Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
SWIFT COPY.exe

Overview

General Information

Sample Name:SWIFT COPY.exe
Analysis ID:562442
MD5:25906d2539670f9f9160d38fe5ea1444
SHA1:333660a6407757be305ca516e9b7e1e5e799b93f
SHA256:d979e436abf4f48c18c8d2670d60c72abfc4741400e04da1894b4a228316278e
Tags:AgentTeslaexe
Infos:

Detection

AgentTesla
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Multi AV Scanner detection for submitted file
Malicious sample detected (through community Yara rule)
Yara detected AgentTesla
Yara detected AntiVM3
Multi AV Scanner detection for dropped file
Modifies the hosts file
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Sigma detected: Suspicius Add Task From User AppData Temp
Machine Learning detection for sample
.NET source code contains potential unpacker
Injects a PE file into a foreign processes
.NET source code contains very large array initializations
.NET source code contains very large strings
Machine Learning detection for dropped file
Hides that the sample has been downloaded from the Internet (zone.identifier)
Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)
Uses schtasks.exe or at.exe to add and modify task schedules
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Uses 32bit PE files
Queries the volume information (name, serial number etc) of a device
Yara signature match
Antivirus or Machine Learning detection for unpacked file
May sleep (evasive loops) to hinder dynamic analysis
Uses code obfuscation techniques (call, push, ret)
Detected potential crypto function
Sample execution stops while process was sleeping (likely an evasion)
Yara detected Credential Stealer
Contains long sleeps (>= 3 min)
Enables debug privileges
Creates a DirectInput object (often for capturing keystrokes)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found inlined nop instructions (likely shell or obfuscated code)
Sample file is different than original file name gathered from version info
PE file contains strange resources
Drops PE files
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Creates a process in suspended mode (likely to inject code)
Sigma detected: Autorun Keys Modification

Classification

  • System is w10x64
  • SWIFT COPY.exe (PID: 4364 cmdline: "C:\Users\user\Desktop\SWIFT COPY.exe" MD5: 25906D2539670F9F9160D38FE5EA1444)
    • schtasks.exe (PID: 6760 cmdline: C:\Windows\System32\schtasks.exe" /Create /TN "Updates\QTzKSOrs" /XML "C:\Users\user\AppData\Local\Temp\tmpF17F.tmp MD5: 15FF7D8324231381BAD48A052F85DF04)
      • conhost.exe (PID: 6788 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
    • SWIFT COPY.exe (PID: 6848 cmdline: {path} MD5: 25906D2539670F9F9160D38FE5EA1444)
  • tKZVPq.exe (PID: 4024 cmdline: "C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exe" MD5: 25906D2539670F9F9160D38FE5EA1444)
    • schtasks.exe (PID: 4428 cmdline: C:\Windows\System32\schtasks.exe" /Create /TN "Updates\QTzKSOrs" /XML "C:\Users\user\AppData\Local\Temp\tmpFAA2.tmp MD5: 15FF7D8324231381BAD48A052F85DF04)
      • conhost.exe (PID: 6452 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
    • tKZVPq.exe (PID: 360 cmdline: {path} MD5: 25906D2539670F9F9160D38FE5EA1444)
  • tKZVPq.exe (PID: 4556 cmdline: "C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exe" MD5: 25906D2539670F9F9160D38FE5EA1444)
    • schtasks.exe (PID: 5788 cmdline: C:\Windows\System32\schtasks.exe" /Create /TN "Updates\QTzKSOrs" /XML "C:\Users\user\AppData\Local\Temp\tmp2099.tmp MD5: 15FF7D8324231381BAD48A052F85DF04)
      • conhost.exe (PID: 6256 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
    • tKZVPq.exe (PID: 6504 cmdline: {path} MD5: 25906D2539670F9F9160D38FE5EA1444)
    • tKZVPq.exe (PID: 7000 cmdline: {path} MD5: 25906D2539670F9F9160D38FE5EA1444)
  • cleanup
{"Exfil Mode": "SMTP", "Username": "stores@jkudyog.com", "Password": "UxQ45zv[V-b3", "Host": "mail.jkudyog.com"}
SourceRuleDescriptionAuthorStrings
00000009.00000002.550659347.0000000000402000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
    00000009.00000002.550659347.0000000000402000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_AgentTesla_2Yara detected AgentTeslaJoe Security
      0000001B.00000000.525359202.0000000000402000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
        0000001B.00000000.525359202.0000000000402000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_AgentTesla_2Yara detected AgentTeslaJoe Security
          00000017.00000000.496018922.0000000000402000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
            Click to see the 56 entries
            SourceRuleDescriptionAuthorStrings
            23.0.tKZVPq.exe.400000.12.unpackJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
              23.0.tKZVPq.exe.400000.12.unpackJoeSecurity_AgentTesla_2Yara detected AgentTeslaJoe Security
                23.0.tKZVPq.exe.400000.12.unpackMALWARE_Win_AgentTeslaV3AgentTeslaV3 infostealer payloadditekSHen
                • 0x30e0c:$s1: get_kbok
                • 0x31740:$s2: get_CHoo
                • 0x323b3:$s3: set_passwordIsSet
                • 0x30c10:$s4: get_enableLog
                • 0x352fe:$s8: torbrowser
                • 0x33cda:$s10: logins
                • 0x33659:$s11: credential
                • 0x30003:$g1: get_Clipboard
                • 0x30011:$g2: get_Keyboard
                • 0x3001e:$g3: get_Password
                • 0x315ee:$g4: get_CtrlKeyDown
                • 0x315fe:$g5: get_ShiftKeyDown
                • 0x3160f:$g6: get_AltKeyDown
                23.2.tKZVPq.exe.400000.0.unpackJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
                  23.2.tKZVPq.exe.400000.0.unpackJoeSecurity_AgentTesla_2Yara detected AgentTeslaJoe Security
                    Click to see the 72 entries

