W;.ndata:W;.rsrc:R; vs .MPRESS1:ER;.MPRESS2:ER;.rsrc:W;
                  Source: C:\Users\user\Desktop\z58Swiftcopy_MT.bat.exeUnpacked PE file: 5.2.z58Swiftcopy_MT.bat.exe.400000.0.unpack .text:ER;.rdata:R;.data:W;.ndata:W;.rsrc:R; vs .MPRESS1:ER;.MPRESS2:ER;.rsrc:W;
                  Source: Yara matchFile source: 00000002.00000002.32053389316.0000000001764000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000000.00000002.27693286929.00000000031B4000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000000.00000002.27693002963.00000000028A5000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000002.00000002.32053389316.0000000001660000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000000.00000002.27693286929.00000000030B0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\stvbrernes\Cementfabrikkerne\Objektsprogs.Jrg119, type: DROPPED
                  Source: Yara matchFile source: C:\Users\user\AppData\Local\Temp\nsm9317.tmp, type: DROPPED
                  Source: C:\Users\user\Desktop\z58Swiftcopy_MT.bat.exeCode function: 0_2_10001A5D GlobalAlloc,lstrcpyA,lstrcpyA,GlobalFree,GlobalFree,GlobalFree,GlobalFree,GlobalFree,GlobalFree,lstrcpyA,GetModuleHandleA,LoadLibraryA,GetProcAddress,lstrlenA,0_2_10001A5D
                  Source: C:\Users\user\Desktop\z58Swiftcopy_MT.bat.exeCode function: 0_2_10002D20 push eax; ret 0_2_10002D4E
                  Source: C:\Users\user\Desktop\z58Swiftcopy_MT.bat.exeCode function: 2_2_33A72806 push ecx; ret 2_2_33A72819
                  Source: C:\Users\user\Desktop\z58Swiftcopy_MT.bat.exeCode function: 2_2_0176527A push ds; retf 2_2_0176527E
                  Source: C:\Users\user\Desktop\z58Swiftcopy_MT.bat.exeCode function: 2_2_0176827A push ds; retf 2_2_0176827E
                  Source: C:\Users\user\Desktop\z58Swiftcopy_MT.bat.exeCode function: 3_2_0044693D push ecx; ret 3_2_0044694D
                  Source: C:\Users\user\Desktop\z58Swiftcopy_MT.bat.exeCode function: 3_2_0044DB70 push eax; ret 3_2_0044DB84
                  Source: C:\Users\user\Desktop\z58Swiftcopy_MT.bat.exeCode function: 3_2_0044DB70 push eax; ret 3_2_0044DBAC
                  Source: C:\Users\user\Desktop\z58Swiftcopy_MT.bat.exeCode function: 3_2_00451D54 push eax; ret 3_2_00451D61
                  Source: C:\Users\user\Desktop\z58Swiftcopy_MT.bat.exeCode function: 4_2_0044B090 push eax; ret 4_2_0044B0A4
                  Source: C:\Users\user\Desktop\z58Swiftcopy_MT.bat.exeCode function: 4_2_0044B090 push eax; ret 4_2_0044B0CC
                  Source: C:\Users\user\Desktop\z58Swiftcopy_MT.bat.exeCode function: 4_2_00451D34 push eax; ret 4_2_00451D41
                  Source: C:\Users\user\Desktop\z58Swiftcopy_MT.bat.exeCode function: 4_2_00444E71 push ecx; ret 4_2_00444E81
                  Source: C:\Users\user\Desktop\z58Swiftcopy_MT.bat.exeCode function: 5_2_00414060 push eax; ret 5_2_00414074
                  Source: C:\Users\user\Desktop\z58Swiftcopy_MT.bat.exeCode function: 5_2_00414060 push eax; ret 5_2_0041409C
                  Source: C:\Users\user\Desktop\z58Swiftcopy_MT.bat.exeCode function: 5_2_00414039 push ecx; ret 5_2_00414049
                  Source: C:\Users\user\Desktop\z58Swiftcopy_MT.bat.exeCode function: 5_2_004164EB push 0000006Ah; retf 5_2_004165C4
                  Source: C:\Users\user\Desktop\z58Swiftcopy_MT.bat.exeCode function: 5_2_00416553 push 0000006Ah; retf 5_2_004165C4
                  Source: C:\Users\user\Desktop\z58Swiftcopy_MT.bat.exeCode function: 5_2_00416555 push 0000006Ah; retf 5_2_004165C4
                  Source: C:\Users\user\Desktop\z58Swiftcopy_MT.bat.exeFile created: C:\Users\user\AppData\Local\Temp\nsb9327.tmp\System.dllJump to dropped file
                  Source: C:\Users\user\Desktop\z58Swiftcopy_MT.bat.exeCode function: 4_2_004047CB LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,4_2_004047CB
                  Source: C:\Users\user\Desktop\z58Swiftcopy_MT.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\z58Swiftcopy_MT.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\z58Swiftcopy_MT.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\z58Swiftcopy_MT.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\z58Swiftcopy_MT.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\z58Swiftcopy_MT.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\z58Swiftcopy_MT.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\z58Swiftcopy_MT.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\z58Swiftcopy_MT.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\z58Swiftcopy_MT.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\z58Swiftcopy_MT.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\z58Swiftcopy_MT.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

