Loading ...

Play interactive tourEdit tour

Analysis Report SwiftCopy.pdf.exe

Overview

General Information

Sample Name:SwiftCopy.pdf.exe
Analysis ID:432424
MD5:5a13130ec1c4259c3f63fa48167ab094
SHA1:ec4a42085f6c4fd6fbd79705723c8d034f24ebad
SHA256:85c856fe483e3a2ef7a4417693dc121c42673ac426cb8cf486fbe20b4825636a
Tags:exeNanoCoreRAT
Infos:

Most interesting Screenshot:

Detection

Nanocore
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Detected Nanocore Rat
Found malware configuration
Icon mismatch, binary includes an icon from a different legit application in order to fool users
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Sigma detected: NanoCore
Sigma detected: Suspicious Double Extension
Yara detected AntiVM3
Yara detected Nanocore RAT
.NET source code contains method to dynamically call methods (often used by packers)
.NET source code contains potential unpacker
.NET source code contains very large strings
C2 URLs / IPs found in malware configuration
Connects to many ports of the same IP (likely port scanning)
Hides that the sample has been downloaded from the Internet (zone.identifier)
Initial sample is a PE file and has a suspicious name
Injects a PE file into a foreign processes
Machine Learning detection for dropped file
Machine Learning detection for sample
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Uses an obfuscated file name to hide its real file extension (double extension)
Uses dynamic DNS services
Uses schtasks.exe or at.exe to add and modify task schedules
Antivirus or Machine Learning detection for unpacked file
Contains capabilities to detect virtual machines
Contains functionality to call native functions
Contains functionality to open a port and listen for incoming connection (possibly a backdoor)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Drops PE files
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found inlined nop instructions (likely shell or obfuscated code)
Installs a raw input device (often for capturing keystrokes)
Internet Provider seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)
Yara signature match

Classification

Process Tree

  • System is w10x64
  • SwiftCopy.pdf.exe (PID: 6872 cmdline: 'C:\Users\user\Desktop\SwiftCopy.pdf.exe' MD5: 5A13130EC1C4259C3F63FA48167AB094)
    • schtasks.exe (PID: 6348 cmdline: 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\xetNJdChYOitP' /XML 'C:\Users\user\AppData\Local\Temp\tmpF25B.tmp' MD5: 15FF7D8324231381BAD48A052F85DF04)
      • conhost.exe (PID: 6344 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
    • SwiftCopy.pdf.exe (PID: 6476 cmdline: {path} MD5: 5A13130EC1C4259C3F63FA48167AB094)
      • schtasks.exe (PID: 6576 cmdline: 'schtasks.exe' /create /f /tn 'DHCP Monitor' /xml 'C:\Users\user\AppData\Local\Temp\tmpDE76.tmp' MD5: 15FF7D8324231381BAD48A052F85DF04)
        • conhost.exe (PID: 6632 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
      • schtasks.exe (PID: 6704 cmdline: 'schtasks.exe' /create /f /tn 'DHCP Monitor Task' /xml 'C:\Users\user\AppData\Local\Temp\tmpE388.tmp' MD5: 15FF7D8324231381BAD48A052F85DF04)
        • conhost.exe (PID: 6988 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
  • SwiftCopy.pdf.exe (PID: 7040 cmdline: C:\Users\user\Desktop\SwiftCopy.pdf.exe 0 MD5: 5A13130EC1C4259C3F63FA48167AB094)
    • schtasks.exe (PID: 2204 cmdline: 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\xetNJdChYOitP' /XML 'C:\Users\user\AppData\Local\Temp\tmp994A.tmp' MD5: 15FF7D8324231381BAD48A052F85DF04)
      • conhost.exe (PID: 5972 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
  • dhcpmon.exe (PID: 5848 cmdline: 'C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe' 0 MD5: 5A13130EC1C4259C3F63FA48167AB094)
  • dhcpmon.exe (PID: 6152 cmdline: 'C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe' MD5: 5A13130EC1C4259C3F63FA48167AB094)
    • schtasks.exe (PID: 2860 cmdline: 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\xetNJdChYOitP' /XML 'C:\Users\user\AppData\Local\Temp\tmpBC24.tmp' MD5: 15FF7D8324231381BAD48A052F85DF04)
      • conhost.exe (PID: 4800 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
    • dhcpmon.exe (PID: 6892 cmdline: {path} MD5: 5A13130EC1C4259C3F63FA48167AB094)
  • cleanup

Malware Configuration

Threatname: NanoCore

{"Version": "1.2.2.0", "Mutex": "6f656d69-7475-8807-1300-000c0a4c", "Group": "Ego come se", "Domain1": "sylviaoslh01.ddns.net", "Domain2": "194.5.98.31", "Port": 52943, "KeyboardLogging": "Enable", "RunOnStartup": "Enable", "RequestElevation": "Disable", "BypassUAC": "Enable", "ClearZoneIdentifier": "Enable", "ClearAccessControl": "Enable", "SetCriticalProcess": "Disable", "PreventSystemSleep": "Enable", "ActivateAwayMode": "Enable", "EnableDebugMode": "Disable", "RunDelay": 0, "ConnectDelay": 4000, "RestartDelay": 5000, "TimeoutInterval": 5000, "KeepAliveTimeout": 30000, "MutexTimeout": 5000, "LanTimeout": 2500, "WanTimeout": 8009, "BufferSize": "02000100", "MaxPacketSize": "", "GCThreshold": "", "UseCustomDNS": "Enable", "PrimaryDNSServer": "8.8.8.8", "BackupDNSServer": "8.8.4.4", "BypassUserAccountControlData": "<?xml version=\"1.0\" encoding=\"UTF-16\"?>\r\n<Task version=\"1.2\" xmlns=\"http://schemas.microsoft.com/windows/2004/02/mit/task\">\r\n  <RegistrationInfo />\r\n  <Triggers />\r\n  <Principals>\r\n    <Principal id=\"Author\">\r\n      <LogonType>InteractiveToken</LogonType>\r\n      <RunLevel>HighestAvailable</RunLevel>\r\n    </Principal>\r\n  </Principals>\r\n  <Settings>\r\n    <MultipleInstancesPolicy>Parallel</MultipleInstancesPolicy>\r\n    <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>\r\n    <StopIfGoingOnBatteries>false</StopIfGoingOnBatteries>\r\n    <AllowHardTerminate>true</AllowHardTerminate>\r\n    <StartWhenAvailable>false</StartWhenAvailable>\r\n    <RunOnlyIfNetworkAvailable>false</RunOnlyIfNetworkAvailable>\r\n    <IdleSettings>\r\n      <StopOnIdleEnd>false</StopOnIdleEnd>\r\n      <RestartOnIdle>false</RestartOnIdle>\r\n    </IdleSettings>\r\n    <AllowStartOnDemand>true</AllowStartOnDemand>\r\n    <Enabled>true</Enabled>\r\n    <Hidden>false</Hidden>\r\n    <RunOnlyIfIdle>false</RunOnlyIfIdle>\r\n    <WakeToRun>false</WakeToRun>\r\n    <ExecutionTimeLimit>PT0S</ExecutionTimeLimit>\r\n    <Priority>4</Priority>\r\n  </Settings>\r\n  <Actions Context=\"Author\">\r\n    <Exec>\r\n      <Command>\"#EXECUTABLEPATH\"</Command>\r\n      <Arguments>$(Arg0)</Arguments>\r\n    </Exec>\r\n  </Actions>\r\n</Task"}

Yara Overview

Memory Dumps

SourceRuleDescriptionAuthorStrings
00000020.00000000.836222469.0000000000402000.00000040.00000001.sdmpNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth
  • 0xff8d:$x1: NanoCore.ClientPluginHost
  • 0xffca:$x2: IClientNetworkHost
  • 0x13afd:$x3: #=qjgz7ljmpp0J7FvL9dmi8ctJILdgtcbw8JYUc6GC8MeJ9B11Crfg2Djxcf0p8PZGe
00000020.00000000.836222469.0000000000402000.00000040.00000001.sdmpJoeSecurity_NanocoreYara detected Nanocore RATJoe Security
    00000020.00000000.836222469.0000000000402000.00000040.00000001.sdmpNanoCoreunknown Kevin Breen <kevin@techanarchy.net>
    • 0xfcf5:$a: NanoCore
    • 0xfd05:$a: NanoCore
    • 0xff39:$a: NanoCore
    • 0xff4d:$a: NanoCore
    • 0xff8d:$a: NanoCore
    • 0xfd54:$b: ClientPlugin
    • 0xff56:$b: ClientPlugin
    • 0xff96:$b: ClientPlugin
    • 0xfe7b:$c: ProjectData
    • 0x10882:$d: DESCrypto
    • 0x1824e:$e: KeepAlive
    • 0x1623c:$g: LogClientMessage
    • 0x12437:$i: get_Connected
    • 0x10bb8:$j: #=q
    • 0x10be8:$j: #=q
    • 0x10c04:$j: #=q
    • 0x10c34:$j: #=q
    • 0x10c50:$j: #=q
    • 0x10c6c:$j: #=q
    • 0x10c9c:$j: #=q
    • 0x10cb8:$j: #=q
    0000001D.00000000.819759981.0000000000402000.00000040.00000001.sdmpNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth
    • 0xff8d:$x1: NanoCore.ClientPluginHost
    • 0xffca:$x2: IClientNetworkHost
    • 0x13afd:$x3: #=qjgz7ljmpp0J7FvL9dmi8ctJILdgtcbw8JYUc6GC8MeJ9B11Crfg2Djxcf0p8PZGe
    0000001D.00000000.819759981.0000000000402000.00000040.00000001.sdmpJoeSecurity_NanocoreYara detected Nanocore RATJoe Security
      Click to see the 66 entries

      Unpacked PEs

      SourceRuleDescriptionAuthorStrings
      29.0.SwiftCopy.pdf.exe.400000.3.unpackNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth
      • 0x1018d:$x1: NanoCore.ClientPluginHost
      • 0x101ca:$x2: IClientNetworkHost
      • 0x13cfd:$x3: #=qjgz7ljmpp0J7FvL9dmi8ctJILdgtcbw8JYUc6GC8MeJ9B11Crfg2Djxcf0p8PZGe
      29.0.SwiftCopy.pdf.exe.400000.3.unpackNanocore_RAT_Feb18_1Detects Nanocore RATFlorian Roth
      • 0xff05:$x1: NanoCore Client.exe
      • 0x1018d:$x2: NanoCore.ClientPluginHost
      • 0x117c6:$s1: PluginCommand
      • 0x117ba:$s2: FileCommand
      • 0x1266b:$s3: PipeExists
      • 0x18422:$s4: PipeCreated
      • 0x101b7:$s5: IClientLoggingHost
      29.0.SwiftCopy.pdf.exe.400000.3.unpackJoeSecurity_NanocoreYara detected Nanocore RATJoe Security
        29.0.SwiftCopy.pdf.exe.400000.3.unpackNanoCoreunknown Kevin Breen <kevin@techanarchy.net>
        • 0xfef5:$a: NanoCore
        • 0xff05:$a: NanoCore
        • 0x10139:$a: NanoCore
        • 0x1014d:$a: NanoCore
        • 0x1018d:$a: NanoCore
        • 0xff54:$b: ClientPlugin
        • 0x10156:$b: ClientPlugin
        • 0x10196:$b: ClientPlugin
        • 0x1007b:$c: ProjectData
        • 0x10a82:$d: DESCrypto
        • 0x1844e:$e: KeepAlive
        • 0x1643c:$g: LogClientMessage
        • 0x12637:$i: get_Connected
        • 0x10db8:$j: #=q
        • 0x10de8:$j: #=q
        • 0x10e04:$j: #=q
        • 0x10e34:$j: #=q
        • 0x10e50:$j: #=q
        • 0x10e6c:$j: #=q
        • 0x10e9c:$j: #=q
        • 0x10eb8:$j: #=q
        11.2.SwiftCopy.pdf.exe.5d70000.11.raw.unpackNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth
        • 0xf7ad:$x1: NanoCore.ClientPluginHost
        • 0xf7da:$x2: IClientNetworkHost
        Click to see the 141 entries

        Sigma Overview

        AV Detection:

        barindex
        Sigma detected: NanoCoreShow sources
        Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Users\user\Desktop\SwiftCopy.pdf.exe, ProcessId: 6476, TargetFilename: C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat

        E-Banking Fraud:

        barindex
        Sigma detected: NanoCoreShow sources
        Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Users\user\Desktop\SwiftCopy.pdf.exe, ProcessId: 6476, TargetFilename: C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat

        System Summary:

        barindex
        Sigma detected: Suspicious Double ExtensionShow sources
        Source: Process startedAuthor: Florian Roth (rule), @blu3_team (idea): Data: Command: {path}, CommandLine: {path}, CommandLine|base64offset|contains: , Image: C:\Users\user\Desktop\SwiftCopy.pdf.exe, NewProcessName: C:\Users\user\Desktop\SwiftCopy.pdf.exe, OriginalFileName: C:\Users\user\Desktop\SwiftCopy.pdf.exe, ParentCommandLine: 'C:\Users\user\Desktop\SwiftCopy.pdf.exe' , ParentImage: C:\Users\user\Desktop\SwiftCopy.pdf.exe, ParentProcessId: 6872, ProcessCommandLine: {path}, ProcessId: 6468

        Stealing of Sensitive Information:

        barindex
        Sigma detected: NanoCoreShow sources
        Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Users\user\Desktop\SwiftCopy.pdf.exe, ProcessId: 6476, TargetFilename: C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat

        Remote Access Functionality:

        barindex
        Sigma detected: NanoCoreShow sources
        Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Users\user\Desktop\SwiftCopy.pdf.exe, ProcessId: 6476, TargetFilename: C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat

        Signature Overview

        Click to jump to signature section

        Show All Signature Results

        AV Detection:

        barindex
        Found malware configurationShow sources
        Source: 00000020.00000002.857250258.0000000002F31000.00000004.00000001.sdmpMalware Configuration Extractor: NanoCore {"Version": "1.2.2.0", "Mutex": "6f656d69-7475-8807-1300-000c0a4c", "Group": "Ego come se", "Domain1": "sylviaoslh01.ddns.net", "Domain2": "194.5.98.31", "Port": 52943, "KeyboardLogging": "Enable", "RunOnStartup": "Enable", "RequestElevation": "Disable", "BypassUAC": "Enable", "ClearZoneIdentifier": "Enable", "ClearAccessControl": "Enable", "SetCriticalProcess": "Disable", "PreventSystemSleep": "Enable", "ActivateAwayMode": "Enable", "EnableDebugMode": "Disable", "RunDelay": 0, "ConnectDelay": 4000, "RestartDelay": 5000, "TimeoutInterval": 5000, "KeepAliveTimeout": 30000, "MutexTimeout": 5000, "LanTimeout": 2500, "WanTimeout": 8009, "BufferSize": "02000100", "MaxPacketSize": "", "GCThreshold": "", "UseCustomDNS": "Enable", "PrimaryDNSServer": "8.8.8.8", "BackupDNSServer": "8.8.4.4", "BypassUserAccountControlData": "<?xml version=\"1.0\" encoding=\"UTF-16\"?>\r\n<Task version=\"1.2\" xmlns=\"http://schemas.microsoft.com/windows/2004/02/mit/task\">\r\n <RegistrationInfo />\r\n <Triggers />\r\n <Principals>\r\n <Principal id=\"Author\">\r\n <LogonType>InteractiveToken</LogonType>\r\n <RunLevel>HighestAvailable</RunLevel>\r\n </Principal>\r\n </Principals>\r\n <Settings>\r\n <MultipleInstancesPolicy>Parallel</MultipleInstancesPolicy>\r\n <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>\r\n <StopIfGoingOnBatteries>false</StopIfGoingOnBatteries>\r\n <AllowHardTerminate>true</AllowHardTerminate>\r\n <StartWhenAvailable>false</StartWhenAvailable>\r\n <RunOnlyIfNetworkAvailable>false</RunOnlyIfNetworkAvailable>\r\n <IdleSettings>\r\n <StopOnIdleEnd>false</StopOnIdleEnd>\r\n <RestartOnIdle>false</RestartOnIdle>\r\n </IdleSettings>\r\n <AllowStartOnDemand>true</AllowStartOnDemand>\r\n <Enabled>true</Enabled>\r\n <Hidden>false</Hidden>\r\n <RunOnlyIfIdle>false</RunOnlyIfIdle>\r\n <WakeToRun>false</WakeToRun>\r\n <ExecutionTimeLimit>PT0S</ExecutionTimeLimit>\r\n <Priority>4</Priority>\r\n </Settings>\r\n <Actions Context=\"Author\">\r\n <Exec>\r\n <Command>\"#EXECUTABLEPATH\"</Command>\r\n <Arguments>$(Arg0)</Arguments>\r\n </Exec>\r\n </Actions>\r\n</Task"}
        Multi AV Scanner detection for domain / URLShow sources
        Source: sylviaoslh01.ddns.netVirustotal: Detection: 9%Perma Link
        Multi AV Scanner detection for dropped fileShow sources
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeReversingLabs: Detection: 44%
        Source: C:\Users\user\AppData\Roaming\xetNJdChYOitP.exeReversingLabs: Detection: 44%
        Multi AV Scanner detection for submitted fileShow sources
        Source: SwiftCopy.pdf.exeReversingLabs: Detection: 44%
        Yara detected Nanocore RATShow sources
        Source: Yara matchFile source: 00000020.00000000.836222469.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000001D.00000000.819759981.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000001D.00000002.835267863.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000001D.00000000.820327781.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000B.00000000.726462560.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000014.00000002.820471977.0000000003A31000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000000.00000002.741715588.00000000045C0000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000020.00000002.857250258.0000000002F31000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000B.00000002.912619347.0000000005D70000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000015.00000002.841434727.0000000003D51000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000020.00000002.852127142.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000020.00000000.835581816.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000000.00000002.734043460.00000000041D1000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000B.00000002.908625280.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000013.00000002.826910629.0000000004641000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000001D.00000002.836835816.0000000003391000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000001D.00000002.836971548.0000000004391000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000B.00000002.911022966.0000000004319000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000B.00000000.726040524.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000020.00000002.857349420.0000000003F31000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: SwiftCopy.pdf.exe PID: 2848, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: SwiftCopy.pdf.exe PID: 6476, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: SwiftCopy.pdf.exe PID: 6872, type: MEMORY
        Source: Yara matchFile source: 29.0.SwiftCopy.pdf.exe.400000.3.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 11.2.SwiftCopy.pdf.exe.5d70000.11.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 19.2.SwiftCopy.pdf.exe.4746d68.2.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.SwiftCopy.pdf.exe.42d6d68.3.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 19.2.SwiftCopy.pdf.exe.4746d68.2.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 11.0.SwiftCopy.pdf.exe.400000.3.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 11.2.SwiftCopy.pdf.exe.4332580.6.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 11.2.SwiftCopy.pdf.exe.4319591.7.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 11.2.SwiftCopy.pdf.exe.400000.0.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 32.0.dhcpmon.exe.400000.3.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 11.2.SwiftCopy.pdf.exe.4319591.7.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 32.2.dhcpmon.exe.3f89591.7.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 29.2.SwiftCopy.pdf.exe.43e9591.4.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 11.2.SwiftCopy.pdf.exe.4332580.6.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 29.2.SwiftCopy.pdf.exe.400000.0.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 32.2.dhcpmon.exe.3f7ed1e.5.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 11.2.SwiftCopy.pdf.exe.431dbba.5.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 11.2.SwiftCopy.pdf.exe.5d70000.11.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 29.2.SwiftCopy.pdf.exe.43e3b5b.6.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 32.2.dhcpmon.exe.3f89591.7.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 32.2.dhcpmon.exe.400000.0.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 21.2.dhcpmon.exe.3e56d68.2.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 20.2.dhcpmon.exe.3b36d68.2.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 11.0.SwiftCopy.pdf.exe.400000.1.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 32.0.dhcpmon.exe.400000.1.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 11.2.SwiftCopy.pdf.exe.5d74629.12.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.SwiftCopy.pdf.exe.42d6d68.3.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 32.2.dhcpmon.exe.3f83b5b.6.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 29.0.SwiftCopy.pdf.exe.400000.1.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 29.2.SwiftCopy.pdf.exe.43e9591.4.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 29.2.SwiftCopy.pdf.exe.43ded1e.5.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 21.2.dhcpmon.exe.3e56d68.2.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 20.2.dhcpmon.exe.3b36d68.2.unpack, type: UNPACKEDPE
        Machine Learning detection for dropped fileShow sources
        Source: C:\Users\user\AppData\Roaming\xetNJdChYOitP.exeJoe Sandbox ML: detected
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeJoe Sandbox ML: detected
        Machine Learning detection for sampleShow sources
        Source: SwiftCopy.pdf.exeJoe Sandbox ML: detected
        Source: 11.2.SwiftCopy.pdf.exe.4332580.6.unpackAvira: Label: TR/NanoCore.fadte
        Source: 29.0.SwiftCopy.pdf.exe.400000.3.unpackAvira: Label: TR/Dropper.MSIL.Gen7
        Source: 11.0.SwiftCopy.pdf.exe.400000.3.unpackAvira: Label: TR/Dropper.MSIL.Gen7
        Source: 32.0.dhcpmon.exe.400000.3.unpackAvira: Label: TR/Dropper.MSIL.Gen7
        Source: 11.2.SwiftCopy.pdf.exe.400000.0.unpackAvira: Label: TR/Dropper.MSIL.Gen7
        Source: 29.2.SwiftCopy.pdf.exe.400000.0.unpackAvira: Label: TR/Dropper.MSIL.Gen7
        Source: 11.2.SwiftCopy.pdf.exe.5d70000.11.unpackAvira: Label: TR/NanoCore.fadte
        Source: 32.2.dhcpmon.exe.400000.0.unpackAvira: Label: TR/Dropper.MSIL.Gen7
        Source: 11.0.SwiftCopy.pdf.exe.400000.1.unpackAvira: Label: TR/Dropper.MSIL.Gen7
        Source: 32.0.dhcpmon.exe.400000.1.unpackAvira: Label: TR/Dropper.MSIL.Gen7
        Source: 29.0.SwiftCopy.pdf.exe.400000.1.unpackAvira: Label: TR/Dropper.MSIL.Gen7
        Source: SwiftCopy.pdf.exeStatic PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeFile opened: C:\Windows\WinSxS\x86_microsoft.vc80.crt_1fc8b3b9a1e18e3b_8.0.50727.9445_none_d08c58b4442ba54f\MSVCR80.dll
        Source: SwiftCopy.pdf.exeStatic PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
        Source: Binary string: indows\System.pdbpdbtem.pdbon source: SwiftCopy.pdf.exe, 0000000B.00000002.910162753.0000000002F75000.00000004.00000040.sdmp
        Source: Binary string: indows\symbols\dll\System.pdb source: SwiftCopy.pdf.exe, 0000000B.00000002.910162753.0000000002F75000.00000004.00000040.sdmp
        Source: Binary string: C:\Users\user\Desktop\hcUgzA.pdb source: SwiftCopy.pdf.exe, 0000000B.00000002.910162753.0000000002F75000.00000004.00000040.sdmp
        Source: Binary string: System.pdbM source: SwiftCopy.pdf.exe, 0000000B.00000002.910162753.0000000002F75000.00000004.00000040.sdmp
        Source: Binary string: C:\Windows\dll\System.pdb source: SwiftCopy.pdf.exe, 0000000B.00000002.910162753.0000000002F75000.00000004.00000040.sdmp
        Source: Binary string: C:\Windows\assembly\GAC_MSIL\System\2.0.0.0__b77a5c561934e089\System.pdbILE source: SwiftCopy.pdf.exe, 0000000B.00000002.910162753.0000000002F75000.00000004.00000040.sdmp
        Source: Binary string: 1koC:\Windows\System.pdb source: SwiftCopy.pdf.exe, 0000000B.00000002.913409176.000000000666C000.00000004.00000001.sdmp
        Source: Binary string: symbols\dll\System.pdb& source: SwiftCopy.pdf.exe, 0000000B.00000002.913409176.000000000666C000.00000004.00000001.sdmp
        Source: Binary string: C:\Users\Cole\Documents\Visual Studio 2013\Projects\NanoProtectPlugin\NanoProtectClient\obj\Debug\NanoProtectClient.pdb source: SwiftCopy.pdf.exe, 0000000B.00000002.910531601.00000000032C1000.00000004.00000001.sdmp, SwiftCopy.pdf.exe, 0000001D.00000002.836835816.0000000003391000.00000004.00000001.sdmp, dhcpmon.exe, 00000020.00000002.857250258.0000000002F31000.00000004.00000001.sdmp
        Source: Binary string: System.pdb H source: SwiftCopy.pdf.exe, 0000000B.00000002.913409176.000000000666C000.00000004.00000001.sdmp
        Source: Binary string: indows\hcUgzA.pdbpdbgzA.pdb source: SwiftCopy.pdf.exe, 0000000B.00000002.910162753.0000000002F75000.00000004.00000040.sdmp
        Source: Binary string: .pdbSystem source: SwiftCopy.pdf.exe, 0000000B.00000002.913409176.000000000666C000.00000004.00000001.sdmp
        Source: Binary string: C:\Windows\assembly\GA.pdbL\System\2.0.0.0__b77a5c561934e089\System.dll source: SwiftCopy.pdf.exe, 0000000B.00000002.913409176.000000000666C000.00000004.00000001.sdmp
        Source: Binary string: C:\Users\Administrator\Desktop\Client\Temp\BtHJZpKYpK\src\obj\Debug\hcUgzA.pdb source: SwiftCopy.pdf.exe
        Source: Binary string: C:\Windows\System.pdb++wE source: SwiftCopy.pdf.exe, 0000000B.00000002.910162753.0000000002F75000.00000004.00000040.sdmp
        Source: Binary string: System.pdb source: SwiftCopy.pdf.exe, 0000000B.00000002.913409176.000000000666C000.00000004.00000001.sdmp
        Source: Binary string: mscorrc.pdb source: SwiftCopy.pdf.exe, 00000000.00000002.743183682.0000000006AF0000.00000002.00000001.sdmp, SwiftCopy.pdf.exe, 0000000B.00000002.912263148.0000000005A70000.00000002.00000001.sdmp, SwiftCopy.pdf.exe, 00000013.00000002.830322013.0000000006EE0000.00000002.00000001.sdmp, dhcpmon.exe, 00000014.00000002.824841723.0000000006010000.00000002.00000001.sdmp, dhcpmon.exe, 00000015.00000002.843885287.0000000006430000.00000002.00000001.sdmp
        Source: Binary string: System.pdbSystem.pdbpdbtem.pdbm\2.0.0.0__b77a5c561934e089\System.pdb source: SwiftCopy.pdf.exe, 0000000B.00000002.913409176.000000000666C000.00000004.00000001.sdmp
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeCode function: 4x nop then mov esp, ebp

        Networking:

        barindex
        C2 URLs / IPs found in malware configurationShow sources
        Source: Malware configuration extractorURLs: sylviaoslh01.ddns.net
        Source: Malware configuration extractorURLs: 194.5.98.31
        Connects to many ports of the same IP (likely port scanning)Show sources
        Source: global trafficTCP traffic: 194.5.98.31 ports 2,3,4,5,9,52943
        Uses dynamic DNS servicesShow sources
        Source: unknownDNS query: name: sylviaoslh01.ddns.net
        Source: global trafficTCP traffic: 192.168.2.4:49742 -> 194.5.98.31:52943
        Source: Joe Sandbox ViewASN Name: DANILENKODE DANILENKODE
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeCode function: 11_2_052C2F5A WSARecv,
        Source: unknownDNS traffic detected: queries for: sylviaoslh01.ddns.net
        Source: SwiftCopy.pdf.exe, 00000000.00000002.742185961.00000000055F0000.00000002.00000001.sdmp, SwiftCopy.pdf.exe, 00000013.00000002.827664643.00000000059C0000.00000002.00000001.sdmp, dhcpmon.exe, 00000014.00000002.823119054.0000000004F00000.00000002.00000001.sdmp, dhcpmon.exe, 00000015.00000002.843141069.0000000005430000.00000002.00000001.sdmpString found in binary or memory: http://fontfabrik.com
        Source: SwiftCopy.pdf.exe, 00000000.00000003.644038179.000000000548D000.00000004.00000001.sdmp, SwiftCopy.pdf.exe, 00000013.00000002.827664643.00000000059C0000.00000002.00000001.sdmp, dhcpmon.exe, 00000014.00000002.823119054.0000000004F00000.00000002.00000001.sdmp, dhcpmon.exe, 00000015.00000002.843141069.0000000005430000.00000002.00000001.sdmpString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0
        Source: SwiftCopy.pdf.exe, 00000000.00000003.644496357.0000000005496000.00000004.00000001.sdmp, SwiftCopy.pdf.exe, 00000000.00000003.644225835.0000000005499000.00000004.00000001.sdmpString found in binary or memory: http://www.carterandcone.com
        Source: SwiftCopy.pdf.exe, 00000000.00000003.644496357.0000000005496000.00000004.00000001.sdmpString found in binary or memory: http://www.carterandcone.com6
        Source: SwiftCopy.pdf.exe, 00000000.00000003.644225835.0000000005499000.00000004.00000001.sdmpString found in binary or memory: http://www.carterandcone.comI
        Source: SwiftCopy.pdf.exe, 00000000.00000003.644496357.0000000005496000.00000004.00000001.sdmpString found in binary or memory: http://www.carterandcone.comP
        Source: SwiftCopy.pdf.exe, 00000000.00000003.644496357.0000000005496000.00000004.00000001.sdmpString found in binary or memory: http://www.carterandcone.coming
        Source: SwiftCopy.pdf.exe, 00000000.00000002.742185961.00000000055F0000.00000002.00000001.sdmp, SwiftCopy.pdf.exe, 00000013.00000002.827664643.00000000059C0000.00000002.00000001.sdmp, dhcpmon.exe, 00000014.00000002.823119054.0000000004F00000.00000002.00000001.sdmp, dhcpmon.exe, 00000015.00000002.843141069.0000000005430000.00000002.00000001.sdmpString found in binary or memory: http://www.carterandcone.coml
        Source: SwiftCopy.pdf.exe, 00000000.00000003.644451230.0000000005496000.00000004.00000001.sdmpString found in binary or memory: http://www.carterandcone.comr
        Source: SwiftCopy.pdf.exe, 00000000.00000003.644496357.0000000005496000.00000004.00000001.sdmpString found in binary or memory: http://www.carterandcone.comses
        Source: SwiftCopy.pdf.exe, 00000000.00000003.644496357.0000000005496000.00000004.00000001.sdmpString found in binary or memory: http://www.carterandcone.comv
        Source: SwiftCopy.pdf.exe, 00000000.00000003.645966627.0000000005482000.00000004.00000001.sdmp, SwiftCopy.pdf.exe, 00000013.00000002.827664643.00000000059C0000.00000002.00000001.sdmp, dhcpmon.exe, 00000014.00000002.823119054.0000000004F00000.00000002.00000001.sdmp, dhcpmon.exe, 00000015.00000002.843141069.0000000005430000.00000002.00000001.sdmpString found in binary or memory: http://www.fontbureau.com
        Source: dhcpmon.exe, 00000015.00000002.843141069.0000000005430000.00000002.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers
        Source: SwiftCopy.pdf.exe, 00000000.00000003.645966627.0000000005482000.00000004.00000001.sdmp, SwiftCopy.pdf.exe, 00000000.00000003.645961936.000000000160B000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers/
        Source: SwiftCopy.pdf.exe, 00000000.00000002.742185961.00000000055F0000.00000002.00000001.sdmp, SwiftCopy.pdf.exe, 00000013.00000002.827664643.00000000059C0000.00000002.00000001.sdmp, dhcpmon.exe, 00000014.00000002.823119054.0000000004F00000.00000002.00000001.sdmp, dhcpmon.exe, 00000015.00000002.843141069.0000000005430000.00000002.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers/?
        Source: SwiftCopy.pdf.exe, 00000000.00000002.742185961.00000000055F0000.00000002.00000001.sdmp, SwiftCopy.pdf.exe, 00000013.00000002.827664643.00000000059C0000.00000002.00000001.sdmp, dhcpmon.exe, 00000014.00000002.823119054.0000000004F00000.00000002.00000001.sdmp, dhcpmon.exe, 00000015.00000002.843141069.0000000005430000.00000002.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers/cabarga.htmlN
        Source: SwiftCopy.pdf.exe, 00000000.00000002.742185961.00000000055F0000.00000002.00000001.sdmp, SwiftCopy.pdf.exe, 00000013.00000002.827664643.00000000059C0000.00000002.00000001.sdmp, dhcpmon.exe, 00000014.00000002.823119054.0000000004F00000.00000002.00000001.sdmp, dhcpmon.exe, 00000015.00000002.843141069.0000000005430000.00000002.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers/frere-user.html
        Source: SwiftCopy.pdf.exe, 00000000.00000002.742185961.00000000055F0000.00000002.00000001.sdmp, SwiftCopy.pdf.exe, 00000013.00000002.827664643.00000000059C0000.00000002.00000001.sdmp, dhcpmon.exe, 00000014.00000002.823119054.0000000004F00000.00000002.00000001.sdmp, dhcpmon.exe, 00000015.00000002.843141069.0000000005430000.00000002.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers8
        Source: SwiftCopy.pdf.exe, 00000000.00000002.742185961.00000000055F0000.00000002.00000001.sdmp, SwiftCopy.pdf.exe, 00000013.00000002.827664643.00000000059C0000.00000002.00000001.sdmp, dhcpmon.exe, 00000014.00000002.823119054.0000000004F00000.00000002.00000001.sdmp, dhcpmon.exe, 00000015.00000002.843141069.0000000005430000.00000002.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers?
        Source: SwiftCopy.pdf.exe, 00000000.00000002.742185961.00000000055F0000.00000002.00000001.sdmp, SwiftCopy.pdf.exe, 00000013.00000002.827664643.00000000059C0000.00000002.00000001.sdmp, dhcpmon.exe, 00000014.00000002.823119054.0000000004F00000.00000002.00000001.sdmp, dhcpmon.exe, 00000015.00000002.843141069.0000000005430000.00000002.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designersG
        Source: SwiftCopy.pdf.exe, 00000000.00000003.726780421.0000000005480000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.comB.TTF
        Source: SwiftCopy.pdf.exe, 00000000.00000003.645966627.0000000005482000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.comef
        Source: SwiftCopy.pdf.exe, 00000000.00000003.726780421.0000000005480000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.como
        Source: SwiftCopy.pdf.exe, 00000000.00000003.645994299.0000000005482000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.comq
        Source: SwiftCopy.pdf.exe, 00000000.00000002.742185961.00000000055F0000.00000002.00000001.sdmp, SwiftCopy.pdf.exe, 00000013.00000002.827664643.00000000059C0000.00000002.00000001.sdmp, dhcpmon.exe, 00000014.00000002.823119054.0000000004F00000.00000002.00000001.sdmp, dhcpmon.exe, 00000015.00000002.843141069.0000000005430000.00000002.00000001.sdmpString found in binary or memory: http://www.fonts.com
        Source: SwiftCopy.pdf.exe, 00000000.00000003.643130611.0000000005496000.00000004.00000001.sdmp, SwiftCopy.pdf.exe, 00000013.00000002.827664643.00000000059C0000.00000002.00000001.sdmp, dhcpmon.exe, 00000014.00000002.823119054.0000000004F00000.00000002.00000001.sdmp, dhcpmon.exe, 00000015.00000002.843141069.0000000005430000.00000002.00000001.sdmpString found in binary or memory: http://www.founder.com.cn/cn
        Source: SwiftCopy.pdf.exe, 00000000.00000002.742185961.00000000055F0000.00000002.00000001.sdmp, SwiftCopy.pdf.exe, 00000013.00000002.827664643.00000000059C0000.00000002.00000001.sdmp, dhcpmon.exe, 00000014.00000002.823119054.0000000004F00000.00000002.00000001.sdmp, dhcpmon.exe, 00000015.00000002.843141069.0000000005430000.00000002.00000001.sdmpString found in binary or memory: http://www.founder.com.cn/cn/bThe
        Source: SwiftCopy.pdf.exe, 00000000.00000002.742185961.00000000055F0000.00000002.00000001.sdmp, SwiftCopy.pdf.exe, 00000013.00000002.827664643.00000000059C0000.00000002.00000001.sdmp, dhcpmon.exe, 00000014.00000002.823119054.0000000004F00000.00000002.00000001.sdmp, dhcpmon.exe, 00000015.00000002.843141069.0000000005430000.00000002.00000001.sdmpString found in binary or memory: http://www.founder.com.cn/cn/cThe
        Source: SwiftCopy.pdf.exe, 00000000.00000003.643149912.000000000160B000.00000004.00000001.sdmpString found in binary or memory: http://www.founder.com.cn/cnn
        Source: SwiftCopy.pdf.exe, 00000000.00000002.742185961.00000000055F0000.00000002.00000001.sdmp, SwiftCopy.pdf.exe, 00000013.00000002.827664643.00000000059C0000.00000002.00000001.sdmp, dhcpmon.exe, 00000014.00000002.823119054.0000000004F00000.00000002.00000001.sdmp, dhcpmon.exe, 00000015.00000002.843141069.0000000005430000.00000002.00000001.sdmpString found in binary or memory: http://www.galapagosdesign.com/DPlease
        Source: SwiftCopy.pdf.exe, 00000000.00000002.742185961.00000000055F0000.00000002.00000001.sdmp, SwiftCopy.pdf.exe, 00000013.00000002.827664643.00000000059C0000.00000002.00000001.sdmp, dhcpmon.exe, 00000014.00000002.823119054.0000000004F00000.00000002.00000001.sdmp, dhcpmon.exe, 00000015.00000002.843141069.0000000005430000.00000002.00000001.sdmpString found in binary or memory: http://www.galapagosdesign.com/staff/dennis.htm
        Source: SwiftCopy.pdf.exe, 00000000.00000002.742185961.00000000055F0000.00000002.00000001.sdmp, SwiftCopy.pdf.exe, 00000013.00000002.827664643.00000000059C0000.00000002.00000001.sdmp, dhcpmon.exe, 00000014.00000002.823119054.0000000004F00000.00000002.00000001.sdmp, dhcpmon.exe, 00000015.00000002.843141069.0000000005430000.00000002.00000001.sdmpString found in binary or memory: http://www.goodfont.co.kr
        Source: SwiftCopy.pdf.exe, 00000000.00000003.645291588.000000000548C000.00000004.00000001.sdmp, SwiftCopy.pdf.exe, 00000013.00000002.827664643.00000000059C0000.00000002.00000001.sdmp, dhcpmon.exe, 00000014.00000002.823119054.0000000004F00000.00000002.00000001.sdmp, dhcpmon.exe, 00000015.00000002.843141069.0000000005430000.00000002.00000001.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/
        Source: SwiftCopy.pdf.exe, 00000000.00000003.644645566.0000000005485000.00000004.00000001.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/&
        Source: SwiftCopy.pdf.exe, 00000000.00000003.645291588.000000000548C000.00000004.00000001.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp//
        Source: SwiftCopy.pdf.exe, 00000000.00000003.644645566.0000000005485000.00000004.00000001.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/0
        Source: SwiftCopy.pdf.exe, 00000000.00000003.645072500.0000000005497000.00000004.00000001.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/7
        Source: SwiftCopy.pdf.exe, 00000000.00000003.645291588.000000000548C000.00000004.00000001.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/9
        Source: SwiftCopy.pdf.exe, 00000000.00000003.644842820.0000000005487000.00000004.00000001.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/D
        Source: SwiftCopy.pdf.exe, 00000000.00000003.644842820.0000000005487000.00000004.00000001.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/L
        Source: SwiftCopy.pdf.exe, 00000000.00000003.645291588.000000000548C000.00000004.00000001.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/U
        Source: SwiftCopy.pdf.exe, 00000000.00000003.644842820.0000000005487000.00000004.00000001.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/Y0
        Source: SwiftCopy.pdf.exe, 00000000.00000003.645291588.000000000548C000.00000004.00000001.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/Y0h
        Source: SwiftCopy.pdf.exe, 00000000.00000003.645334951.000000000548C000.00000004.00000001.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/jp/
        Source: SwiftCopy.pdf.exe, 00000000.00000003.645072500.0000000005497000.00000004.00000001.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/jp//
        Source: SwiftCopy.pdf.exe, 00000000.00000003.644842820.0000000005487000.00000004.00000001.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/jp/0
        Source: SwiftCopy.pdf.exe, 00000000.00000003.645291588.000000000548C000.00000004.00000001.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/jp/D
        Source: SwiftCopy.pdf.exe, 00000000.00000003.645291588.000000000548C000.00000004.00000001.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/jp/L
        Source: SwiftCopy.pdf.exe, 00000000.00000003.645291588.000000000548C000.00000004.00000001.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/jp/q
        Source: SwiftCopy.pdf.exe, 00000000.00000003.644645566.0000000005485000.00000004.00000001.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/q
        Source: SwiftCopy.pdf.exe, 00000000.00000003.645291588.000000000548C000.00000004.00000001.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/s9
        Source: SwiftCopy.pdf.exe, 00000000.00000003.645291588.000000000548C000.00000004.00000001.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/z
        Source: SwiftCopy.pdf.exe, 00000000.00000002.742185961.00000000055F0000.00000002.00000001.sdmp, SwiftCopy.pdf.exe, 00000013.00000002.827664643.00000000059C0000.00000002.00000001.sdmp, dhcpmon.exe, 00000014.00000002.823119054.0000000004F00000.00000002.00000001.sdmp, dhcpmon.exe, 00000015.00000002.843141069.0000000005430000.00000002.00000001.sdmpString found in binary or memory: http://www.sajatypeworks.com
        Source: SwiftCopy.pdf.exe, 00000000.00000002.742185961.00000000055F0000.00000002.00000001.sdmp, SwiftCopy.pdf.exe, 00000013.00000002.827664643.00000000059C0000.00000002.00000001.sdmp, dhcpmon.exe, 00000014.00000002.823119054.0000000004F00000.00000002.00000001.sdmp, dhcpmon.exe, 00000015.00000002.843141069.0000000005430000.00000002.00000001.sdmpString found in binary or memory: http://www.sakkal.com
        Source: SwiftCopy.pdf.exe, 00000000.00000002.742185961.00000000055F0000.00000002.00000001.sdmp, SwiftCopy.pdf.exe, 00000013.00000002.827664643.00000000059C0000.00000002.00000001.sdmp, dhcpmon.exe, 00000014.00000002.823119054.0000000004F00000.00000002.00000001.sdmp, dhcpmon.exe, 00000015.00000002.843141069.0000000005430000.00000002.00000001.sdmpString found in binary or memory: http://www.sandoll.co.kr
        Source: dhcpmon.exe, 00000015.00000002.843141069.0000000005430000.00000002.00000001.sdmpString found in binary or memory: http://www.tiro.com
        Source: SwiftCopy.pdf.exe, 00000000.00000002.742185961.00000000055F0000.00000002.00000001.sdmp, SwiftCopy.pdf.exe, 00000013.00000002.827664643.00000000059C0000.00000002.00000001.sdmp, dhcpmon.exe, 00000014.00000002.823119054.0000000004F00000.00000002.00000001.sdmp, dhcpmon.exe, 00000015.00000002.843141069.0000000005430000.00000002.00000001.sdmpString found in binary or memory: http://www.typography.netD
        Source: SwiftCopy.pdf.exe, 00000000.00000002.742185961.00000000055F0000.00000002.00000001.sdmp, SwiftCopy.pdf.exe, 00000013.00000002.827664643.00000000059C0000.00000002.00000001.sdmp, dhcpmon.exe, 00000014.00000002.823119054.0000000004F00000.00000002.00000001.sdmp, dhcpmon.exe, 00000015.00000002.843141069.0000000005430000.00000002.00000001.sdmpString found in binary or memory: http://www.urwpp.deDPlease
        Source: SwiftCopy.pdf.exe, 00000000.00000002.742185961.00000000055F0000.00000002.00000001.sdmp, SwiftCopy.pdf.exe, 00000013.00000002.827664643.00000000059C0000.00000002.00000001.sdmp, dhcpmon.exe, 00000014.00000002.823119054.0000000004F00000.00000002.00000001.sdmp, dhcpmon.exe, 00000015.00000002.843141069.0000000005430000.00000002.00000001.sdmpString found in binary or memory: http://www.zhongyicts.com.cn
        Source: SwiftCopy.pdf.exe, 0000000B.00000002.912619347.0000000005D70000.00000004.00000001.sdmpBinary or memory string: RegisterRawInputDevices

        E-Banking Fraud:

        barindex
        Yara detected Nanocore RATShow sources
        Source: Yara matchFile source: 00000020.00000000.836222469.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000001D.00000000.819759981.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000001D.00000002.835267863.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000001D.00000000.820327781.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000B.00000000.726462560.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000014.00000002.820471977.0000000003A31000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000000.00000002.741715588.00000000045C0000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000020.00000002.857250258.0000000002F31000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000B.00000002.912619347.0000000005D70000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000015.00000002.841434727.0000000003D51000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000020.00000002.852127142.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000020.00000000.835581816.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000000.00000002.734043460.00000000041D1000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000B.00000002.908625280.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000013.00000002.826910629.0000000004641000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000001D.00000002.836835816.0000000003391000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000001D.00000002.836971548.0000000004391000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000B.00000002.911022966.0000000004319000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000B.00000000.726040524.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000020.00000002.857349420.0000000003F31000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: SwiftCopy.pdf.exe PID: 2848, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: SwiftCopy.pdf.exe PID: 6476, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: SwiftCopy.pdf.exe PID: 6872, type: MEMORY
        Source: Yara matchFile source: 29.0.SwiftCopy.pdf.exe.400000.3.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 11.2.SwiftCopy.pdf.exe.5d70000.11.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 19.2.SwiftCopy.pdf.exe.4746d68.2.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.SwiftCopy.pdf.exe.42d6d68.3.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 19.2.SwiftCopy.pdf.exe.4746d68.2.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 11.0.SwiftCopy.pdf.exe.400000.3.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 11.2.SwiftCopy.pdf.exe.4332580.6.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 11.2.SwiftCopy.pdf.exe.4319591.7.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 11.2.SwiftCopy.pdf.exe.400000.0.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 32.0.dhcpmon.exe.400000.3.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 11.2.SwiftCopy.pdf.exe.4319591.7.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 32.2.dhcpmon.exe.3f89591.7.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 29.2.SwiftCopy.pdf.exe.43e9591.4.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 11.2.SwiftCopy.pdf.exe.4332580.6.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 29.2.SwiftCopy.pdf.exe.400000.0.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 32.2.dhcpmon.exe.3f7ed1e.5.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 11.2.SwiftCopy.pdf.exe.431dbba.5.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 11.2.SwiftCopy.pdf.exe.5d70000.11.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 29.2.SwiftCopy.pdf.exe.43e3b5b.6.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 32.2.dhcpmon.exe.3f89591.7.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 32.2.dhcpmon.exe.400000.0.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 21.2.dhcpmon.exe.3e56d68.2.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 20.2.dhcpmon.exe.3b36d68.2.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 11.0.SwiftCopy.pdf.exe.400000.1.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 32.0.dhcpmon.exe.400000.1.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 11.2.SwiftCopy.pdf.exe.5d74629.12.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.SwiftCopy.pdf.exe.42d6d68.3.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 32.2.dhcpmon.exe.3f83b5b.6.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 29.0.SwiftCopy.pdf.exe.400000.1.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 29.2.SwiftCopy.pdf.exe.43e9591.4.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 29.2.SwiftCopy.pdf.exe.43ded1e.5.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 21.2.dhcpmon.exe.3e56d68.2.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 20.2.dhcpmon.exe.3b36d68.2.unpack, type: UNPACKEDPE

        System Summary:

        barindex
        Malicious sample detected (through community Yara rule)Show sources
        Source: 00000020.00000000.836222469.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 00000020.00000000.836222469.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 0000001D.00000000.819759981.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 0000001D.00000000.819759981.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 0000000B.00000002.912587333.0000000005D60000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 0000001D.00000002.835267863.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 0000001D.00000002.835267863.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 0000000B.00000002.911932177.00000000054D0000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 0000001D.00000000.820327781.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 0000001D.00000000.820327781.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 0000000B.00000000.726462560.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 0000000B.00000000.726462560.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 00000014.00000002.820471977.0000000003A31000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 00000014.00000002.820471977.0000000003A31000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 00000000.00000002.741715588.00000000045C0000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 00000000.00000002.741715588.00000000045C0000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 00000020.00000002.857250258.0000000002F31000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 0000000B.00000002.912619347.0000000005D70000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 00000015.00000002.841434727.0000000003D51000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 00000015.00000002.841434727.0000000003D51000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 00000020.00000002.852127142.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 00000020.00000002.852127142.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 00000020.00000000.835581816.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 00000020.00000000.835581816.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 00000000.00000002.734043460.00000000041D1000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 00000000.00000002.734043460.00000000041D1000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 0000000B.00000002.908625280.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 0000000B.00000002.908625280.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 00000013.00000002.826910629.0000000004641000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 00000013.00000002.826910629.0000000004641000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 0000001D.00000002.836835816.0000000003391000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 0000001D.00000002.836971548.0000000004391000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 0000000B.00000000.726040524.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 0000000B.00000000.726040524.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 00000020.00000002.857349420.0000000003F31000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: Process Memory Space: SwiftCopy.pdf.exe PID: 2848, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: Process Memory Space: SwiftCopy.pdf.exe PID: 2848, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: Process Memory Space: SwiftCopy.pdf.exe PID: 6476, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: Process Memory Space: SwiftCopy.pdf.exe PID: 6476, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: Process Memory Space: SwiftCopy.pdf.exe PID: 6872, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: Process Memory Space: SwiftCopy.pdf.exe PID: 6872, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 29.0.SwiftCopy.pdf.exe.400000.3.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 29.0.SwiftCopy.pdf.exe.400000.3.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 11.2.SwiftCopy.pdf.exe.5d70000.11.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 11.2.SwiftCopy.pdf.exe.5d60000.10.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 19.2.SwiftCopy.pdf.exe.4746d68.2.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 19.2.SwiftCopy.pdf.exe.4746d68.2.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 29.2.SwiftCopy.pdf.exe.43ded1e.5.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 0.2.SwiftCopy.pdf.exe.42d6d68.3.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 0.2.SwiftCopy.pdf.exe.42d6d68.3.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 19.2.SwiftCopy.pdf.exe.4746d68.2.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 19.2.SwiftCopy.pdf.exe.4746d68.2.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 11.0.SwiftCopy.pdf.exe.400000.3.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 11.0.SwiftCopy.pdf.exe.400000.3.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 11.2.SwiftCopy.pdf.exe.4332580.6.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 11.2.SwiftCopy.pdf.exe.4319591.7.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 11.2.SwiftCopy.pdf.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 11.2.SwiftCopy.pdf.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 32.0.dhcpmon.exe.400000.3.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 32.0.dhcpmon.exe.400000.3.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 11.2.SwiftCopy.pdf.exe.4319591.7.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 32.2.dhcpmon.exe.2f53ac8.4.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 32.2.dhcpmon.exe.3f89591.7.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 29.2.SwiftCopy.pdf.exe.43e9591.4.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 11.2.SwiftCopy.pdf.exe.4332580.6.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 29.2.SwiftCopy.pdf.exe.33b3924.2.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 32.2.dhcpmon.exe.2f58b54.3.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 29.2.SwiftCopy.pdf.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 29.2.SwiftCopy.pdf.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 32.2.dhcpmon.exe.2f53ac8.4.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 32.2.dhcpmon.exe.3f7ed1e.5.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 32.2.dhcpmon.exe.3f7ed1e.5.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 11.2.SwiftCopy.pdf.exe.431dbba.5.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 11.2.SwiftCopy.pdf.exe.5d70000.11.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 11.2.SwiftCopy.pdf.exe.32d6488.4.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 11.2.SwiftCopy.pdf.exe.32d160c.3.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 11.2.SwiftCopy.pdf.exe.54d0000.8.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 29.2.SwiftCopy.pdf.exe.43e3b5b.6.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 29.2.SwiftCopy.pdf.exe.43e3b5b.6.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 32.2.dhcpmon.exe.3f89591.7.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 32.2.dhcpmon.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 32.2.dhcpmon.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 29.2.SwiftCopy.pdf.exe.33b89b0.3.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 21.2.dhcpmon.exe.3e56d68.2.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 21.2.dhcpmon.exe.3e56d68.2.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 20.2.dhcpmon.exe.3b36d68.2.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 20.2.dhcpmon.exe.3b36d68.2.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 11.0.SwiftCopy.pdf.exe.400000.1.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 11.0.SwiftCopy.pdf.exe.400000.1.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 32.0.dhcpmon.exe.400000.1.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 32.0.dhcpmon.exe.400000.1.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 32.2.dhcpmon.exe.3f7ed1e.5.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 11.2.SwiftCopy.pdf.exe.5d74629.12.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 0.2.SwiftCopy.pdf.exe.42d6d68.3.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 0.2.SwiftCopy.pdf.exe.42d6d68.3.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 32.2.dhcpmon.exe.3f83b5b.6.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 32.2.dhcpmon.exe.3f83b5b.6.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 29.2.SwiftCopy.pdf.exe.33b3924.2.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 29.0.SwiftCopy.pdf.exe.400000.1.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 29.0.SwiftCopy.pdf.exe.400000.1.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 11.2.SwiftCopy.pdf.exe.32d160c.3.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 29.2.SwiftCopy.pdf.exe.43e9591.4.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 29.2.SwiftCopy.pdf.exe.43ded1e.5.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 29.2.SwiftCopy.pdf.exe.43ded1e.5.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 21.2.dhcpmon.exe.3e56d68.2.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 21.2.dhcpmon.exe.3e56d68.2.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 20.2.dhcpmon.exe.3b36d68.2.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 20.2.dhcpmon.exe.3b36d68.2.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        .NET source code contains very large stringsShow sources
        Source: SwiftCopy.pdf.exe, LoginForm.csLong String: Length: 11840
        Source: xetNJdChYOitP.exe.0.dr, LoginForm.csLong String: Length: 11840
        Source: 0.2.SwiftCopy.pdf.exe.960000.0.unpack, LoginForm.csLong String: Length: 11840
        Source: 0.0.SwiftCopy.pdf.exe.960000.0.unpack, LoginForm.csLong String: Length: 11840
        Source: 10.2.SwiftCopy.pdf.exe.200000.0.unpack, LoginForm.csLong String: Length: 11840
        Source: 10.0.SwiftCopy.pdf.exe.200000.0.unpack, LoginForm.csLong String: Length: 11840
        Source: dhcpmon.exe.11.dr, LoginForm.csLong String: Length: 11840
        Source: 11.2.SwiftCopy.pdf.exe.9d0000.1.unpack, LoginForm.csLong String: Length: 11840
        Source: 11.0.SwiftCopy.pdf.exe.9d0000.4.unpack, LoginForm.csLong String: Length: 11840
        Initial sample is a PE file and has a suspicious nameShow sources
        Source: initial sampleStatic PE information: Filename: SwiftCopy.pdf.exe
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeCode function: 0_2_02D4213A NtQuerySystemInformation,
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeCode function: 0_2_02D42100 NtQuerySystemInformation,
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeCode function: 11_2_052C178E NtQuerySystemInformation,
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeCode function: 11_2_052C1753 NtQuerySystemInformation,
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeCode function: 19_2_08211DD2 NtQuerySystemInformation,
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeCode function: 19_2_08211D98 NtQuerySystemInformation,
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 21_2_05391DD2 NtQuerySystemInformation,
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 21_2_05391D98 NtQuerySystemInformation,
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeCode function: 0_2_015A2D78
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeCode function: 0_2_015AB978
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeCode function: 0_2_015AD91D
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeCode function: 0_2_015A8598
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeCode function: 0_2_015ABD88
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeCode function: 0_2_015A5478
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeCode function: 0_2_015A3400
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeCode function: 0_2_015A9020
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeCode function: 0_2_015AD4C0
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeCode function: 0_2_015A3898
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeCode function: 0_2_015A4B50
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeCode function: 0_2_015A4380
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeCode function: 0_2_015A6258
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeCode function: 0_2_015AF258
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeCode function: 0_2_015A0E68
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeCode function: 0_2_015A1E38
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeCode function: 0_2_015A6142
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeCode function: 0_2_015A6179
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeCode function: 0_2_015ABD77
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeCode function: 0_2_015A2D68
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeCode function: 0_2_015AB968
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeCode function: 0_2_015A9D08
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeCode function: 0_2_015ABD38
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeCode function: 0_2_015AA9D8
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeCode function: 0_2_015A79F8
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeCode function: 0_2_015AD1F1
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeCode function: 0_2_015A8190
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeCode function: 0_2_015A8588
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeCode function: 0_2_015AA989
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeCode function: 0_2_015A8180
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeCode function: 0_2_015AA1B0
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeCode function: 0_2_015AA1A0
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeCode function: 0_2_015A546A
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeCode function: 0_2_015AA438
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeCode function: 0_2_015AA428
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeCode function: 0_2_015A94F8
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeCode function: 0_2_015A9CF8
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeCode function: 0_2_015A94E8
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeCode function: 0_2_015A388A
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeCode function: 0_2_015AD4B0
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeCode function: 0_2_015AF354
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeCode function: 0_2_015ACB4F
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeCode function: 0_2_015AC340
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeCode function: 0_2_015A4B40
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeCode function: 0_2_015A4312
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeCode function: 0_2_015AD738
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeCode function: 0_2_015AC330
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeCode function: 0_2_015AD728
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeCode function: 0_2_015A83C8
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeCode function: 0_2_015A7F98
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeCode function: 0_2_015A8F88
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeCode function: 0_2_015A7F88
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeCode function: 0_2_015A83B8
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeCode function: 0_2_015A6FB0
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeCode function: 0_2_015A6FA2
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeCode function: 0_2_015A0E58
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeCode function: 0_2_015A7A08
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeCode function: 0_2_015AD200
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeCode function: 0_2_015A1E27
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeCode function: 0_2_015A42E0
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeCode function: 0_2_015ACA98
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeCode function: 0_2_015ACA90
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeCode function: 0_2_015ACAA0
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeCode function: 11_2_02F123A0
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeCode function: 11_2_02F12FA8
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeCode function: 11_2_02F1B7AD
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeCode function: 11_2_02F13850
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeCode function: 11_2_02F18D68
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeCode function: 11_2_02F19968
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeCode function: 11_2_02F19A2F
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeCode function: 11_2_02F1A210
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeCode function: 11_2_02F1306F
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeCode function: 19_2_03154B40
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeCode function: 19_2_03154380
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeCode function: 19_2_031533F0
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeCode function: 19_2_03151E38
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeCode function: 19_2_03150E58
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeCode function: 19_2_03156258
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeCode function: 19_2_0315BD08
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeCode function: 19_2_0315B978
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeCode function: 19_2_03152D78
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeCode function: 19_2_03158588
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeCode function: 19_2_0315C9D0
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeCode function: 19_2_0315D430
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeCode function: 19_2_03159020
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeCode function: 19_2_0315546A
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeCode function: 19_2_0315D89D
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeCode function: 19_2_0315388A
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeCode function: 19_2_03157F98
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeCode function: 19_2_03157F89
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeCode function: 19_2_03158F88
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeCode function: 19_2_03156FB0
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeCode function: 19_2_031583B8
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeCode function: 19_2_03156FA2
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeCode function: 19_2_031583C8
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeCode function: 19_2_0315CA10
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeCode function: 19_2_03157A08
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeCode function: 19_2_03151E27
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeCode function: 19_2_0315C2B0
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeCode function: 19_2_0315D6B8
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeCode function: 19_2_0315D6A9
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeCode function: 19_2_0315C2C0
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeCode function: 19_2_0315CACF
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeCode function: 19_2_031542E0
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeCode function: 19_2_0315D120
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeCode function: 19_2_03156147
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeCode function: 19_2_03156179
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeCode function: 19_2_03152D69
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeCode function: 19_2_0315B968
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeCode function: 19_2_03158190
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeCode function: 19_2_03158180
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeCode function: 19_2_0315A989
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeCode function: 19_2_0315A1A0
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeCode function: 19_2_0315A9D8
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeCode function: 19_2_031579F8
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeCode function: 19_2_0315A438
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeCode function: 19_2_031594F8
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeCode function: 19_2_03159CF8
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeCode function: 19_2_0315BCFA
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 20_2_04BA3896
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 20_2_04BA1E38
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 20_2_04BA9020
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 20_2_04BA5476
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 20_2_04BA0E58
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 20_2_04BA6258
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 20_2_04BA8588
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 20_2_04BA4380
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 20_2_04BA33F0
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 20_2_04BA2D78
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 20_2_04BAB978
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 20_2_04BA4B40
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 20_2_04BA9CF8
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 20_2_04BA94E8
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 20_2_04BA42E0
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 20_2_04BA52D0
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 20_2_04BAA438
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 20_2_04BAA428
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 20_2_04BA7A08
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 20_2_04BA6FB0
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 20_2_04BA6FA8
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 20_2_04BAA1A0
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 20_2_04BA7F98
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 20_2_04BA8190
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 20_2_04BA8F8B
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 20_2_04BA7F89
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 20_2_04BA8180
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 20_2_04BA79F8
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 20_2_04BAA9D8
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 20_2_04BA83C8
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 20_2_04BAA9C0
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 20_2_04BA83C1
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 20_2_04BA6179
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 20_2_04BAB973
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 20_2_04BA2D69
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 20_2_04BA6143
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 21_2_04F4D89D
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 21_2_04F4388A
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 21_2_04F4546A
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 21_2_04F4D430
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 21_2_04F49020
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 21_2_04F48588
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 21_2_04F4B978
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 21_2_04F42D78
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 21_2_04F4BD08
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 21_2_04F40E58
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 21_2_04F46258
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 21_2_04F41E38
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 21_2_04F433F0
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 21_2_04F44380
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 21_2_04F44B40
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 21_2_04F494F8
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 21_2_04F49CF8
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 21_2_04F4BCFA
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 21_2_04F494E8
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 21_2_04F4A438
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 21_2_04F4A428
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 21_2_04F479F8
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 21_2_04F4A9D8
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 21_2_04F4A1A0
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 21_2_04F48190
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 21_2_04F48180
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 21_2_04F4A989
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 21_2_04F4D170
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 21_2_04F46179
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 21_2_04F42D68
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 21_2_04F4B968
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 21_2_04F46143
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 21_2_04F442E0
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 21_2_04F4C2C0
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 21_2_04F4CACF
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 21_2_04F4C2B0
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 21_2_04F4D6B8
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 21_2_04F4D6A9
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 21_2_04F41E27
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 21_2_04F4CA10
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 21_2_04F47A08
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 21_2_04F483C8
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 21_2_04F46FB0
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 21_2_04F483B8
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 21_2_04F46FA2
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 21_2_04F47F98
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 21_2_04F48F8C
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 21_2_04F47F88
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 21_2_04F4CB23
        Source: SwiftCopy.pdf.exe, 00000000.00000002.743422851.0000000006CD0000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameMajorRevision.exe< vs SwiftCopy.pdf.exe
        Source: SwiftCopy.pdf.exe, 00000000.00000002.727647632.00000000009EE000.00000002.00020000.sdmpBinary or memory string: OriginalFilenamehcUgzA.exe: vs SwiftCopy.pdf.exe
        Source: SwiftCopy.pdf.exe, 00000000.00000002.730420038.0000000002D50000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameWindowsNetwork.dll> vs SwiftCopy.pdf.exe
        Source: SwiftCopy.pdf.exe, 00000000.00000002.745519092.0000000008C40000.00000002.00000001.sdmpBinary or memory string: System.OriginalFileName vs SwiftCopy.pdf.exe
        Source: SwiftCopy.pdf.exe, 00000000.00000002.743183682.0000000006AF0000.00000002.00000001.sdmpBinary or memory string: OriginalFilenamemscorrc.dllT vs SwiftCopy.pdf.exe
        Source: SwiftCopy.pdf.exe, 00000000.00000002.743563612.0000000006FC0000.00000002.00000001.sdmpBinary or memory string: originalfilename vs SwiftCopy.pdf.exe
        Source: SwiftCopy.pdf.exe, 00000000.00000002.743563612.0000000006FC0000.00000002.00000001.sdmpBinary or memory string: OriginalFilenamepropsys.dll.mui@ vs SwiftCopy.pdf.exe
        Source: SwiftCopy.pdf.exe, 0000000A.00000002.724885838.000000000028E000.00000002.00020000.sdmpBinary or memory string: OriginalFilenamehcUgzA.exe: vs SwiftCopy.pdf.exe
        Source: SwiftCopy.pdf.exe, 0000000B.00000002.913111276.0000000006250000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameLzma#.dll4 vs SwiftCopy.pdf.exe
        Source: SwiftCopy.pdf.exe, 0000000B.00000002.912263148.0000000005A70000.00000002.00000001.sdmpBinary or memory string: OriginalFilenamemscorrc.dllT vs SwiftCopy.pdf.exe
        Source: SwiftCopy.pdf.exe, 0000000B.00000002.913493984.00000000067B0000.00000002.00000001.sdmpBinary or memory string: OriginalFilenameKernelbase.dll.muij% vs SwiftCopy.pdf.exe
        Source: SwiftCopy.pdf.exe, 0000000B.00000002.910531601.00000000032C1000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameClientPlugin.dll4 vs SwiftCopy.pdf.exe
        Source: SwiftCopy.pdf.exe, 0000000B.00000002.910531601.00000000032C1000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameNanoProtectClient.dllT vs SwiftCopy.pdf.exe
        Source: SwiftCopy.pdf.exe, 0000000B.00000000.726164379.0000000000A5E000.00000002.00020000.sdmpBinary or memory string: OriginalFilenamehcUgzA.exe: vs SwiftCopy.pdf.exe
        Source: SwiftCopy.pdf.exe, 0000000B.00000002.910136702.0000000002F60000.00000002.00000001.sdmpBinary or memory string: OriginalFilenameuser32j% vs SwiftCopy.pdf.exe
        Source: SwiftCopy.pdf.exe, 0000000B.00000002.912619347.0000000005D70000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameSurveillanceExClientPlugin.dll4 vs SwiftCopy.pdf.exe
        Source: SwiftCopy.pdf.exe, 0000000B.00000002.909589663.0000000001269000.00000004.00000020.sdmpBinary or memory string: OriginalFilenamemscorwks.dllT vs SwiftCopy.pdf.exe
        Source: SwiftCopy.pdf.exe, 00000013.00000002.830985145.0000000008750000.00000002.00000001.sdmpBinary or memory string: System.OriginalFileName vs SwiftCopy.pdf.exe
        Source: SwiftCopy.pdf.exe, 00000013.00000002.830322013.0000000006EE0000.00000002.00000001.sdmpBinary or memory string: OriginalFilenamemscorrc.dllT vs SwiftCopy.pdf.exe
        Source: SwiftCopy.pdf.exe, 00000013.00000002.824821231.00000000036D9000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameMajorRevision.exe< vs SwiftCopy.pdf.exe
        Source: SwiftCopy.pdf.exe, 00000013.00000002.824821231.00000000036D9000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameWindowsNetwork.dll> vs SwiftCopy.pdf.exe
        Source: SwiftCopy.pdf.exe, 00000013.00000002.821492248.0000000000E5E000.00000002.00020000.sdmpBinary or memory string: OriginalFilenamehcUgzA.exe: vs SwiftCopy.pdf.exe
        Source: SwiftCopy.pdf.exe, 00000013.00000002.830433282.0000000006FA0000.00000002.00000001.sdmpBinary or memory string: originalfilename vs SwiftCopy.pdf.exe
        Source: SwiftCopy.pdf.exe, 00000013.00000002.830433282.0000000006FA0000.00000002.00000001.sdmpBinary or memory string: OriginalFilenamepropsys.dll.mui@ vs SwiftCopy.pdf.exe
        Source: SwiftCopy.pdf.exe, 0000001D.00000002.835389817.0000000000DBE000.00000002.00020000.sdmpBinary or memory string: OriginalFilenamehcUgzA.exe: vs SwiftCopy.pdf.exe
        Source: SwiftCopy.pdf.exe, 0000001D.00000002.837835685.00000000056D0000.00000002.00000001.sdmpBinary or memory string: OriginalFilenameuser32j% vs SwiftCopy.pdf.exe
        Source: SwiftCopy.pdf.exe, 0000001D.00000002.835797951.000000000149A000.00000004.00000020.sdmpBinary or memory string: OriginalFilenamemscorwks.dllT vs SwiftCopy.pdf.exe
        Source: SwiftCopy.pdf.exe, 0000001D.00000002.836835816.0000000003391000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameSurveillanceExClientPlugin.dll4 vs SwiftCopy.pdf.exe
        Source: SwiftCopy.pdf.exe, 0000001D.00000002.836835816.0000000003391000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameClientPlugin.dll4 vs SwiftCopy.pdf.exe
        Source: SwiftCopy.pdf.exe, 0000001D.00000002.836835816.0000000003391000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameNanoProtectClient.dllT vs SwiftCopy.pdf.exe
        Source: SwiftCopy.pdf.exe, 0000001D.00000002.836971548.0000000004391000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameLzma#.dll4 vs SwiftCopy.pdf.exe
        Source: SwiftCopy.pdf.exeBinary or memory string: OriginalFilenamehcUgzA.exe: vs SwiftCopy.pdf.exe
        Source: SwiftCopy.pdf.exeStatic PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE
        Source: 00000020.00000000.836222469.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 00000020.00000000.836222469.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 0000001D.00000000.819759981.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 0000001D.00000000.819759981.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 0000000B.00000002.912587333.0000000005D60000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 0000000B.00000002.912587333.0000000005D60000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 0000001D.00000002.835267863.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 0000001D.00000002.835267863.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 0000000B.00000002.911932177.00000000054D0000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 0000000B.00000002.911932177.00000000054D0000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 0000001D.00000000.820327781.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 0000001D.00000000.820327781.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 0000000B.00000000.726462560.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 0000000B.00000000.726462560.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 00000014.00000002.820471977.0000000003A31000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 00000014.00000002.820471977.0000000003A31000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 00000000.00000002.741715588.00000000045C0000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 00000000.00000002.741715588.00000000045C0000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 00000020.00000002.857250258.0000000002F31000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 0000000B.00000002.912619347.0000000005D70000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 0000000B.00000002.912619347.0000000005D70000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 00000015.00000002.841434727.0000000003D51000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 00000015.00000002.841434727.0000000003D51000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 00000020.00000002.852127142.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 00000020.00000002.852127142.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 00000020.00000000.835581816.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 00000020.00000000.835581816.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 00000000.00000002.734043460.00000000041D1000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 00000000.00000002.734043460.00000000041D1000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 0000000B.00000002.908625280.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 0000000B.00000002.908625280.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 00000013.00000002.826910629.0000000004641000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 00000013.00000002.826910629.0000000004641000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 0000001D.00000002.836835816.0000000003391000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 0000001D.00000002.836971548.0000000004391000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 0000000B.00000000.726040524.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 0000000B.00000000.726040524.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 00000020.00000002.857349420.0000000003F31000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: Process Memory Space: SwiftCopy.pdf.exe PID: 2848, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: Process Memory Space: SwiftCopy.pdf.exe PID: 2848, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: Process Memory Space: SwiftCopy.pdf.exe PID: 6476, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: Process Memory Space: SwiftCopy.pdf.exe PID: 6476, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: Process Memory Space: SwiftCopy.pdf.exe PID: 6872, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: Process Memory Space: SwiftCopy.pdf.exe PID: 6872, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 29.0.SwiftCopy.pdf.exe.400000.3.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 29.0.SwiftCopy.pdf.exe.400000.3.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 29.0.SwiftCopy.pdf.exe.400000.3.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 11.2.SwiftCopy.pdf.exe.5d70000.11.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 11.2.SwiftCopy.pdf.exe.5d70000.11.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 11.2.SwiftCopy.pdf.exe.5d60000.10.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 11.2.SwiftCopy.pdf.exe.5d60000.10.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 19.2.SwiftCopy.pdf.exe.4746d68.2.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 19.2.SwiftCopy.pdf.exe.4746d68.2.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 19.2.SwiftCopy.pdf.exe.4746d68.2.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 29.2.SwiftCopy.pdf.exe.43ded1e.5.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 29.2.SwiftCopy.pdf.exe.43ded1e.5.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 0.2.SwiftCopy.pdf.exe.42d6d68.3.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 0.2.SwiftCopy.pdf.exe.42d6d68.3.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 0.2.SwiftCopy.pdf.exe.42d6d68.3.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 19.2.SwiftCopy.pdf.exe.4746d68.2.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 19.2.SwiftCopy.pdf.exe.4746d68.2.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 19.2.SwiftCopy.pdf.exe.4746d68.2.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 11.0.SwiftCopy.pdf.exe.400000.3.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 11.0.SwiftCopy.pdf.exe.400000.3.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 11.0.SwiftCopy.pdf.exe.400000.3.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 11.2.SwiftCopy.pdf.exe.4332580.6.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 11.2.SwiftCopy.pdf.exe.4332580.6.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 11.2.SwiftCopy.pdf.exe.4319591.7.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 11.2.SwiftCopy.pdf.exe.4319591.7.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 11.2.SwiftCopy.pdf.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 11.2.SwiftCopy.pdf.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 11.2.SwiftCopy.pdf.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 32.0.dhcpmon.exe.400000.3.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 32.0.dhcpmon.exe.400000.3.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 32.0.dhcpmon.exe.400000.3.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 11.2.SwiftCopy.pdf.exe.4319591.7.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 11.2.SwiftCopy.pdf.exe.4319591.7.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 32.2.dhcpmon.exe.2f53ac8.4.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 32.2.dhcpmon.exe.2f53ac8.4.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 32.2.dhcpmon.exe.3f89591.7.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 32.2.dhcpmon.exe.3f89591.7.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 29.2.SwiftCopy.pdf.exe.43e9591.4.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 29.2.SwiftCopy.pdf.exe.43e9591.4.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 11.2.SwiftCopy.pdf.exe.4332580.6.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 11.2.SwiftCopy.pdf.exe.4332580.6.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 29.2.SwiftCopy.pdf.exe.33b3924.2.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 29.2.SwiftCopy.pdf.exe.33b3924.2.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 32.2.dhcpmon.exe.2f58b54.3.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 32.2.dhcpmon.exe.2f58b54.3.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 29.2.SwiftCopy.pdf.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 29.2.SwiftCopy.pdf.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 29.2.SwiftCopy.pdf.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 32.2.dhcpmon.exe.2f53ac8.4.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 32.2.dhcpmon.exe.2f53ac8.4.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 32.2.dhcpmon.exe.3f7ed1e.5.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 32.2.dhcpmon.exe.3f7ed1e.5.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 32.2.dhcpmon.exe.3f7ed1e.5.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 11.2.SwiftCopy.pdf.exe.431dbba.5.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 11.2.SwiftCopy.pdf.exe.431dbba.5.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 11.2.SwiftCopy.pdf.exe.5d70000.11.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 11.2.SwiftCopy.pdf.exe.5d70000.11.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 11.2.SwiftCopy.pdf.exe.32d6488.4.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 11.2.SwiftCopy.pdf.exe.32d6488.4.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 11.2.SwiftCopy.pdf.exe.32d160c.3.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 11.2.SwiftCopy.pdf.exe.32d160c.3.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 11.2.SwiftCopy.pdf.exe.54d0000.8.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 11.2.SwiftCopy.pdf.exe.54d0000.8.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 29.2.SwiftCopy.pdf.exe.43e3b5b.6.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 29.2.SwiftCopy.pdf.exe.43e3b5b.6.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 29.2.SwiftCopy.pdf.exe.43e3b5b.6.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 32.2.dhcpmon.exe.3f89591.7.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 32.2.dhcpmon.exe.3f89591.7.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 32.2.dhcpmon.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 32.2.dhcpmon.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 32.2.dhcpmon.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 29.2.SwiftCopy.pdf.exe.33b89b0.3.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 29.2.SwiftCopy.pdf.exe.33b89b0.3.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 21.2.dhcpmon.exe.3e56d68.2.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 21.2.dhcpmon.exe.3e56d68.2.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 21.2.dhcpmon.exe.3e56d68.2.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 20.2.dhcpmon.exe.3b36d68.2.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 20.2.dhcpmon.exe.3b36d68.2.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 20.2.dhcpmon.exe.3b36d68.2.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 11.0.SwiftCopy.pdf.exe.400000.1.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 11.0.SwiftCopy.pdf.exe.400000.1.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 11.0.SwiftCopy.pdf.exe.400000.1.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 32.0.dhcpmon.exe.400000.1.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 32.0.dhcpmon.exe.400000.1.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 32.0.dhcpmon.exe.400000.1.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 32.2.dhcpmon.exe.3f7ed1e.5.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 32.2.dhcpmon.exe.3f7ed1e.5.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 11.2.SwiftCopy.pdf.exe.5d74629.12.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 11.2.SwiftCopy.pdf.exe.5d74629.12.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 0.2.SwiftCopy.pdf.exe.42d6d68.3.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 0.2.SwiftCopy.pdf.exe.42d6d68.3.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 0.2.SwiftCopy.pdf.exe.42d6d68.3.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 32.2.dhcpmon.exe.3f83b5b.6.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 32.2.dhcpmon.exe.3f83b5b.6.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 32.2.dhcpmon.exe.3f83b5b.6.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 29.2.SwiftCopy.pdf.exe.33b3924.2.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 29.2.SwiftCopy.pdf.exe.33b3924.2.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 29.0.SwiftCopy.pdf.exe.400000.1.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 29.0.SwiftCopy.pdf.exe.400000.1.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 29.0.SwiftCopy.pdf.exe.400000.1.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 11.2.SwiftCopy.pdf.exe.32d160c.3.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 11.2.SwiftCopy.pdf.exe.32d160c.3.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 29.2.SwiftCopy.pdf.exe.43e9591.4.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 29.2.SwiftCopy.pdf.exe.43e9591.4.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 29.2.SwiftCopy.pdf.exe.43ded1e.5.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 29.2.SwiftCopy.pdf.exe.43ded1e.5.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 29.2.SwiftCopy.pdf.exe.43ded1e.5.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 21.2.dhcpmon.exe.3e56d68.2.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 21.2.dhcpmon.exe.3e56d68.2.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 21.2.dhcpmon.exe.3e56d68.2.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 20.2.dhcpmon.exe.3b36d68.2.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 20.2.dhcpmon.exe.3b36d68.2.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 20.2.dhcpmon.exe.3b36d68.2.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: SwiftCopy.pdf.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
        Source: xetNJdChYOitP.exe.0.drStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
        Source: dhcpmon.exe.11.drStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
        Source: SwiftCopy.pdf.exe, LoginForm.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
        Source: xetNJdChYOitP.exe.0.dr, LoginForm.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
        Source: 0.2.SwiftCopy.pdf.exe.960000.0.unpack, LoginForm.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
        Source: 0.0.SwiftCopy.pdf.exe.960000.0.unpack, LoginForm.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
        Source: 10.2.SwiftCopy.pdf.exe.200000.0.unpack, LoginForm.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
        Source: 10.0.SwiftCopy.pdf.exe.200000.0.unpack, LoginForm.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
        Source: 11.0.SwiftCopy.pdf.exe.400000.1.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csSecurity API names: System.Security.Principal.WindowsIdentity System.Security.Principal.WindowsIdentity::GetCurrent()
        Source: 11.0.SwiftCopy.pdf.exe.400000.1.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csSecurity API names: System.Boolean System.Security.Principal.WindowsPrincipal::IsInRole(System.Security.Principal.WindowsBuiltInRole)
        Source: 11.2.SwiftCopy.pdf.exe.400000.0.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csSecurity API names: System.Security.Principal.WindowsIdentity System.Security.Principal.WindowsIdentity::GetCurrent()
        Source: 11.2.SwiftCopy.pdf.exe.400000.0.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csSecurity API names: System.Boolean System.Security.Principal.WindowsPrincipal::IsInRole(System.Security.Principal.WindowsBuiltInRole)
        Source: 11.0.SwiftCopy.pdf.exe.400000.3.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csSecurity API names: System.Security.Principal.WindowsIdentity System.Security.Principal.WindowsIdentity::GetCurrent()
        Source: 11.0.SwiftCopy.pdf.exe.400000.3.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csSecurity API names: System.Boolean System.Security.Principal.WindowsPrincipal::IsInRole(System.Security.Principal.WindowsBuiltInRole)
        Source: classification engineClassification label: mal100.troj.evad.winEXE@27/13@13/2
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeCode function: 0_2_02D41D16 AdjustTokenPrivileges,
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeCode function: 0_2_02D41CDF AdjustTokenPrivileges,
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeCode function: 11_2_052C154E AdjustTokenPrivileges,
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeCode function: 11_2_052C1517 AdjustTokenPrivileges,
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeCode function: 19_2_08211D02 AdjustTokenPrivileges,
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeCode function: 19_2_08211CCB AdjustTokenPrivileges,
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 21_2_05391D02 AdjustTokenPrivileges,
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 21_2_05391CCB AdjustTokenPrivileges,
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeFile created: C:\Program Files (x86)\DHCP MonitorJump to behavior
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeFile created: C:\Users\user\AppData\Roaming\xetNJdChYOitP.exeJump to behavior
        Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5972:120:WilError_01
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeMutant created: \Sessions\1\BaseNamedObjects\Global\{7b42330a-496b-48fe-8a1c-b48f92653e95}
        Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6344:120:WilError_01
        Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:4800:120:WilError_01
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeMutant created: \Sessions\1\BaseNamedObjects\Global\.net clr networking
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeMutant created: \Sessions\1\BaseNamedObjects\hReiWqLZtvWC
        Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6988:120:WilError_01
        Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6632:120:WilError_01
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeFile created: C:\Users\user\AppData\Local\Temp\tmpF25B.tmpJump to behavior
        Source: SwiftCopy.pdf.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeSection loaded: C:\Windows\assembly\NativeImages_v2.0.50727_32\mscorlib\9603718106bd57ecfbb18fefd769cab4\mscorlib.ni.dll
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeSection loaded: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sorttbls.nlp
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeSection loaded: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sortkey.nlp
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeSection loaded: C:\Windows\assembly\NativeImages_v2.0.50727_32\mscorlib\9603718106bd57ecfbb18fefd769cab4\mscorlib.ni.dll
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeSection loaded: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sorttbls.nlp
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeSection loaded: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sortkey.nlp
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeSection loaded: C:\Windows\assembly\NativeImages_v2.0.50727_32\mscorlib\9603718106bd57ecfbb18fefd769cab4\mscorlib.ni.dll
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeSection loaded: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sorttbls.nlp
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeSection loaded: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sortkey.nlp
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeSection loaded: C:\Windows\assembly\NativeImages_v2.0.50727_32\mscorlib\9603718106bd57ecfbb18fefd769cab4\mscorlib.ni.dll
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeSection loaded: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sorttbls.nlp
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeSection loaded: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sortkey.nlp
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeSection loaded: C:\Windows\assembly\NativeImages_v2.0.50727_32\mscorlib\9603718106bd57ecfbb18fefd769cab4\mscorlib.ni.dll
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeSection loaded: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sorttbls.nlp
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeSection loaded: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sortkey.nlp
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeSection loaded: C:\Windows\assembly\NativeImages_v2.0.50727_32\mscorlib\9603718106bd57ecfbb18fefd769cab4\mscorlib.ni.dll
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeSection loaded: C:\Windows\assembly\NativeImages_v2.0.50727_32\mscorlib\9603718106bd57ecfbb18fefd769cab4\mscorlib.ni.dll
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
        Source: SwiftCopy.pdf.exeReversingLabs: Detection: 44%
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeFile read: C:\Users\user\Desktop\SwiftCopy.pdf.exeJump to behavior
        Source: unknownProcess created: C:\Users\user\Desktop\SwiftCopy.pdf.exe 'C:\Users\user\Desktop\SwiftCopy.pdf.exe'
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeProcess created: C:\Windows\SysWOW64\schtasks.exe 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\xetNJdChYOitP' /XML 'C:\Users\user\AppData\Local\Temp\tmpF25B.tmp'
        Source: C:\Windows\SysWOW64\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeProcess created: C:\Users\user\Desktop\SwiftCopy.pdf.exe {path}
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeProcess created: C:\Users\user\Desktop\SwiftCopy.pdf.exe {path}
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeProcess created: C:\Windows\SysWOW64\schtasks.exe 'schtasks.exe' /create /f /tn 'DHCP Monitor' /xml 'C:\Users\user\AppData\Local\Temp\tmpDE76.tmp'
        Source: C:\Windows\SysWOW64\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeProcess created: C:\Windows\SysWOW64\schtasks.exe 'schtasks.exe' /create /f /tn 'DHCP Monitor Task' /xml 'C:\Users\user\AppData\Local\Temp\tmpE388.tmp'
        Source: C:\Windows\SysWOW64\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
        Source: unknownProcess created: C:\Users\user\Desktop\SwiftCopy.pdf.exe C:\Users\user\Desktop\SwiftCopy.pdf.exe 0
        Source: unknownProcess created: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe 'C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe' 0
        Source: unknownProcess created: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe 'C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe'
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeProcess created: C:\Windows\SysWOW64\schtasks.exe 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\xetNJdChYOitP' /XML 'C:\Users\user\AppData\Local\Temp\tmp994A.tmp'
        Source: C:\Windows\SysWOW64\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeProcess created: C:\Users\user\Desktop\SwiftCopy.pdf.exe {path}
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess created: C:\Windows\SysWOW64\schtasks.exe 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\xetNJdChYOitP' /XML 'C:\Users\user\AppData\Local\Temp\tmpBC24.tmp'
        Source: C:\Windows\SysWOW64\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess created: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe {path}
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeProcess created: C:\Windows\SysWOW64\schtasks.exe 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\xetNJdChYOitP' /XML 'C:\Users\user\AppData\Local\Temp\tmpF25B.tmp'
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeProcess created: C:\Users\user\Desktop\SwiftCopy.pdf.exe {path}
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeProcess created: C:\Users\user\Desktop\SwiftCopy.pdf.exe {path}
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeProcess created: C:\Windows\SysWOW64\schtasks.exe 'schtasks.exe' /create /f /tn 'DHCP Monitor' /xml 'C:\Users\user\AppData\Local\Temp\tmpDE76.tmp'
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeProcess created: C:\Windows\SysWOW64\schtasks.exe 'schtasks.exe' /create /f /tn 'DHCP Monitor Task' /xml 'C:\Users\user\AppData\Local\Temp\tmpE388.tmp'
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeProcess created: C:\Windows\SysWOW64\schtasks.exe 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\xetNJdChYOitP' /XML 'C:\Users\user\AppData\Local\Temp\tmp994A.tmp'
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeProcess created: C:\Users\user\Desktop\SwiftCopy.pdf.exe {path}
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess created: C:\Windows\SysWOW64\schtasks.exe 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\xetNJdChYOitP' /XML 'C:\Users\user\AppData\Local\Temp\tmpBC24.tmp'
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess created: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe {path}
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{95E15D0A-66E6-93D9-C53C-76E6219D3341}\InProcServer32
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeFile opened: C:\Windows\Microsoft.NET\Framework\v2.0.50727\mscorrc.dll
        Source: SwiftCopy.pdf.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeFile opened: C:\Windows\WinSxS\x86_microsoft.vc80.crt_1fc8b3b9a1e18e3b_8.0.50727.9445_none_d08c58b4442ba54f\MSVCR80.dll
        Source: SwiftCopy.pdf.exeStatic PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
        Source: SwiftCopy.pdf.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
        Source: Binary string: indows\System.pdbpdbtem.pdbon source: SwiftCopy.pdf.exe, 0000000B.00000002.910162753.0000000002F75000.00000004.00000040.sdmp
        Source: Binary string: indows\symbols\dll\System.pdb source: SwiftCopy.pdf.exe, 0000000B.00000002.910162753.0000000002F75000.00000004.00000040.sdmp
        Source: Binary string: C:\Users\user\Desktop\hcUgzA.pdb source: SwiftCopy.pdf.exe, 0000000B.00000002.910162753.0000000002F75000.00000004.00000040.sdmp
        Source: Binary string: System.pdbM source: SwiftCopy.pdf.exe, 0000000B.00000002.910162753.0000000002F75000.00000004.00000040.sdmp
        Source: Binary string: C:\Windows\dll\System.pdb source: SwiftCopy.pdf.exe, 0000000B.00000002.910162753.0000000002F75000.00000004.00000040.sdmp
        Source: Binary string: C:\Windows\assembly\GAC_MSIL\System\2.0.0.0__b77a5c561934e089\System.pdbILE source: SwiftCopy.pdf.exe, 0000000B.00000002.910162753.0000000002F75000.00000004.00000040.sdmp
        Source: Binary string: 1koC:\Windows\System.pdb source: SwiftCopy.pdf.exe, 0000000B.00000002.913409176.000000000666C000.00000004.00000001.sdmp
        Source: Binary string: symbols\dll\System.pdb& source: SwiftCopy.pdf.exe, 0000000B.00000002.913409176.000000000666C000.00000004.00000001.sdmp
        Source: Binary string: C:\Users\Cole\Documents\Visual Studio 2013\Projects\NanoProtectPlugin\NanoProtectClient\obj\Debug\NanoProtectClient.pdb source: SwiftCopy.pdf.exe, 0000000B.00000002.910531601.00000000032C1000.00000004.00000001.sdmp, SwiftCopy.pdf.exe, 0000001D.00000002.836835816.0000000003391000.00000004.00000001.sdmp, dhcpmon.exe, 00000020.00000002.857250258.0000000002F31000.00000004.00000001.sdmp
        Source: Binary string: System.pdb H source: SwiftCopy.pdf.exe, 0000000B.00000002.913409176.000000000666C000.00000004.00000001.sdmp
        Source: Binary string: indows\hcUgzA.pdbpdbgzA.pdb source: SwiftCopy.pdf.exe, 0000000B.00000002.910162753.0000000002F75000.00000004.00000040.sdmp
        Source: Binary string: .pdbSystem source: SwiftCopy.pdf.exe, 0000000B.00000002.913409176.000000000666C000.00000004.00000001.sdmp
        Source: Binary string: C:\Windows\assembly\GA.pdbL\System\2.0.0.0__b77a5c561934e089\System.dll source: SwiftCopy.pdf.exe, 0000000B.00000002.913409176.000000000666C000.00000004.00000001.sdmp
        Source: Binary string: C:\Users\Administrator\Desktop\Client\Temp\BtHJZpKYpK\src\obj\Debug\hcUgzA.pdb source: SwiftCopy.pdf.exe
        Source: Binary string: C:\Windows\System.pdb++wE source: SwiftCopy.pdf.exe, 0000000B.00000002.910162753.0000000002F75000.00000004.00000040.sdmp
        Source: Binary string: System.pdb source: SwiftCopy.pdf.exe, 0000000B.00000002.913409176.000000000666C000.00000004.00000001.sdmp
        Source: Binary string: mscorrc.pdb source: SwiftCopy.pdf.exe, 00000000.00000002.743183682.0000000006AF0000.00000002.00000001.sdmp, SwiftCopy.pdf.exe, 0000000B.00000002.912263148.0000000005A70000.00000002.00000001.sdmp, SwiftCopy.pdf.exe, 00000013.00000002.830322013.0000000006EE0000.00000002.00000001.sdmp, dhcpmon.exe, 00000014.00000002.824841723.0000000006010000.00000002.00000001.sdmp, dhcpmon.exe, 00000015.00000002.843885287.0000000006430000.00000002.00000001.sdmp
        Source: Binary string: System.pdbSystem.pdbpdbtem.pdbm\2.0.0.0__b77a5c561934e089\System.pdb source: SwiftCopy.pdf.exe, 0000000B.00000002.913409176.000000000666C000.00000004.00000001.sdmp

        Data Obfuscation:

        barindex
        .NET source code contains method to dynamically call methods (often used by packers)Show sources
        Source: SwiftCopy.pdf.exe, LoginForm.cs.Net Code: LateBinding.LateCall(V_1, null, "Invoke", new object[] { 0, V_0 }, null, null)
        Source: xetNJdChYOitP.exe.0.dr, LoginForm.cs.Net Code: LateBinding.LateCall(V_1, null, "Invoke", new object[] { 0, V_0 }, null, null)
        Source: 0.2.SwiftCopy.pdf.exe.960000.0.unpack, LoginForm.cs.Net Code: LateBinding.LateCall(V_1, null, "Invoke", new object[] { 0, V_0 }, null, null)
        Source: 0.0.SwiftCopy.pdf.exe.960000.0.unpack, LoginForm.cs.Net Code: LateBinding.LateCall(V_1, null, "Invoke", new object[] { 0, V_0 }, null, null)
        Source: 10.2.SwiftCopy.pdf.exe.200000.0.unpack, LoginForm.cs.Net Code: LateBinding.LateCall(V_1, null, "Invoke", new object[] { 0, V_0 }, null, null)
        Source: dhcpmon.exe.11.dr, LoginForm.cs.Net Code: LateBinding.LateCall(V_1, null, "Invoke", new object[] { 0, V_0 }, null, null)
        Source: 11.2.SwiftCopy.pdf.exe.9d0000.1.unpack, LoginForm.cs.Net Code: LateBinding.LateCall(V_1, null, "Invoke", new object[] { 0, V_0 }, null, null)
        Source: 11.0.SwiftCopy.pdf.exe.9d0000.4.unpack, LoginForm.cs.Net Code: LateBinding.LateCall(V_1, null, "Invoke", new object[] { 0, V_0 }, null, null)
        .NET source code contains potential unpackerShow sources
        Source: SwiftCopy.pdf.exe, LoginForm.cs.Net Code: I_ System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
        Source: xetNJdChYOitP.exe.0.dr, LoginForm.cs.Net Code: I_ System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
        Source: 0.2.SwiftCopy.pdf.exe.960000.0.unpack, LoginForm.cs.Net Code: I_ System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
        Source: 0.0.SwiftCopy.pdf.exe.960000.0.unpack, LoginForm.cs.Net Code: I_ System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
        Source: 10.2.SwiftCopy.pdf.exe.200000.0.unpack, LoginForm.cs.Net Code: I_ System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
        Source: 10.0.SwiftCopy.pdf.exe.200000.0.unpack, LoginForm.cs.Net Code: I_ System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
        Source: dhcpmon.exe.11.dr, LoginForm.cs.Net Code: I_ System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
        Source: 11.0.SwiftCopy.pdf.exe.400000.3.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.cs.Net Code: #=q_FL69pQf17BUSAFbWYu1SStMAbdu$R1GJ8VY8UL5_EA= System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
        Source: 11.0.SwiftCopy.pdf.exe.400000.3.unpack, u0023u003dqxoz66kOqvxr21iYXZYXWiumy9eZGwFWaiX4C5X8aecUu003d.cs.Net Code: #=qKU0J1fiP8KA33eFK1owekQ== System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
        Source: 11.2.SwiftCopy.pdf.exe.400000.0.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.cs.Net Code: #=q_FL69pQf17BUSAFbWYu1SStMAbdu$R1GJ8VY8UL5_EA= System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
        Source: 11.2.SwiftCopy.pdf.exe.400000.0.unpack, u0023u003dqxoz66kOqvxr21iYXZYXWiumy9eZGwFWaiX4C5X8aecUu003d.cs.Net Code: #=qKU0J1fiP8KA33eFK1owekQ== System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
        Source: 11.2.SwiftCopy.pdf.exe.9d0000.1.unpack, LoginForm.cs.Net Code: I_ System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
        Source: 11.0.SwiftCopy.pdf.exe.9d0000.4.unpack, LoginForm.cs.Net Code: I_ System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
        Source: 11.0.SwiftCopy.pdf.exe.400000.1.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.cs.Net Code: #=q_FL69pQf17BUSAFbWYu1SStMAbdu$R1GJ8VY8UL5_EA= System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
        Source: 11.0.SwiftCopy.pdf.exe.400000.1.unpack, u0023u003dqxoz66kOqvxr21iYXZYXWiumy9eZGwFWaiX4C5X8aecUu003d.cs.Net Code: #=qKU0J1fiP8KA33eFK1owekQ== System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeCode function: 0_2_015A8872 push cs; retf
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeCode function: 0_2_015A882D push ebx; retf
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeCode function: 0_2_015AE497 push ebp; retf
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeCode function: 11_2_01169E24 pushfd ; retf
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeCode function: 11_2_01167698 push es; ret
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeCode function: 11_2_011674B8 push ebp; ret
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeCode function: 11_2_011674AC push ecx; ret
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeCode function: 11_2_01169DEC pushfd ; retf
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeCode function: 19_2_0315E417 push ebp; retf
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeCode function: 19_2_0315882D push ebx; retf
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeCode function: 19_2_03158872 push cs; retf
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 20_2_04BA882D push ebx; retf
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 20_2_04BA8872 push cs; retf
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 20_2_04BAB25D push ebp; iretd
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 21_2_04F48872 push cs; retf
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 21_2_04F4882D push ebx; retf
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 21_2_04F4E417 push ebp; retf
        Source: initial sampleStatic PE information: section name: .text entropy: 7.53870171772
        Source: initial sampleStatic PE information: section name: .text entropy: 7.53870171772
        Source: initial sampleStatic PE information: section name: .text entropy: 7.53870171772
        Source: 11.0.SwiftCopy.pdf.exe.400000.3.unpack, u0023u003dqJT4I5hOweIku0024xYFEeDszbikglXCuquUdu0024v9AXtyq2nsu003d.csHigh entropy of concatenated method names: '#=qBeOBlH6CwHFnQdZWWBgZ_pemudZ6CfCVcfOQtgpeG$Y=', '#=q5v5cLSMFBaxiTtOEjscx86gN2ozXlfytiL6UmXnyWtg=', '#=q_XA5h2lVGHLcY9dK754wKGrOjAm6aBbwPxcUJXgJThJUz83kMbCL53G5uuOLP6Rq', '#=qIFfr$DrKqIieRc688$vylAlBsEnx9Z3$TxvrDsPURfM=', '#=qejgvNXJQvgM2GomZsygLjreyguSPQ29pQHqjR_a0dWk=', '#=qCGokdf0OOxeMJLDkXSfc3NPmwygIQ29RjKQWj$wbNGB9C1pPgma_891QiNyTRXcA', '#=qDqyUVyJLXCtYqhZ0$opqkomqhUBn2WCeEEvGAXlNQ$I=', '#=qdImPAY1o3YhbLtukwCQ91cISaeIEWRKSYrGZ3dTVnkY=', '#=qza7O1AHrroJC7yRIJz4wINR_Sgo4hDpQrj_OYfIrlJE=', '#=q6Ct3QmvVLFC7my$dL1uEiHGmXJ5qCuK4WIhDwfhPTFs='
        Source: 11.0.SwiftCopy.pdf.exe.400000.3.unpack, u0023u003dqWrm21vQ8CBMZP_RBTwpusAu003du003d.csHigh entropy of concatenated method names: '#=qCgU$tDqtOAyz2b$RwfSF7UzBcCAr0rFJWxm16x7Lre0=', '#=qeD3MBfedCIuKIQf9V1u2N3YS4VXE_FOHqw_XAjWtZK8=', '#=q$mvEHEBkZud$AdHPWqsMQnw5Xm5sD4vBSSmqrKuXGOk=', '#=qZaN94n8dM6tBEf$qCdY2kbTZb5BOW8Z134$2tNv7EJs=', '#=qtlZnL8mho$rv1eTFz0Mw9UYFC_yCabEZ0xtVePn6wR5aSHE7ti3UfKg2l7D0_xk8', '#=qVS$QmQjvFfsXSqQAKGSl6HGbkse2SG0XCab4upVjtRJkvhTEk$oIS2I9Zja7id1Q', '#=qxJg7RxTW1v5mnt12xXeJiYJv_bcctbtL2BCD5MjDi45Hlz6t8vwDNTv1Rv7tgIct', '#=qp$ZVC1r9spi890l$D7IwEd3faoKeWHvv42mVq8wIIWM=', '#=qCoWHlVuoVRMkOzC7RZubJCslkxaEWn9yZiIydECf69$ktj0IPD5wAwC2H5Cc8C$L', '#=qqs1moO$mYaS72OXOWe0Z6GycslEb6e9Ipoy7ppW0O5abIp05ajv8doqdJZHlN3cK'
        Source: 11.2.SwiftCopy.pdf.exe.400000.0.unpack, u0023u003dqJT4I5hOweIku0024xYFEeDszbikglXCuquUdu0024v9AXtyq2nsu003d.csHigh entropy of concatenated method names: '#=qBeOBlH6CwHFnQdZWWBgZ_pemudZ6CfCVcfOQtgpeG$Y=', '#=q5v5cLSMFBaxiTtOEjscx86gN2ozXlfytiL6UmXnyWtg=', '#=q_XA5h2lVGHLcY9dK754wKGrOjAm6aBbwPxcUJXgJThJUz83kMbCL53G5uuOLP6Rq', '#=qIFfr$DrKqIieRc688$vylAlBsEnx9Z3$TxvrDsPURfM=', '#=qejgvNXJQvgM2GomZsygLjreyguSPQ29pQHqjR_a0dWk=', '#=qCGokdf0OOxeMJLDkXSfc3NPmwygIQ29RjKQWj$wbNGB9C1pPgma_891QiNyTRXcA', '#=qDqyUVyJLXCtYqhZ0$opqkomqhUBn2WCeEEvGAXlNQ$I=', '#=qdImPAY1o3YhbLtukwCQ91cISaeIEWRKSYrGZ3dTVnkY=', '#=qza7O1AHrroJC7yRIJz4wINR_Sgo4hDpQrj_OYfIrlJE=', '#=q6Ct3QmvVLFC7my$dL1uEiHGmXJ5qCuK4WIhDwfhPTFs='
        Source: 11.2.SwiftCopy.pdf.exe.400000.0.unpack, u0023u003dqWrm21vQ8CBMZP_RBTwpusAu003du003d.csHigh entropy of concatenated method names: '#=qCgU$tDqtOAyz2b$RwfSF7UzBcCAr0rFJWxm16x7Lre0=', '#=qeD3MBfedCIuKIQf9V1u2N3YS4VXE_FOHqw_XAjWtZK8=', '#=q$mvEHEBkZud$AdHPWqsMQnw5Xm5sD4vBSSmqrKuXGOk=', '#=qZaN94n8dM6tBEf$qCdY2kbTZb5BOW8Z134$2tNv7EJs=', '#=qtlZnL8mho$rv1eTFz0Mw9UYFC_yCabEZ0xtVePn6wR5aSHE7ti3UfKg2l7D0_xk8', '#=qVS$QmQjvFfsXSqQAKGSl6HGbkse2SG0XCab4upVjtRJkvhTEk$oIS2I9Zja7id1Q', '#=qxJg7RxTW1v5mnt12xXeJiYJv_bcctbtL2BCD5MjDi45Hlz6t8vwDNTv1Rv7tgIct', '#=qp$ZVC1r9spi890l$D7IwEd3faoKeWHvv42mVq8wIIWM=', '#=qCoWHlVuoVRMkOzC7RZubJCslkxaEWn9yZiIydECf69$ktj0IPD5wAwC2H5Cc8C$L', '#=qqs1moO$mYaS72OXOWe0Z6GycslEb6e9Ipoy7ppW0O5abIp05ajv8doqdJZHlN3cK'
        Source: 11.0.SwiftCopy.pdf.exe.400000.1.unpack, u0023u003dqJT4I5hOweIku0024xYFEeDszbikglXCuquUdu0024v9AXtyq2nsu003d.csHigh entropy of concatenated method names: '#=qBeOBlH6CwHFnQdZWWBgZ_pemudZ6CfCVcfOQtgpeG$Y=', '#=q5v5cLSMFBaxiTtOEjscx86gN2ozXlfytiL6UmXnyWtg=', '#=q_XA5h2lVGHLcY9dK754wKGrOjAm6aBbwPxcUJXgJThJUz83kMbCL53G5uuOLP6Rq', '#=qIFfr$DrKqIieRc688$vylAlBsEnx9Z3$TxvrDsPURfM=', '#=qejgvNXJQvgM2GomZsygLjreyguSPQ29pQHqjR_a0dWk=', '#=qCGokdf0OOxeMJLDkXSfc3NPmwygIQ29RjKQWj$wbNGB9C1pPgma_891QiNyTRXcA', '#=qDqyUVyJLXCtYqhZ0$opqkomqhUBn2WCeEEvGAXlNQ$I=', '#=qdImPAY1o3YhbLtukwCQ91cISaeIEWRKSYrGZ3dTVnkY=', '#=qza7O1AHrroJC7yRIJz4wINR_Sgo4hDpQrj_OYfIrlJE=', '#=q6Ct3QmvVLFC7my$dL1uEiHGmXJ5qCuK4WIhDwfhPTFs='
        Source: 11.0.SwiftCopy.pdf.exe.400000.1.unpack, u0023u003dqWrm21vQ8CBMZP_RBTwpusAu003du003d.csHigh entropy of concatenated method names: '#=qCgU$tDqtOAyz2b$RwfSF7UzBcCAr0rFJWxm16x7Lre0=', '#=qeD3MBfedCIuKIQf9V1u2N3YS4VXE_FOHqw_XAjWtZK8=', '#=q$mvEHEBkZud$AdHPWqsMQnw5Xm5sD4vBSSmqrKuXGOk=', '#=qZaN94n8dM6tBEf$qCdY2kbTZb5BOW8Z134$2tNv7EJs=', '#=qtlZnL8mho$rv1eTFz0Mw9UYFC_yCabEZ0xtVePn6wR5aSHE7ti3UfKg2l7D0_xk8', '#=qVS$QmQjvFfsXSqQAKGSl6HGbkse2SG0XCab4upVjtRJkvhTEk$oIS2I9Zja7id1Q', '#=qxJg7RxTW1v5mnt12xXeJiYJv_bcctbtL2BCD5MjDi45Hlz6t8vwDNTv1Rv7tgIct', '#=qp$ZVC1r9spi890l$D7IwEd3faoKeWHvv42mVq8wIIWM=', '#=qCoWHlVuoVRMkOzC7RZubJCslkxaEWn9yZiIydECf69$ktj0IPD5wAwC2H5Cc8C$L', '#=qqs1moO$mYaS72OXOWe0Z6GycslEb6e9Ipoy7ppW0O5abIp05ajv8doqdJZHlN3cK'
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeFile created: C:\Users\user\AppData\Roaming\xetNJdChYOitP.exeJump to dropped file
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeFile created: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeJump to dropped file