                    System Summary

                    barindex
                    Source: Process startedAuthor: frack113: Data: Command: C:\Windows\System32\schtasks.exe" /Create /TN "Updates\QTzKSOrs" /XML "C:\Users\user\AppData\Local\Temp\tmpF17F.tmp, CommandLine: C:\Windows\System32\schtasks.exe" /Create /TN "Updates\QTzKSOrs" /XML "C:\Users\user\AppData\Local\Temp\tmpF17F.tmp, CommandLine|base64offset|contains: *j, Image: C:\Windows\SysWOW64\schtasks.exe, NewProcessName: C:\Windows\SysWOW64\schtasks.exe, OriginalFileName: C:\Windows\SysWOW64\schtasks.exe, ParentCommandLine: "C:\Users\user\Desktop\SWIFT COPY.exe" , ParentImage: C:\Users\user\Desktop\SWIFT COPY.exe, ParentProcessId: 4364, ProcessCommandLine: C:\Windows\System32\schtasks.exe" /Create /TN "Updates\QTzKSOrs" /XML "C:\Users\user\AppData\Local\Temp\tmpF17F.tmp, ProcessId: 6760
                    Source: Registry Key setAuthor: Victor Sergeev, Daniil Yugoslavskiy, Gleb Sukhodolskiy, Timur Zinniatullin, oscd.community, Tim Shelton: Data: Details: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exe, EventID: 13, EventType: SetValue, Image: C:\Users\user\Desktop\SWIFT COPY.exe, ProcessId: 6848, TargetObject: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run\tKZVPq