                  Malware Analysis System Evasion

                  barindex
                  Source: C:\Users\user\Desktop\z58Swiftcopy_MT.bat.exeAPI/Special instruction interceptor: Address: 340E6D4
                  Source: C:\Users\user\Desktop\z58Swiftcopy_MT.bat.exeAPI/Special instruction interceptor: Address: 19BE6D4
                  Source: C:\Users\user\Desktop\z58Swiftcopy_MT.bat.exeFile opened: C:\Program Files\Qemu-ga\qemu-ga.exeJump to behavior
                  Source: C:\Users\user\Desktop\z58Swiftcopy_MT.bat.exeFile opened: C:\Program Files\qga\qga.exeJump to behavior
                  Source: C:\Users\user\Desktop\z58Swiftcopy_MT.bat.exeFile opened: C:\Program Files\Qemu-ga\qemu-ga.exeJump to behavior
                  Source: C:\Users\user\Desktop\z58Swiftcopy_MT.bat.exeFile opened: C:\Program Files\qga\qga.exeJump to behavior
                  Source: z58Swiftcopy_MT.bat.exe, 00000000.00000002.27692448822.00000000006D0000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OMC:\PROGRAM FILES\QEMU-GA\QEMU-GA.EXE1]?
                  Source: z58Swiftcopy_MT.bat.exe, 00000000.00000002.27692878076.0000000002430000.00000004.00001000.00020000.00000000.sdmp, z58Swiftcopy_MT.bat.exe, 00000002.00000002.32057198140.0000000002BE0000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: PC:\PROGRAM FILES\QEMU-GA\QEMU-GA.EXE
                  Source: z58Swiftcopy_MT.bat.exe, 00000000.00000002.27692448822.00000000006D8000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: C:\PROGRAM FILES\QEMU-GA\QEMU-GA.EXESK
                  Source: C:\Users\user\Desktop\z58Swiftcopy_MT.bat.exeCode function: 3_2_0040DD85 memset,CreateFileW,NtQuerySystemInformation,NtQuerySystemInformation,CloseHandle,GetCurrentProcessId,_wcsicmp,_wcsicmp,_wcsicmp,OpenProcess,GetCurrentProcess,DuplicateHandle,memset,NtQueryObject,CloseHandle,_wcsicmp,CloseHandle,3_2_0040DD85
                  Source: C:\Users\user\Desktop\z58Swiftcopy_MT.bat.exeWindow / User API: threadDelayed 3609Jump to behavior
                  Source: C:\Users\user\Desktop\z58Swiftcopy_MT.bat.exeWindow / User API: threadDelayed 5385Jump to behavior
                  Source: C:\Users\user\Desktop\z58Swiftcopy_MT.bat.exeWindow / User API: foregroundWindowGot 1764Jump to behavior
                  Source: C:\Users\user\Desktop\z58Swiftcopy_MT.bat.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\nsb9327.tmp\System.dllJump to dropped file
                  Source: C:\Users\user\Desktop\z58Swiftcopy_MT.bat.exeAPI coverage: 9.2 %
                  Source: C:\Users\user\Desktop\z58Swiftcopy_MT.bat.exe TID: 7704Thread sleep count: 3609 > 30Jump to behavior
                  Source: C:\Users\user\Desktop\z58Swiftcopy_MT.bat.exe TID: 484Thread sleep count: 82 > 30Jump to behavior
                  Source: C:\Users\user\Desktop\z58Swiftcopy_MT.bat.exe TID: 484Thread sleep time: -41000s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\z58Swiftcopy_MT.bat.exe TID: 1212Thread sleep count: 5385 > 30Jump to behavior
                  Source: C:\Users\user\Desktop\z58Swiftcopy_MT.bat.exe TID: 1212Thread sleep time: -16155000s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\z58Swiftcopy_MT.bat.exeThread sleep count: Count: 3609 delay: -5Jump to behavior
                  Source: C:\Users\user\Desktop\z58Swiftcopy_MT.bat.exeCode function: 0_2_00405861 CloseHandle,GetTempPathA,DeleteFileA,lstrcatA,lstrcatA,lstrlenA,FindFirstFileA,FindNextFileA,FindClose,0_2_00405861
                  Source: C:\Users\user\Desktop\z58Swiftcopy_MT.bat.exeCode function: 0_2_0040639C FindFirstFileA,FindClose,0_2_0040639C
                  Source: C:\Users\user\Desktop\z58Swiftcopy_MT.bat.exeCode function: 0_2_004026F8 FindFirstFileA,0_2_004026F8
                  Source: C:\Users\user\Desktop\z58Swiftcopy_MT.bat.exeCode function: 2_2_33A710F1 lstrlenW,lstrlenW,lstrcatW,lstrlenW,lstrlenW,lstrlenW,FindFirstFileW,FindNextFileW,FindClose,2_2_33A710F1
                  Source: C:\Users\user\Desktop\z58Swiftcopy_MT.bat.exeCode function: 2_2_33A76580 FindFirstFileExA,2_2_33A76580
                  Source: C:\Users\user\Desktop\z58Swiftcopy_MT.bat.exeCode function: 3_2_0040AE51 FindFirstFileW,FindNextFileW,3_2_0040AE51
                  Source: C:\Users\user\Desktop\z58Swiftcopy_MT.bat.exeCode function: 4_2_00407EF8 FindFirstFileA,FindNextFileA,strlen,strlen,4_2_00407EF8
                  Source: C:\Users\user\Desktop\z58Swiftcopy_MT.bat.exeCode function: 5_2_00407898 FindFirstFileA,FindNextFileA,strlen,strlen,5_2_00407898