        Boot Survival:

        barindex
        Uses schtasks.exe or at.exe to add and modify task schedulesShow sources
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeProcess created: C:\Windows\SysWOW64\schtasks.exe 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\xetNJdChYOitP' /XML 'C:\Users\user\AppData\Local\Temp\tmpF25B.tmp'

        Hooking and other Techniques for Hiding and Protection:

        barindex
        Icon mismatch, binary includes an icon from a different legit application in order to fool usersShow sources
        Source: initial sampleIcon embedded in binary file: icon matches a legit application icon: download (29).png
        Hides that the sample has been downloaded from the Internet (zone.identifier)Show sources
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeFile opened: C:\Users\user\Desktop\SwiftCopy.pdf.exe:Zone.Identifier read attributes | delete
        Uses an obfuscated file name to hide its real file extension (double extension)Show sources
        Source: Possible double extension: pdf.exeStatic PE information: SwiftCopy.pdf.exe
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX

        Malware Analysis System Evasion:

        barindex
        Yara detected AntiVM3Show sources
        Source: Yara matchFile source: Process Memory Space: SwiftCopy.pdf.exe PID: 7040, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: dhcpmon.exe PID: 5848, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: dhcpmon.exe PID: 6152, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: SwiftCopy.pdf.exe PID: 6872, type: MEMORY
        Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)Show sources
        Source: SwiftCopy.pdf.exe, 00000000.00000002.731903892.0000000003200000.00000004.00000001.sdmp, SwiftCopy.pdf.exe, 00000013.00000002.824701204.0000000003670000.00000004.00000001.sdmp, dhcpmon.exe, 00000014.00000002.819289713.0000000002A60000.00000004.00000001.sdmp, dhcpmon.exe, 00000015.00000002.840138693.0000000002D80000.00000004.00000001.sdmpBinary or memory string: WINE_GET_UNIX_FILE_NAME
        Source: SwiftCopy.pdf.exe, 00000000.00000002.731903892.0000000003200000.00000004.00000001.sdmp, SwiftCopy.pdf.exe, 00000013.00000002.824701204.0000000003670000.00000004.00000001.sdmp, dhcpmon.exe, 00000014.00000002.819289713.0000000002A60000.00000004.00000001.sdmp, dhcpmon.exe, 00000015.00000002.840138693.0000000002D80000.00000004.00000001.sdmpBinary or memory string: SBIEDLL.DLL
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeFile opened / queried: SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&280b647&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeThread delayed: delay time: 922337203685477
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeThread delayed: delay time: 922337203685477
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeThread delayed: delay time: 922337203685477
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 922337203685477
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 922337203685477
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeThread delayed: delay time: 922337203685477
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 922337203685477
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeWindow / User API: foregroundWindowGot 586
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exe TID: 6892Thread sleep time: -922337203685477s >= -30000s
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exe TID: 4608Thread sleep time: -922337203685477s >= -30000s
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exe TID: 4608Thread sleep count: 182 > 30
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exe TID: 4608Thread sleep count: 206 > 30
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exe TID: 4608Thread sleep count: 33 > 30
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exe TID: 6920Thread sleep time: -380000s >= -30000s
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exe TID: 6924Thread sleep time: -922337203685477s >= -30000s
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe TID: 5696Thread sleep time: -922337203685477s >= -30000s
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe TID: 6212Thread sleep time: -922337203685477s >= -30000s
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exe TID: 2092Thread sleep time: -922337203685477s >= -30000s
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe TID: 6456Thread sleep time: -922337203685477s >= -30000s
        Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
        Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
        Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
        Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
        Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeCode function: 11_2_052C1276 GetSystemInfo,
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeThread delayed: delay time: 922337203685477
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeThread delayed: delay time: 922337203685477
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeThread delayed: delay time: 922337203685477
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 922337203685477
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 922337203685477
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeThread delayed: delay time: 922337203685477
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 922337203685477
        Source: dhcpmon.exe, 00000015.00000002.840138693.0000000002D80000.00000004.00000001.sdmpBinary or memory string: VMware SVGA IIOData Source=localhost\sqlexpress;Initial Catalog=dbSMS;Integrated Security=True
        Source: SwiftCopy.pdf.exe, 0000000B.00000002.913493984.00000000067B0000.00000002.00000001.sdmpBinary or memory string: A Virtual Machine could not be started because Hyper-V is not installed.
        Source: dhcpmon.exe, 00000015.00000002.840138693.0000000002D80000.00000004.00000001.sdmpBinary or memory string: vmware
        Source: dhcpmon.exe, 00000015.00000002.840138693.0000000002D80000.00000004.00000001.sdmpBinary or memory string: C:\PROGRAM FILES\VMWARE\VMWARE TOOLS\
        Source: dhcpmon.exe, 00000015.00000002.840138693.0000000002D80000.00000004.00000001.sdmpBinary or memory string: SOFTWARE\VMware, Inc.\VMware Tools
        Source: dhcpmon.exe, 00000015.00000002.840138693.0000000002D80000.00000004.00000001.sdmpBinary or memory string: VMWARE
        Source: dhcpmon.exe, 00000015.00000002.840138693.0000000002D80000.00000004.00000001.sdmpBinary or memory string: InstallPath%C:\PROGRAM FILES\VMWARE\VMWARE TOOLS\
        Source: SwiftCopy.pdf.exe, 0000000B.00000002.913493984.00000000067B0000.00000002.00000001.sdmpBinary or memory string: A communication protocol error has occurred between the Hyper-V Host and Guest Compute Service.
        Source: SwiftCopy.pdf.exe, 0000000B.00000002.913493984.00000000067B0000.00000002.00000001.sdmpBinary or memory string: The communication protocol version between the Hyper-V Host and Guest Compute Services is not supported.
        Source: dhcpmon.exe, 00000015.00000002.840138693.0000000002D80000.00000004.00000001.sdmpBinary or memory string: VMWARE"SOFTWARE\VMware, Inc.\VMware ToolsLHARDWARE\DEVICEMAP\Scsi\Scsi Port 1\Scsi Bus 0\Target Id 0\Logical Unit Id 0LHARDWARE\DEVICEMAP\Scsi\Scsi Port 2\Scsi Bus 0\Target Id 0\Logical Unit Id 0'SYSTEM\ControlSet001\Services\Disk\Enum
        Source: dhcpmon.exe, 00000015.00000002.840138693.0000000002D80000.00000004.00000001.sdmpBinary or memory string: VMware SVGA II
        Source: dhcpmon.exe, 00000015.00000002.840138693.0000000002D80000.00000004.00000001.sdmpBinary or memory string: vmwareNSYSTEM\ControlSet001\Control\Class\{4D36E968-E325-11CE-BFC1-08002BE10318}\0000
        Source: SwiftCopy.pdf.exe, 0000000B.00000003.869986141.00000000012E3000.00000004.00000001.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
        Source: SwiftCopy.pdf.exe, 0000000B.00000002.913493984.00000000067B0000.00000002.00000001.sdmpBinary or memory string: An unknown internal message was received by the Hyper-V Compute Service.
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeProcess information queried: ProcessInformation
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeProcess token adjusted: Debug
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeProcess token adjusted: Debug
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeProcess token adjusted: Debug
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess token adjusted: Debug
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeMemory allocated: page read and write | page guard

        HIPS / PFW / Operating System Protection Evasion:

        barindex
        Injects a PE file into a foreign processesShow sources
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeMemory written: C:\Users\user\Desktop\SwiftCopy.pdf.exe base: 400000 value starts with: 4D5A
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeMemory written: C:\Users\user\Desktop\SwiftCopy.pdf.exe base: 400000 value starts with: 4D5A
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeMemory written: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe base: 400000 value starts with: 4D5A
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeProcess created: C:\Windows\SysWOW64\schtasks.exe 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\xetNJdChYOitP' /XML 'C:\Users\user\AppData\Local\Temp\tmpF25B.tmp'
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeProcess created: C:\Users\user\Desktop\SwiftCopy.pdf.exe {path}
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeProcess created: C:\Users\user\Desktop\SwiftCopy.pdf.exe {path}
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeProcess created: C:\Windows\SysWOW64\schtasks.exe 'schtasks.exe' /create /f /tn 'DHCP Monitor' /xml 'C:\Users\user\AppData\Local\Temp\tmpDE76.tmp'
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeProcess created: C:\Windows\SysWOW64\schtasks.exe 'schtasks.exe' /create /f /tn 'DHCP Monitor Task' /xml 'C:\Users\user\AppData\Local\Temp\tmpE388.tmp'
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeProcess created: C:\Windows\SysWOW64\schtasks.exe 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\xetNJdChYOitP' /XML 'C:\Users\user\AppData\Local\Temp\tmp994A.tmp'
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeProcess created: C:\Users\user\Desktop\SwiftCopy.pdf.exe {path}
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess created: C:\Windows\SysWOW64\schtasks.exe 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\xetNJdChYOitP' /XML 'C:\Users\user\AppData\Local\Temp\tmpBC24.tmp'
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess created: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe {path}
        Source: SwiftCopy.pdf.exe, 0000000B.00000002.910675975.000000000338E000.00000004.00000001.sdmpBinary or memory string: Program Manager(
        Source: SwiftCopy.pdf.exe, 0000000B.00000002.910867572.000000000353C000.00000004.00000001.sdmpBinary or memory string: Program Manager
        Source: SwiftCopy.pdf.exe, 0000000B.00000002.909891247.00000000018B0000.00000002.00000001.sdmpBinary or memory string: Shell_TrayWnd
        Source: SwiftCopy.pdf.exe, 0000000B.00000002.909891247.00000000018B0000.00000002.00000001.sdmpBinary or memory string: Progman
        Source: SwiftCopy.pdf.exe, 0000000B.00000003.869986141.00000000012E3000.00000004.00000001.sdmpBinary or memory string: Program Managerl
        Source: SwiftCopy.pdf.exe, 0000000B.00000003.856666930.000000000131D000.00000004.00000001.sdmpBinary or memory string: Program Managerz4 I
        Source: SwiftCopy.pdf.exe, 0000000B.00000002.909891247.00000000018B0000.00000002.00000001.sdmpBinary or memory string: Progmanlock
        Source: SwiftCopy.pdf.exe, 0000000B.00000002.909678566.00000000012E3000.00000004.00000020.sdmpBinary or memory string: Program ManagerlnA
        Source: SwiftCopy.pdf.exe, 0000000B.00000003.869986141.00000000012E3000.00000004.00000001.sdmpBinary or memory string: Program Managerz
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeQueries volume information: C:\Windows\Fonts\arial.ttf VolumeInformation
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeQueries volume information: C:\Windows\Fonts\ariali.ttf VolumeInformation
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeQueries volume information: C:\Windows\Fonts\arialbd.ttf VolumeInformation
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeQueries volume information: C:\Windows\Fonts\arialbi.ttf VolumeInformation
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeQueries volume information: C:\Windows\Fonts\ARIALN.TTF VolumeInformation
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeQueries volume information: C:\Windows\Fonts\ariblk.ttf VolumeInformation
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeQueries volume information: C:\Windows\Fonts\ARIALNI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeQueries volume information: C:\Windows\Fonts\ARIALNB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeQueries volume information: C:\Windows\Fonts\ARIALNBI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformation
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeQueries volume information: C:\Windows\Fonts\calibri.ttf VolumeInformation
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeQueries volume information: C:\Windows\Fonts\calibril.ttf VolumeInformation
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeQueries volume information: C:\Windows\Fonts\calibrii.ttf VolumeInformation
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeQueries volume information: C:\Windows\Fonts\calibrili.ttf VolumeInformation
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeQueries volume information: C:\Windows\Fonts\calibrib.ttf VolumeInformation
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeQueries volume information: C:\Windows\Fonts\calibriz.ttf VolumeInformation
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeQueries volume information: C:\Windows\Fonts\cambria.ttc VolumeInformation
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeQueries volume information: C:\Windows\Fonts\cambriai.ttf VolumeInformation
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeQueries volume information: C:\Windows\Fonts\cambriab.ttf VolumeInformation
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeQueries volume information: C:\Windows\Fonts\cambriaz.ttf VolumeInformation
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeQueries volume information: C:\Windows\Fonts\Candara.ttf VolumeInformation
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeQueries volume information: C:\Windows\Fonts\Candarai.ttf VolumeInformation
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeQueries volume information: C:\Windows\Fonts\Candarab.ttf VolumeInformation
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeQueries volume information: C:\Windows\Fonts\Candaraz.ttf VolumeInformation
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeQueries volume information: C:\Windows\Fonts\comic.ttf VolumeInformation
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeQueries volume information: C:\Windows\Fonts\comici.ttf VolumeInformation
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeQueries volume information: C:\Windows\Fonts\comicbd.ttf VolumeInformation
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeQueries volume information: C:\Windows\Fonts\comicz.ttf VolumeInformation
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeQueries volume information: C:\Windows\Fonts\consola.ttf VolumeInformation
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeQueries volume information: C:\Windows\Fonts\consolai.ttf VolumeInformation
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeQueries volume information: C:\Windows\Fonts\consolab.ttf VolumeInformation
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeQueries volume information: C:\Windows\Fonts\consolaz.ttf VolumeInformation
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeQueries volume information: C:\Windows\Fonts\constan.ttf VolumeInformation
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeQueries volume information: C:\Windows\Fonts\constani.ttf VolumeInformation
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeQueries volume information: C:\Windows\Fonts\constanb.ttf VolumeInformation
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeQueries volume information: C:\Windows\Fonts\constanz.ttf VolumeInformation
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeQueries volume information: C:\Windows\Fonts\corbel.ttf VolumeInformation
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeQueries volume information: C:\Windows\Fonts\corbeli.ttf VolumeInformation
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeQueries volume information: C:\Windows\Fonts\corbelb.ttf VolumeInformation
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeQueries volume information: C:\Windows\Fonts\corbelz.ttf VolumeInformation
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeQueries volume information: C:\Windows\Fonts\cour.ttf VolumeInformation
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeQueries volume information: C:\Windows\Fonts\couri.ttf VolumeInformation
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeQueries volume information: C:\Windows\Fonts\courbd.ttf VolumeInformation
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeQueries volume information: C:\Windows\Fonts\courbi.ttf VolumeInformation
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeQueries volume information: C:\Windows\Fonts\ebrima.ttf VolumeInformation
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeQueries volume information: C:\Windows\Fonts\ebrimabd.ttf VolumeInformation
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeQueries volume information: C:\Windows\Fonts\framd.ttf VolumeInformation
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeQueries volume information: C:\Windows\Fonts\FRADM.TTF VolumeInformation
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeQueries volume information: C:\Windows\Fonts\framdit.ttf VolumeInformation
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeQueries volume information: C:\Windows\Fonts\FRADMIT.TTF VolumeInformation
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeQueries volume information: C:\Windows\Fonts\FRAMDCN.TTF VolumeInformation
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeQueries volume information: C:\Windows\Fonts\FRADMCN.TTF VolumeInformation
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeQueries volume information: C:\Windows\Fonts\FRAHV.TTF VolumeInformation
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeQueries volume information: C:\Windows\Fonts\FRAHVIT.TTF VolumeInformation
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeQueries volume information: C:\Windows\Fonts\Gabriola.ttf VolumeInformation
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeQueries volume information: C:\Windows\Fonts\gadugi.ttf VolumeInformation
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeQueries volume information: C:\Windows\Fonts\gadugib.ttf VolumeInformation
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeQueries volume information: C:\Windows\Fonts\georgia.ttf VolumeInformation
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeQueries volume information: C:\Windows\Fonts\georgiai.ttf VolumeInformation
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeQueries volume information: C:\Windows\Fonts\georgiab.ttf VolumeInformation
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeQueries volume information: C:\Windows\Fonts\georgiaz.ttf VolumeInformation
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeQueries volume information: C:\Windows\Fonts\impact.ttf VolumeInformation
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeQueries volume information: C:\Windows\Fonts\Inkfree.ttf VolumeInformation
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeQueries volume information: C:\Windows\Fonts\javatext.ttf VolumeInformation
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeQueries volume information: C:\Windows\Fonts\LeelawUI.ttf VolumeInformation
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeQueries volume information: C:\Windows\Fonts\LeelUIsl.ttf VolumeInformation
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeQueries volume information: C:\Windows\Fonts\LeelaUIb.ttf VolumeInformation
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeQueries volume information: C:\Windows\Fonts\lucon.ttf VolumeInformation
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeQueries volume information: C:\Windows\Fonts\l_10646.ttf VolumeInformation
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeQueries volume information: C:\Windows\Fonts\malgun.ttf VolumeInformation
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeQueries volume information: C:\Windows\Fonts\malgunsl.ttf VolumeInformation
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeQueries volume information: C:\Windows\Fonts\malgunbd.ttf VolumeInformation
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeQueries volume information: C:\Windows\Fonts\himalaya.ttf VolumeInformation
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeQueries volume information: C:\Windows\Fonts\msjh.ttc VolumeInformation
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeQueries volume information: C:\Windows\Fonts\msjhl.ttc VolumeInformation
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeQueries volume information: C:\Windows\Fonts\msjhbd.ttc VolumeInformation
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeQueries volume information: C:\Windows\Fonts\ntailu.ttf VolumeInformation
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeQueries volume information: C:\Windows\Fonts\ntailub.ttf VolumeInformation
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeQueries volume information: C:\Windows\Fonts\phagspa.ttf VolumeInformation
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeQueries volume information: C:\Windows\Fonts\phagspab.ttf VolumeInformation
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformation
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeQueries volume information: C:\Windows\Fonts\taile.ttf VolumeInformation
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeQueries volume information: C:\Windows\Fonts\taileb.ttf VolumeInformation
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeQueries volume information: C:\Windows\Fonts\msyh.ttc VolumeInformation
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeQueries volume information: C:\Windows\Fonts\msyhl.ttc VolumeInformation
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeQueries volume information: C:\Windows\Fonts\msyhbd.ttc VolumeInformation
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeQueries volume information: C:\Windows\Fonts\msyi.ttf VolumeInformation
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeQueries volume information: C:\Windows\Fonts\mingliub.ttc VolumeInformation
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeQueries volume information: C:\Windows\Fonts\monbaiti.ttf VolumeInformation
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeQueries volume information: C:\Windows\Fonts\msgothic.ttc VolumeInformation
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeQueries volume information: C:\Windows\Fonts\mvboli.ttf VolumeInformation
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeQueries volume information: C:\Windows\Fonts\mmrtext.ttf VolumeInformation
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeQueries volume information: C:\Windows\Fonts\mmrtextb.ttf VolumeInformation
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeQueries volume information: C:\Windows\Fonts\Nirmala.ttf VolumeInformation
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeQueries volume information: C:\Windows\Fonts\NirmalaS.ttf VolumeInformation
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeQueries volume information: C:\Windows\Fonts\NirmalaB.ttf VolumeInformation
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeQueries volume information: C:\Windows\Fonts\pala.ttf VolumeInformation
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeQueries volume information: C:\Windows\Fonts\palai.ttf VolumeInformation
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeQueries volume information: C:\Windows\Fonts\palab.ttf VolumeInformation
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeQueries volume information: C:\Windows\Fonts\palabi.ttf VolumeInformation
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeQueries volume information: C:\Windows\Fonts\segoepr.ttf VolumeInformation
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeQueries volume information: C:\Windows\Fonts\segoeprb.ttf VolumeInformation
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeQueries volume information: C:\Windows\Fonts\segoesc.ttf VolumeInformation
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeQueries volume information: C:\Windows\Fonts\segoescb.ttf VolumeInformation
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeQueries volume information: C:\Windows\Fonts\seguiemj.ttf VolumeInformation
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeQueries volume information: C:\Windows\Fonts\seguihis.ttf VolumeInformation
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeQueries volume information: C:\Windows\Fonts\seguisym.ttf VolumeInformation
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeQueries volume information: C:\Windows\Fonts\simsun.ttc VolumeInformation
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeQueries volume information: C:\Windows\Fonts\simsunb.ttf VolumeInformation
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeQueries volume information: C:\Windows\Fonts\Sitka.ttc VolumeInformation
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeQueries volume information: C:\Windows\Fonts\SitkaI.ttc VolumeInformation
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeQueries volume information: C:\Windows\Fonts\SitkaB.ttc VolumeInformation
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeQueries volume information: C:\Windows\Fonts\SitkaZ.ttc VolumeInformation
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeQueries volume information: C:\Windows\Fonts\sylfaen.ttf VolumeInformation
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeQueries volume information: C:\Windows\Fonts\symbol.ttf VolumeInformation
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeQueries volume information: C:\Windows\Fonts\tahoma.ttf VolumeInformation
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeQueries volume information: C:\Windows\Fonts\tahomabd.ttf VolumeInformation
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeQueries volume information: C:\Windows\Fonts\trebuc.ttf VolumeInformation
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeQueries volume information: C:\Windows\Fonts\trebucit.ttf VolumeInformation
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeQueries volume information: C:\Windows\Fonts\trebucbd.ttf VolumeInformation
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeQueries volume information: C:\Windows\Fonts\trebucbi.ttf VolumeInformation
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeQueries volume information: C:\Windows\Fonts\verdana.ttf VolumeInformation
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeQueries volume information: C:\Windows\Fonts\verdanai.ttf VolumeInformation
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeQueries volume information: C:\Windows\Fonts\verdanab.ttf VolumeInformation
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeQueries volume information: C:\Windows\Fonts\verdanaz.ttf VolumeInformation
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeQueries volume information: C:\Windows\Fonts\webdings.ttf VolumeInformation
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeQueries volume information: C:\Windows\Fonts\wingding.ttf VolumeInformation
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeQueries volume information: C:\Windows\Fonts\YuGothR.ttc VolumeInformation
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeQueries volume information: C:\Windows\Fonts\YuGothM.ttc VolumeInformation
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeQueries volume information: C:\Windows\Fonts\YuGothL.ttc VolumeInformation
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeQueries volume information: C:\Windows\Fonts\YuGothB.ttc VolumeInformation
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeQueries volume information: C:\Windows\Fonts\holomdl2.ttf VolumeInformation
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeQueries volume information: C:\Windows\Fonts\CENTURY.TTF VolumeInformation
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeQueries volume information: C:\Windows\Fonts\LEELAWAD.TTF VolumeInformation
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeQueries volume information: C:\Windows\Fonts\LEELAWDB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeQueries volume information: C:\Windows\Fonts\MSUIGHUR.TTF VolumeInformation
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeQueries volume information: C:\Windows\Fonts\MSUIGHUB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeQueries volume information: C:\Windows\Fonts\WINGDNG2.TTF VolumeInformation
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeQueries volume information: C:\Windows\Fonts\WINGDNG3.TTF VolumeInformation
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeQueries volume information: C:\Windows\Fonts\TEMPSITC.TTF VolumeInformation
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeQueries volume information: C:\Windows\Fonts\PRISTINA.TTF VolumeInformation
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeQueries volume information: C:\Windows\Fonts\PAPYRUS.TTF VolumeInformation
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeQueries volume information: C:\Windows\Fonts\MISTRAL.TTF VolumeInformation
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeQueries volume information: C:\Windows\Fonts\LHANDW.TTF VolumeInformation
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeQueries volume information: C:\Windows\Fonts\ITCKRIST.TTF VolumeInformation
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeQueries volume information: C:\Windows\Fonts\JUICE___.TTF VolumeInformation
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeQueries volume information: C:\Windows\Fonts\FRSCRIPT.TTF VolumeInformation
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeQueries volume information: C:\Windows\Fonts\FREESCPT.TTF VolumeInformation
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeQueries volume information: C:\Windows\Fonts\BRADHITC.TTF VolumeInformation
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeQueries volume information: C:\Windows\Fonts\OUTLOOK.TTF VolumeInformation
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeQueries volume information: C:\Windows\Fonts\BKANT.TTF VolumeInformation
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeQueries volume information: C:\Windows\Fonts\ANTQUAI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeQueries volume information: C:\Windows\Fonts\ANTQUAB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeQueries volume information: C:\Windows\Fonts\ANTQUABI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeQueries volume information: C:\Windows\Fonts\GARA.TTF VolumeInformation
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeQueries volume information: C:\Windows\Fonts\GARAIT.TTF VolumeInformation
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeQueries volume information: C:\Windows\Fonts\GARABD.TTF VolumeInformation
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeQueries volume information: C:\Windows\Fonts\MTCORSVA.TTF VolumeInformation
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeQueries volume information: C:\Windows\Fonts\GOTHIC.TTF VolumeInformation
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeQueries volume information: C:\Windows\Fonts\GOTHICI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeQueries volume information: C:\Windows\Fonts\GOTHICB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeQueries volume information: C:\Windows\Fonts\GOTHICBI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeQueries volume information: C:\Windows\Fonts\ALGER.TTF VolumeInformation
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeQueries volume information: C:\Windows\Fonts\BASKVILL.TTF VolumeInformation
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeQueries volume information: C:\Windows\Fonts\BAUHS93.TTF VolumeInformation
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeQueries volume information: C:\Windows\Fonts\BELL.TTF VolumeInformation
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeQueries volume information: C:\Windows\Fonts\BELLI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeQueries volume information: C:\Windows\Fonts\BELLB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeQueries volume information: C:\Windows\Fonts\BRLNSR.TTF VolumeInformation
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeQueries volume information: C:\Windows\Fonts\BRLNSDB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeQueries volume information: C:\Windows\Fonts\BRLNSB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeQueries volume information: C:\Windows\Fonts\BERNHC.TTF VolumeInformation
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeQueries volume information: C:\Windows\Fonts\BOD_PSTC.TTF VolumeInformation
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeQueries volume information: C:\Windows\Fonts\BRITANIC.TTF VolumeInformation
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeQueries volume information: C:\Windows\Fonts\BROADW.TTF VolumeInformation
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeQueries volume information: C:\Windows\Fonts\BRUSHSCI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeQueries volume information: C:\Windows\Fonts\CALIFR.TTF VolumeInformation
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeQueries volume information: C:\Windows\Fonts\CALIFI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeQueries volume information: C:\Windows\Fonts\CALIFB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeQueries volume information: C:\Windows\Fonts\CENTAUR.TTF VolumeInformation
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeQueries volume information: C:\Windows\Fonts\CHILLER.TTF VolumeInformation
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeQueries volume information: C:\Windows\Fonts\COLONNA.TTF VolumeInformation
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeQueries volume information: C:\Windows\Fonts\COOPBL.TTF VolumeInformation
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeQueries volume information: C:\Windows\Fonts\FTLTLT.TTF VolumeInformation
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeQueries volume information: C:\Windows\Fonts\HARLOWSI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeQueries volume information: C:\Windows\Fonts\HARNGTON.TTF VolumeInformation
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeQueries volume information: C:\Windows\Fonts\HTOWERT.TTF VolumeInformation
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeQueries volume information: C:\Windows\Fonts\HTOWERTI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeQueries volume information: C:\Windows\Fonts\JOKERMAN.TTF VolumeInformation
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeQueries volume information: C:\Windows\Fonts\KUNSTLER.TTF VolumeInformation
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeQueries volume information: C:\Windows\Fonts\LBRITE.TTF VolumeInformation
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeQueries volume information: C:\Windows\Fonts\LBRITED.TTF VolumeInformation
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeQueries volume information: C:\Windows\Fonts\LBRITEI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeQueries volume information: C:\Windows\Fonts\LBRITEDI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeQueries volume information: C:\Windows\Fonts\LCALLIG.TTF VolumeInformation
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeQueries volume information: C:\Windows\Fonts\LFAX.TTF VolumeInformation
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeQueries volume information: C:\Windows\Fonts\LFAXD.TTF VolumeInformation
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeQueries volume information: C:\Windows\Fonts\LFAXI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeQueries volume information: C:\Windows\Fonts\LFAXDI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeQueries volume information: C:\Windows\Fonts\MAGNETOB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeQueries volume information: C:\Windows\Fonts\MATURASC.TTF VolumeInformation
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeQueries volume information: C:\Windows\Fonts\MOD20.TTF VolumeInformation
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeQueries volume information: C:\Windows\Fonts\NIAGENG.TTF VolumeInformation
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeQueries volume information: C:\Windows\Fonts\NIAGSOL.TTF VolumeInformation
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeQueries volume information: C:\Windows\Fonts\OLDENGL.TTF VolumeInformation
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeQueries volume information: C:\Windows\Fonts\ONYX.TTF VolumeInformation
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeQueries volume information: C:\Windows\Fonts\PARCHM.TTF VolumeInformation
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeQueries volume information: C:\Windows\Fonts\PLAYBILL.TTF VolumeInformation
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeQueries volume information: C:\Windows\Fonts\POORICH.TTF VolumeInformation
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeQueries volume information: C:\Windows\Fonts\RAVIE.TTF VolumeInformation
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeQueries volume information: C:\Windows\Fonts\INFROMAN.TTF VolumeInformation
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeQueries volume information: C:\Windows\Fonts\SHOWG.TTF VolumeInformation
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeQueries volume information: C:\Windows\Fonts\SNAP____.TTF VolumeInformation
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeQueries volume information: C:\Windows\Fonts\STENCIL.TTF VolumeInformation
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeQueries volume information: C:\Windows\Fonts\VINERITC.TTF VolumeInformation
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeQueries volume information: C:\Windows\Fonts\VIVALDII.TTF VolumeInformation
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeQueries volume information: C:\Windows\Fonts\VLADIMIR.TTF VolumeInformation
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeQueries volume information: C:\Windows\Fonts\LATINWD.TTF VolumeInformation
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeQueries volume information: C:\Windows\Fonts\TCM_____.TTF VolumeInformation
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeQueries volume information: C:\Windows\Fonts\TCMI____.TTF VolumeInformation
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeQueries volume information: C:\Windows\Fonts\TCB_____.TTF VolumeInformation
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeQueries volume information: C:\Windows\Fonts\TCBI____.TTF VolumeInformation
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeQueries volume information: C:\Windows\Fonts\TCCM____.TTF VolumeInformation
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeQueries volume information: C:\Windows\Fonts\TCCB____.TTF VolumeInformation
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeQueries volume information: C:\Windows\Fonts\TCCEB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeQueries volume information: C:\Windows\Fonts\SCRIPTBL.TTF VolumeInformation
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeQueries volume information: C:\Windows\Fonts\ROCK.TTF VolumeInformation
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeQueries volume information: C:\Windows\Fonts\ROCKI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeQueries volume information: C:\Windows\Fonts\ROCKB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeQueries volume information: C:\Windows\Fonts\ROCKEB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeQueries volume information: C:\Windows\Fonts\ROCKBI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeQueries volume information: C:\Windows\Fonts\ROCC____.TTF VolumeInformation
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeQueries volume information: C:\Windows\Fonts\ROCCB___.TTF VolumeInformation
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeQueries volume information: C:\Windows\Fonts\RAGE.TTF VolumeInformation
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeQueries volume information: C:\Windows\Fonts\PERTILI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeQueries volume information: C:\Windows\Fonts\PERTIBD.TTF VolumeInformation
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeQueries volume information: C:\Windows\Fonts\PER_____.TTF VolumeInformation
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeQueries volume information: C:\Windows\Fonts\PERI____.TTF VolumeInformation
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeQueries volume information: C:\Windows\Fonts\PERB____.TTF VolumeInformation
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeQueries volume information: C:\Windows\Fonts\PERBI___.TTF VolumeInformation
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeQueries volume information: C:\Windows\Fonts\PALSCRI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeQueries volume information: C:\Windows\Fonts\OCRAEXT.TTF VolumeInformation
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeQueries volume information: C:\Windows\Fonts\MAIAN.TTF VolumeInformation
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeQueries volume information: C:\Windows\Fonts\LTYPE.TTF VolumeInformation
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeQueries volume information: C:\Windows\Fonts\LTYPEO.TTF VolumeInformation
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeQueries volume information: C:\Windows\Fonts\LTYPEB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeQueries volume information: C:\Windows\Fonts\LTYPEBO.TTF VolumeInformation
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeQueries volume information: C:\Windows\Fonts\LSANS.TTF VolumeInformation
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeQueries volume information: C:\Windows\Fonts\LSANSD.TTF VolumeInformation
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeQueries volume information: C:\Windows\Fonts\LSANSI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeQueries volume information: C:\Windows\Fonts\LSANSDI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeQueries volume information: C:\Windows\Fonts\IMPRISHA.TTF VolumeInformation
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeQueries volume information: C:\Windows\Fonts\HATTEN.TTF VolumeInformation
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeQueries volume information: C:\Windows\Fonts\GOUDYSTO.TTF VolumeInformation
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeQueries volume information: C:\Windows\Fonts\GOUDOS.TTF VolumeInformation
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeQueries volume information: C:\Windows\Fonts\GOUDOSI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeQueries volume information: C:\Windows\Fonts\GOUDOSB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeQueries volume information: C:\Windows\Fonts\GLECB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeQueries volume information: C:\Windows\Fonts\GIL_____.TTF VolumeInformation
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeQueries volume information: C:\Windows\Fonts\GILI____.TTF VolumeInformation
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeQueries volume information: C:\Windows\Fonts\GILB____.TTF VolumeInformation
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeQueries volume information: C:\Windows\Fonts\GILBI___.TTF VolumeInformation
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeQueries volume information: C:\Windows\Fonts\GILC____.TTF VolumeInformation
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeQueries volume information: C:\Windows\Fonts\GLSNECB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeQueries volume information: C:\Windows\Fonts\GIGI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeQueries volume information: C:\Windows\Fonts\FRABK.TTF VolumeInformation
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeQueries volume information: C:\Windows\Fonts\FRABKIT.TTF VolumeInformation
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeQueries volume information: C:\Windows\Fonts\FORTE.TTF VolumeInformation
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeQueries volume information: C:\Windows\Fonts\FELIXTI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeQueries volume information: C:\Windows\Fonts\ERASMD.TTF VolumeInformation
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeQueries volume information: C:\Windows\Fonts\ERASLGHT.TTF VolumeInformation
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeQueries volume information: C:\Windows\Fonts\ERASDEMI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeQueries volume information: C:\Windows\Fonts\ERASBD.TTF VolumeInformation
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeQueries volume information: C:\Windows\Fonts\ENGR.TTF VolumeInformation
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeQueries volume information: C:\Windows\Fonts\ELEPHNT.TTF VolumeInformation
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeQueries volume information: C:\Windows\Fonts\ELEPHNTI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeQueries volume information: C:\Windows\Fonts\ITCEDSCR.TTF VolumeInformation
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeQueries volume information: C:\Windows\Fonts\CURLZ___.TTF VolumeInformation
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeQueries volume information: C:\Windows\Fonts\COPRGTL.TTF VolumeInformation
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeQueries volume information: C:\Windows\Fonts\COPRGTB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeQueries volume information: C:\Windows\Fonts\CENSCBK.TTF VolumeInformation
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeQueries volume information: C:\Windows\Fonts\SCHLBKI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeQueries volume information: C:\Windows\Fonts\SCHLBKB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeQueries volume information: C:\Windows\Fonts\SCHLBKBI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeQueries volume information: C:\Windows\Fonts\CASTELAR.TTF VolumeInformation
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeQueries volume information: C:\Windows\Fonts\CALIST.TTF VolumeInformation
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeQueries volume information: C:\Windows\Fonts\CALISTI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeQueries volume information: C:\Windows\Fonts\CALISTB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeQueries volume information: C:\Windows\Fonts\CALISTBI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeQueries volume information: C:\Windows\Fonts\BOOKOS.TTF VolumeInformation
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeQueries volume information: C:\Windows\Fonts\BOOKOSB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeQueries volume information: C:\Windows\Fonts\BOOKOSI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeQueries volume information: C:\Windows\Fonts\BOOKOSBI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeQueries volume information: C:\Windows\Fonts\BOD_R.TTF VolumeInformation
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeQueries volume information: C:\Windows\Fonts\BOD_I.TTF VolumeInformation
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeQueries volume information: C:\Windows\Fonts\BOD_B.TTF VolumeInformation
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeQueries volume information: C:\Windows\Fonts\BOD_BI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeQueries volume information: C:\Windows\Fonts\BOD_CR.TTF VolumeInformation
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeQueries volume information: C:\Windows\Fonts\BOD_BLAR.TTF VolumeInformation
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeQueries volume information: C:\Windows\Fonts\BOD_CI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeQueries volume information: C:\Windows\Fonts\BOD_CB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeQueries volume information: C:\Windows\Fonts\BOD_BLAI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeQueries volume information: C:\Windows\Fonts\BOD_CBI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeQueries volume information: C:\Windows\Fonts\ITCBLKAD.TTF VolumeInformation
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeQueries volume information: C:\Windows\Fonts\ARLRDBD.TTF VolumeInformation
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeQueries volume information: C:\Windows\Fonts\AGENCYR.TTF VolumeInformation
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeQueries volume information: C:\Windows\Fonts\AGENCYB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeQueries volume information: C:\Windows\Fonts\BSSYM7.TTF VolumeInformation
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeQueries volume information: C:\Windows\Fonts\REFSAN.TTF VolumeInformation
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeQueries volume information: C:\Windows\Fonts\REFSPCL.TTF VolumeInformation
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeQueries volume information: C:\Windows\Fonts\MTEXTRA.TTF VolumeInformation
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeQueries volume information: C:\Windows\Fonts\marlett.ttf VolumeInformation
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformation
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeQueries volume information: C:\Windows\Fonts\arial.ttf VolumeInformation
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeQueries volume information: C:\Windows\Fonts\ariali.ttf VolumeInformation
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeQueries volume information: C:\Windows\Fonts\arialbd.ttf VolumeInformation
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeQueries volume information: C:\Windows\Fonts\arialbi.ttf VolumeInformation
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeCode function: 11_2_0115AF9A GetUserNameW,
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid

        Stealing of Sensitive Information:

        barindex
        Yara detected Nanocore RATShow sources
        Source: Yara matchFile source: 00000020.00000000.836222469.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000001D.00000000.819759981.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000001D.00000002.835267863.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000001D.00000000.820327781.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000B.00000000.726462560.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000014.00000002.820471977.0000000003A31000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000000.00000002.741715588.00000000045C0000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000020.00000002.857250258.0000000002F31000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000B.00000002.912619347.0000000005D70000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000015.00000002.841434727.0000000003D51000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000020.00000002.852127142.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000020.00000000.835581816.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000000.00000002.734043460.00000000041D1000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000B.00000002.908625280.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000013.00000002.826910629.0000000004641000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000001D.00000002.836835816.0000000003391000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000001D.00000002.836971548.0000000004391000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000B.00000002.911022966.0000000004319000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000B.00000000.726040524.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000020.00000002.857349420.0000000003F31000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: SwiftCopy.pdf.exe PID: 2848, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: SwiftCopy.pdf.exe PID: 6476, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: SwiftCopy.pdf.exe PID: 6872, type: MEMORY
        Source: Yara matchFile source: 29.0.SwiftCopy.pdf.exe.400000.3.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 11.2.SwiftCopy.pdf.exe.5d70000.11.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 19.2.SwiftCopy.pdf.exe.4746d68.2.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.SwiftCopy.pdf.exe.42d6d68.3.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 19.2.SwiftCopy.pdf.exe.4746d68.2.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 11.0.SwiftCopy.pdf.exe.400000.3.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 11.2.SwiftCopy.pdf.exe.4332580.6.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 11.2.SwiftCopy.pdf.exe.4319591.7.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 11.2.SwiftCopy.pdf.exe.400000.0.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 32.0.dhcpmon.exe.400000.3.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 11.2.SwiftCopy.pdf.exe.4319591.7.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 32.2.dhcpmon.exe.3f89591.7.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 29.2.SwiftCopy.pdf.exe.43e9591.4.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 11.2.SwiftCopy.pdf.exe.4332580.6.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 29.2.SwiftCopy.pdf.exe.400000.0.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 32.2.dhcpmon.exe.3f7ed1e.5.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 11.2.SwiftCopy.pdf.exe.431dbba.5.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 11.2.SwiftCopy.pdf.exe.5d70000.11.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 29.2.SwiftCopy.pdf.exe.43e3b5b.6.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 32.2.dhcpmon.exe.3f89591.7.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 32.2.dhcpmon.exe.400000.0.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 21.2.dhcpmon.exe.3e56d68.2.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 20.2.dhcpmon.exe.3b36d68.2.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 11.0.SwiftCopy.pdf.exe.400000.1.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 32.0.dhcpmon.exe.400000.1.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 11.2.SwiftCopy.pdf.exe.5d74629.12.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.SwiftCopy.pdf.exe.42d6d68.3.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 32.2.dhcpmon.exe.3f83b5b.6.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 29.0.SwiftCopy.pdf.exe.400000.1.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 29.2.SwiftCopy.pdf.exe.43e9591.4.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 29.2.SwiftCopy.pdf.exe.43ded1e.5.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 21.2.dhcpmon.exe.3e56d68.2.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 20.2.dhcpmon.exe.3b36d68.2.unpack, type: UNPACKEDPE

        Remote Access Functionality:

        barindex
        Detected Nanocore RatShow sources
        Source: SwiftCopy.pdf.exe, 00000000.00000002.741715588.00000000045C0000.00000004.00000001.sdmpString found in binary or memory: NanoCore.ClientPluginHost
        Source: SwiftCopy.pdf.exe, 0000000B.00000002.910531601.00000000032C1000.00000004.00000001.sdmpString found in binary or memory: NanoCore.ClientPluginHost
        Source: SwiftCopy.pdf.exe, 0000000B.00000002.910531601.00000000032C1000.00000004.00000001.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCore.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1IClientNetworkNanoCore.ClientPluginIClientDataIClientAppIClientDataHostNanoCore.ClientPluginHostIClientNetworkHostIClientUIHostIClientLoggingHostIClientAppHostIClientNameObjectCollectionNanoCoreIClientReadOnlyNameObjectCollectionClientInvokeDelegateMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceReadPacketpipeNameparamsPipeCreatedPipeClosedConnectionStateChangedconnectedConnectionFailedhostportBuildingHostCacheVariableChangednameClientSettingChangedPluginUninstallingClientUninstallingget_Variablesget_ClientSettingsget_BuilderSettingsVariablesClientSettingsBuilderSettingsget_ConnectedClosePipePipeExistsRebuildHostCacheAddHostEntryDisconnectSendToServercompressConnectedInvokemethodstateLogClientMessagemessageExceptionLogClientExceptionexsiteRestartShutdownDisableProtectionRestoreProtectionUninstallEntryExistsSystem.Collections.GenericKeyValuePair`2GetEntriesGetValuedefaultValueSetValuevalueRemoveValueMulticastDelegateTargetObjectTargetMethodIAsyncResultAsyncCallbackBeginInvokeDelegateCallbackDelegateAsyncStateEndInvokeDelegateAsyncResultSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeParamArrayAttributeCompilationRelaxationsAttributeRuntimeCompatibilityAttributeSystem.ReflectionAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeClientPluginClientPlugin.dll
        Source: SwiftCopy.pdf.exe, 0000000B.00000002.910531601.00000000032C1000.00000004.00000001.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoProtectClient.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1ClientMainNanoProtectClientClientPluginResourcesNanoProtectClient.My.ResourcesMySettingsMySettingsPropertyFunctionsNanoProtectClient.NanoProtectMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceNanoCore.ClientPluginHostIClientLoggingHostLoggingHostInitializePluginNanoCore.ClientPluginIClientNetwork_loggingHostBuildingHostCacheConnectionFailedhostportConnectionStateChangedconnectedPipeClosedpipeNamePipeCreatedReadPacketparamsSystem.ResourcesResourceManagerresourceManSystem.GlobalizationCultureInforesourceCultureget_ResourceManagerget_Cultureset_CulturevalueCultureSystem.ConfigurationApplicationSettingsBasedefaultInstanceget_DefaultDefaultget_SettingsSettingsGetProtectDirectoryGetProtectFileCreateProtectFileKillNanoCoreSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerNonUserCodeAttributeDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeLogClientMessageSystem.IOFileExistsReferenceEqualsSystem.ReflectionAssemblyget_AssemblyCompilerGeneratedAttributeSettingsBaseSynchronizedEnvironmentSpecialFolderGetFolderPathPathCombineExceptionDirectoryDirectoryInfoCreateDirectoryFileStreamCreateProjectDataSetProjectErrorClearProjectErrorProcessGetCurrentProcessKillNanoProtectClient.Resources.resourcesDebuggableAttributeDebuggingModesCompilationRelaxationsAttributeRuntimeCompatibilityAttributeAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeNanoProtectClient.dlla[NanoProtect]: Checking for NanoProtect module..
        Source: SwiftCopy.pdf.exe, 0000001D.00000000.819759981.0000000000402000.00000040.00000001.sdmpString found in binary or memory: NanoCore.ClientPluginHost
        Source: SwiftCopy.pdf.exe, 0000001D.00000002.836835816.0000000003391000.00000004.00000001.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCore.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1IClientNetworkNanoCore.ClientPluginIClientDataIClientAppIClientDataHostNanoCore.ClientPluginHostIClientNetworkHostIClientUIHostIClientLoggingHostIClientAppHostIClientNameObjectCollectionNanoCoreIClientReadOnlyNameObjectCollectionClientInvokeDelegateMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceReadPacketpipeNameparamsPipeCreatedPipeClosedConnectionStateChangedconnectedConnectionFailedhostportBuildingHostCacheVariableChangednameClientSettingChangedPluginUninstallingClientUninstallingget_Variablesget_ClientSettingsget_BuilderSettingsVariablesClientSettingsBuilderSettingsget_ConnectedClosePipePipeExistsRebuildHostCacheAddHostEntryDisconnectSendToServercompressConnectedInvokemethodstateLogClientMessagemessageExceptionLogClientExceptionexsiteRestartShutdownDisableProtectionRestoreProtectionUninstallEntryExistsSystem.Collections.GenericKeyValuePair`2GetEntriesGetValuedefaultValueSetValuevalueRemoveValueMulticastDelegateTargetObjectTargetMethodIAsyncResultAsyncCallbackBeginInvokeDelegateCallbackDelegateAsyncStateEndInvokeDelegateAsyncResultSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeParamArrayAttributeCompilationRelaxationsAttributeRuntimeCompatibilityAttributeSystem.ReflectionAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeClientPluginClientPlugin.dll
        Source: SwiftCopy.pdf.exe, 0000001D.00000002.836835816.0000000003391000.00000004.00000001.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoProtectClient.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1ClientMainNanoProtectClientClientPluginResourcesNanoProtectClient.My.ResourcesMySettingsMySettingsPropertyFunctionsNanoProtectClient.NanoProtectMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceNanoCore.ClientPluginHostIClientLoggingHostLoggingHostInitializePluginNanoCore.ClientPluginIClientNetwork_loggingHostBuildingHostCacheConnectionFailedhostportConnectionStateChangedconnectedPipeClosedpipeNamePipeCreatedReadPacketparamsSystem.ResourcesResourceManagerresourceManSystem.GlobalizationCultureInforesourceCultureget_ResourceManagerget_Cultureset_CulturevalueCultureSystem.ConfigurationApplicationSettingsBasedefaultInstanceget_DefaultDefaultget_SettingsSettingsGetProtectDirectoryGetProtectFileCreateProtectFileKillNanoCoreSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerNonUserCodeAttributeDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeLogClientMessageSystem.IOFileExistsReferenceEqualsSystem.ReflectionAssemblyget_AssemblyCompilerGeneratedAttributeSettingsBaseSynchronizedEnvironmentSpecialFolderGetFolderPathPathCombineExceptionDirectoryDirectoryInfoCreateDirectoryFileStreamCreateProjectDataSetProjectErrorClearProjectErrorProcessGetCurrentProcessKillNanoProtectClient.Resources.resourcesDebuggableAttributeDebuggingModesCompilationRelaxationsAttributeRuntimeCompatibilityAttributeAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeNanoProtectClient.dlla[NanoProtect]: Checking for NanoProtect module..
        Source: dhcpmon.exe, 00000020.00000000.836222469.0000000000402000.00000040.00000001.sdmpString found in binary or memory: NanoCore.ClientPluginHost
        Source: dhcpmon.exe, 00000020.00000002.857250258.0000000002F31000.00000004.00000001.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCore.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1IClientNetworkNanoCore.ClientPluginIClientDataIClientAppIClientDataHostNanoCore.ClientPluginHostIClientNetworkHostIClientUIHostIClientLoggingHostIClientAppHostIClientNameObjectCollectionNanoCoreIClientReadOnlyNameObjectCollectionClientInvokeDelegateMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceReadPacketpipeNameparamsPipeCreatedPipeClosedConnectionStateChangedconnectedConnectionFailedhostportBuildingHostCacheVariableChangednameClientSettingChangedPluginUninstallingClientUninstallingget_Variablesget_ClientSettingsget_BuilderSettingsVariablesClientSettingsBuilderSettingsget_ConnectedClosePipePipeExistsRebuildHostCacheAddHostEntryDisconnectSendToServercompressConnectedInvokemethodstateLogClientMessagemessageExceptionLogClientExceptionexsiteRestartShutdownDisableProtectionRestoreProtectionUninstallEntryExistsSystem.Collections.GenericKeyValuePair`2GetEntriesGetValuedefaultValueSetValuevalueRemoveValueMulticastDelegateTargetObjectTargetMethodIAsyncResultAsyncCallbackBeginInvokeDelegateCallbackDelegateAsyncStateEndInvokeDelegateAsyncResultSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeParamArrayAttributeCompilationRelaxationsAttributeRuntimeCompatibilityAttributeSystem.ReflectionAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeClientPluginClientPlugin.dll
        Source: dhcpmon.exe, 00000020.00000002.857250258.0000000002F31000.00000004.00000001.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoProtectClient.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1ClientMainNanoProtectClientClientPluginResourcesNanoProtectClient.My.ResourcesMySettingsMySettingsPropertyFunctionsNanoProtectClient.NanoProtectMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceNanoCore.ClientPluginHostIClientLoggingHostLoggingHostInitializePluginNanoCore.ClientPluginIClientNetwork_loggingHostBuildingHostCacheConnectionFailedhostportConnectionStateChangedconnectedPipeClosedpipeNamePipeCreatedReadPacketparamsSystem.ResourcesResourceManagerresourceManSystem.GlobalizationCultureInforesourceCultureget_ResourceManagerget_Cultureset_CulturevalueCultureSystem.ConfigurationApplicationSettingsBasedefaultInstanceget_DefaultDefaultget_SettingsSettingsGetProtectDirectoryGetProtectFileCreateProtectFileKillNanoCoreSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerNonUserCodeAttributeDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeLogClientMessageSystem.IOFileExistsReferenceEqualsSystem.ReflectionAssemblyget_AssemblyCompilerGeneratedAttributeSettingsBaseSynchronizedEnvironmentSpecialFolderGetFolderPathPathCombineExceptionDirectoryDirectoryInfoCreateDirectoryFileStreamCreateProjectDataSetProjectErrorClearProjectErrorProcessGetCurrentProcessKillNanoProtectClient.Resources.resourcesDebuggableAttributeDebuggingModesCompilationRelaxationsAttributeRuntimeCompatibilityAttributeAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeNanoProtectClient.dlla[NanoProtect]: Checking for NanoProtect module..
        Yara detected Nanocore RATShow sources
        Source: Yara matchFile source: 00000020.00000000.836222469.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000001D.00000000.819759981.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000001D.00000002.835267863.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000001D.00000000.820327781.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000B.00000000.726462560.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000014.00000002.820471977.0000000003A31000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000000.00000002.741715588.00000000045C0000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000020.00000002.857250258.0000000002F31000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000B.00000002.912619347.0000000005D70000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000015.00000002.841434727.0000000003D51000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000020.00000002.852127142.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000020.00000000.835581816.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000000.00000002.734043460.00000000041D1000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000B.00000002.908625280.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000013.00000002.826910629.0000000004641000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000001D.00000002.836835816.0000000003391000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000001D.00000002.836971548.0000000004391000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000B.00000002.911022966.0000000004319000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000B.00000000.726040524.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000020.00000002.857349420.0000000003F31000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: SwiftCopy.pdf.exe PID: 2848, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: SwiftCopy.pdf.exe PID: 6476, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: SwiftCopy.pdf.exe PID: 6872, type: MEMORY
        Source: Yara matchFile source: 29.0.SwiftCopy.pdf.exe.400000.3.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 11.2.SwiftCopy.pdf.exe.5d70000.11.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 19.2.SwiftCopy.pdf.exe.4746d68.2.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.SwiftCopy.pdf.exe.42d6d68.3.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 19.2.SwiftCopy.pdf.exe.4746d68.2.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 11.0.SwiftCopy.pdf.exe.400000.3.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 11.2.SwiftCopy.pdf.exe.4332580.6.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 11.2.SwiftCopy.pdf.exe.4319591.7.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 11.2.SwiftCopy.pdf.exe.400000.0.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 32.0.dhcpmon.exe.400000.3.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 11.2.SwiftCopy.pdf.exe.4319591.7.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 32.2.dhcpmon.exe.3f89591.7.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 29.2.SwiftCopy.pdf.exe.43e9591.4.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 11.2.SwiftCopy.pdf.exe.4332580.6.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 29.2.SwiftCopy.pdf.exe.400000.0.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 32.2.dhcpmon.exe.3f7ed1e.5.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 11.2.SwiftCopy.pdf.exe.431dbba.5.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 11.2.SwiftCopy.pdf.exe.5d70000.11.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 29.2.SwiftCopy.pdf.exe.43e3b5b.6.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 32.2.dhcpmon.exe.3f89591.7.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 32.2.dhcpmon.exe.400000.0.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 21.2.dhcpmon.exe.3e56d68.2.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 20.2.dhcpmon.exe.3b36d68.2.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 11.0.SwiftCopy.pdf.exe.400000.1.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 32.0.dhcpmon.exe.400000.1.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 11.2.SwiftCopy.pdf.exe.5d74629.12.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.SwiftCopy.pdf.exe.42d6d68.3.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 32.2.dhcpmon.exe.3f83b5b.6.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 29.0.SwiftCopy.pdf.exe.400000.1.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 29.2.SwiftCopy.pdf.exe.43e9591.4.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 29.2.SwiftCopy.pdf.exe.43ded1e.5.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 21.2.dhcpmon.exe.3e56d68.2.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 20.2.dhcpmon.exe.3b36d68.2.unpack, type: UNPACKEDPE
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeCode function: 11_2_052C2A9E bind,
        Source: C:\Users\user\Desktop\SwiftCopy.pdf.exeCode function: 11_2_052C2A4C bind,

        Mitre Att&ck Matrix

        Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
        Valid AccountsScheduled Task/Job1Scheduled Task/Job1Access Token Manipulation1Disable or Modify Tools1Input Capture11Account Discovery1Remote ServicesArchive Collected Data11Exfiltration Over Other Network MediumIngress Tool Transfer1Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
        Default AccountsScheduled Task/JobBoot or Logon Initialization ScriptsProcess Injection112Deobfuscate/Decode Files or Information1LSASS MemoryFile and Directory Discovery1Remote Desktop ProtocolInput Capture11Exfiltration Over BluetoothEncrypted Channel1Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
        Domain AccountsAt (Linux)Logon Script (Windows)Scheduled Task/Job1Obfuscated Files or Information13Security Account ManagerSystem Information Discovery13SMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationNon-Standard Port1Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
        Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)Software Packing23NTDSSecurity Software Discovery211Distributed Component Object ModelInput CaptureScheduled TransferRemote Access Software1SIM Card SwapCarrier Billing Fraud
        Cloud AccountsCronNetwork Logon ScriptNetwork Logon ScriptMasquerading22LSA SecretsProcess Discovery2SSHKeyloggingData Transfer Size LimitsNon-Application Layer Protocol1Manipulate Device CommunicationManipulate App Store Rankings or Ratings
        Replication Through Removable MediaLaunchdRc.commonRc.commonVirtualization/Sandbox Evasion31Cached Domain CredentialsVirtualization/Sandbox Evasion31VNCGUI Input CaptureExfiltration Over C2 ChannelApplication Layer Protocol21Jamming or Denial of ServiceAbuse Accessibility Features
        External Remote ServicesScheduled TaskStartup ItemsStartup ItemsAccess Token Manipulation1DCSyncApplication Window Discovery1Windows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
        Drive-by CompromiseCommand and Scripting InterpreterScheduled Task/JobScheduled Task/JobProcess Injection112Proc FilesystemSystem Owner/User Discovery1Shared WebrootCredential API HookingExfiltration Over Symmetric Encrypted Non-C2 ProtocolApplication Layer ProtocolDowngrade to Insecure ProtocolsGenerate Fraudulent Advertising Revenue
        Exploit Public-Facing ApplicationPowerShellAt (Linux)At (Linux)Hidden Files and Directories1/etc/passwd and /etc/shadowSystem Network Connections DiscoverySoftware Deployment ToolsData StagedExfiltration Over Asymmetric Encrypted Non-C2 ProtocolWeb ProtocolsRogue Cellular Base StationData Destruction

        Behavior Graph

        Hide Legend

        Legend:

        • Process
        • Signature
        • Created File
        • DNS/IP Info
        • Is Dropped
        • Is Windows Process
        • Number of created Registry Values
        • Number of created Files
        • Visual Basic
        • Delphi
        • Java
        • .Net C# or VB.NET
        • C, C++ or other language
        • Is malicious
        • Internet
        behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 432424 Sample: SwiftCopy.pdf.exe Startdate: 10/06/2021 Architecture: WINDOWS Score: 100 62 sylviaoslh01.ddns.net 2->62 68 Multi AV Scanner detection for domain / URL 2->68 70 Found malware configuration 2->70 72 Malicious sample detected (through community Yara rule) 2->72 74 19 other signatures 2->74 9 SwiftCopy.pdf.exe 6 2->9         started        13 dhcpmon.exe 4 2->13         started        15 SwiftCopy.pdf.exe 4 2->15         started        17 dhcpmon.exe 3 2->17         started        signatures3 process4 file5 56 C:\Users\user\AppData\...\xetNJdChYOitP.exe, PE32 9->56 dropped 58 C:\Users\user\AppData\Local\...\tmpF25B.tmp, XML 9->58 dropped 60 C:\Users\user\...\SwiftCopy.pdf.exe.log, ASCII 9->60 dropped 78 Uses schtasks.exe or at.exe to add and modify task schedules 9->78 80 Injects a PE file into a foreign processes 9->80 19 SwiftCopy.pdf.exe 1 15 9->19         started        24 schtasks.exe 1 9->24         started        26 SwiftCopy.pdf.exe 9->26         started        28 schtasks.exe 13->28         started        30 dhcpmon.exe 13->30         started        32 schtasks.exe 15->32         started        34 SwiftCopy.pdf.exe 15->34         started        signatures6 process7 dnsIp8 64 sylviaoslh01.ddns.net 194.5.98.31, 49742, 49750, 49753 DANILENKODE Netherlands 19->64 66 192.168.2.1 unknown unknown 19->66 50 C:\Program Files (x86)\...\dhcpmon.exe, PE32 19->50 dropped 52 C:\Users\user\AppData\Roaming\...\run.dat, Non-ISO 19->52 dropped 54 C:\...\dhcpmon.exe:Zone.Identifier, ASCII 19->54 dropped 76 Hides that the sample has been downloaded from the Internet (zone.identifier) 19->76 36 schtasks.exe 1 19->36         started        38 schtasks.exe 1 19->38         started        40 conhost.exe 24->40         started        42 conhost.exe 28->42         started        44 conhost.exe 32->44         started        file9 signatures10 process11 process12 46 conhost.exe 36->46         started        48 conhost.exe 38->48         started       

        Screenshots

        Thumbnails

        This section contains all screenshots as thumbnails, including those not shown in the slideshow.

        windows-stand

        Antivirus, Machine Learning and Genetic Malware Detection

        Initial Sample

        SourceDetectionScannerLabelLink
        SwiftCopy.pdf.exe44%ReversingLabs
        SwiftCopy.pdf.exe100%Joe Sandbox ML

        Dropped Files

        SourceDetectionScannerLabelLink
        C:\Users\user\AppData\Roaming\xetNJdChYOitP.exe100%Joe Sandbox ML
        C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe100%Joe Sandbox ML
        C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe44%ReversingLabs
        C:\Users\user\AppData\Roaming\xetNJdChYOitP.exe44%ReversingLabs

        Unpacked PE Files

        SourceDetectionScannerLabelLinkDownload
        11.2.SwiftCopy.pdf.exe.4332580.6.unpack100%AviraTR/NanoCore.fadteDownload File
        29.0.SwiftCopy.pdf.exe.400000.3.unpack100%AviraTR/Dropper.MSIL.Gen7Download File
        11.0.SwiftCopy.pdf.exe.400000.3.unpack100%AviraTR/Dropper.MSIL.Gen7Download File
        32.0.dhcpmon.exe.400000.3.unpack100%AviraTR/Dropper.MSIL.Gen7Download File
        11.2.SwiftCopy.pdf.exe.400000.0.unpack100%AviraTR/Dropper.MSIL.Gen7Download File
        29.2.SwiftCopy.pdf.exe.400000.0.unpack100%AviraTR/Dropper.MSIL.Gen7Download File
        11.2.SwiftCopy.pdf.exe.5d70000.11.unpack100%AviraTR/NanoCore.fadteDownload File
        32.2.dhcpmon.exe.400000.0.unpack100%AviraTR/Dropper.MSIL.Gen7Download File
        11.0.SwiftCopy.pdf.exe.400000.1.unpack100%AviraTR/Dropper.MSIL.Gen7Download File
        32.0.dhcpmon.exe.400000.1.unpack100%AviraTR/Dropper.MSIL.Gen7Download File
        29.0.SwiftCopy.pdf.exe.400000.1.unpack100%AviraTR/Dropper.MSIL.Gen7Download File

        Domains

        SourceDetectionScannerLabelLink
        sylviaoslh01.ddns.net9%VirustotalBrowse

        URLs

        SourceDetectionScannerLabelLink
        http://www.founder.com.cn/cn/bThe0%URL Reputationsafe
        http://www.founder.com.cn/cn/bThe0%URL Reputationsafe
        http://www.founder.com.cn/cn/bThe0%URL Reputationsafe
        http://www.founder.com.cn/cn/bThe0%URL Reputationsafe
        http://www.jiyu-kobo.co.jp/jp/D0%Avira URL Cloudsafe
        http://www.jiyu-kobo.co.jp/jp/L0%Avira URL Cloudsafe
        http://www.jiyu-kobo.co.jp/jp//0%VirustotalBrowse
        http://www.jiyu-kobo.co.jp/jp//0%Avira URL Cloudsafe
        http://www.jiyu-kobo.co.jp/jp/00%Avira URL Cloudsafe
        http://www.tiro.com0%URL Reputationsafe
        http://www.tiro.com0%URL Reputationsafe
        http://www.tiro.com0%URL Reputationsafe
        http://www.carterandcone.com60%Avira URL Cloudsafe
        http://www.goodfont.co.kr0%URL Reputationsafe
        http://www.goodfont.co.kr0%URL Reputationsafe
        http://www.goodfont.co.kr0%URL Reputationsafe
        http://www.carterandcone.com0%URL Reputationsafe
        http://www.carterandcone.com0%URL Reputationsafe
        http://www.carterandcone.com0%URL Reputationsafe
        http://www.sajatypeworks.com0%URL Reputationsafe
        http://www.sajatypeworks.com0%URL Reputationsafe
        http://www.sajatypeworks.com0%URL Reputationsafe
        http://www.jiyu-kobo.co.jp/90%URL Reputationsafe
        http://www.jiyu-kobo.co.jp/90%URL Reputationsafe
        http://www.jiyu-kobo.co.jp/90%URL Reputationsafe
        http://www.typography.netD0%URL Reputationsafe
        http://www.typography.netD0%URL Reputationsafe
        http://www.typography.netD0%URL Reputationsafe
        http://www.founder.com.cn/cn/cThe0%URL Reputationsafe
        http://www.founder.com.cn/cn/cThe0%URL Reputationsafe
        http://www.founder.com.cn/cn/cThe0%URL Reputationsafe
        http://www.founder.com.cn/cnn0%URL Reputationsafe
        http://www.founder.com.cn/cnn0%URL Reputationsafe
        http://www.founder.com.cn/cnn0%URL Reputationsafe
        http://www.galapagosdesign.com/staff/dennis.htm0%URL Reputationsafe
        http://www.galapagosdesign.com/staff/dennis.htm0%URL Reputationsafe
        http://www.galapagosdesign.com/staff/dennis.htm0%URL Reputationsafe
        http://www.jiyu-kobo.co.jp/70%URL Reputationsafe
        http://www.jiyu-kobo.co.jp/70%URL Reputationsafe
        http://www.jiyu-kobo.co.jp/70%URL Reputationsafe
        http://fontfabrik.com0%URL Reputationsafe
        http://fontfabrik.com0%URL Reputationsafe
        http://fontfabrik.com0%URL Reputationsafe
        http://www.jiyu-kobo.co.jp/Y0h0%Avira URL Cloudsafe
        http://www.fontbureau.comB.TTF0%URL Reputationsafe
        http://www.fontbureau.comB.TTF0%URL Reputationsafe
        http://www.fontbureau.comB.TTF0%URL Reputationsafe
        http://www.jiyu-kobo.co.jp//0%URL Reputationsafe
        http://www.jiyu-kobo.co.jp//0%URL Reputationsafe
        http://www.jiyu-kobo.co.jp//0%URL Reputationsafe
        http://www.jiyu-kobo.co.jp/00%URL Reputationsafe
        http://www.jiyu-kobo.co.jp/00%URL Reputationsafe
        http://www.jiyu-kobo.co.jp/00%URL Reputationsafe
        http://www.fontbureau.comef0%Avira URL Cloudsafe
        http://www.galapagosdesign.com/DPlease0%URL Reputationsafe
        http://www.galapagosdesign.com/DPlease0%URL Reputationsafe
        http://www.galapagosdesign.com/DPlease0%URL Reputationsafe
        http://www.jiyu-kobo.co.jp/Y00%URL Reputationsafe
        http://www.jiyu-kobo.co.jp/Y00%URL Reputationsafe
        http://www.jiyu-kobo.co.jp/Y00%URL Reputationsafe
        http://www.carterandcone.comP0%Avira URL Cloudsafe
        http://www.sandoll.co.kr0%URL Reputationsafe
        http://www.sandoll.co.kr0%URL Reputationsafe
        http://www.sandoll.co.kr0%URL Reputationsafe
        http://www.jiyu-kobo.co.jp/&0%URL Reputationsafe
        http://www.jiyu-kobo.co.jp/&0%URL Reputationsafe
        http://www.jiyu-kobo.co.jp/&0%URL Reputationsafe
        http://www.urwpp.deDPlease0%URL Reputationsafe
        http://www.urwpp.deDPlease0%URL Reputationsafe
        http://www.urwpp.deDPlease0%URL Reputationsafe
        http://www.zhongyicts.com.cn0%URL Reputationsafe
        http://www.zhongyicts.com.cn0%URL Reputationsafe
        http://www.zhongyicts.com.cn0%URL Reputationsafe
        http://www.carterandcone.comI0%Avira URL Cloudsafe
        http://www.sakkal.com0%URL Reputationsafe
        http://www.sakkal.com0%URL Reputationsafe
        http://www.sakkal.com0%URL Reputationsafe
        http://www.jiyu-kobo.co.jp/U0%URL Reputationsafe
        http://www.jiyu-kobo.co.jp/U0%URL Reputationsafe
        http://www.jiyu-kobo.co.jp/U0%URL Reputationsafe
        http://www.jiyu-kobo.co.jp/L0%URL Reputationsafe
        http://www.jiyu-kobo.co.jp/L0%URL Reputationsafe
        http://www.jiyu-kobo.co.jp/L0%URL Reputationsafe
        http://www.carterandcone.comr0%Avira URL Cloudsafe
        194.5.98.310%Avira URL Cloudsafe
        http://www.jiyu-kobo.co.jp/jp/q0%Avira URL Cloudsafe
        http://www.carterandcone.comv0%Avira URL Cloudsafe
        http://www.jiyu-kobo.co.jp/D0%URL Reputationsafe
        http://www.jiyu-kobo.co.jp/D0%URL Reputationsafe
        http://www.jiyu-kobo.co.jp/D0%URL Reputationsafe
        http://www.jiyu-kobo.co.jp/jp/0%URL Reputationsafe
        http://www.jiyu-kobo.co.jp/jp/0%URL Reputationsafe
        http://www.jiyu-kobo.co.jp/jp/0%URL Reputationsafe
        http://www.carterandcone.coml0%URL Reputationsafe
        http://www.carterandcone.coml0%URL Reputationsafe
        http://www.carterandcone.coml0%URL Reputationsafe
        http://www.jiyu-kobo.co.jp/z0%URL Reputationsafe
        http://www.jiyu-kobo.co.jp/z0%URL Reputationsafe
        http://www.jiyu-kobo.co.jp/z0%URL Reputationsafe
        http://www.founder.com.cn/cn0%URL Reputationsafe