                    Click to jump to signature section

                    Show All Signature Results

                    AV Detection

                    barindex
                    Source: 27.0.tKZVPq.exe.400000.6.unpackMalware Configuration Extractor: Agenttesla {"Exfil Mode": "SMTP", "Username": "stores@jkudyog.com", "Password": "UxQ45zv[V-b3", "Host": "mail.jkudyog.com"}
                    Source: SWIFT COPY.exeReversingLabs: Detection: 75%
                    Source: C:\Users\user\AppData\Roaming\QTzKSOrs.exeReversingLabs: Detection: 75%
                    Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeReversingLabs: Detection: 75%
                    Source: SWIFT COPY.exeJoe Sandbox ML: detected
                    Source: C:\Users\user\AppData\Roaming\QTzKSOrs.exeJoe Sandbox ML: detected
                    Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeJoe Sandbox ML: detected
                    Source: 27.0.tKZVPq.exe.400000.6.unpackAvira: Label: TR/Spy.Gen8
                    Source: 9.2.SWIFT COPY.exe.400000.0.unpackAvira: Label: TR/Spy.Gen8
                    Source: 9.0.SWIFT COPY.exe.400000.6.unpackAvira: Label: TR/Spy.Gen8
                    Source: 23.2.tKZVPq.exe.400000.0.unpackAvira: Label: TR/Spy.Gen8
                    Source: 27.0.tKZVPq.exe.400000.8.unpackAvira: Label: TR/Spy.Gen8
                    Source: 23.0.tKZVPq.exe.400000.12.unpackAvira: Label: TR/Spy.Gen8
                    Source: 9.0.SWIFT COPY.exe.400000.8.unpackAvira: Label: TR/Spy.Gen8
                    Source: 9.0.SWIFT COPY.exe.400000.10.unpackAvira: Label: TR/Spy.Gen8
                    Source: 23.0.tKZVPq.exe.400000.10.unpackAvira: Label: TR/Spy.Gen8
                    Source: 27.2.tKZVPq.exe.400000.0.unpackAvira: Label: TR/Spy.Gen8
                    Source: 23.0.tKZVPq.exe.400000.6.unpackAvira: Label: TR/Spy.Gen8
                    Source: 9.0.SWIFT COPY.exe.400000.4.unpackAvira: Label: TR/Spy.Gen8
                    Source: 9.0.SWIFT COPY.exe.400000.12.unpackAvira: Label: TR/Spy.Gen8
                    Source: 27.0.tKZVPq.exe.400000.12.unpackAvira: Label: TR/Spy.Gen8
                    Source: 23.0.tKZVPq.exe.400000.8.unpackAvira: Label: TR/Spy.Gen8
                    Source: 27.0.tKZVPq.exe.400000.4.unpackAvira: Label: TR/Spy.Gen8
                    Source: 23.0.tKZVPq.exe.400000.4.unpackAvira: Label: TR/Spy.Gen8
                    Source: 27.0.tKZVPq.exe.400000.10.unpackAvira: Label: TR/Spy.Gen8
                    Source: SWIFT COPY.exeStatic PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE
                    Source: SWIFT COPY.exeStatic PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
                    Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeCode function: 4x nop then mov dword ptr [ebp-18h], 00000000h
                    Source: SWIFT COPY.exe, 00000009.00000002.552462552.0000000002DC1000.00000004.00000800.00020000.00000000.sdmp, tKZVPq.exe, 00000017.00000002.536878272.00000000032D1000.00000004.00000800.00020000.00000000.sdmp, tKZVPq.exe, 0000001B.00000002.552996616.0000000003301000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://127.0.0.1:HTTP/1.1
                    Source: tKZVPq.exe, 0000001B.00000002.552996616.0000000003301000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://DynDns.comDynDNS
                    Source: SWIFT COPY.exe, 00000001.00000002.368180307.0000000006932000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://fontfabrik.com
                    Source: tKZVPq.exe, 0000001B.00000002.552996616.0000000003301000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://hCnGLP.com
                    Source: SWIFT COPY.exe, 00000001.00000002.358148905.0000000002771000.00000004.00000800.00020000.00000000.sdmp, tKZVPq.exe, 00000013.00000002.502198914.0000000003291000.00000004.00000800.00020000.00000000.sdmp, tKZVPq.exe, 00000014.00000002.528563746.0000000002751000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
                    Source: SWIFT COPY.exe, 00000001.00000002.368180307.0000000006932000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0
                    Source: SWIFT COPY.exe, 00000001.00000003.302686183.0000000005725000.00000004.00000800.00020000.00000000.sdmp, SWIFT COPY.exe, 00000001.00000003.303068912.000000000572C000.00000004.00000800.00020000.00000000.sdmp, SWIFT COPY.exe, 00000001.00000003.303313014.000000000572A000.00000004.00000800.00020000.00000000.sdmp, SWIFT COPY.exe, 00000001.00000003.303731903.000000000572C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.carterandcone.com
                    Source: SWIFT COPY.exe, 00000001.00000003.302686183.0000000005725000.00000004.00000800.00020000.00000000.sdmp, SWIFT COPY.exe, 00000001.00000003.303068912.000000000572C000.00000004.00000800.00020000.00000000.sdmp, SWIFT COPY.exe, 00000001.00000003.303313014.000000000572A000.00000004.00000800.00020000.00000000.sdmp, SWIFT COPY.exe, 00000001.00000003.303731903.000000000572C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.carterandcone.comg
                    Source: SWIFT COPY.exe, 00000001.00000003.302686183.0000000005725000.00000004.00000800.00020000.00000000.sdmp, SWIFT COPY.exe, 00000001.00000003.303068912.000000000572C000.00000004.00000800.00020000.00000000.sdmp, SWIFT COPY.exe, 00000001.00000003.303313014.000000000572A000.00000004.00000800.00020000.00000000.sdmp, SWIFT COPY.exe, 00000001.00000003.303731903.000000000572C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.carterandcone.comic