                  Source: C:\Users\user\Desktop\z58Swiftcopy_MT.bat.exeCode function: 3_2_00418981 memset,GetSystemInfo,3_2_00418981
                  Source: z58Swiftcopy_MT.bat.exe, 00000000.00000002.27696800598.0000000010059000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Hyper-V Guest Shutdown Service
                  Source: z58Swiftcopy_MT.bat.exe, 00000000.00000002.27692448822.00000000006D0000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OmC:\Program Files\Qemu-ga\qemu-ga.exe1]?
                  Source: z58Swiftcopy_MT.bat.exe, 00000000.00000002.27696800598.0000000010059000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Hyper-V Remote Desktop Virtualization Service
                  Source: z58Swiftcopy_MT.bat.exe, 00000000.00000002.27696800598.0000000010059000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: vmicshutdown
                  Source: z58Swiftcopy_MT.bat.exe, 00000000.00000002.27696800598.0000000010059000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Hyper-V Volume Shadow Copy Requestor
                  Source: z58Swiftcopy_MT.bat.exe, 00000002.00000003.29410654098.0000000002A88000.00000004.00000020.00020000.00000000.sdmp, z58Swiftcopy_MT.bat.exe, 00000002.00000002.32056784519.0000000002A88000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW/
                  Source: z58Swiftcopy_MT.bat.exe, 00000000.00000002.27696800598.0000000010059000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Hyper-V PowerShell Direct Service
                  Source: z58Swiftcopy_MT.bat.exe, 00000000.00000002.27696800598.0000000010059000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Hyper-V Time Synchronization Service
                  Source: z58Swiftcopy_MT.bat.exe, 00000000.00000002.27696800598.0000000010059000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: vmicvss
                  Source: z58Swiftcopy_MT.bat.exe, 00000002.00000003.29410654098.0000000002A88000.00000004.00000020.00020000.00000000.sdmp, z58Swiftcopy_MT.bat.exe, 00000002.00000002.32056632494.0000000002A4B000.00000004.00000020.00020000.00000000.sdmp, z58Swiftcopy_MT.bat.exe, 00000002.00000002.32056784519.0000000002A88000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
                  Source: z58Swiftcopy_MT.bat.exe, 00000000.00000002.27696800598.0000000010059000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Hyper-V Data Exchange Service
                  Source: z58Swiftcopy_MT.bat.exe, 00000000.00000002.27692878076.0000000002430000.00000004.00001000.00020000.00000000.sdmp, z58Swiftcopy_MT.bat.exe, 00000002.00000002.32057198140.0000000002BE0000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: PC:\Program Files\Qemu-ga\qemu-ga.exe
                  Source: z58Swiftcopy_MT.bat.exe, 00000000.00000002.27696800598.0000000010059000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Hyper-V Heartbeat Service
                  Source: z58Swiftcopy_MT.bat.exe, 00000000.00000002.27692448822.00000000006D8000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: C:\Program Files\Qemu-ga\qemu-ga.exesk
                  Source: z58Swiftcopy_MT.bat.exe, 00000000.00000002.27696800598.0000000010059000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Hyper-V Guest Service Interface
                  Source: z58Swiftcopy_MT.bat.exe, 00000000.00000002.27696800598.0000000010059000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: vmicheartbeat
                  Source: C:\Users\user\Desktop\z58Swiftcopy_MT.bat.exeAPI call chain: ExitProcess graph end nodegraph_0-4128
                  Source: C:\Users\user\Desktop\z58Swiftcopy_MT.bat.exeAPI call chain: ExitProcess graph end nodegraph_0-4306
                  Source: C:\Users\user\Desktop\z58Swiftcopy_MT.bat.exeAPI call chain: ExitProcess graph end nodegraph_4-34116
                  Source: C:\Users\user\Desktop\z58Swiftcopy_MT.bat.exeProcess information queried: ProcessInformationJump to behavior
                  Source: C:\Users\user\Desktop\z58Swiftcopy_MT.bat.exeCode function: 2_2_33A72639 IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,2_2_33A72639
                  Source: C:\Users\user\Desktop\z58Swiftcopy_MT.bat.exeCode function: 3_2_0040DD85 memset,CreateFileW,NtQuerySystemInformation,NtQuerySystemInformation,CloseHandle,GetCurrentProcessId,_wcsicmp,_wcsicmp,_wcsicmp,OpenProcess,GetCurrentProcess,DuplicateHandle,memset,NtQueryObject,CloseHandle,_wcsicmp,CloseHandle,3_2_0040DD85