        Domains and IPs

        Contacted Domains

        NameIPActiveMaliciousAntivirus DetectionReputation
        sylviaoslh01.ddns.net
        194.5.98.31
        truetrueunknown

        Contacted URLs

        NameMaliciousAntivirus DetectionReputation
        194.5.98.31true
        • Avira URL Cloud: safe
        unknown
        sylviaoslh01.ddns.nettrue
        • Avira URL Cloud: safe
        unknown

        URLs from Memory and Binaries

        NameSourceMaliciousAntivirus DetectionReputation
        http://www.fontbureau.com/designersGSwiftCopy.pdf.exe, 00000000.00000002.742185961.00000000055F0000.00000002.00000001.sdmp, SwiftCopy.pdf.exe, 00000013.00000002.827664643.00000000059C0000.00000002.00000001.sdmp, dhcpmon.exe, 00000014.00000002.823119054.0000000004F00000.00000002.00000001.sdmp, dhcpmon.exe, 00000015.00000002.843141069.0000000005430000.00000002.00000001.sdmpfalse
          high
          http://www.fontbureau.com/designers/?SwiftCopy.pdf.exe, 00000000.00000002.742185961.00000000055F0000.00000002.00000001.sdmp, SwiftCopy.pdf.exe, 00000013.00000002.827664643.00000000059C0000.00000002.00000001.sdmp, dhcpmon.exe, 00000014.00000002.823119054.0000000004F00000.00000002.00000001.sdmp, dhcpmon.exe, 00000015.00000002.843141069.0000000005430000.00000002.00000001.sdmpfalse
            high
            http://www.founder.com.cn/cn/bTheSwiftCopy.pdf.exe, 00000000.00000002.742185961.00000000055F0000.00000002.00000001.sdmp, SwiftCopy.pdf.exe, 00000013.00000002.827664643.00000000059C0000.00000002.00000001.sdmp, dhcpmon.exe, 00000014.00000002.823119054.0000000004F00000.00000002.00000001.sdmp, dhcpmon.exe, 00000015.00000002.843141069.0000000005430000.00000002.00000001.sdmpfalse
            • URL Reputation: safe
            • URL Reputation: safe
            • URL Reputation: safe
            • URL Reputation: safe
            unknown
            http://www.jiyu-kobo.co.jp/jp/DSwiftCopy.pdf.exe, 00000000.00000003.645291588.000000000548C000.00000004.00000001.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            http://www.fontbureau.com/designers?SwiftCopy.pdf.exe, 00000000.00000002.742185961.00000000055F0000.00000002.00000001.sdmp, SwiftCopy.pdf.exe, 00000013.00000002.827664643.00000000059C0000.00000002.00000001.sdmp, dhcpmon.exe, 00000014.00000002.823119054.0000000004F00000.00000002.00000001.sdmp, dhcpmon.exe, 00000015.00000002.843141069.0000000005430000.00000002.00000001.sdmpfalse
              high
              http://www.jiyu-kobo.co.jp/jp/LSwiftCopy.pdf.exe, 00000000.00000003.645291588.000000000548C000.00000004.00000001.sdmpfalse
              • Avira URL Cloud: safe
              unknown
              http://www.jiyu-kobo.co.jp/jp//SwiftCopy.pdf.exe, 00000000.00000003.645072500.0000000005497000.00000004.00000001.sdmpfalse
              • 0%, Virustotal, Browse
              • Avira URL Cloud: safe
              unknown
              http://www.jiyu-kobo.co.jp/jp/0SwiftCopy.pdf.exe, 00000000.00000003.644842820.0000000005487000.00000004.00000001.sdmpfalse
              • Avira URL Cloud: safe
              unknown
              http://www.tiro.comdhcpmon.exe, 00000015.00000002.843141069.0000000005430000.00000002.00000001.sdmpfalse
              • URL Reputation: safe
              • URL Reputation: safe
              • URL Reputation: safe
              unknown
              http://www.carterandcone.com6SwiftCopy.pdf.exe, 00000000.00000003.644496357.0000000005496000.00000004.00000001.sdmpfalse
              • Avira URL Cloud: safe
              unknown
              http://www.fontbureau.com/designersdhcpmon.exe, 00000015.00000002.843141069.0000000005430000.00000002.00000001.sdmpfalse
                high
                http://www.goodfont.co.krSwiftCopy.pdf.exe, 00000000.00000002.742185961.00000000055F0000.00000002.00000001.sdmp, SwiftCopy.pdf.exe, 00000013.00000002.827664643.00000000059C0000.00000002.00000001.sdmp, dhcpmon.exe, 00000014.00000002.823119054.0000000004F00000.00000002.00000001.sdmp, dhcpmon.exe, 00000015.00000002.843141069.0000000005430000.00000002.00000001.sdmpfalse
                • URL Reputation: safe
                • URL Reputation: safe
                • URL Reputation: safe
                unknown
                http://www.carterandcone.comSwiftCopy.pdf.exe, 00000000.00000003.644496357.0000000005496000.00000004.00000001.sdmp, SwiftCopy.pdf.exe, 00000000.00000003.644225835.0000000005499000.00000004.00000001.sdmpfalse
                • URL Reputation: safe
                • URL Reputation: safe
                • URL Reputation: safe
                unknown
                http://www.sajatypeworks.comSwiftCopy.pdf.exe, 00000000.00000002.742185961.00000000055F0000.00000002.00000001.sdmp, SwiftCopy.pdf.exe, 00000013.00000002.827664643.00000000059C0000.00000002.00000001.sdmp, dhcpmon.exe, 00000014.00000002.823119054.0000000004F00000.00000002.00000001.sdmp, dhcpmon.exe, 00000015.00000002.843141069.0000000005430000.00000002.00000001.sdmpfalse
                • URL Reputation: safe
                • URL Reputation: safe
                • URL Reputation: safe
                unknown
                http://www.jiyu-kobo.co.jp/9SwiftCopy.pdf.exe, 00000000.00000003.645291588.000000000548C000.00000004.00000001.sdmpfalse
                • URL Reputation: safe
                • URL Reputation: safe
                • URL Reputation: safe
                unknown
                http://www.typography.netDSwiftCopy.pdf.exe, 00000000.00000002.742185961.00000000055F0000.00000002.00000001.sdmp, SwiftCopy.pdf.exe, 00000013.00000002.827664643.00000000059C0000.00000002.00000001.sdmp, dhcpmon.exe, 00000014.00000002.823119054.0000000004F00000.00000002.00000001.sdmp, dhcpmon.exe, 00000015.00000002.843141069.0000000005430000.00000002.00000001.sdmpfalse
                • URL Reputation: safe
                • URL Reputation: safe
                • URL Reputation: safe
                unknown
                http://www.founder.com.cn/cn/cTheSwiftCopy.pdf.exe, 00000000.00000002.742185961.00000000055F0000.00000002.00000001.sdmp, SwiftCopy.pdf.exe, 00000013.00000002.827664643.00000000059C0000.00000002.00000001.sdmp, dhcpmon.exe, 00000014.00000002.823119054.0000000004F00000.00000002.00000001.sdmp, dhcpmon.exe, 00000015.00000002.843141069.0000000005430000.00000002.00000001.sdmpfalse
                • URL Reputation: safe
                • URL Reputation: safe
                • URL Reputation: safe
                unknown
                http://www.founder.com.cn/cnnSwiftCopy.pdf.exe, 00000000.00000003.643149912.000000000160B000.00000004.00000001.sdmpfalse
                • URL Reputation: safe
                • URL Reputation: safe
                • URL Reputation: safe
                unknown
                http://www.galapagosdesign.com/staff/dennis.htmSwiftCopy.pdf.exe, 00000000.00000002.742185961.00000000055F0000.00000002.00000001.sdmp, SwiftCopy.pdf.exe, 00000013.00000002.827664643.00000000059C0000.00000002.00000001.sdmp, dhcpmon.exe, 00000014.00000002.823119054.0000000004F00000.00000002.00000001.sdmp, dhcpmon.exe, 00000015.00000002.843141069.0000000005430000.00000002.00000001.sdmpfalse
                • URL Reputation: safe
                • URL Reputation: safe
                • URL Reputation: safe
                unknown
                http://www.jiyu-kobo.co.jp/7SwiftCopy.pdf.exe, 00000000.00000003.645072500.0000000005497000.00000004.00000001.sdmpfalse
                • URL Reputation: safe
                • URL Reputation: safe
                • URL Reputation: safe
                unknown
                http://fontfabrik.comSwiftCopy.pdf.exe, 00000000.00000002.742185961.00000000055F0000.00000002.00000001.sdmp, SwiftCopy.pdf.exe, 00000013.00000002.827664643.00000000059C0000.00000002.00000001.sdmp, dhcpmon.exe, 00000014.00000002.823119054.0000000004F00000.00000002.00000001.sdmp, dhcpmon.exe, 00000015.00000002.843141069.0000000005430000.00000002.00000001.sdmpfalse
                • URL Reputation: safe
                • URL Reputation: safe
                • URL Reputation: safe
                unknown
                http://www.jiyu-kobo.co.jp/Y0hSwiftCopy.pdf.exe, 00000000.00000003.645291588.000000000548C000.00000004.00000001.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                http://www.fontbureau.comB.TTFSwiftCopy.pdf.exe, 00000000.00000003.726780421.0000000005480000.00000004.00000001.sdmpfalse
                • URL Reputation: safe
                • URL Reputation: safe
                • URL Reputation: safe
                unknown
                http://www.jiyu-kobo.co.jp//SwiftCopy.pdf.exe, 00000000.00000003.645291588.000000000548C000.00000004.00000001.sdmpfalse
                • URL Reputation: safe
                • URL Reputation: safe
                • URL Reputation: safe
                unknown
                http://www.jiyu-kobo.co.jp/0SwiftCopy.pdf.exe, 00000000.00000003.644645566.0000000005485000.00000004.00000001.sdmpfalse
                • URL Reputation: safe
                • URL Reputation: safe
                • URL Reputation: safe
                unknown
                http://www.fontbureau.comefSwiftCopy.pdf.exe, 00000000.00000003.645966627.0000000005482000.00000004.00000001.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                http://www.galapagosdesign.com/DPleaseSwiftCopy.pdf.exe, 00000000.00000002.742185961.00000000055F0000.00000002.00000001.sdmp, SwiftCopy.pdf.exe, 00000013.00000002.827664643.00000000059C0000.00000002.00000001.sdmp, dhcpmon.exe, 00000014.00000002.823119054.0000000004F00000.00000002.00000001.sdmp, dhcpmon.exe, 00000015.00000002.843141069.0000000005430000.00000002.00000001.sdmpfalse
                • URL Reputation: safe
                • URL Reputation: safe
                • URL Reputation: safe
                unknown
                http://www.jiyu-kobo.co.jp/Y0SwiftCopy.pdf.exe, 00000000.00000003.644842820.0000000005487000.00000004.00000001.sdmpfalse
                • URL Reputation: safe
                • URL Reputation: safe
                • URL Reputation: safe
                unknown
                http://www.carterandcone.comPSwiftCopy.pdf.exe, 00000000.00000003.644496357.0000000005496000.00000004.00000001.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                http://www.fonts.comSwiftCopy.pdf.exe, 00000000.00000002.742185961.00000000055F0000.00000002.00000001.sdmp, SwiftCopy.pdf.exe, 00000013.00000002.827664643.00000000059C0000.00000002.00000001.sdmp, dhcpmon.exe, 00000014.00000002.823119054.0000000004F00000.00000002.00000001.sdmp, dhcpmon.exe, 00000015.00000002.843141069.0000000005430000.00000002.00000001.sdmpfalse
                  high
                  http://www.sandoll.co.krSwiftCopy.pdf.exe, 00000000.00000002.742185961.00000000055F0000.00000002.00000001.sdmp, SwiftCopy.pdf.exe, 00000013.00000002.827664643.00000000059C0000.00000002.00000001.sdmp, dhcpmon.exe, 00000014.00000002.823119054.0000000004F00000.00000002.00000001.sdmp, dhcpmon.exe, 00000015.00000002.843141069.0000000005430000.00000002.00000001.sdmpfalse
                  • URL Reputation: safe
                  • URL Reputation: safe
                  • URL Reputation: safe
                  unknown
                  http://www.jiyu-kobo.co.jp/&SwiftCopy.pdf.exe, 00000000.00000003.644645566.0000000005485000.00000004.00000001.sdmpfalse
                  • URL Reputation: safe
                  • URL Reputation: safe
                  • URL Reputation: safe
                  unknown
                  http://www.urwpp.deDPleaseSwiftCopy.pdf.exe, 00000000.00000002.742185961.00000000055F0000.00000002.00000001.sdmp, SwiftCopy.pdf.exe, 00000013.00000002.827664643.00000000059C0000.00000002.00000001.sdmp, dhcpmon.exe, 00000014.00000002.823119054.0000000004F00000.00000002.00000001.sdmp, dhcpmon.exe, 00000015.00000002.843141069.0000000005430000.00000002.00000001.sdmpfalse
                  • URL Reputation: safe
                  • URL Reputation: safe
                  • URL Reputation: safe
                  unknown
                  http://www.zhongyicts.com.cnSwiftCopy.pdf.exe, 00000000.00000002.742185961.00000000055F0000.00000002.00000001.sdmp, SwiftCopy.pdf.exe, 00000013.00000002.827664643.00000000059C0000.00000002.00000001.sdmp, dhcpmon.exe, 00000014.00000002.823119054.0000000004F00000.00000002.00000001.sdmp, dhcpmon.exe, 00000015.00000002.843141069.0000000005430000.00000002.00000001.sdmpfalse
                  • URL Reputation: safe
                  • URL Reputation: safe
                  • URL Reputation: safe
                  unknown
                  http://www.carterandcone.comISwiftCopy.pdf.exe, 00000000.00000003.644225835.0000000005499000.00000004.00000001.sdmpfalse
                  • Avira URL Cloud: safe
                  unknown
                  http://www.sakkal.comSwiftCopy.pdf.exe, 00000000.00000002.742185961.00000000055F0000.00000002.00000001.sdmp, SwiftCopy.pdf.exe, 00000013.00000002.827664643.00000000059C0000.00000002.00000001.sdmp, dhcpmon.exe, 00000014.00000002.823119054.0000000004F00000.00000002.00000001.sdmp, dhcpmon.exe, 00000015.00000002.843141069.0000000005430000.00000002.00000001.sdmpfalse
                  • URL Reputation: safe
                  • URL Reputation: safe
                  • URL Reputation: safe
                  unknown
                  http://www.apache.org/licenses/LICENSE-2.0SwiftCopy.pdf.exe, 00000000.00000003.644038179.000000000548D000.00000004.00000001.sdmp, SwiftCopy.pdf.exe, 00000013.00000002.827664643.00000000059C0000.00000002.00000001.sdmp, dhcpmon.exe, 00000014.00000002.823119054.0000000004F00000.00000002.00000001.sdmp, dhcpmon.exe, 00000015.00000002.843141069.0000000005430000.00000002.00000001.sdmpfalse
                    high
                    http://www.fontbureau.comSwiftCopy.pdf.exe, 00000000.00000003.645966627.0000000005482000.00000004.00000001.sdmp, SwiftCopy.pdf.exe, 00000013.00000002.827664643.00000000059C0000.00000002.00000001.sdmp, dhcpmon.exe, 00000014.00000002.823119054.0000000004F00000.00000002.00000001.sdmp, dhcpmon.exe, 00000015.00000002.843141069.0000000005430000.00000002.00000001.sdmpfalse
                      high
                      http://www.jiyu-kobo.co.jp/USwiftCopy.pdf.exe, 00000000.00000003.645291588.000000000548C000.00000004.00000001.sdmpfalse
                      • URL Reputation: safe
                      • URL Reputation: safe
                      • URL Reputation: safe
                      unknown
                      http://www.jiyu-kobo.co.jp/LSwiftCopy.pdf.exe, 00000000.00000003.644842820.0000000005487000.00000004.00000001.sdmpfalse
                      • URL Reputation: safe
                      • URL Reputation: safe
                      • URL Reputation: safe
                      unknown
                      http://www.carterandcone.comrSwiftCopy.pdf.exe, 00000000.00000003.644451230.0000000005496000.00000004.00000001.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      http://www.jiyu-kobo.co.jp/jp/qSwiftCopy.pdf.exe, 00000000.00000003.645291588.000000000548C000.00000004.00000001.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      http://www.carterandcone.comvSwiftCopy.pdf.exe, 00000000.00000003.644496357.0000000005496000.00000004.00000001.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      http://www.jiyu-kobo.co.jp/DSwiftCopy.pdf.exe, 00000000.00000003.644842820.0000000005487000.00000004.00000001.sdmpfalse
                      • URL Reputation: safe
                      • URL Reputation: safe
                      • URL Reputation: safe
                      unknown
                      http://www.jiyu-kobo.co.jp/jp/SwiftCopy.pdf.exe, 00000000.00000003.645334951.000000000548C000.00000004.00000001.sdmpfalse
                      • URL Reputation: safe
                      • URL Reputation: safe
                      • URL Reputation: safe
                      unknown
                      http://www.carterandcone.comlSwiftCopy.pdf.exe, 00000000.00000002.742185961.00000000055F0000.00000002.00000001.sdmp, SwiftCopy.pdf.exe, 00000013.00000002.827664643.00000000059C0000.00000002.00000001.sdmp, dhcpmon.exe, 00000014.00000002.823119054.0000000004F00000.00000002.00000001.sdmp, dhcpmon.exe, 00000015.00000002.843141069.0000000005430000.00000002.00000001.sdmpfalse
                      • URL Reputation: safe
                      • URL Reputation: safe
                      • URL Reputation: safe
                      unknown
                      http://www.fontbureau.com/designers/cabarga.htmlNSwiftCopy.pdf.exe, 00000000.00000002.742185961.00000000055F0000.00000002.00000001.sdmp, SwiftCopy.pdf.exe, 00000013.00000002.827664643.00000000059C0000.00000002.00000001.sdmp, dhcpmon.exe, 00000014.00000002.823119054.0000000004F00000.00000002.00000001.sdmp, dhcpmon.exe, 00000015.00000002.843141069.0000000005430000.00000002.00000001.sdmpfalse
                        high
                        http://www.jiyu-kobo.co.jp/zSwiftCopy.pdf.exe, 00000000.00000003.645291588.000000000548C000.00000004.00000001.sdmpfalse
                        • URL Reputation: safe
                        • URL Reputation: safe
                        • URL Reputation: safe
                        unknown
                        http://www.founder.com.cn/cnSwiftCopy.pdf.exe, 00000000.00000003.643130611.0000000005496000.00000004.00000001.sdmp, SwiftCopy.pdf.exe, 00000013.00000002.827664643.00000000059C0000.00000002.00000001.sdmp, dhcpmon.exe, 00000014.00000002.823119054.0000000004F00000.00000002.00000001.sdmp, dhcpmon.exe, 00000015.00000002.843141069.0000000005430000.00000002.00000001.sdmpfalse
                        • URL Reputation: safe
                        • URL Reputation: safe
                        • URL Reputation: safe
                        unknown
                        http://www.jiyu-kobo.co.jp/s9SwiftCopy.pdf.exe, 00000000.00000003.645291588.000000000548C000.00000004.00000001.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        http://www.fontbureau.com/designers/frere-user.htmlSwiftCopy.pdf.exe, 00000000.00000002.742185961.00000000055F0000.00000002.00000001.sdmp, SwiftCopy.pdf.exe, 00000013.00000002.827664643.00000000059C0000.00000002.00000001.sdmp, dhcpmon.exe, 00000014.00000002.823119054.0000000004F00000.00000002.00000001.sdmp, dhcpmon.exe, 00000015.00000002.843141069.0000000005430000.00000002.00000001.sdmpfalse
                          high
                          http://www.jiyu-kobo.co.jp/qSwiftCopy.pdf.exe, 00000000.00000003.644645566.0000000005485000.00000004.00000001.sdmpfalse
                          • URL Reputation: safe
                          • URL Reputation: safe
                          • URL Reputation: safe
                          unknown
                          http://www.fontbureau.comqSwiftCopy.pdf.exe, 00000000.00000003.645994299.0000000005482000.00000004.00000001.sdmpfalse
                          • Avira URL Cloud: safe
                          unknown
                          http://www.jiyu-kobo.co.jp/SwiftCopy.pdf.exe, 00000000.00000003.645291588.000000000548C000.00000004.00000001.sdmp, SwiftCopy.pdf.exe, 00000013.00000002.827664643.00000000059C0000.00000002.00000001.sdmp, dhcpmon.exe, 00000014.00000002.823119054.0000000004F00000.00000002.00000001.sdmp, dhcpmon.exe, 00000015.00000002.843141069.0000000005430000.00000002.00000001.sdmpfalse
                          • URL Reputation: safe
                          • URL Reputation: safe
                          • URL Reputation: safe
                          unknown
                          http://www.fontbureau.comoSwiftCopy.pdf.exe, 00000000.00000003.726780421.0000000005480000.00000004.00000001.sdmpfalse
                          • URL Reputation: safe
                          • URL Reputation: safe
                          • URL Reputation: safe
                          unknown
                          http://www.carterandcone.comingSwiftCopy.pdf.exe, 00000000.00000003.644496357.0000000005496000.00000004.00000001.sdmpfalse
                          • Avira URL Cloud: safe
                          unknown
                          http://www.carterandcone.comsesSwiftCopy.pdf.exe, 00000000.00000003.644496357.0000000005496000.00000004.00000001.sdmpfalse
                          • Avira URL Cloud: safe
                          unknown
                          http://www.fontbureau.com/designers8SwiftCopy.pdf.exe, 00000000.00000002.742185961.00000000055F0000.00000002.00000001.sdmp, SwiftCopy.pdf.exe, 00000013.00000002.827664643.00000000059C0000.00000002.00000001.sdmp, dhcpmon.exe, 00000014.00000002.823119054.0000000004F00000.00000002.00000001.sdmp, dhcpmon.exe, 00000015.00000002.843141069.0000000005430000.00000002.00000001.sdmpfalse
                            high
                            http://www.fontbureau.com/designers/SwiftCopy.pdf.exe, 00000000.00000003.645966627.0000000005482000.00000004.00000001.sdmp, SwiftCopy.pdf.exe, 00000000.00000003.645961936.000000000160B000.00000004.00000001.sdmpfalse
                              high

                              Contacted IPs

                              • No. of IPs < 25%
                              • 25% < No. of IPs < 50%
                              • 50% < No. of IPs < 75%
                              • 75% < No. of IPs

                              Public

                              IPDomainCountryFlagASNASN NameMalicious
                              194.5.98.31
                              sylviaoslh01.ddns.netNetherlands
                              208476DANILENKODEtrue

                              Private

                              IP
                              192.168.2.1

                              General Information

                              Joe Sandbox Version:32.0.0 Black Diamond
                              Analysis ID:432424
                              Start date:10.06.2021
                              Start time:10:32:54
                              Joe Sandbox Product:CloudBasic
                              Overall analysis duration:0h 14m 7s
                              Hypervisor based Inspection enabled:false
                              Report type:light
                              Sample file name:SwiftCopy.pdf.exe
                              Cookbook file name:default.jbs
                              Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
                              Number of analysed new started processes analysed:34
                              Number of new started drivers analysed:0
                              Number of existing processes analysed:0
                              Number of existing drivers analysed:0
                              Number of injected processes analysed:0
                              Technologies:
                              • HCA enabled
                              • EGA enabled
                              • HDC enabled
                              • AMSI enabled
                              Analysis Mode:default
                              Analysis stop reason:Timeout
                              Detection:MAL
                              Classification:mal100.troj.evad.winEXE@27/13@13/2
                              EGA Information:Failed
                              HDC Information:
                              • Successful, ratio: 0.6% (good quality ratio 0.6%)
                              • Quality average: 91.6%
                              • Quality standard deviation: 10.7%
                              HCA Information:
                              • Successful, ratio: 99%
                              • Number of executed functions: 0
                              • Number of non-executed functions: 0
                              Cookbook Comments:
                              • Adjust boot time
                              • Enable AMSI
                              • Found application associated with file extension: .exe
                              Warnings:
                              Show All
                              • Behavior information exceeds normal sizes, reducing to normal. Report will have missing behavior information.
                              • TCP Packets have been reduced to 100
                              • Exclude process from analysis (whitelisted): BackgroundTransferHost.exe, backgroundTaskHost.exe, svchost.exe, wuapihost.exe
                              • Excluded IPs from analysis (whitelisted): 104.42.151.234, 20.50.102.62, 92.122.145.220, 13.64.90.137, 20.72.88.19, 2.20.142.210, 2.20.142.209, 20.54.26.129, 20.75.105.140, 92.122.213.194, 92.122.213.247
                              • Excluded domains from analysis (whitelisted): au.download.windowsupdate.com.edgesuite.net, store-images.s-microsoft.com-c.edgekey.net, a1449.dscg2.akamai.net, arc.msn.com, consumerrp-displaycatalog-aks2eap-europe.md.mp.microsoft.com.akadns.net, eus2-consumerrp-displaycatalog-aks2aks-useast.md.mp.microsoft.com.akadns.net, e12564.dspb.akamaiedge.net, audownload.windowsupdate.nsatc.net, arc.trafficmanager.net, displaycatalog.mp.microsoft.com, watson.telemetry.microsoft.com, img-prod-cms-rt-microsoft-com.akamaized.net, au-bg-shim.trafficmanager.net, skypedataprdcolwus17.cloudapp.net, displaycatalog-rp-europe.md.mp.microsoft.com.akadns.net, ris-prod.trafficmanager.net, ctldl.windowsupdate.com, a767.dscg3.akamai.net, consumerrp-displaycatalog-aks2aks-europe.md.mp.microsoft.com.akadns.net, iris-de-prod-azsc-uks.uksouth.cloudapp.azure.com, ris.api.iris.microsoft.com, store-images.s-microsoft.com, blobcollector.events.data.trafficmanager.net, skypedataprdcolwus16.cloudapp.net, displaycatalog-rp.md.mp.microsoft.com.akadns.net
                              • Not all processes where analyzed, report is missing behavior information
                              • Report creation exceeded maximum time and may have missing disassembly code information.
                              • Report size exceeded maximum capacity and may have missing behavior information.
                              • Report size exceeded maximum capacity and may have missing disassembly code.
                              • Report size getting too big, too many NtAllocateVirtualMemory calls found.
                              • Report size getting too big, too many NtOpenKeyEx calls found.
                              • Report size getting too big, too many NtProtectVirtualMemory calls found.
                              • Report size getting too big, too many NtQueryValueKey calls found.