                    Source: SWIFT COPY.exe, 00000001.00000002.368180307.0000000006932000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.carterandcone.coml
                    Source: SWIFT COPY.exe, 00000001.00000002.368180307.0000000006932000.00000004.00000800.00020000.00000000.sdmp, SWIFT COPY.exe, 00000001.00000003.308668335.0000000005739000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com
                    Source: SWIFT COPY.exe, 00000001.00000002.368180307.0000000006932000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers
                    Source: SWIFT COPY.exe, 00000001.00000002.368180307.0000000006932000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/?
                    Source: SWIFT COPY.exe, 00000001.00000002.368180307.0000000006932000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/cabarga.htmlN
                    Source: SWIFT COPY.exe, 00000001.00000002.368180307.0000000006932000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/frere-jones.html
                    Source: SWIFT COPY.exe, 00000001.00000002.368180307.0000000006932000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers8
                    Source: SWIFT COPY.exe, 00000001.00000002.368180307.0000000006932000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers?
                    Source: SWIFT COPY.exe, 00000001.00000002.368180307.0000000006932000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designersG
                    Source: SWIFT COPY.exe, 00000001.00000003.308668335.0000000005739000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.comcomd
                    Source: SWIFT COPY.exe, 00000001.00000003.308668335.0000000005739000.00000004.00000800.00020000.00000000.sdmp, SWIFT COPY.exe, 00000001.00000003.307714916.0000000005739000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.comessed
                    Source: SWIFT COPY.exe, 00000001.00000003.308668335.0000000005739000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.comitu3
                    Source: SWIFT COPY.exe, 00000001.00000003.308668335.0000000005739000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.comlicF
                    Source: SWIFT COPY.exe, 00000001.00000003.354222788.0000000005732000.00000004.00000800.00020000.00000000.sdmp, SWIFT COPY.exe, 00000001.00000002.367958819.0000000005732000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.como
                    Source: SWIFT COPY.exe, 00000001.00000003.308668335.0000000005739000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.comp7
                    Source: SWIFT COPY.exe, 00000001.00000003.308668335.0000000005739000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.coms
                    Source: SWIFT COPY.exe, 00000001.00000002.368180307.0000000006932000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fonts.com
                    Source: SWIFT COPY.exe, 00000001.00000002.368180307.0000000006932000.00000004.00000800.00020000.00000000.sdmp, SWIFT COPY.exe, 00000001.00000003.300366233.0000000005737000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn
                    Source: SWIFT COPY.exe, 00000001.00000003.300675717.0000000005736000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn/Xd
                    Source: SWIFT COPY.exe, 00000001.00000002.368180307.0000000006932000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn/bThe
                    Source: SWIFT COPY.exe, 00000001.00000002.368180307.0000000006932000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn/cThe
                    Source: SWIFT COPY.exe, 00000001.00000002.368180307.0000000006932000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.galapagosdesign.com/DPlease
                    Source: SWIFT COPY.exe, 00000001.00000002.368180307.0000000006932000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.galapagosdesign.com/staff/dennis.htm
                    Source: SWIFT COPY.exe, 00000001.00000002.368180307.0000000006932000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.goodfont.co.kr
                    Source: SWIFT COPY.exe, 00000001.00000003.303074834.0000000005732000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/
                    Source: SWIFT COPY.exe, 00000001.00000003.303319950.0000000005732000.00000004.00000800.00020000.00000000.sdmp, SWIFT COPY.exe, 00000001.00000003.303074834.0000000005732000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/4
                    Source: SWIFT COPY.exe, 00000001.00000003.303319950.0000000005732000.00000004.00000800.00020000.00000000.sdmp, SWIFT COPY.exe, 00000001.00000003.302697738.0000000005732000.00000004.00000800.00020000.00000000.sdmp, SWIFT COPY.exe, 00000001.00000003.303748281.0000000005732000.00000004.00000800.00020000.00000000.sdmp, SWIFT COPY.exe, 00000001.00000003.303074834.0000000005732000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/=
                    Source: SWIFT COPY.exe, 00000001.00000003.303319950.0000000005732000.00000004.00000800.00020000.00000000.sdmp, SWIFT COPY.exe, 00000001.00000003.303074834.0000000005732000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/Kurs
                    Source: SWIFT COPY.exe, 00000001.00000003.303748281.0000000005732000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/N
                    Source: SWIFT COPY.exe, 00000001.00000003.303319950.0000000005732000.00000004.00000800.00020000.00000000.sdmp, SWIFT COPY.exe, 00000001.00000003.303748281.0000000005732000.00000004.00000800.00020000.00000000.sdmp, SWIFT COPY.exe, 00000001.00000003.303074834.0000000005732000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/Y0/