                  Source: C:\Users\user\Desktop\z58Swiftcopy_MT.bat.exeCode function: 0_2_10001A5D GlobalAlloc,lstrcpyA,lstrcpyA,GlobalFree,GlobalFree,GlobalFree,GlobalFree,GlobalFree,GlobalFree,lstrcpyA,GetModuleHandleA,LoadLibraryA,GetProcAddress,lstrlenA,0_2_10001A5D
                  Source: C:\Users\user\Desktop\z58Swiftcopy_MT.bat.exeCode function: 2_2_33A74AB4 mov eax, dword ptr fs:[00000030h]2_2_33A74AB4
                  Source: C:\Users\user\Desktop\z58Swiftcopy_MT.bat.exeCode function: 2_2_33A7724E GetProcessHeap,2_2_33A7724E
                  Source: C:\Users\user\Desktop\z58Swiftcopy_MT.bat.exeProcess token adjusted: DebugJump to behavior
                  Source: C:\Users\user\Desktop\z58Swiftcopy_MT.bat.exeCode function: 2_2_33A72B1C SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,2_2_33A72B1C
                  Source: C:\Users\user\Desktop\z58Swiftcopy_MT.bat.exeCode function: 2_2_33A72639 IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,2_2_33A72639
                  Source: C:\Users\user\Desktop\z58Swiftcopy_MT.bat.exeCode function: 2_2_33A760E2 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,2_2_33A760E2

                  HIPS / PFW / Operating System Protection Evasion

                  barindex
                  Source: C:\Users\user\Desktop\z58Swiftcopy_MT.bat.exeSection loaded: NULL target: C:\Users\user\Desktop\z58Swiftcopy_MT.bat.exe protection: execute and read and writeJump to behavior
                  Source: C:\Users\user\Desktop\z58Swiftcopy_MT.bat.exeSection loaded: NULL target: C:\Users\user\Desktop\z58Swiftcopy_MT.bat.exe protection: execute and read and writeJump to behavior
                  Source: C:\Users\user\Desktop\z58Swiftcopy_MT.bat.exeSection loaded: NULL target: C:\Users\user\Desktop\z58Swiftcopy_MT.bat.exe protection: execute and read and writeJump to behavior
                  Source: C:\Users\user\Desktop\z58Swiftcopy_MT.bat.exeProcess created: C:\Users\user\Desktop\z58Swiftcopy_MT.bat.exe "C:\Users\user\Desktop\z58Swiftcopy_MT.bat.exe"Jump to behavior
                  Source: C:\Users\user\Desktop\z58Swiftcopy_MT.bat.exeProcess created: C:\Users\user\Desktop\z58Swiftcopy_MT.bat.exe C:\Users\user\Desktop\z58Swiftcopy_MT.bat.exe /stext "C:\Users\user\AppData\Local\Temp\hqupnmxiqgofocirvgzrkof"Jump to behavior
                  Source: C:\Users\user\Desktop\z58Swiftcopy_MT.bat.exeProcess created: C:\Users\user\Desktop\z58Swiftcopy_MT.bat.exe C:\Users\user\Desktop\z58Swiftcopy_MT.bat.exe /stext "C:\Users\user\AppData\Local\Temp\rsiinfhkeogkqiwvmrmsntajnt"Jump to behavior
                  Source: C:\Users\user\Desktop\z58Swiftcopy_MT.bat.exeProcess created: C:\Users\user\Desktop\z58Swiftcopy_MT.bat.exe C:\Users\user\Desktop\z58Swiftcopy_MT.bat.exe /stext "C:\Users\user\AppData\Local\Temp\umntoxsdzwyxawszvchuyguswzwofs"Jump to behavior
                  Source: z58Swiftcopy_MT.bat.exe, 00000002.00000002.32056932719.0000000002A9D000.00000004.00000020.00020000.00000000.sdmp, z58Swiftcopy_MT.bat.exe, 00000002.00000003.29410588585.0000000002A9C000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program ManagerGl
                  Source: z58Swiftcopy_MT.bat.exe, 00000002.00000002.32056932719.0000000002A9D000.00000004.00000020.00020000.00000000.sdmp, z58Swiftcopy_MT.bat.exe, 00000002.00000003.29410588585.0000000002A9C000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program ManagergzrkofD
                  Source: z58Swiftcopy_MT.bat.exe, 00000002.00000003.28436040290.0000000002A9A000.00000004.00000020.00020000.00000000.sdmp, z58Swiftcopy_MT.bat.exe, 00000002.00000002.32056932719.0000000002A9D000.00000004.00000020.00020000.00000000.sdmp, z58Swiftcopy_MT.bat.exe, 00000002.00000003.29410654098.0000000002A88000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Manager
                  Source: z58Swiftcopy_MT.bat.exe, 00000002.00000002.32056784519.0000000002A88000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Managerd
                  Source: z58Swiftcopy_MT.bat.exe, 00000002.00000002.32056932719.0000000002A9D000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Manager.
                  Source: z58Swiftcopy_MT.bat.exe, 00000002.00000002.32056784519.0000000002A88000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Managern
                  Source: z58Swiftcopy_MT.bat.exe, 00000002.00000002.32056784519.0000000002A88000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Managerk
                  Source: z58Swiftcopy_MT.bat.exe, 00000002.00000002.32056932719.0000000002A9D000.00000004.00000020.00020000.00000000.sdmp, z58Swiftcopy_MT.bat.exe, 00000002.00000003.29410588585.0000000002A9C000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Managerr|