                              Simulations

                              Behavior and APIs

                              TimeTypeDescription
                              10:34:15API Interceptor660x Sleep call for process: SwiftCopy.pdf.exe modified
                              10:34:22Task SchedulerRun new task: DHCP Monitor path: "C:\Users\user\Desktop\SwiftCopy.pdf.exe" s>$(Arg0)
                              10:34:24AutostartRun: HKLM\Software\Microsoft\Windows\CurrentVersion\Run DHCP Monitor C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
                              10:34:25Task SchedulerRun new task: DHCP Monitor Task path: "C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe" s>$(Arg0)
                              10:35:06API Interceptor1x Sleep call for process: dhcpmon.exe modified

                              Joe Sandbox View / Context

                              IPs

                              MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                              194.5.98.31TPA AGREEMENT00038499530.exeGet hashmaliciousBrowse

                                Domains

                                MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                sylviaoslh01.ddns.netTPA AGREEMENT00038499530.exeGet hashmaliciousBrowse
                                • 154.118.45.15
                                0672IMP000158021.pdf.exeGet hashmaliciousBrowse
                                • 185.244.30.13
                                C3GWn5tduT.exeGet hashmaliciousBrowse
                                • 197.242.98.161
                                a34b93ef-dea2-45f8-a5bf-4f6b0b5291c7.exeGet hashmaliciousBrowse
                                • 194.5.97.207
                                3fcd8c19-af88-4cd9-87e7-0bfea1de01a1.exeGet hashmaliciousBrowse
                                • 194.5.97.207
                                5zLV4brBQ7.exeGet hashmaliciousBrowse
                                • 194.5.97.207
                                Bank Information.exeGet hashmaliciousBrowse
                                • 41.217.47.187
                                0712020.exeGet hashmaliciousBrowse
                                • 41.217.69.179
                                HSBCdoc24523820201117161551.exeGet hashmaliciousBrowse
                                • 194.5.98.180

                                ASN

                                MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                DANILENKODEwlCqbMRJ7p.exeGet hashmaliciousBrowse
                                • 194.5.98.5
                                SecuriteInfo.com.Trojan.PackedNET.832.3222.exeGet hashmaliciousBrowse
                                • 194.5.98.144
                                SecuriteInfo.com.Trojan.PackedNET.831.12541.exeGet hashmaliciousBrowse
                                • 194.5.98.144
                                0Cg1YYs1sv.exeGet hashmaliciousBrowse
                                • 194.5.98.144
                                Duplicated Orders.xlsxGet hashmaliciousBrowse
                                • 194.5.98.144
                                DEPOSITAR.xlsxGet hashmaliciousBrowse
                                • 194.5.98.144
                                InvoicePOzGlybgcIc1vHasG.exeGet hashmaliciousBrowse
                                • 194.5.98.87
                                POInvoiceOrderIuVvcl0VWEOAmXy.exeGet hashmaliciousBrowse
                                • 194.5.98.87
                                payment invoice.exeGet hashmaliciousBrowse
                                • 194.5.98.23
                                #RFQ ORDER484475577797.exeGet hashmaliciousBrowse
                                • 194.5.98.120
                                b6yzWugw8V.exeGet hashmaliciousBrowse
                                • 194.5.98.107
                                0041#Receipt.pif.exeGet hashmaliciousBrowse
                                • 194.5.98.180
                                j07ghiByDq.exeGet hashmaliciousBrowse
                                • 194.5.97.146
                                j07ghiByDq.exeGet hashmaliciousBrowse
                                • 194.5.97.146
                                PROOF OF PAYMENT.exeGet hashmaliciousBrowse
                                • 194.5.97.18
                                SecuriteInfo.com.Trojan.PackedNET.820.24493.exeGet hashmaliciousBrowse
                                • 194.5.97.61
                                DHL_file.exeGet hashmaliciousBrowse
                                • 194.5.98.145
                                BBS FX.xlsxGet hashmaliciousBrowse
                                • 194.5.97.61
                                GpnPv433gb.exeGet hashmaliciousBrowse
                                • 194.5.98.11
                                Kj7tTd1Zimp0ciI.exeGet hashmaliciousBrowse
                                • 194.5.97.197

                                JA3 Fingerprints

                                No context

                                Dropped Files

                                No context

                                Created / dropped Files

                                C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
                                Process:C:\Users\user\Desktop\SwiftCopy.pdf.exe
                                File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                Category:dropped
                                Size (bytes):793088
                                Entropy (8bit):6.728969427122061
                                Encrypted:false
                                SSDEEP:12288:ipbyAsdHyDOfkigFIjGGe3OK+CwiVDkWqqLEkHqc0E:KWAiHiOMiaIyFOKHNVgjryF0E
                                MD5:5A13130EC1C4259C3F63FA48167AB094
                                SHA1:EC4A42085F6C4FD6FBD79705723C8D034F24EBAD
                                SHA-256:85C856FE483E3A2EF7A4417693DC121C42673AC426CB8CF486FBE20B4825636A
                                SHA-512:CE38522E50ADACE8D49720CD8F05183ED051ACA11C2FAE6EAB5C2D5EC830D831B041016E6B1AA9019C78803B8456A7052C1EDE99E09E8A11FB1039DFF5049086
                                Malicious:true
                                Antivirus:
                                • Antivirus: Joe Sandbox ML, Detection: 100%
                                • Antivirus: ReversingLabs, Detection: 44%
                                Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...)2.`..............0......p........... ........@.. ....................................@.....................................O........m...................`......\................................................ ............... ..H............text....... ...................... ..`.rsrc....m.......n..................@..@.reloc.......`......................@..B........................H.......................$...8...........................................^..}.....(.......(*....*.0..T........r...ps......o.....r...p...s......o....&s......s.........o....&.{.....o......o.....*.0............{....o....o....r<..p(.....{....o....o....r<..p(...._.{....o....o....r<..p(...._.{....o....o....r<..p(...._.{....o....o....r<..p(...._.{....o....o....r<..p(...._.{....o....o....r<..p(...._.{....o....o....r<..p(...._..9.....r...ps......o......{.....{....o....( ....{....o....(
                                C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe:Zone.Identifier
                                Process:C:\Users\user\Desktop\SwiftCopy.pdf.exe
                                File Type:ASCII text, with CRLF line terminators
                                Category:dropped
                                Size (bytes):26
                                Entropy (8bit):3.95006375643621
                                Encrypted:false
                                SSDEEP:3:ggPYV:rPYV
                                MD5:187F488E27DB4AF347237FE461A079AD
                                SHA1:6693BA299EC1881249D59262276A0D2CB21F8E64
                                SHA-256:255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309
                                SHA-512:89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E
                                Malicious:true
                                Preview: [ZoneTransfer]....ZoneId=0
                                C:\Users\user\AppData\Local\Microsoft\CLR_v2.0_32\UsageLogs\SwiftCopy.pdf.exe.log
                                Process:C:\Users\user\Desktop\SwiftCopy.pdf.exe
                                File Type:ASCII text, with CRLF line terminators
                                Category:dropped
                                Size (bytes):525
                                Entropy (8bit):5.2874233355119316
                                Encrypted:false
                                SSDEEP:12:Q3LaJU20NaL10U29hJ5g1B0U2ukyrFk70Ug+9Yz9tv:MLF20NaL329hJ5g522rWz2T
                                MD5:61CCF53571C9ABA6511D696CB0D32E45
                                SHA1:A13A42A20EC14942F52DB20FB16A0A520F8183CE
                                SHA-256:3459BDF6C0B7F9D43649ADAAF19BA8D5D133BCBE5EF80CF4B7000DC91E10903B
                                SHA-512:90E180D9A681F82C010C326456AC88EBB89256CC769E900BFB4B2DF92E69CA69726863B45DFE4627FC1EE8C281F2AF86A6A1E2EF1710094CCD3F4E092872F06F
                                Malicious:true
                                Preview: 1,"fusion","GAC",0..3,"C:\Windows\assembly\NativeImages_v2.0.50727_32\System\1ffc437de59fb69ba2b865ffdc98ffd1\System.ni.dll",0..3,"C:\Windows\assembly\NativeImages_v2.0.50727_32\System.Drawing\54d944b3ca0ea1188d700fbd8089726b\System.Drawing.ni.dll",0..3,"C:\Windows\assembly\NativeImages_v2.0.50727_32\System.Windows.Forms\bd8d59c984c9f5f2695f64341115cdf0\System.Windows.Forms.ni.dll",0..3,"C:\Windows\assembly\NativeImages_v2.0.50727_32\Microsoft.VisualBas#\cd7c74fce2a0eab72cd25cbe4bb61614\Microsoft.VisualBasic.ni.dll",0..
                                C:\Users\user\AppData\Local\Microsoft\CLR_v2.0_32\UsageLogs\dhcpmon.exe.log
                                Process:C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
                                File Type:ASCII text, with CRLF line terminators
                                Category:dropped
                                Size (bytes):525
                                Entropy (8bit):5.2874233355119316
                                Encrypted:false
                                SSDEEP:12:Q3LaJU20NaL10U29hJ5g1B0U2ukyrFk70Ug+9Yz9tv:MLF20NaL329hJ5g522rWz2T
                                MD5:61CCF53571C9ABA6511D696CB0D32E45
                                SHA1:A13A42A20EC14942F52DB20FB16A0A520F8183CE
                                SHA-256:3459BDF6C0B7F9D43649ADAAF19BA8D5D133BCBE5EF80CF4B7000DC91E10903B
                                SHA-512:90E180D9A681F82C010C326456AC88EBB89256CC769E900BFB4B2DF92E69CA69726863B45DFE4627FC1EE8C281F2AF86A6A1E2EF1710094CCD3F4E092872F06F
                                Malicious:false
                                Preview: 1,"fusion","GAC",0..3,"C:\Windows\assembly\NativeImages_v2.0.50727_32\System\1ffc437de59fb69ba2b865ffdc98ffd1\System.ni.dll",0..3,"C:\Windows\assembly\NativeImages_v2.0.50727_32\System.Drawing\54d944b3ca0ea1188d700fbd8089726b\System.Drawing.ni.dll",0..3,"C:\Windows\assembly\NativeImages_v2.0.50727_32\System.Windows.Forms\bd8d59c984c9f5f2695f64341115cdf0\System.Windows.Forms.ni.dll",0..3,"C:\Windows\assembly\NativeImages_v2.0.50727_32\Microsoft.VisualBas#\cd7c74fce2a0eab72cd25cbe4bb61614\Microsoft.VisualBasic.ni.dll",0..
                                C:\Users\user\AppData\Local\Temp\tmp994A.tmp
                                Process:C:\Users\user\Desktop\SwiftCopy.pdf.exe
                                File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                Category:dropped
                                Size (bytes):1646
                                Entropy (8bit):5.183748957987971
                                Encrypted:false
                                SSDEEP:24:2dH4+SEqC/S7hblNMFp//rlMhEMjnGpwjpIgUYODOLD9RJh7h8gKBG/ntn:cbhK79lNQR/rydbz9I3YODOLNdq3It
                                MD5:E768B7AC7BE721211F882B89152C81EC
                                SHA1:0B9869E31A443D80BF82BE67C249FAC94651D881
                                SHA-256:F36D60E3C11650CC66D572D7C7A6C67E0E946D0965C61D05FAB4C98EDA1F48D7
                                SHA-512:052C5BBE2297993F679E942FE59A4D7E6CE32CAABF9574F081E51F3262292DDCFE3039419AF28F2FF9E92592BC6ADCC099676A7BFC8A9C555F2A721AEFBE711B
                                Malicious:false
                                Preview: <?xml version="1.0" encoding="UTF-16"?>..<Task version="1.2" xmlns="http://schemas.microsoft.com/windows/2004/02/mit/task">.. <RegistrationInfo>.. <Date>2014-10-25T14:27:44.8929027</Date>.. <Author>computer\user</Author>.. </RegistrationInfo>.. <Triggers>.. <LogonTrigger>.. <Enabled>true</Enabled>.. <UserId>computer\user</UserId>.. </LogonTrigger>.. <RegistrationTrigger>.. <Enabled>false</Enabled>.. </RegistrationTrigger>.. </Triggers>.. <Principals>.. <Principal id="Author">.. <UserId>computer\user</UserId>.. <LogonType>InteractiveToken</LogonType>.. <RunLevel>LeastPrivilege</RunLevel>.. </Principal>.. </Principals>.. <Settings>.. <MultipleInstancesPolicy>StopExisting</MultipleInstancesPolicy>.. <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>.. <StopIfGoingOnBatteries>true</StopIfGoingOnBatteries>.. <AllowHardTerminate>false</AllowHardTerminate>.. <StartWhenAvailable>true
                                C:\Users\user\AppData\Local\Temp\tmpBC24.tmp
                                Process:C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
                                File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                Category:dropped
                                Size (bytes):1646
                                Entropy (8bit):5.183748957987971
                                Encrypted:false
                                SSDEEP:24:2dH4+SEqC/S7hblNMFp//rlMhEMjnGpwjpIgUYODOLD9RJh7h8gKBG/ntn:cbhK79lNQR/rydbz9I3YODOLNdq3It
                                MD5:E768B7AC7BE721211F882B89152C81EC
                                SHA1:0B9869E31A443D80BF82BE67C249FAC94651D881
                                SHA-256:F36D60E3C11650CC66D572D7C7A6C67E0E946D0965C61D05FAB4C98EDA1F48D7
                                SHA-512:052C5BBE2297993F679E942FE59A4D7E6CE32CAABF9574F081E51F3262292DDCFE3039419AF28F2FF9E92592BC6ADCC099676A7BFC8A9C555F2A721AEFBE711B
                                Malicious:false
                                Preview: <?xml version="1.0" encoding="UTF-16"?>..<Task version="1.2" xmlns="http://schemas.microsoft.com/windows/2004/02/mit/task">.. <RegistrationInfo>.. <Date>2014-10-25T14:27:44.8929027</Date>.. <Author>computer\user</Author>.. </RegistrationInfo>.. <Triggers>.. <LogonTrigger>.. <Enabled>true</Enabled>.. <UserId>computer\user</UserId>.. </LogonTrigger>.. <RegistrationTrigger>.. <Enabled>false</Enabled>.. </RegistrationTrigger>.. </Triggers>.. <Principals>.. <Principal id="Author">.. <UserId>computer\user</UserId>.. <LogonType>InteractiveToken</LogonType>.. <RunLevel>LeastPrivilege</RunLevel>.. </Principal>.. </Principals>.. <Settings>.. <MultipleInstancesPolicy>StopExisting</MultipleInstancesPolicy>.. <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>.. <StopIfGoingOnBatteries>true</StopIfGoingOnBatteries>.. <AllowHardTerminate>false</AllowHardTerminate>.. <StartWhenAvailable>true
                                C:\Users\user\AppData\Local\Temp\tmpDE76.tmp
                                Process:C:\Users\user\Desktop\SwiftCopy.pdf.exe
                                File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                Category:dropped
                                Size (bytes):1303
                                Entropy (8bit):5.101879798382705
                                Encrypted:false
                                SSDEEP:24:2dH4+S/4oL600QlMhEMjn5pwjVLUYODOLG9RJh7h8gK0Ywmxtn:cbk4oL600QydbQxIYODOLedq39j
                                MD5:9277324E6C97922D77E8C5B805F560BF
                                SHA1:7C0F8E50ED343C7018218433E0D625D6744A5BD7
                                SHA-256:76717189D5111F393F2764E76D62E105AC2DAE9EE657D177CFC2225B4FCFD93E
                                SHA-512:8E1264E37C72865AC0CE57FAF831B390428123BAD490A53C6738E1488733B067024D5AF76F189870BE29E239E9E58B8C3126D51787064662756191EADAD07ACE
                                Malicious:false
                                Preview: <?xml version="1.0" encoding="UTF-16"?>..<Task version="1.2" xmlns="http://schemas.microsoft.com/windows/2004/02/mit/task">.. <RegistrationInfo />.. <Triggers />.. <Principals>.. <Principal id="Author">.. <LogonType>InteractiveToken</LogonType>.. <RunLevel>HighestAvailable</RunLevel>.. </Principal>.. </Principals>.. <Settings>.. <MultipleInstancesPolicy>Parallel</MultipleInstancesPolicy>.. <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>.. <StopIfGoingOnBatteries>false</StopIfGoingOnBatteries>.. <AllowHardTerminate>true</AllowHardTerminate>.. <StartWhenAvailable>false</StartWhenAvailable>.. <RunOnlyIfNetworkAvailable>false</RunOnlyIfNetworkAvailable>.. <IdleSettings>.. <StopOnIdleEnd>false</StopOnIdleEnd>.. <RestartOnIdle>false</RestartOnIdle>.. </IdleSettings>.. <AllowStartOnDemand>true</AllowStartOnDemand>.. <Enabled>true</Enabled>.. <Hidden>false</Hidden>.. <RunOnlyIfIdle>false</RunOnlyIfIdle>.. <Wak
                                C:\Users\user\AppData\Local\Temp\tmpE388.tmp
                                Process:C:\Users\user\Desktop\SwiftCopy.pdf.exe
                                File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                Category:dropped
                                Size (bytes):1310
                                Entropy (8bit):5.109425792877704
                                Encrypted:false
                                SSDEEP:24:2dH4+S/4oL600QlMhEMjn5pwjVLUYODOLG9RJh7h8gK0R3xtn:cbk4oL600QydbQxIYODOLedq3S3j
                                MD5:5C2F41CFC6F988C859DA7D727AC2B62A
                                SHA1:68999C85FC7E37BAB9216E0099836D40D4545C1C
                                SHA-256:98B6E66B6C2173B9B91FC97FE51805340EFDE978B695453742EBAB631018398B
                                SHA-512:B5DA5DA378D038AFBF8A7738E47921ED39F9B726E2CAA2993D915D9291A3322F94EFE8CCA6E7AD678A670DB19926B22B20E5028460FCC89CEA7F6635E7557334
                                Malicious:false
                                Preview: <?xml version="1.0" encoding="UTF-16"?>..<Task version="1.2" xmlns="http://schemas.microsoft.com/windows/2004/02/mit/task">.. <RegistrationInfo />.. <Triggers />.. <Principals>.. <Principal id="Author">.. <LogonType>InteractiveToken</LogonType>.. <RunLevel>HighestAvailable</RunLevel>.. </Principal>.. </Principals>.. <Settings>.. <MultipleInstancesPolicy>Parallel</MultipleInstancesPolicy>.. <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>.. <StopIfGoingOnBatteries>false</StopIfGoingOnBatteries>.. <AllowHardTerminate>true</AllowHardTerminate>.. <StartWhenAvailable>false</StartWhenAvailable>.. <RunOnlyIfNetworkAvailable>false</RunOnlyIfNetworkAvailable>.. <IdleSettings>.. <StopOnIdleEnd>false</StopOnIdleEnd>.. <RestartOnIdle>false</RestartOnIdle>.. </IdleSettings>.. <AllowStartOnDemand>true</AllowStartOnDemand>.. <Enabled>true</Enabled>.. <Hidden>false</Hidden>.. <RunOnlyIfIdle>false</RunOnlyIfIdle>.. <Wak
                                C:\Users\user\AppData\Local\Temp\tmpF25B.tmp
                                Process:C:\Users\user\Desktop\SwiftCopy.pdf.exe
                                File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                Category:dropped
                                Size (bytes):1646
                                Entropy (8bit):5.183748957987971
                                Encrypted:false
                                SSDEEP:24:2dH4+SEqC/S7hblNMFp//rlMhEMjnGpwjpIgUYODOLD9RJh7h8gKBG/ntn:cbhK79lNQR/rydbz9I3YODOLNdq3It
                                MD5:E768B7AC7BE721211F882B89152C81EC
                                SHA1:0B9869E31A443D80BF82BE67C249FAC94651D881
                                SHA-256:F36D60E3C11650CC66D572D7C7A6C67E0E946D0965C61D05FAB4C98EDA1F48D7
                                SHA-512:052C5BBE2297993F679E942FE59A4D7E6CE32CAABF9574F081E51F3262292DDCFE3039419AF28F2FF9E92592BC6ADCC099676A7BFC8A9C555F2A721AEFBE711B
                                Malicious:true
                                Preview: <?xml version="1.0" encoding="UTF-16"?>..<Task version="1.2" xmlns="http://schemas.microsoft.com/windows/2004/02/mit/task">.. <RegistrationInfo>.. <Date>2014-10-25T14:27:44.8929027</Date>.. <Author>computer\user</Author>.. </RegistrationInfo>.. <Triggers>.. <LogonTrigger>.. <Enabled>true</Enabled>.. <UserId>computer\user</UserId>.. </LogonTrigger>.. <RegistrationTrigger>.. <Enabled>false</Enabled>.. </RegistrationTrigger>.. </Triggers>.. <Principals>.. <Principal id="Author">.. <UserId>computer\user</UserId>.. <LogonType>InteractiveToken</LogonType>.. <RunLevel>LeastPrivilege</RunLevel>.. </Principal>.. </Principals>.. <Settings>.. <MultipleInstancesPolicy>StopExisting</MultipleInstancesPolicy>.. <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>.. <StopIfGoingOnBatteries>true</StopIfGoingOnBatteries>.. <AllowHardTerminate>false</AllowHardTerminate>.. <StartWhenAvailable>true
                                C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\catalog.dat
                                Process:C:\Users\user\Desktop\SwiftCopy.pdf.exe
                                File Type:data
                                Category:modified
                                Size (bytes):2728
                                Entropy (8bit):7.094528505897445
                                Encrypted:false
                                SSDEEP:48:Ik/t3FmH8Uk/t3FmH8Uk/t3FmH8Uk/t3FmH8Uk/t3FmH8Uk/t3FmH8Uk/t3FmH87:ft3Ucrt3Ucrt3Ucrt3Ucrt3Ucrt3UcrN
                                MD5:3F16EC9869DEDFFEC07792CA71B87AB5
                                SHA1:124F3AAEB04E11DEA7361736CE472750D237D3D2
                                SHA-256:1A187F3EF38284FF4EE2B20D6021C884E42FC72284F2DA858D7E389CE9C7D0E9
                                SHA-512:8DDE0277C2F8CF1CEF64B1EDF120C4A239619FBE9513C833C94B9A429984ECB8AD2A346FD9E333270207951021CCB0CA08FFCDF2ADE538AAFC2B5FAAA1ADF0A2
                                Malicious:false
                                Preview: Gj.h\.3.A...5.x..&...i+..c(1.P..P.cLT...A.b........4h...t.+..Z\.. .i.....@.3..{...grv+V...B.......].P...W.4C}uL....f.Z#.|...@HkG....G..O*V..........pz...."....r...w&&|..c..3}~.....~...os..f.......4..1.gJ.'.d".L...A.t...F.{....C.|&.wGj.h\.3.A...5.x..&...i+..c(1.P..P.cLT...A.b........4h...t.+..Z\.. .i.....@.3..{...grv+V...B.......].P...W.4C}uL....f.Z#.|...@HkG....G..O*V..........pz...."....r...w&&|..c..3}~.....~...os..f.......4..1.gJ.'.d".L...A.t...F.{....C.|&.wGj.h\.3.A...5.x..&...i+..c(1.P..P.cLT...A.b........4h...t.+..Z\.. .i.....@.3..{...grv+V...B.......].P...W.4C}uL....f.Z#.|...@HkG....G..O*V..........pz...."....r...w&&|..c..3}~.....~...os..f.......4..1.gJ.'.d".L...A.t...F.{....C.|&.wGj.h\.3.A...5.x..&...i+..c(1.P..P.cLT...A.b........4h...t.+..Z\.. .i.....@.3..{...grv+V...B.......].P...W.4C}uL....f.Z#.|...@HkG....G..O*V..........pz...."....r...w&&|..c..3}~.....~...os..f.......4..1.gJ.'.d".L...A.t...F.{....C.|&.wGj.h\.3.
                                C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat
                                Process:C:\Users\user\Desktop\SwiftCopy.pdf.exe
                                File Type:Non-ISO extended-ASCII text, with no line terminators
                                Category:dropped
                                Size (bytes):8
                                Entropy (8bit):3.0
                                Encrypted:false
                                SSDEEP:3:mPhn:4h
                                MD5:1F09E9E971FDD1CF98B64E2FDF0D7BFE
                                SHA1:C7FD38D5D15CA82BBAA36C61297051F0393C6800
                                SHA-256:B958CDE5917C67F83AE71142141AB5E7BC489C01D2A02391DB0889D8D5DB9A2F
                                SHA-512:814524AC8A197D8EF0A3430806814A43A07840AB52813278928AAC4CE98857C4AFEE7751440EB3BAD7F3A06616305FC3F85F4086D677A7F2D2E94038FA290A08
                                Malicious:true
                                Preview: .O...+.H
                                C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\task.dat
                                Process:C:\Users\user\Desktop\SwiftCopy.pdf.exe
                                File Type:ASCII text, with no line terminators
                                Category:dropped
                                Size (bytes):40
                                Entropy (8bit):4.193942707918268
                                Encrypted:false
                                SSDEEP:3:oNt+WfW2SS3cT0C:oNwv2l7C
                                MD5:EC4B6BB237CA5039FA75EC510514D266
                                SHA1:6AFEE68877A36DA2C6FBD3282F38BD885E6FE348
                                SHA-256:127CDA974A1E5B25020A36DA2727CD76DD317883513861D4AA5CB27B7E89AF0B
                                SHA-512:B27F5C08E7D6BD8CF106E444C06F2789396393260F3748959E296735E2027F76FC8AB5257F969B438749287115A50A8147333928A120DDBC1242B2B1A8EEEB2B
                                Malicious:false
                                Preview: C:\Users\user\Desktop\SwiftCopy.pdf.exe
                                C:\Users\user\AppData\Roaming\xetNJdChYOitP.exe
                                Process:C:\Users\user\Desktop\SwiftCopy.pdf.exe
                                File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                Category:dropped
                                Size (bytes):793088
                                Entropy (8bit):6.728969427122061
                                Encrypted:false
                                SSDEEP:12288:ipbyAsdHyDOfkigFIjGGe3OK+CwiVDkWqqLEkHqc0E:KWAiHiOMiaIyFOKHNVgjryF0E
                                MD5:5A13130EC1C4259C3F63FA48167AB094
                                SHA1:EC4A42085F6C4FD6FBD79705723C8D034F24EBAD
                                SHA-256:85C856FE483E3A2EF7A4417693DC121C42673AC426CB8CF486FBE20B4825636A
                                SHA-512:CE38522E50ADACE8D49720CD8F05183ED051ACA11C2FAE6EAB5C2D5EC830D831B041016E6B1AA9019C78803B8456A7052C1EDE99E09E8A11FB1039DFF5049086
                                Malicious:true
                                Antivirus:
                                • Antivirus: Joe Sandbox ML, Detection: 100%
                                • Antivirus: ReversingLabs, Detection: 44%
                                Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...)2.`..............0......p........... ........@.. ....................................@.....................................O........m...................`......\................................................ ............... ..H............text....... ...................... ..`.rsrc....m.......n..................@..@.reloc.......`......................@..B........................H.......................$...8...........................................^..}.....(.......(*....*.0..T........r...ps......o.....r...p...s......o....&s......s.........o....&.{.....o......o.....*.0............{....o....o....r<..p(.....{....o....o....r<..p(...._.{....o....o....r<..p(...._.{....o....o....r<..p(...._.{....o....o....r<..p(...._.{....o....o....r<..p(...._.{....o....o....r<..p(...._.{....o....o....r<..p(...._..9.....r...ps......o......{.....{....o....( ....{....o....(

                                Static File Info

                                General

                                File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                Entropy (8bit):6.728969427122061
                                TrID:
                                • Win32 Executable (generic) Net Framework (10011505/4) 49.83%
                                • Win32 Executable (generic) a (10002005/4) 49.78%
                                • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                                • Generic Win/DOS Executable (2004/3) 0.01%
                                • DOS Executable Generic (2002/1) 0.01%
                                File name:SwiftCopy.pdf.exe
                                File size:793088
                                MD5:5a13130ec1c4259c3f63fa48167ab094
                                SHA1:ec4a42085f6c4fd6fbd79705723c8d034f24ebad
                                SHA256:85c856fe483e3a2ef7a4417693dc121c42673ac426cb8cf486fbe20b4825636a
                                SHA512:ce38522e50adace8d49720cd8f05183ed051aca11c2fae6eab5c2d5ec830d831b041016e6b1aa9019c78803b8456a7052c1ede99e09e8a11fb1039dff5049086
                                SSDEEP:12288:ipbyAsdHyDOfkigFIjGGe3OK+CwiVDkWqqLEkHqc0E:KWAiHiOMiaIyFOKHNVgjryF0E
                                File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...)2.`..............0......p........... ........@.. ....................................@................................

                                File Icon

                                Icon Hash:e28eac86b2968eb2

                                Static PE Info

                                General

                                Entrypoint:0x48c6e6
                                Entrypoint Section:.text
                                Digitally signed:false
                                Imagebase:0x400000
                                Subsystem:windows gui
                                Image File Characteristics:32BIT_MACHINE, EXECUTABLE_IMAGE
                                DLL Characteristics:NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
                                Time Stamp:0x60C13229 [Wed Jun 9 21:27:05 2021 UTC]
                                TLS Callbacks:
                                CLR (.Net) Version:v2.0.50727
                                OS Version Major:4
                                OS Version Minor:0
                                File Version Major:4
                                File Version Minor:0
                                Subsystem Version Major:4
                                Subsystem Version Minor:0
                                Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744

                                Entrypoint Preview

                                Instruction
                                jmp dword ptr [00402000h]
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al

                                Data Directories

                                NameVirtual AddressVirtual Size Is in Section
                                IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                IMAGE_DIRECTORY_ENTRY_IMPORT0x8c6940x4f.text
                                IMAGE_DIRECTORY_ENTRY_RESOURCE0x8e0000x36dc8.rsrc
                                IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                IMAGE_DIRECTORY_ENTRY_BASERELOC0xc60000xc.reloc
                                IMAGE_DIRECTORY_ENTRY_DEBUG0x8c55c0x1c.text
                                IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                                IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                                IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0

                                Sections

                                NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                .text0x20000x8a6ec0x8a800False0.789103043208data7.53870171772IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                                .rsrc0x8e0000x36dc80x36e00False0.0571122223804data2.50601914036IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                .reloc0xc60000xc0x200False0.044921875data0.101910425663IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ

                                Resources

                                NameRVASizeTypeLanguageCountry
                                RT_ICON0x8e1300x35c28dBase IV DBT, block length 16384, next free block index 40, next free block 4294309365, next used block 4294309365
                                RT_GROUP_ICON0xc3d580x14data
                                RT_VERSION0xc3d6c0x334data
                                RT_MANIFEST0xc40a00xd25XML 1.0 document, UTF-8 Unicode (with BOM) text, with CRLF, LF line terminators

                                Imports

                                DLLImport
                                mscoree.dll_CorExeMain

                                Version Infos

                                DescriptionData
                                Translation0x0000 0x04b0
                                LegalCopyrightCopyright 2017 - 2021
                                Assembly Version1.0.0.0
                                InternalNamehcUgzA.exe
                                FileVersion1.0.0.0
                                CompanyName
                                LegalTrademarks
                                Comments
                                ProductNamePharmacy POS
                                ProductVersion1.0.0.0
                                FileDescriptionPharmacy POS
                                OriginalFilenamehcUgzA.exe

                                Network Behavior

                                Network Port Distribution

                                TCP Packets

                                TimestampSource PortDest PortSource IPDest IP
                                Jun 10, 2021 10:34:27.366183043 CEST4974252943192.168.2.4194.5.98.31
                                Jun 10, 2021 10:34:27.690171957 CEST5294349742194.5.98.31192.168.2.4
                                Jun 10, 2021 10:34:27.691082954 CEST4974252943192.168.2.4194.5.98.31
                                Jun 10, 2021 10:34:27.740679026 CEST4974252943192.168.2.4194.5.98.31
                                Jun 10, 2021 10:34:28.210490942 CEST5294349742194.5.98.31192.168.2.4
                                Jun 10, 2021 10:34:28.210937977 CEST4974252943192.168.2.4194.5.98.31
                                Jun 10, 2021 10:34:28.760354042 CEST5294349742194.5.98.31192.168.2.4
                                Jun 10, 2021 10:34:28.761718035 CEST4974252943192.168.2.4194.5.98.31
                                Jun 10, 2021 10:34:29.110290051 CEST5294349742194.5.98.31192.168.2.4
                                Jun 10, 2021 10:34:29.110382080 CEST4974252943192.168.2.4194.5.98.31
                                Jun 10, 2021 10:34:29.650293112 CEST5294349742194.5.98.31192.168.2.4
                                Jun 10, 2021 10:34:29.651935101 CEST4974252943192.168.2.4194.5.98.31
                                Jun 10, 2021 10:34:29.663579941 CEST4974252943192.168.2.4194.5.98.31
                                Jun 10, 2021 10:34:33.787781000 CEST4975052943192.168.2.4194.5.98.31
                                Jun 10, 2021 10:34:34.140764952 CEST5294349750194.5.98.31192.168.2.4
                                Jun 10, 2021 10:34:34.141683102 CEST4975052943192.168.2.4194.5.98.31
                                Jun 10, 2021 10:34:34.144468069 CEST4975052943192.168.2.4194.5.98.31
                                Jun 10, 2021 10:34:34.606406927 CEST5294349750194.5.98.31192.168.2.4
                                Jun 10, 2021 10:34:34.606652975 CEST4975052943192.168.2.4194.5.98.31
                                Jun 10, 2021 10:34:35.160306931 CEST5294349750194.5.98.31192.168.2.4
                                Jun 10, 2021 10:34:35.161034107 CEST4975052943192.168.2.4194.5.98.31
                                Jun 10, 2021 10:34:35.490586042 CEST5294349750194.5.98.31192.168.2.4
                                Jun 10, 2021 10:34:35.490852118 CEST4975052943192.168.2.4194.5.98.31
                                Jun 10, 2021 10:34:35.991791010 CEST4975052943192.168.2.4194.5.98.31
                                Jun 10, 2021 10:34:36.014859915 CEST5294349750194.5.98.31192.168.2.4
                                Jun 10, 2021 10:34:36.016088009 CEST4975052943192.168.2.4194.5.98.31
                                Jun 10, 2021 10:34:40.112143993 CEST4975352943192.168.2.4194.5.98.31
                                Jun 10, 2021 10:34:40.490674019 CEST5294349753194.5.98.31192.168.2.4
                                Jun 10, 2021 10:34:40.490952015 CEST4975352943192.168.2.4194.5.98.31
                                Jun 10, 2021 10:34:40.491599083 CEST4975352943192.168.2.4194.5.98.31
                                Jun 10, 2021 10:34:40.989996910 CEST5294349753194.5.98.31192.168.2.4
                                Jun 10, 2021 10:34:40.990183115 CEST4975352943192.168.2.4194.5.98.31
                                Jun 10, 2021 10:34:41.560538054 CEST5294349753194.5.98.31192.168.2.4
                                Jun 10, 2021 10:34:41.560669899 CEST4975352943192.168.2.4194.5.98.31
                                Jun 10, 2021 10:34:41.940607071 CEST5294349753194.5.98.31192.168.2.4
                                Jun 10, 2021 10:34:41.944595098 CEST4975352943192.168.2.4194.5.98.31
                                Jun 10, 2021 10:34:42.416027069 CEST4975352943192.168.2.4194.5.98.31
                                Jun 10, 2021 10:34:42.525362968 CEST5294349753194.5.98.31192.168.2.4
                                Jun 10, 2021 10:34:42.525568008 CEST4975352943192.168.2.4194.5.98.31
                                Jun 10, 2021 10:34:46.541755915 CEST4975752943192.168.2.4194.5.98.31
                                Jun 10, 2021 10:34:46.889558077 CEST5294349757194.5.98.31192.168.2.4
                                Jun 10, 2021 10:34:46.889668941 CEST4975752943192.168.2.4194.5.98.31
                                Jun 10, 2021 10:34:46.909559965 CEST4975752943192.168.2.4194.5.98.31
                                Jun 10, 2021 10:34:47.368880987 CEST5294349757194.5.98.31192.168.2.4
                                Jun 10, 2021 10:34:47.368976116 CEST4975752943192.168.2.4194.5.98.31
                                Jun 10, 2021 10:34:47.959402084 CEST5294349757194.5.98.31192.168.2.4
                                Jun 10, 2021 10:34:47.959516048 CEST4975752943192.168.2.4194.5.98.31
                                Jun 10, 2021 10:34:48.279232979 CEST5294349757194.5.98.31192.168.2.4
                                Jun 10, 2021 10:34:48.279354095 CEST4975752943192.168.2.4194.5.98.31
                                Jun 10, 2021 10:34:48.789838076 CEST4975752943192.168.2.4194.5.98.31
                                Jun 10, 2021 10:34:48.809135914 CEST5294349757194.5.98.31192.168.2.4
                                Jun 10, 2021 10:34:48.809240103 CEST4975752943192.168.2.4194.5.98.31
                                Jun 10, 2021 10:34:52.924417019 CEST4976252943192.168.2.4194.5.98.31
                                Jun 10, 2021 10:34:53.270167112 CEST5294349762194.5.98.31192.168.2.4
                                Jun 10, 2021 10:34:53.270374060 CEST4976252943192.168.2.4194.5.98.31
                                Jun 10, 2021 10:34:53.270833969 CEST4976252943192.168.2.4194.5.98.31
                                Jun 10, 2021 10:34:53.710514069 CEST5294349762194.5.98.31192.168.2.4
                                Jun 10, 2021 10:34:53.710660934 CEST4976252943192.168.2.4194.5.98.31
                                Jun 10, 2021 10:34:54.260628939 CEST5294349762194.5.98.31192.168.2.4
                                Jun 10, 2021 10:34:54.260801077 CEST4976252943192.168.2.4194.5.98.31
                                Jun 10, 2021 10:34:54.900413036 CEST5294349762194.5.98.31192.168.2.4
                                Jun 10, 2021 10:34:54.900607109 CEST4976252943192.168.2.4194.5.98.31
                                Jun 10, 2021 10:34:55.102653027 CEST4976252943192.168.2.4194.5.98.31
                                Jun 10, 2021 10:34:55.470098019 CEST5294349762194.5.98.31192.168.2.4
                                Jun 10, 2021 10:34:55.470264912 CEST4976252943192.168.2.4194.5.98.31
                                Jun 10, 2021 10:34:59.296395063 CEST4976352943192.168.2.4194.5.98.31
                                Jun 10, 2021 10:34:59.650151968 CEST5294349763194.5.98.31192.168.2.4
                                Jun 10, 2021 10:34:59.650331020 CEST4976352943192.168.2.4194.5.98.31
                                Jun 10, 2021 10:35:00.102884054 CEST4976352943192.168.2.4194.5.98.31
                                Jun 10, 2021 10:35:00.570404053 CEST5294349763194.5.98.31192.168.2.4
                                Jun 10, 2021 10:35:00.570633888 CEST4976352943192.168.2.4194.5.98.31
                                Jun 10, 2021 10:35:01.151874065 CEST5294349763194.5.98.31192.168.2.4
                                Jun 10, 2021 10:35:01.152029991 CEST4976352943192.168.2.4194.5.98.31
                                Jun 10, 2021 10:35:01.530121088 CEST5294349763194.5.98.31192.168.2.4
                                Jun 10, 2021 10:35:01.530224085 CEST4976352943192.168.2.4194.5.98.31
                                Jun 10, 2021 10:35:02.069837093 CEST5294349763194.5.98.31192.168.2.4
                                Jun 10, 2021 10:35:02.069962978 CEST4976352943192.168.2.4194.5.98.31
                                Jun 10, 2021 10:35:02.445271969 CEST5294349763194.5.98.31192.168.2.4
                                Jun 10, 2021 10:35:02.445342064 CEST5294349763194.5.98.31192.168.2.4
                                Jun 10, 2021 10:35:02.445368052 CEST4976352943192.168.2.4194.5.98.31
                                Jun 10, 2021 10:35:02.445409060 CEST4976352943192.168.2.4194.5.98.31
                                Jun 10, 2021 10:35:02.760499954 CEST5294349763194.5.98.31192.168.2.4
                                Jun 10, 2021 10:35:02.760710955 CEST4976352943192.168.2.4194.5.98.31
                                Jun 10, 2021 10:35:02.764962912 CEST5294349763194.5.98.31192.168.2.4
                                Jun 10, 2021 10:35:02.765084982 CEST4976352943192.168.2.4194.5.98.31
                                Jun 10, 2021 10:35:02.765602112 CEST5294349763194.5.98.31192.168.2.4
                                Jun 10, 2021 10:35:02.765716076 CEST4976352943192.168.2.4194.5.98.31
                                Jun 10, 2021 10:35:02.765726089 CEST5294349763194.5.98.31192.168.2.4
                                Jun 10, 2021 10:35:02.765798092 CEST4976352943192.168.2.4194.5.98.31
                                Jun 10, 2021 10:35:02.899743080 CEST4976352943192.168.2.4194.5.98.31
                                Jun 10, 2021 10:35:03.100178003 CEST5294349763194.5.98.31192.168.2.4
                                Jun 10, 2021 10:35:03.100286961 CEST4976352943192.168.2.4194.5.98.31
                                Jun 10, 2021 10:35:03.105169058 CEST5294349763194.5.98.31192.168.2.4
                                Jun 10, 2021 10:35:03.105245113 CEST4976352943192.168.2.4194.5.98.31
                                Jun 10, 2021 10:35:03.110635996 CEST5294349763194.5.98.31192.168.2.4
                                Jun 10, 2021 10:35:03.110667944 CEST5294349763194.5.98.31192.168.2.4
                                Jun 10, 2021 10:35:03.110687971 CEST5294349763194.5.98.31192.168.2.4
                                Jun 10, 2021 10:35:03.110698938 CEST4976352943192.168.2.4194.5.98.31
                                Jun 10, 2021 10:35:03.110738993 CEST4976352943192.168.2.4194.5.98.31
                                Jun 10, 2021 10:35:03.110778093 CEST4976352943192.168.2.4194.5.98.31