                    Source: SWIFT COPY.exe, 00000001.00000003.303319950.0000000005732000.00000004.00000800.00020000.00000000.sdmp, SWIFT COPY.exe, 00000001.00000003.303748281.0000000005732000.00000004.00000800.00020000.00000000.sdmp, SWIFT COPY.exe, 00000001.00000003.303074834.0000000005732000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/j
                    Source: SWIFT COPY.exe, 00000001.00000003.303319950.0000000005732000.00000004.00000800.00020000.00000000.sdmp, SWIFT COPY.exe, 00000001.00000003.302697738.0000000005732000.00000004.00000800.00020000.00000000.sdmp, SWIFT COPY.exe, 00000001.00000003.303748281.0000000005732000.00000004.00000800.00020000.00000000.sdmp, SWIFT COPY.exe, 00000001.00000003.304374380.0000000005739000.00000004.00000800.00020000.00000000.sdmp, SWIFT COPY.exe, 00000001.00000003.303074834.0000000005732000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/jp/
                    Source: SWIFT COPY.exe, 00000001.00000003.303319950.0000000005732000.00000004.00000800.00020000.00000000.sdmp, SWIFT COPY.exe, 00000001.00000003.303748281.0000000005732000.00000004.00000800.00020000.00000000.sdmp, SWIFT COPY.exe, 00000001.00000003.304374380.0000000005739000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/jp/s
                    Source: SWIFT COPY.exe, 00000001.00000003.303319950.0000000005732000.00000004.00000800.00020000.00000000.sdmp, SWIFT COPY.exe, 00000001.00000003.303748281.0000000005732000.00000004.00000800.00020000.00000000.sdmp, SWIFT COPY.exe, 00000001.00000003.303074834.0000000005732000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/p7
                    Source: SWIFT COPY.exe, 00000001.00000003.303319950.0000000005732000.00000004.00000800.00020000.00000000.sdmp, SWIFT COPY.exe, 00000001.00000003.303748281.0000000005732000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/perm
                    Source: SWIFT COPY.exe, 00000001.00000003.303074834.0000000005732000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/s
                    Source: SWIFT COPY.exe, 00000001.00000003.303319950.0000000005732000.00000004.00000800.00020000.00000000.sdmp, SWIFT COPY.exe, 00000001.00000003.303074834.0000000005732000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/uckmN
                    Source: SWIFT COPY.exe, 00000001.00000003.309521502.0000000005732000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.monot6mb.e
                    Source: SWIFT COPY.exe, 00000001.00000002.368180307.0000000006932000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sajatypeworks.com
                    Source: SWIFT COPY.exe, 00000001.00000002.368180307.0000000006932000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sakkal.com
                    Source: SWIFT COPY.exe, 00000001.00000002.368180307.0000000006932000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sandoll.co.kr
                    Source: SWIFT COPY.exe, 00000001.00000002.368180307.0000000006932000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.tiro.com
                    Source: SWIFT COPY.exe, 00000001.00000003.298668690.000000000573B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.tiro.comk
                    Source: SWIFT COPY.exe, 00000001.00000003.298523725.000000000573B000.00000004.00000800.00020000.00000000.sdmp, SWIFT COPY.exe, 00000001.00000003.298404697.000000000573B000.00000004.00000800.00020000.00000000.sdmp, SWIFT COPY.exe, 00000001.00000003.298177012.000000000573B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.tiro.comm
                    Source: SWIFT COPY.exe, 00000001.00000002.368180307.0000000006932000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.typography.netD
                    Source: SWIFT COPY.exe, 00000001.00000002.368180307.0000000006932000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.urwpp.deDPlease
                    Source: SWIFT COPY.exe, 00000001.00000002.368180307.0000000006932000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.zhongyicts.com.cn
                    Source: SWIFT COPY.exe, 00000001.00000002.364987356.0000000003771000.00000004.00000800.00020000.00000000.sdmp, SWIFT COPY.exe, 00000009.00000002.550659347.0000000000402000.00000040.00000400.00020000.00000000.sdmp, SWIFT COPY.exe, 00000009.00000000.349638861.0000000000402000.00000040.00000400.00020000.00000000.sdmp, tKZVPq.exe, 00000013.00000002.507129144.0000000004291000.00000004.00000800.00020000.00000000.sdmp, tKZVPq.exe, 00000014.00000002.532671197.0000000003751000.00000004.00000800.00020000.00000000.sdmp, tKZVPq.exe, 00000017.00000000.496018922.0000000000402000.00000040.00000400.00020000.00000000.sdmp, tKZVPq.exe, 00000017.00000000.498474265.0000000000402000.00000040.00000400.00020000.00000000.sdmp, tKZVPq.exe, 0000001B.00000000.525359202.0000000000402000.00000040.00000400.00020000.00000000.sdmp, tKZVPq.exe, 0000001B.00000000.523515962.0000000000402000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip
                    Source: SWIFT COPY.exe, 00000009.00000002.552462552.0000000002DC1000.00000004.00000800.00020000.00000000.sdmp, tKZVPq.exe, 00000017.00000002.536878272.00000000032D1000.00000004.00000800.00020000.00000000.sdmp, tKZVPq.exe, 0000001B.00000002.552996616.0000000003301000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip%tordir%%ha
                    Source: tKZVPq.exe, 00000013.00000002.501235821.00000000014F8000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: <HOOK MODULE="DDRAW.DLL" FUNCTION="DirectDrawCreateEx"/>