                  Source: z58Swiftcopy_MT.bat.exe, 00000002.00000002.32056932719.0000000002A9D000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Manager*
                  Source: z58Swiftcopy_MT.bat.exe, 00000002.00000002.32056932719.0000000002A9D000.00000004.00000020.00020000.00000000.sdmp, z58Swiftcopy_MT.bat.exe, 00000002.00000003.29410588585.0000000002A9C000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program ManagerV
                  Source: z58Swiftcopy_MT.bat.exe, 00000002.00000002.32056932719.0000000002A9D000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program ManagerFz
                  Source: z58Swiftcopy_MT.bat.exe, 00000002.00000002.32056932719.0000000002A9D000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Manager$4<
                  Source: z58Swiftcopy_MT.bat.exe, 00000002.00000003.28436040290.0000000002A9A000.00000004.00000020.00020000.00000000.sdmp, z58Swiftcopy_MT.bat.exe, 00000002.00000002.32056784519.0000000002A88000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Manager
                  Source: z58Swiftcopy_MT.bat.exe, 00000002.00000003.29410654098.0000000002A88000.00000004.00000020.00020000.00000000.sdmp, z58Swiftcopy_MT.bat.exe, 00000002.00000002.32056784519.0000000002A88000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program ManagerY
                  Source: z58Swiftcopy_MT.bat.exe, 00000002.00000002.32056632494.0000000002A18000.00000004.00000020.00020000.00000000.sdmp, logs.dat.2.drBinary or memory string: [Program Manager]
                  Source: z58Swiftcopy_MT.bat.exe, 00000002.00000003.29410588585.0000000002A9C000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Managerles\*/
                  Source: z58Swiftcopy_MT.bat.exe, 00000002.00000002.32056932719.0000000002A9D000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program ManagerG
                  Source: z58Swiftcopy_MT.bat.exe, 00000002.00000003.28436040290.0000000002A9A000.00000004.00000020.00020000.00000000.sdmp, z58Swiftcopy_MT.bat.exe, 00000002.00000002.32056932719.0000000002A9D000.00000004.00000020.00020000.00000000.sdmp, z58Swiftcopy_MT.bat.exe, 00000002.00000003.29410588585.0000000002A9C000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program ManagerC
                  Source: z58Swiftcopy_MT.bat.exe, 00000002.00000002.32056932719.0000000002A9D000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program ManagerKJ
                  Source: z58Swiftcopy_MT.bat.exe, 00000002.00000002.32056932719.0000000002A9D000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Managerinutes }
                  Source: z58Swiftcopy_MT.bat.exe, 00000002.00000003.28436040290.0000000002A9A000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Managerx
                  Source: z58Swiftcopy_MT.bat.exe, 00000002.00000003.29410654098.0000000002A88000.00000004.00000020.00020000.00000000.sdmp, z58Swiftcopy_MT.bat.exe, 00000002.00000002.32056784519.0000000002A88000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Manageru
                  Source: z58Swiftcopy_MT.bat.exe, 00000002.00000002.32056932719.0000000002A9D000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Managero^
                  Source: z58Swiftcopy_MT.bat.exe, 00000002.00000003.29410654098.0000000002A88000.00000004.00000020.00020000.00000000.sdmp, z58Swiftcopy_MT.bat.exe, 00000002.00000002.32056784519.0000000002A88000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Manager1
                  Source: z58Swiftcopy_MT.bat.exe, 00000002.00000003.28436040290.0000000002A9A000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Manager2
                  Source: z58Swiftcopy_MT.bat.exe, 00000002.00000002.32056932719.0000000002A9D000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Manager:J
                  Source: z58Swiftcopy_MT.bat.exe, 00000002.00000003.29410654098.0000000002A88000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Managerr
                  Source: z58Swiftcopy_MT.bat.exe, 00000002.00000002.32056932719.0000000002AF1000.00000004.00000020.00020000.00000000.sdmp, z58Swiftcopy_MT.bat.exe, 00000002.00000002.32056932719.0000000002A9D000.00000004.00000020.00020000.00000000.sdmp, z58Swiftcopy_MT.bat.exe, 00000002.00000003.29410588585.0000000002A9C000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: |Program Manager|
                  Source: z58Swiftcopy_MT.bat.exe, 00000002.00000002.32056932719.0000000002A9D000.00000004.00000020.00020000.00000000.sdmp, z58Swiftcopy_MT.bat.exe, 00000002.00000003.29410588585.0000000002A9C000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Manager9