                                UDP Packets

                                TimestampSource PortDest PortSource IPDest IP
                                Jun 10, 2021 10:33:32.536983013 CEST6464653192.168.2.48.8.8.8
                                Jun 10, 2021 10:33:32.557069063 CEST6529853192.168.2.48.8.8.8
                                Jun 10, 2021 10:33:32.587359905 CEST53646468.8.8.8192.168.2.4
                                Jun 10, 2021 10:33:32.623980045 CEST53652988.8.8.8192.168.2.4
                                Jun 10, 2021 10:33:33.629506111 CEST5912353192.168.2.48.8.8.8
                                Jun 10, 2021 10:33:33.679953098 CEST53591238.8.8.8192.168.2.4
                                Jun 10, 2021 10:33:34.986825943 CEST5453153192.168.2.48.8.8.8
                                Jun 10, 2021 10:33:35.045962095 CEST53545318.8.8.8192.168.2.4
                                Jun 10, 2021 10:33:35.208853006 CEST4971453192.168.2.48.8.8.8
                                Jun 10, 2021 10:33:35.281884909 CEST53497148.8.8.8192.168.2.4
                                Jun 10, 2021 10:33:36.450401068 CEST5802853192.168.2.48.8.8.8
                                Jun 10, 2021 10:33:36.501832962 CEST53580288.8.8.8192.168.2.4
                                Jun 10, 2021 10:33:37.755027056 CEST5309753192.168.2.48.8.8.8
                                Jun 10, 2021 10:33:37.814858913 CEST53530978.8.8.8192.168.2.4
                                Jun 10, 2021 10:33:38.910078049 CEST4925753192.168.2.48.8.8.8
                                Jun 10, 2021 10:33:38.962830067 CEST53492578.8.8.8192.168.2.4
                                Jun 10, 2021 10:33:40.153809071 CEST6238953192.168.2.48.8.8.8
                                Jun 10, 2021 10:33:40.204180956 CEST53623898.8.8.8192.168.2.4
                                Jun 10, 2021 10:33:42.224312067 CEST4991053192.168.2.48.8.8.8
                                Jun 10, 2021 10:33:42.278187990 CEST53499108.8.8.8192.168.2.4
                                Jun 10, 2021 10:33:43.479994059 CEST5585453192.168.2.48.8.8.8
                                Jun 10, 2021 10:33:43.532958984 CEST53558548.8.8.8192.168.2.4
                                Jun 10, 2021 10:33:44.629715919 CEST6454953192.168.2.48.8.8.8
                                Jun 10, 2021 10:33:44.680195093 CEST53645498.8.8.8192.168.2.4
                                Jun 10, 2021 10:33:48.444940090 CEST6315353192.168.2.48.8.8.8
                                Jun 10, 2021 10:33:48.503596067 CEST53631538.8.8.8192.168.2.4
                                Jun 10, 2021 10:33:50.916301966 CEST5299153192.168.2.48.8.8.8
                                Jun 10, 2021 10:33:50.966325045 CEST53529918.8.8.8192.168.2.4
                                Jun 10, 2021 10:33:52.083894968 CEST5370053192.168.2.48.8.8.8
                                Jun 10, 2021 10:33:52.134041071 CEST53537008.8.8.8192.168.2.4
                                Jun 10, 2021 10:33:53.597280979 CEST5172653192.168.2.48.8.8.8
                                Jun 10, 2021 10:33:53.647387028 CEST53517268.8.8.8192.168.2.4
                                Jun 10, 2021 10:33:57.776487112 CEST5679453192.168.2.48.8.8.8
                                Jun 10, 2021 10:33:57.831326962 CEST53567948.8.8.8192.168.2.4
                                Jun 10, 2021 10:33:59.038877010 CEST5653453192.168.2.48.8.8.8
                                Jun 10, 2021 10:33:59.093847036 CEST53565348.8.8.8192.168.2.4
                                Jun 10, 2021 10:34:00.195631027 CEST5662753192.168.2.48.8.8.8
                                Jun 10, 2021 10:34:00.254189014 CEST53566278.8.8.8192.168.2.4
                                Jun 10, 2021 10:34:01.973507881 CEST5662153192.168.2.48.8.8.8
                                Jun 10, 2021 10:34:02.024010897 CEST53566218.8.8.8192.168.2.4
                                Jun 10, 2021 10:34:03.633651972 CEST6311653192.168.2.48.8.8.8
                                Jun 10, 2021 10:34:03.683856964 CEST53631168.8.8.8192.168.2.4
                                Jun 10, 2021 10:34:04.761117935 CEST6407853192.168.2.48.8.8.8
                                Jun 10, 2021 10:34:04.812642097 CEST53640788.8.8.8192.168.2.4
                                Jun 10, 2021 10:34:06.315124989 CEST6480153192.168.2.48.8.8.8
                                Jun 10, 2021 10:34:06.393599987 CEST53648018.8.8.8192.168.2.4
                                Jun 10, 2021 10:34:24.076440096 CEST6172153192.168.2.48.8.8.8
                                Jun 10, 2021 10:34:24.139894962 CEST53617218.8.8.8192.168.2.4
                                Jun 10, 2021 10:34:25.868913889 CEST5125553192.168.2.48.8.8.8
                                Jun 10, 2021 10:34:25.919239044 CEST53512558.8.8.8192.168.2.4
                                Jun 10, 2021 10:34:27.063676119 CEST6152253192.168.2.48.8.8.8
                                Jun 10, 2021 10:34:27.127314091 CEST53615228.8.8.8192.168.2.4
                                Jun 10, 2021 10:34:27.262192011 CEST5233753192.168.2.48.8.8.8
                                Jun 10, 2021 10:34:27.315831900 CEST5504653192.168.2.48.8.8.8
                                Jun 10, 2021 10:34:27.328581095 CEST53523378.8.8.8192.168.2.4
                                Jun 10, 2021 10:34:27.377747059 CEST53550468.8.8.8192.168.2.4
                                Jun 10, 2021 10:34:28.083149910 CEST4961253192.168.2.48.8.8.8
                                Jun 10, 2021 10:34:28.131383896 CEST4928553192.168.2.48.8.8.8
                                Jun 10, 2021 10:34:28.146332979 CEST53496128.8.8.8192.168.2.4
                                Jun 10, 2021 10:34:28.289916992 CEST53492858.8.8.8192.168.2.4
                                Jun 10, 2021 10:34:29.551420927 CEST5060153192.168.2.48.8.8.8
                                Jun 10, 2021 10:34:29.612972021 CEST53506018.8.8.8192.168.2.4
                                Jun 10, 2021 10:34:30.572972059 CEST6087553192.168.2.48.8.8.8
                                Jun 10, 2021 10:34:30.716739893 CEST53608758.8.8.8192.168.2.4
                                Jun 10, 2021 10:34:31.559391022 CEST5644853192.168.2.48.8.8.8
                                Jun 10, 2021 10:34:31.621851921 CEST53564488.8.8.8192.168.2.4
                                Jun 10, 2021 10:34:32.907172918 CEST5917253192.168.2.48.8.8.8
                                Jun 10, 2021 10:34:32.969037056 CEST53591728.8.8.8192.168.2.4
                                Jun 10, 2021 10:34:33.723819017 CEST6242053192.168.2.48.8.8.8
                                Jun 10, 2021 10:34:33.785756111 CEST53624208.8.8.8192.168.2.4
                                Jun 10, 2021 10:34:34.321305990 CEST6057953192.168.2.48.8.8.8
                                Jun 10, 2021 10:34:34.372845888 CEST53605798.8.8.8192.168.2.4
                                Jun 10, 2021 10:34:35.203485012 CEST5018353192.168.2.48.8.8.8
                                Jun 10, 2021 10:34:35.269186020 CEST53501838.8.8.8192.168.2.4
                                Jun 10, 2021 10:34:40.045242071 CEST6153153192.168.2.48.8.8.8
                                Jun 10, 2021 10:34:40.109802961 CEST53615318.8.8.8192.168.2.4
                                Jun 10, 2021 10:34:40.748991013 CEST4922853192.168.2.48.8.8.8
                                Jun 10, 2021 10:34:40.819622993 CEST53492288.8.8.8192.168.2.4
                                Jun 10, 2021 10:34:40.946115017 CEST5979453192.168.2.48.8.8.8
                                Jun 10, 2021 10:34:41.019854069 CEST53597948.8.8.8192.168.2.4
                                Jun 10, 2021 10:34:46.480256081 CEST5591653192.168.2.48.8.8.8
                                Jun 10, 2021 10:34:46.540632963 CEST53559168.8.8.8192.168.2.4
                                Jun 10, 2021 10:34:47.967485905 CEST5275253192.168.2.48.8.8.8
                                Jun 10, 2021 10:34:48.034168005 CEST53527528.8.8.8192.168.2.4
                                Jun 10, 2021 10:34:52.862509012 CEST6054253192.168.2.48.8.8.8
                                Jun 10, 2021 10:34:52.923218966 CEST53605428.8.8.8192.168.2.4
                                Jun 10, 2021 10:34:59.221124887 CEST6068953192.168.2.48.8.8.8
                                Jun 10, 2021 10:34:59.284426928 CEST53606898.8.8.8192.168.2.4
                                Jun 10, 2021 10:35:06.964653015 CEST6420653192.168.2.48.8.8.8
                                Jun 10, 2021 10:35:07.024833918 CEST53642068.8.8.8192.168.2.4
                                Jun 10, 2021 10:35:13.321352005 CEST5090453192.168.2.48.8.8.8
                                Jun 10, 2021 10:35:13.380218029 CEST53509048.8.8.8192.168.2.4
                                Jun 10, 2021 10:35:18.319159985 CEST5752553192.168.2.48.8.8.8
                                Jun 10, 2021 10:35:18.389082909 CEST53575258.8.8.8192.168.2.4
                                Jun 10, 2021 10:35:20.150182962 CEST5381453192.168.2.48.8.8.8
                                Jun 10, 2021 10:35:20.211251020 CEST53538148.8.8.8192.168.2.4
                                Jun 10, 2021 10:35:21.986959934 CEST5341853192.168.2.48.8.8.8
                                Jun 10, 2021 10:35:22.052707911 CEST53534188.8.8.8192.168.2.4
                                Jun 10, 2021 10:35:26.746030092 CEST6283353192.168.2.48.8.8.8
                                Jun 10, 2021 10:35:26.806623936 CEST53628338.8.8.8192.168.2.4
                                Jun 10, 2021 10:35:33.270361900 CEST5926053192.168.2.48.8.8.8
                                Jun 10, 2021 10:35:33.331773043 CEST53592608.8.8.8192.168.2.4
                                Jun 10, 2021 10:35:39.698998928 CEST4994453192.168.2.48.8.8.8
                                Jun 10, 2021 10:35:39.758059025 CEST53499448.8.8.8192.168.2.4
                                Jun 10, 2021 10:35:45.966790915 CEST6330053192.168.2.48.8.8.8
                                Jun 10, 2021 10:35:46.028119087 CEST53633008.8.8.8192.168.2.4

                                DNS Queries

                                TimestampSource IPDest IPTrans IDOP CodeNameTypeClass
                                Jun 10, 2021 10:34:27.262192011 CEST192.168.2.48.8.8.80x90c8Standard query (0)sylviaoslh01.ddns.netA (IP address)IN (0x0001)
                                Jun 10, 2021 10:34:33.723819017 CEST192.168.2.48.8.8.80xfd47Standard query (0)sylviaoslh01.ddns.netA (IP address)IN (0x0001)
                                Jun 10, 2021 10:34:40.045242071 CEST192.168.2.48.8.8.80x8afaStandard query (0)sylviaoslh01.ddns.netA (IP address)IN (0x0001)
                                Jun 10, 2021 10:34:46.480256081 CEST192.168.2.48.8.8.80x9319Standard query (0)sylviaoslh01.ddns.netA (IP address)IN (0x0001)
                                Jun 10, 2021 10:34:52.862509012 CEST192.168.2.48.8.8.80x7d5Standard query (0)sylviaoslh01.ddns.netA (IP address)IN (0x0001)
                                Jun 10, 2021 10:34:59.221124887 CEST192.168.2.48.8.8.80xfd24Standard query (0)sylviaoslh01.ddns.netA (IP address)IN (0x0001)
                                Jun 10, 2021 10:35:06.964653015 CEST192.168.2.48.8.8.80x325cStandard query (0)sylviaoslh01.ddns.netA (IP address)IN (0x0001)
                                Jun 10, 2021 10:35:13.321352005 CEST192.168.2.48.8.8.80xadeeStandard query (0)sylviaoslh01.ddns.netA (IP address)IN (0x0001)
                                Jun 10, 2021 10:35:20.150182962 CEST192.168.2.48.8.8.80xd31fStandard query (0)sylviaoslh01.ddns.netA (IP address)IN (0x0001)
                                Jun 10, 2021 10:35:26.746030092 CEST192.168.2.48.8.8.80xa3b6Standard query (0)sylviaoslh01.ddns.netA (IP address)IN (0x0001)
                                Jun 10, 2021 10:35:33.270361900 CEST192.168.2.48.8.8.80xf1a2Standard query (0)sylviaoslh01.ddns.netA (IP address)IN (0x0001)
                                Jun 10, 2021 10:35:39.698998928 CEST192.168.2.48.8.8.80xf15bStandard query (0)sylviaoslh01.ddns.netA (IP address)IN (0x0001)
                                Jun 10, 2021 10:35:45.966790915 CEST192.168.2.48.8.8.80xd4beStandard query (0)sylviaoslh01.ddns.netA (IP address)IN (0x0001)

                                DNS Answers

                                TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClass
                                Jun 10, 2021 10:34:27.328581095 CEST8.8.8.8192.168.2.40x90c8No error (0)sylviaoslh01.ddns.net194.5.98.31A (IP address)IN (0x0001)
                                Jun 10, 2021 10:34:33.785756111 CEST8.8.8.8192.168.2.40xfd47No error (0)sylviaoslh01.ddns.net194.5.98.31A (IP address)IN (0x0001)
                                Jun 10, 2021 10:34:40.109802961 CEST8.8.8.8192.168.2.40x8afaNo error (0)sylviaoslh01.ddns.net194.5.98.31A (IP address)IN (0x0001)
                                Jun 10, 2021 10:34:46.540632963 CEST8.8.8.8192.168.2.40x9319No error (0)sylviaoslh01.ddns.net194.5.98.31A (IP address)IN (0x0001)
                                Jun 10, 2021 10:34:52.923218966 CEST8.8.8.8192.168.2.40x7d5No error (0)sylviaoslh01.ddns.net194.5.98.31A (IP address)IN (0x0001)
                                Jun 10, 2021 10:34:59.284426928 CEST8.8.8.8192.168.2.40xfd24No error (0)sylviaoslh01.ddns.net194.5.98.31A (IP address)IN (0x0001)
                                Jun 10, 2021 10:35:07.024833918 CEST8.8.8.8192.168.2.40x325cNo error (0)sylviaoslh01.ddns.net194.5.98.31A (IP address)IN (0x0001)
                                Jun 10, 2021 10:35:13.380218029 CEST8.8.8.8192.168.2.40xadeeNo error (0)sylviaoslh01.ddns.net194.5.98.31A (IP address)IN (0x0001)
                                Jun 10, 2021 10:35:20.211251020 CEST8.8.8.8192.168.2.40xd31fNo error (0)sylviaoslh01.ddns.net194.5.98.31A (IP address)IN (0x0001)
                                Jun 10, 2021 10:35:26.806623936 CEST8.8.8.8192.168.2.40xa3b6No error (0)sylviaoslh01.ddns.net194.5.98.31A (IP address)IN (0x0001)
                                Jun 10, 2021 10:35:33.331773043 CEST8.8.8.8192.168.2.40xf1a2No error (0)sylviaoslh01.ddns.net194.5.98.31A (IP address)IN (0x0001)
                                Jun 10, 2021 10:35:39.758059025 CEST8.8.8.8192.168.2.40xf15bNo error (0)sylviaoslh01.ddns.net194.5.98.31A (IP address)IN (0x0001)
                                Jun 10, 2021 10:35:46.028119087 CEST8.8.8.8192.168.2.40xd4beNo error (0)sylviaoslh01.ddns.net194.5.98.31A (IP address)IN (0x0001)

                                Code Manipulations

                                Statistics

                                Behavior

                                Click to jump to process

                                System Behavior

                                General

                                Start time:10:33:38
                                Start date:10/06/2021
                                Path:C:\Users\user\Desktop\SwiftCopy.pdf.exe
                                Wow64 process (32bit):true
                                Commandline:'C:\Users\user\Desktop\SwiftCopy.pdf.exe'
                                Imagebase:0x960000
                                File size:793088 bytes
                                MD5 hash:5A13130EC1C4259C3F63FA48167AB094
                                Has elevated privileges:true
                                Has administrator privileges:true
                                Programmed in:.Net C# or VB.NET
                                Yara matches:
                                • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000000.00000002.741715588.00000000045C0000.00000004.00000001.sdmp, Author: Florian Roth
                                • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000000.00000002.741715588.00000000045C0000.00000004.00000001.sdmp, Author: Joe Security
                                • Rule: NanoCore, Description: unknown, Source: 00000000.00000002.741715588.00000000045C0000.00000004.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000000.00000002.734043460.00000000041D1000.00000004.00000001.sdmp, Author: Florian Roth
                                • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000000.00000002.734043460.00000000041D1000.00000004.00000001.sdmp, Author: Joe Security
                                • Rule: NanoCore, Description: unknown, Source: 00000000.00000002.734043460.00000000041D1000.00000004.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                Reputation:low

                                General

                                Start time:10:34:15
                                Start date:10/06/2021
                                Path:C:\Windows\SysWOW64\schtasks.exe
                                Wow64 process (32bit):true
                                Commandline:'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\xetNJdChYOitP' /XML 'C:\Users\user\AppData\Local\Temp\tmpF25B.tmp'
                                Imagebase:0xb20000
                                File size:185856 bytes
                                MD5 hash:15FF7D8324231381BAD48A052F85DF04
                                Has elevated privileges:true
                                Has administrator privileges:true
                                Programmed in:C, C++ or other language
                                Reputation:high

                                General

                                Start time:10:34:16
                                Start date:10/06/2021
                                Path:C:\Windows\System32\conhost.exe
                                Wow64 process (32bit):false
                                Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                Imagebase:0x7ff724c50000
                                File size:625664 bytes
                                MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                Has elevated privileges:true
                                Has administrator privileges:true
                                Programmed in:C, C++ or other language
                                Reputation:high

                                General

                                Start time:10:34:17
                                Start date:10/06/2021
                                Path:C:\Users\user\Desktop\SwiftCopy.pdf.exe
                                Wow64 process (32bit):false
                                Commandline:{path}
                                Imagebase:0x200000
                                File size:793088 bytes
                                MD5 hash:5A13130EC1C4259C3F63FA48167AB094
                                Has elevated privileges:true
                                Has administrator privileges:true
                                Programmed in:C, C++ or other language
                                Reputation:low

                                General

                                Start time:10:34:17
                                Start date:10/06/2021
                                Path:C:\Users\user\Desktop\SwiftCopy.pdf.exe
                                Wow64 process (32bit):true
                                Commandline:{path}
                                Imagebase:0x9d0000
                                File size:793088 bytes
                                MD5 hash:5A13130EC1C4259C3F63FA48167AB094
                                Has elevated privileges:true
                                Has administrator privileges:true
                                Programmed in:.Net C# or VB.NET
                                Yara matches:
                                • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 0000000B.00000002.912587333.0000000005D60000.00000004.00000001.sdmp, Author: Florian Roth
                                • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 0000000B.00000002.912587333.0000000005D60000.00000004.00000001.sdmp, Author: Florian Roth
                                • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 0000000B.00000002.911932177.00000000054D0000.00000004.00000001.sdmp, Author: Florian Roth
                                • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 0000000B.00000002.911932177.00000000054D0000.00000004.00000001.sdmp, Author: Florian Roth
                                • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 0000000B.00000000.726462560.0000000000402000.00000040.00000001.sdmp, Author: Florian Roth
                                • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 0000000B.00000000.726462560.0000000000402000.00000040.00000001.sdmp, Author: Joe Security
                                • Rule: NanoCore, Description: unknown, Source: 0000000B.00000000.726462560.0000000000402000.00000040.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 0000000B.00000002.912619347.0000000005D70000.00000004.00000001.sdmp, Author: Florian Roth
                                • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 0000000B.00000002.912619347.0000000005D70000.00000004.00000001.sdmp, Author: Florian Roth
                                • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 0000000B.00000002.912619347.0000000005D70000.00000004.00000001.sdmp, Author: Joe Security
                                • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 0000000B.00000002.908625280.0000000000402000.00000040.00000001.sdmp, Author: Florian Roth
                                • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 0000000B.00000002.908625280.0000000000402000.00000040.00000001.sdmp, Author: Joe Security
                                • Rule: NanoCore, Description: unknown, Source: 0000000B.00000002.908625280.0000000000402000.00000040.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 0000000B.00000002.911022966.0000000004319000.00000004.00000001.sdmp, Author: Joe Security
                                • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 0000000B.00000000.726040524.0000000000402000.00000040.00000001.sdmp, Author: Florian Roth
                                • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 0000000B.00000000.726040524.0000000000402000.00000040.00000001.sdmp, Author: Joe Security
                                • Rule: NanoCore, Description: unknown, Source: 0000000B.00000000.726040524.0000000000402000.00000040.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                Reputation:low

                                General

                                Start time:10:34:20
                                Start date:10/06/2021
                                Path:C:\Windows\SysWOW64\schtasks.exe
                                Wow64 process (32bit):true
                                Commandline:'schtasks.exe' /create /f /tn 'DHCP Monitor' /xml 'C:\Users\user\AppData\Local\Temp\tmpDE76.tmp'
                                Imagebase:0xb20000
                                File size:185856 bytes
                                MD5 hash:15FF7D8324231381BAD48A052F85DF04
                                Has elevated privileges:true
                                Has administrator privileges:true
                                Programmed in:C, C++ or other language
                                Reputation:high

                                General

                                Start time:10:34:20
                                Start date:10/06/2021
                                Path:C:\Windows\System32\conhost.exe
                                Wow64 process (32bit):false
                                Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                Imagebase:0x7ff724c50000
                                File size:625664 bytes
                                MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                Has elevated privileges:true
                                Has administrator privileges:true
                                Programmed in:C, C++ or other language
                                Reputation:high

                                General

                                Start time:10:34:21
                                Start date:10/06/2021
                                Path:C:\Windows\SysWOW64\schtasks.exe
                                Wow64 process (32bit):true
                                Commandline:'schtasks.exe' /create /f /tn 'DHCP Monitor Task' /xml 'C:\Users\user\AppData\Local\Temp\tmpE388.tmp'
                                Imagebase:0xb20000
                                File size:185856 bytes
                                MD5 hash:15FF7D8324231381BAD48A052F85DF04
                                Has elevated privileges:true
                                Has administrator privileges:true
                                Programmed in:C, C++ or other language
                                Reputation:high

                                General

                                Start time:10:34:22
                                Start date:10/06/2021
                                Path:C:\Windows\System32\conhost.exe
                                Wow64 process (32bit):false
                                Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                Imagebase:0x7ff724c50000
                                File size:625664 bytes
                                MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                Has elevated privileges:true
                                Has administrator privileges:true
                                Programmed in:C, C++ or other language
                                Reputation:high

                                General

                                Start time:10:34:22
                                Start date:10/06/2021
                                Path:C:\Users\user\Desktop\SwiftCopy.pdf.exe
                                Wow64 process (32bit):true
                                Commandline:C:\Users\user\Desktop\SwiftCopy.pdf.exe 0
                                Imagebase:0xdd0000
                                File size:793088 bytes
                                MD5 hash:5A13130EC1C4259C3F63FA48167AB094
                                Has elevated privileges:true
                                Has administrator privileges:true
                                Programmed in:.Net C# or VB.NET
                                Yara matches:
                                • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000013.00000002.826910629.0000000004641000.00000004.00000001.sdmp, Author: Florian Roth
                                • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000013.00000002.826910629.0000000004641000.00000004.00000001.sdmp, Author: Joe Security
                                • Rule: NanoCore, Description: unknown, Source: 00000013.00000002.826910629.0000000004641000.00000004.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                Reputation:low

                                General

                                Start time:10:34:25
                                Start date:10/06/2021
                                Path:C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
                                Wow64 process (32bit):true
                                Commandline:'C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe' 0
                                Imagebase:0x340000
                                File size:793088 bytes
                                MD5 hash:5A13130EC1C4259C3F63FA48167AB094
                                Has elevated privileges:true
                                Has administrator privileges:true
                                Programmed in:.Net C# or VB.NET
                                Yara matches:
                                • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000014.00000002.820471977.0000000003A31000.00000004.00000001.sdmp, Author: Florian Roth
                                • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000014.00000002.820471977.0000000003A31000.00000004.00000001.sdmp, Author: Joe Security
                                • Rule: NanoCore, Description: unknown, Source: 00000014.00000002.820471977.0000000003A31000.00000004.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                Antivirus matches:
                                • Detection: 100%, Joe Sandbox ML
                                • Detection: 44%, ReversingLabs
                                Reputation:low

                                General

                                Start time:10:34:33
                                Start date:10/06/2021
                                Path:C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
                                Wow64 process (32bit):true
                                Commandline:'C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe'
                                Imagebase:0x6b0000
                                File size:793088 bytes
                                MD5 hash:5A13130EC1C4259C3F63FA48167AB094
                                Has elevated privileges:true
                                Has administrator privileges:true
                                Programmed in:.Net C# or VB.NET
                                Yara matches:
                                • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000015.00000002.841434727.0000000003D51000.00000004.00000001.sdmp, Author: Florian Roth
                                • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000015.00000002.841434727.0000000003D51000.00000004.00000001.sdmp, Author: Joe Security
                                • Rule: NanoCore, Description: unknown, Source: 00000015.00000002.841434727.0000000003D51000.00000004.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                Reputation:low

                                General

                                Start time:10:34:59
                                Start date:10/06/2021
                                Path:C:\Windows\SysWOW64\schtasks.exe
                                Wow64 process (32bit):true
                                Commandline:'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\xetNJdChYOitP' /XML 'C:\Users\user\AppData\Local\Temp\tmp994A.tmp'
                                Imagebase:0xb20000
                                File size:185856 bytes
                                MD5 hash:15FF7D8324231381BAD48A052F85DF04
                                Has elevated privileges:true
                                Has administrator privileges:true
                                Programmed in:C, C++ or other language
                                Reputation:high

                                General

                                Start time:10:35:00
                                Start date:10/06/2021
                                Path:C:\Windows\System32\conhost.exe
                                Wow64 process (32bit):false
                                Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                Imagebase:0x7ff724c50000
                                File size:625664 bytes
                                MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                Has elevated privileges:true
                                Has administrator privileges:true
                                Programmed in:C, C++ or other language
                                Reputation:high

                                General

                                Start time:10:35:01
                                Start date:10/06/2021
                                Path:C:\Users\user\Desktop\SwiftCopy.pdf.exe
                                Wow64 process (32bit):true
                                Commandline:{path}
                                Imagebase:0xd30000
                                File size:793088 bytes
                                MD5 hash:5A13130EC1C4259C3F63FA48167AB094
                                Has elevated privileges:true
                                Has administrator privileges:true
                                Programmed in:.Net C# or VB.NET
                                Yara matches:
                                • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 0000001D.00000000.819759981.0000000000402000.00000040.00000001.sdmp, Author: Florian Roth
                                • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 0000001D.00000000.819759981.0000000000402000.00000040.00000001.sdmp, Author: Joe Security
                                • Rule: NanoCore, Description: unknown, Source: 0000001D.00000000.819759981.0000000000402000.00000040.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 0000001D.00000002.835267863.0000000000402000.00000040.00000001.sdmp, Author: Florian Roth
                                • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 0000001D.00000002.835267863.0000000000402000.00000040.00000001.sdmp, Author: Joe Security
                                • Rule: NanoCore, Description: unknown, Source: 0000001D.00000002.835267863.0000000000402000.00000040.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 0000001D.00000000.820327781.0000000000402000.00000040.00000001.sdmp, Author: Florian Roth
                                • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 0000001D.00000000.820327781.0000000000402000.00000040.00000001.sdmp, Author: Joe Security
                                • Rule: NanoCore, Description: unknown, Source: 0000001D.00000000.820327781.0000000000402000.00000040.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 0000001D.00000002.836835816.0000000003391000.00000004.00000001.sdmp, Author: Joe Security
                                • Rule: NanoCore, Description: unknown, Source: 0000001D.00000002.836835816.0000000003391000.00000004.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 0000001D.00000002.836971548.0000000004391000.00000004.00000001.sdmp, Author: Joe Security
                                • Rule: NanoCore, Description: unknown, Source: 0000001D.00000002.836971548.0000000004391000.00000004.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                Reputation:low

                                General

                                Start time:10:35:07
                                Start date:10/06/2021
                                Path:C:\Windows\SysWOW64\schtasks.exe
                                Wow64 process (32bit):true
                                Commandline:'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\xetNJdChYOitP' /XML 'C:\Users\user\AppData\Local\Temp\tmpBC24.tmp'
                                Imagebase:0xb20000
                                File size:185856 bytes
                                MD5 hash:15FF7D8324231381BAD48A052F85DF04
                                Has elevated privileges:true
                                Has administrator privileges:true
                                Programmed in:C, C++ or other language
                                Reputation:high

                                General

                                Start time:10:35:08
                                Start date:10/06/2021
                                Path:C:\Windows\System32\conhost.exe
                                Wow64 process (32bit):false
                                Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                Imagebase:0x7ff724c50000
                                File size:625664 bytes
                                MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                Has elevated privileges:true
                                Has administrator privileges:true
                                Programmed in:C, C++ or other language
                                Reputation:high

                                General

                                Start time:10:35:08
                                Start date:10/06/2021
                                Path:C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
                                Wow64 process (32bit):true
                                Commandline:{path}
                                Imagebase:0x6a0000
                                File size:793088 bytes
                                MD5 hash:5A13130EC1C4259C3F63FA48167AB094
                                Has elevated privileges:true
                                Has administrator privileges:true
                                Programmed in:.Net C# or VB.NET
                                Yara matches:
                                • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000020.00000000.836222469.0000000000402000.00000040.00000001.sdmp, Author: Florian Roth
                                • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000020.00000000.836222469.0000000000402000.00000040.00000001.sdmp, Author: Joe Security
                                • Rule: NanoCore, Description: unknown, Source: 00000020.00000000.836222469.0000000000402000.00000040.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000020.00000002.857250258.0000000002F31000.00000004.00000001.sdmp, Author: Joe Security
                                • Rule: NanoCore, Description: unknown, Source: 00000020.00000002.857250258.0000000002F31000.00000004.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000020.00000002.852127142.0000000000402000.00000040.00000001.sdmp, Author: Florian Roth
                                • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000020.00000002.852127142.0000000000402000.00000040.00000001.sdmp, Author: Joe Security
                                • Rule: NanoCore, Description: unknown, Source: 00000020.00000002.852127142.0000000000402000.00000040.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000020.00000000.835581816.0000000000402000.00000040.00000001.sdmp, Author: Florian Roth
                                • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000020.00000000.835581816.0000000000402000.00000040.00000001.sdmp, Author: Joe Security
                                • Rule: NanoCore, Description: unknown, Source: 00000020.00000000.835581816.0000000000402000.00000040.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000020.00000002.857349420.0000000003F31000.00000004.00000001.sdmp, Author: Joe Security
                                • Rule: NanoCore, Description: unknown, Source: 00000020.00000002.857349420.0000000003F31000.00000004.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>

                                Disassembly

                                Code Analysis

                                Reset < >