                    Spam, unwanted Advertisements and Ransom Demands

                    barindex
                    Source: C:\Users\user\Desktop\SWIFT COPY.exeFile written: C:\Windows\System32\drivers\etc\hostsJump to behavior

                    System Summary

                    barindex
                    Source: 23.0.tKZVPq.exe.400000.12.unpack, type: UNPACKEDPEMatched rule: AgentTeslaV3 infostealer payload Author: ditekSHen
                    Source: 23.2.tKZVPq.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: AgentTeslaV3 infostealer payload Author: ditekSHen
                    Source: 9.2.SWIFT COPY.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: AgentTeslaV3 infostealer payload Author: ditekSHen
                    Source: 27.0.tKZVPq.exe.400000.6.unpack, type: UNPACKEDPEMatched rule: AgentTeslaV3 infostealer payload Author: ditekSHen
                    Source: 9.0.SWIFT COPY.exe.400000.8.unpack, type: UNPACKEDPEMatched rule: AgentTeslaV3 infostealer payload Author: ditekSHen
                    Source: 9.0.SWIFT COPY.exe.400000.6.unpack, type: UNPACKEDPEMatched rule: AgentTeslaV3 infostealer payload Author: ditekSHen
                    Source: 27.0.tKZVPq.exe.400000.8.unpack, type: UNPACKEDPEMatched rule: AgentTeslaV3 infostealer payload Author: ditekSHen
                    Source: 9.0.SWIFT COPY.exe.400000.10.unpack, type: UNPACKEDPEMatched rule: AgentTeslaV3 infostealer payload Author: ditekSHen
                    Source: 23.0.tKZVPq.exe.400000.6.unpack, type: UNPACKEDPEMatched rule: AgentTeslaV3 infostealer payload Author: ditekSHen
                    Source: 23.0.tKZVPq.exe.400000.10.unpack, type: UNPACKEDPEMatched rule: AgentTeslaV3 infostealer payload Author: ditekSHen
                    Source: 27.2.tKZVPq.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: AgentTeslaV3 infostealer payload Author: ditekSHen
                    Source: 9.0.SWIFT COPY.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: AgentTeslaV3 infostealer payload Author: ditekSHen
                    Source: 19.2.tKZVPq.exe.43cc6b0.3.unpack, type: UNPACKEDPEMatched rule: AgentTeslaV3 infostealer payload Author: ditekSHen
                    Source: 9.0.SWIFT COPY.exe.400000.12.unpack, type: UNPACKEDPEMatched rule: AgentTeslaV3 infostealer payload Author: ditekSHen
                    Source: 27.0.tKZVPq.exe.400000.12.unpack, type: UNPACKEDPEMatched rule: AgentTeslaV3 infostealer payload Author: ditekSHen
                    Source: 23.0.tKZVPq.exe.400000.8.unpack, type: UNPACKEDPEMatched rule: AgentTeslaV3 infostealer payload Author: ditekSHen
                    Source: 1.2.SWIFT COPY.exe.38ac6b0.4.unpack, type: UNPACKEDPEMatched rule: AgentTeslaV3 infostealer payload Author: ditekSHen
                    Source: 27.0.tKZVPq.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: AgentTeslaV3 infostealer payload Author: ditekSHen
                    Source: 27.0.tKZVPq.exe.400000.10.unpack, type: UNPACKEDPEMatched rule: AgentTeslaV3 infostealer payload Author: ditekSHen
                    Source: 20.2.tKZVPq.exe.388c6b0.3.unpack, type: UNPACKEDPEMatched rule: AgentTeslaV3 infostealer payload Author: ditekSHen
                    Source: 23.0.tKZVPq.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: AgentTeslaV3 infostealer payload Author: ditekSHen
                    Source: 19.2.tKZVPq.exe.43cc6b0.3.raw.unpack, type: UNPACKEDPEMatched rule: AgentTeslaV3 infostealer payload Author: ditekSHen
                    Source: 1.2.SWIFT COPY.exe.27d8054.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables containing artifcats associated with disabling Widnows Defender Author: ditekSHen
                    Source: 20.2.tKZVPq.exe.388c6b0.3.raw.unpack, type: UNPACKEDPEMatched rule: AgentTeslaV3 infostealer payload Author: ditekSHen
                    Source: 19.2.tKZVPq.exe.32f8098.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables containing artifcats associated with disabling Widnows Defender Author: ditekSHen
                    Source: 1.2.SWIFT COPY.exe.38ac6b0.4.raw.unpack, type: UNPACKEDPEMatched rule: AgenetTesla Type 2 Keylogger payload Author: ditekSHen
                    Source: 1.2.SWIFT COPY.exe.38ac6b0.4.raw.unpack, type: UNPACKEDPEMatched rule: AgentTeslaV3 infostealer payload Author: ditekSHen
                    Source: 20.2.tKZVPq.exe.27b8098.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables containing artifcats associated with disabling Widnows Defender Author: ditekSHen
                    Source: 00000017.00000002.536878272.00000000032D1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: AgentTeslaV3 infostealer payload Author: ditekSHen
                    Source: 00000009.00000002.552462552.0000000002DC1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: AgentTeslaV3 infostealer payload Author: ditekSHen
                    Source: 0000001B.00000002.552996616.0000000003301000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: AgentTeslaV3 infostealer payload Author: ditekSHen
                    Source: Process Memory Space: SWIFT COPY.exe PID: 6848, type: MEMORYSTRMatched rule: AgentTeslaV3 infostealer payload Author: ditekSHen
                    Source: Process Memory Space: tKZVPq.exe PID: 360, type: MEMORYSTRMatched rule: AgentTeslaV3 infostealer payload Author: ditekSHen
                    Source: Process Memory Space: tKZVPq.exe PID: 7000, type: MEMORYSTRMatched rule: AgentTeslaV3 infostealer payload Author: ditekSHen
                    Source: 9.2.SWIFT COPY.exe.400000.0.unpack, u003cPrivateImplementationDetailsu003eu007b5B4EF532u002d1E9Bu002d4E22u002dBDE7u002d0B69AA9CB3F3u007d/EBFC53EBu002d3318u002d4A55u002dB73Du002d31A6436F7404.csLarge array initialization: .cctor: array initializer size 11957
                    Source: 9.0.SWIFT COPY.exe.400000.6.unpack, u003cPrivateImplementationDetailsu003eu007b5B4EF532u002d1E9Bu002d4E22u002dBDE7u002d0B69AA9CB3F3u007d/EBFC53EBu002d3318u002d4A55u002dB73Du002d31A6436F7404.csLarge array initialization: .cctor: array initializer size 11957
                    Source: 9.0.SWIFT COPY.exe.400000.8.unpack, u003cPrivateImplementationDetailsu003eu007b5B4EF532u002d1E9Bu002d4E22u002dBDE7u002d0B69AA9CB3F3u007d/EBFC53EBu002d3318u002d4A55u002dB73Du002d31A6436F7404.csLarge array initialization: .cctor: array initializer size 11957
                    Source: 9.0.SWIFT COPY.exe.400000.10.unpack, u003cPrivateImplementationDetailsu003eu007b5B4EF532u002d1E9Bu002d4E22u002dBDE7u002d0B69AA9CB3F3u007d/EBFC53EBu002d3318u002d4A55u002dB73Du002d31A6436F7404.csLarge array initialization: .cctor: array initializer size 11957