                  Source: z58Swiftcopy_MT.bat.exe, 00000002.00000002.32056932719.0000000002A9D000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Manager89b
                  Source: C:\Users\user\Desktop\z58Swiftcopy_MT.bat.exeCode function: 2_2_33A72933 cpuid 2_2_33A72933
                  Source: C:\Users\user\Desktop\z58Swiftcopy_MT.bat.exeQueries volume information: C:\ VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\z58Swiftcopy_MT.bat.exeCode function: 2_2_33A72264 GetSystemTimeAsFileTime,GetCurrentThreadId,GetCurrentProcessId,QueryPerformanceCounter,2_2_33A72264
                  Source: C:\Users\user\Desktop\z58Swiftcopy_MT.bat.exeCode function: 4_2_004082CD memset,memset,memset,memset,GetComputerNameA,GetUserNameA,MultiByteToWideChar,MultiByteToWideChar,MultiByteToWideChar,strlen,strlen,memcpy,4_2_004082CD
                  Source: C:\Users\user\Desktop\z58Swiftcopy_MT.bat.exeCode function: 0_2_0040330D EntryPoint,SetErrorMode,GetVersion,lstrlenA,#17,OleInitialize,SHGetFileInfoA,GetCommandLineA,GetModuleHandleA,CharNextA,GetTempPathA,GetTempPathA,GetWindowsDirectoryA,lstrcatA,GetTempPathA,lstrcatA,SetEnvironmentVariableA,SetEnvironmentVariableA,SetEnvironmentVariableA,DeleteFileA,OleUninitialize,ExitProcess,lstrcatA,lstrcatA,lstrcatA,lstrcmpiA,SetCurrentDirectoryA,DeleteFileA,CopyFileA,CloseHandle,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,0_2_0040330D
                  Source: C:\Users\user\Desktop\z58Swiftcopy_MT.bat.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

                  Stealing of Sensitive Information

                  barindex
                  Source: Yara matchFile source: 00000002.00000002.32056932719.0000000002AF1000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000002.00000003.28436005878.0000000002AE4000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000002.00000003.28485763517.0000000002AEF000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000002.00000002.32056784519.0000000002A77000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000002.00000003.28436040290.0000000002A9A000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000002.00000002.32066409158.0000000032B2F000.00000004.00000010.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000002.00000002.32056932719.0000000002A9D000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000002.00000003.29410654098.0000000002A77000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000002.00000003.28486047899.0000000002AEF000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000002.00000003.28453587511.0000000002AE0000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000002.00000003.28390975053.0000000002A98000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000002.00000003.29410560082.0000000002AEF000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000002.00000003.29410588585.0000000002A9C000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: z58Swiftcopy_MT.bat.exe PID: 5524, type: MEMORYSTR
                  Source: Yara matchFile source: C:\ProgramData\remcos\logs.dat, type: DROPPED
                  Source: C:\Users\user\Desktop\z58Swiftcopy_MT.bat.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\ol7uiqa8.default-release\places.sqliteJump to behavior
                  Source: C:\Users\user\Desktop\z58Swiftcopy_MT.bat.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\ol7uiqa8.default-release\key4.dbJump to behavior
                  Source: C:\Users\user\Desktop\z58Swiftcopy_MT.bat.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login DataJump to behavior
                  Source: C:\Users\user\Desktop\z58Swiftcopy_MT.bat.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web DataJump to behavior
                  Source: C:\Users\user\Desktop\z58Swiftcopy_MT.bat.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.iniJump to behavior
                  Source: C:\Users\user\Desktop\z58Swiftcopy_MT.bat.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
                  Source: C:\Users\user\Desktop\z58Swiftcopy_MT.bat.exeKey opened: HKEY_CURRENT_USER\Software\Google\Google Talk\AccountsJump to behavior
                  Source: C:\Users\user\Desktop\z58Swiftcopy_MT.bat.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Dynamic SaltJump to behavior
                  Source: C:\Users\user\Desktop\z58Swiftcopy_MT.bat.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Dynamic SaltJump to behavior
                  Source: C:\Users\user\Desktop\z58Swiftcopy_MT.bat.exeKey opened: HKEY_CURRENT_USER\Software\Google\Google Talk\AccountsJump to behavior
                  Source: C:\Users\user\Desktop\z58Swiftcopy_MT.bat.exeKey opened: HKEY_CURRENT_USER\Software\PaltalkJump to behavior
                  Source: C:\Users\user\Desktop\z58Swiftcopy_MT.bat.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\Outlook\OMI Account Manager\AccountsJump to behavior
                  Source: C:\Users\user\Desktop\z58Swiftcopy_MT.bat.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\ProfilesJump to behavior
                  Source: C:\Users\user\Desktop\z58Swiftcopy_MT.bat.exeKey opened: HKEY_CURRENT_USER\Software\IncrediMail\IdentitiesJump to behavior
                  Source: C:\Users\user\Desktop\z58Swiftcopy_MT.bat.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows Live MailJump to behavior
                  Source: C:\Users\user\Desktop\z58Swiftcopy_MT.bat.exeCode function: ESMTPPassword4_2_004033F0
                  Source: C:\Users\user\Desktop\z58Swiftcopy_MT.bat.exeCode function: _mbscpy,_mbscpy,_mbscpy,_mbscpy,RegCloseKey, PopPassword4_2_00402DB3
                  Source: C:\Users\user\Desktop\z58Swiftcopy_MT.bat.exeCode function: _mbscpy,_mbscpy,_mbscpy,_mbscpy,RegCloseKey, SMTPPassword4_2_00402DB3
                  Source: Yara matchFile source: Process Memory Space: z58Swiftcopy_MT.bat.exe PID: 5524, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: z58Swiftcopy_MT.bat.exe PID: 2804, type: MEMORYSTR

                  Remote Access Functionality

                  barindex
                  Source: Yara matchFile source: 00000002.00000002.32056932719.0000000002AF1000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000002.00000003.28436005878.0000000002AE4000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000002.00000003.28485763517.0000000002AEF000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000002.00000002.32056784519.0000000002A77000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000002.00000003.28436040290.0000000002A9A000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000002.00000002.32066409158.0000000032B2F000.00000004.00000010.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000002.00000002.32056932719.0000000002A9D000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000002.00000003.29410654098.0000000002A77000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000002.00000003.28486047899.0000000002AEF000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000002.00000003.28453587511.0000000002AE0000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000002.00000003.28390975053.0000000002A98000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000002.00000003.29410560082.0000000002AEF000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000002.00000003.29410588585.0000000002A9C000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: z58Swiftcopy_MT.bat.exe PID: 5524, type: MEMORYSTR
                  Source: Yara matchFile source: C:\ProgramData\remcos\logs.dat, type: DROPPED
                  ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                  Gather Victim Identity InformationAcquire InfrastructureValid Accounts11
                  Native API
                  1
                  DLL Side-Loading
                  1
                  DLL Side-Loading
                  1
                  Deobfuscate/Decode Files or Information
                  1
                  OS Credential Dumping
                  1
                  System Time Discovery
                  Remote Services1
                  Archive Collected Data
                  1
                  Ingress Tool Transfer
                  Exfiltration Over Other Network Medium1
                  System Shutdown/Reboot
                  CredentialsDomainsDefault Accounts2
                  Command and Scripting Interpreter
                  Boot or Logon Initialization Scripts1
                  Access Token Manipulation
                  2
                  Obfuscated Files or Information
                  11
                  Input Capture
                  1
                  Account Discovery
                  Remote Desktop Protocol1
                  Data from Local System
                  21
                  Encrypted Channel
                  Exfiltration Over BluetoothNetwork Denial of Service
                  Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)112
                  Process Injection
                  1
                  Software Packing
                  2
                  Credentials in Registry
                  3
                  File and Directory Discovery
                  SMB/Windows Admin Shares1
                  Email Collection
                  1