                    Source: 9.0.SWIFT COPY.exe.400000.4.unpack, u003cPrivateImplementationDetailsu003eu007b5B4EF532u002d1E9Bu002d4E22u002dBDE7u002d0B69AA9CB3F3u007d/EBFC53EBu002d3318u002d4A55u002dB73Du002d31A6436F7404.csLarge array initialization: .cctor: array initializer size 11957
                    Source: 9.0.SWIFT COPY.exe.400000.12.unpack, u003cPrivateImplementationDetailsu003eu007b5B4EF532u002d1E9Bu002d4E22u002dBDE7u002d0B69AA9CB3F3u007d/EBFC53EBu002d3318u002d4A55u002dB73Du002d31A6436F7404.csLarge array initialization: .cctor: array initializer size 11957
                    Source: SWIFT COPY.exe, Form1.csLong String: Length: 22528
                    Source: QTzKSOrs.exe.1.dr, Form1.csLong String: Length: 22528
                    Source: tKZVPq.exe.9.dr, Form1.csLong String: Length: 22528
                    Source: SWIFT COPY.exeStatic PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE
                    Source: 23.0.tKZVPq.exe.400000.12.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload
                    Source: 23.2.tKZVPq.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload
                    Source: 9.2.SWIFT COPY.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload
                    Source: 27.0.tKZVPq.exe.400000.6.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload
                    Source: 9.0.SWIFT COPY.exe.400000.8.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload
                    Source: 9.0.SWIFT COPY.exe.400000.6.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload
                    Source: 27.0.tKZVPq.exe.400000.8.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload
                    Source: 9.0.SWIFT COPY.exe.400000.10.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload
                    Source: 23.0.tKZVPq.exe.400000.6.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload
                    Source: 23.0.tKZVPq.exe.400000.10.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload
                    Source: 27.2.tKZVPq.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload
                    Source: 9.0.SWIFT COPY.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload
                    Source: 19.2.tKZVPq.exe.43cc6b0.3.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload
                    Source: 9.0.SWIFT COPY.exe.400000.12.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload
                    Source: 27.0.tKZVPq.exe.400000.12.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload
                    Source: 23.0.tKZVPq.exe.400000.8.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload
                    Source: 1.2.SWIFT COPY.exe.38ac6b0.4.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload
                    Source: 27.0.tKZVPq.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload
                    Source: 27.0.tKZVPq.exe.400000.10.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload
                    Source: 20.2.tKZVPq.exe.388c6b0.3.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload
                    Source: 23.0.tKZVPq.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload
                    Source: 19.2.tKZVPq.exe.43cc6b0.3.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload
                    Source: 1.2.SWIFT COPY.exe.27d8054.1.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_DisableWinDefender author = ditekSHen, description = Detects executables containing artifcats associated with disabling Widnows Defender
                    Source: 20.2.tKZVPq.exe.388c6b0.3.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload
                    Source: 19.2.tKZVPq.exe.32f8098.1.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_DisableWinDefender author = ditekSHen, description = Detects executables containing artifcats associated with disabling Widnows Defender
                    Source: 1.2.SWIFT COPY.exe.38ac6b0.4.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV2 author = ditekSHen, description = AgenetTesla Type 2 Keylogger payload
                    Source: 1.2.SWIFT COPY.exe.38ac6b0.4.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload
                    Source: 20.2.tKZVPq.exe.27b8098.1.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_DisableWinDefender author = ditekSHen, description = Detects executables containing artifcats associated with disabling Widnows Defender
                    Source: 00000017.00000002.536878272.00000000032D1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload
                    Source: 00000009.00000002.552462552.0000000002DC1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload
                    Source: 0000001B.00000002.552996616.0000000003301000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload
                    Source: Process Memory Space: SWIFT COPY.exe PID: 6848, type: MEMORYSTRMatched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload
                    Source: Process Memory Space: tKZVPq.exe PID: 360, type: MEMORYSTRMatched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload
                    Source: Process Memory Space: tKZVPq.exe PID: 7000, type: MEMORYSTRMatched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload
                    Source: C:\Users\user\Desktop\SWIFT COPY.exeCode function: 1_2_00312050
                    Source: C:\Users\user\Desktop\SWIFT COPY.exeCode function: 1_2_07170578
                    Source: C:\Users\user\Desktop\SWIFT COPY.exeCode function: 1_2_07172998
                    Source: C:\Users\user\Desktop\SWIFT COPY.exeCode function: 1_2_071717B8
                    Source: C:\Users\user\Desktop\SWIFT COPY.exeCode function: 1_2_07175DD8
                    Source: C:\Users\user\Desktop\SWIFT COPY.exeCode function: 1_2_071719D8
                    Source: C:\Users\user\Desktop\SWIFT COPY.exeCode function: 1_2_07171E18
                    Source: C:\Users\user\Desktop\SWIFT COPY.exeCode function: 1_2_07171C50
                    Source: C:\Users\user\Desktop\SWIFT COPY.exeCode function: 1_2_02579968
                    Source: C:\Users\user\Desktop\SWIFT COPY.exeCode function: 1_2_0257C2B0
                    Source: C:\Users\user\Desktop\SWIFT COPY.exeCode function: 9_2_009C2050
                    Source: C:\Users\user\Desktop\SWIFT COPY.exeCode function: 9_2_052047A0
                    Source: C:\Users\user\Desktop\SWIFT COPY.exeCode function: 9_2_05203E58
                    Source: C:\Users\user\Desktop\SWIFT COPY.exeCode function: 9_2_05204773
                    Source: C:\Users\user\Desktop\SWIFT COPY.exeCode function: 9_2_05204790
                    Source: C:\Users\user\Desktop\SWIFT COPY.exeCode function: 9_2_0520D830