                  Non-Standard Port
                  Automated ExfiltrationData Encrypted for Impact
                  Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
                  DLL Side-Loading
                  1
                  Credentials In Files
                  128
                  System Information Discovery
                  Distributed Component Object Model11
                  Input Capture
                  2
                  Non-Application Layer Protocol
                  Traffic DuplicationData Destruction
                  Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script11
                  Masquerading
                  LSA Secrets331
                  Security Software Discovery
                  SSH2
                  Clipboard Data
                  213
                  Application Layer Protocol
                  Scheduled TransferData Encrypted for Impact
                  Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts12
                  Virtualization/Sandbox Evasion
                  Cached Domain Credentials12
                  Virtualization/Sandbox Evasion
                  VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                  DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
                  Access Token Manipulation
                  DCSync4
                  Process Discovery
                  Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                  Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job112
                  Process Injection
                  Proc Filesystem1
                  Application Window Discovery
                  Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
                  Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAtHTML Smuggling/etc/passwd and /etc/shadow1
                  System Owner/User Discovery
                  Direct Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
                  Hide Legend

                  Legend:

                  • Process
                  • Signature
                  • Created File
                  • DNS/IP Info
                  • Is Dropped
                  • Is Windows Process
                  • Number of created Registry Values
                  • Number of created Files
                  • Visual Basic
                  • Delphi
                  • Java
                  • .Net C# or VB.NET
                  • C, C++ or other language
                  • Is malicious
                  • Internet
                  behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1586058 Sample: z58Swiftcopy_MT.bat.exe Startdate: 08/01/2025 Architecture: WINDOWS Score: 100 32 wealthabundance01.duckdns.org 2->32 34 teldrum.ro 2->34 36 geoplugin.net 2->36 50 Suricata IDS alerts for network traffic 2->50 52 Found malware configuration 2->52 54 Multi AV Scanner detection for submitted file 2->54 58 6 other signatures 2->58 8 z58Swiftcopy_MT.bat.exe 1 37 2->8         started        signatures3 56 Uses dynamic DNS services 32->56 process4 file5 24 C:\Users\user\AppData\Local\...\nsm9317.tmp, data 8->24 dropped 26 C:\Users\user\AppData\...\Objektsprogs.Jrg119, data 8->26 dropped 28 C:\Users\user\AppData\Local\...\System.dll, PE32 8->28 dropped 60 Detected unpacking (changes PE section rights) 8->60 62 Tries to steal Mail credentials (via file registry) 8->62 64 Tries to detect sandboxes and other dynamic analysis tools (process name or module or function) 8->64 66 2 other signatures 8->66 12 z58Swiftcopy_MT.bat.exe 4 17 8->12         started        signatures6 process7 dnsIp8 38 wealthabundance01.duckdns.org 43.226.229.196, 3981, 49748, 49749 SOFTLAYERUS Hong Kong 12->38 40 teldrum.ro 109.99.162.14, 443, 49747 RTDBucharestRomaniaRO Romania 12->40 42 geoplugin.net 178.237.33.50, 49750, 80 ATOM86-ASATOM86NL Netherlands 12->42 30 C:\ProgramData\remcos\logs.dat, data 12->30 dropped 68 Tries to detect Any.run 12->68 70 Maps a DLL or memory area into another process 12->70 72 Installs a global keyboard hook 12->72 17 z58Swiftcopy_MT.bat.exe 1 12->17         started        20 z58Swiftcopy_MT.bat.exe 1 12->20         started        22 z58Swiftcopy_MT.bat.exe 2 12->22         started        file9 signatures10 process11 signatures12 44 Tries to steal Instant Messenger accounts or passwords 17->44 46 Tries to harvest and steal browser information (history, passwords, etc) 17->46 48 Tries to steal Mail credentials (via file / registry access) 20->48

                  This section contains all screenshots as thumbnails, including those not shown in the slideshow.