                    Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeCode function: 19_2_00DE2050
                    Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeCode function: 19_2_01709968
                    Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeCode function: 19_2_0170C2B0
                    Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeCode function: 19_2_073D88D0
                    Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeCode function: 19_2_073D86F8
                    Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeCode function: 19_2_078A72CC
                    Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeCode function: 19_2_078ADF50
                    Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeCode function: 19_2_078ADF60
                    Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeCode function: 20_2_00412050
                    Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeCode function: 20_2_07C688D0
                    Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeCode function: 20_2_0813D410
                    Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeCode function: 20_2_0813DC88
                    Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeCode function: 20_2_08130D28
                    Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeCode function: 20_2_0813E620
                    Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeCode function: 20_2_08131360
                    Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeCode function: 20_2_0813D402
                    Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeCode function: 20_2_0813C470
                    Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeCode function: 20_2_0813F4FE
                    Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeCode function: 20_2_0813F5B8
                    Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeCode function: 20_2_0813D6CA
                    Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeCode function: 20_2_08134F58
                    Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeCode function: 20_2_099A94F0
                    Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeCode function: 20_2_099AF770
                    Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeCode function: 20_2_099A6658
                    Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeCode function: 20_2_099AAE48
                    Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeCode function: 20_2_099A2998
                    Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeCode function: 20_2_099A5D98
                    Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeCode function: 20_2_099A8D98
                    Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeCode function: 20_2_099A8DA8
                    Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeCode function: 20_2_099A99A9
                    Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeCode function: 20_2_099A5DD8
                    Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeCode function: 20_2_099A19D8
                    Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeCode function: 20_2_099A1DC9
                    Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeCode function: 20_2_099A19C9
                    Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeCode function: 20_2_099A0578
                    Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeCode function: 20_2_099A0170
                    Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeCode function: 20_2_099A0569
                    Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeCode function: 20_2_099A94E1
                    Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeCode function: 20_2_099A28E7
                    Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeCode function: 20_2_099A1C50
                    Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeCode function: 20_2_099A1C40
                    Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeCode function: 20_2_099A17B8
                    Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeCode function: 20_2_099A57B8
                    Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeCode function: 20_2_099A17B2
                    Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeCode function: 20_2_099A6B58
                    Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeCode function: 20_2_099A5779
                    Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeCode function: 20_2_099A1E18
                    Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeCode function: 20_2_099A1E0A
                    Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeCode function: 20_2_099A664A
                    Source: SWIFT COPY.exeBinary or memory string: OriginalFilename vs SWIFT COPY.exe
                    Source: SWIFT COPY.exe, 00000001.00000002.368711613.00000000070D0000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameMajorRevision.exe< vs SWIFT COPY.exe
                    Source: SWIFT COPY.exe, 00000001.00000002.365539203.0000000003ABD000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameLXxo.exe> vs SWIFT COPY.exe
                    Source: SWIFT COPY.exe, 00000001.00000002.369113909.0000000008D20000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameBunifu.UI.dll4 vs SWIFT COPY.exe
                    Source: SWIFT COPY.exe, 00000001.00000002.358645831.00000000027AB000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameBunifu.UI.dll4 vs SWIFT COPY.exe
                    Source: SWIFT COPY.exe, 00000001.00000002.358645831.00000000027AB000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenamevahVwxOAZJLNxjsBZVUHZQtsv.exe4 vs SWIFT COPY.exe
                    Source: SWIFT COPY.exe, 00000001.00000002.364475084.0000000002B9A000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameMajorRevision.exe< vs SWIFT COPY.exe
                    Source: SWIFT COPY.exe, 00000001.00000000.284817407.00000000003DE000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameLXxo.exe> vs SWIFT COPY.exe
                    Source: SWIFT COPY.exe, 00000001.00000002.364987356.0000000003771000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenamevahVwxOAZJLNxjsBZVUHZQtsv.exe4 vs SWIFT COPY.exe
                    Source: SWIFT COPY.exe, 00000001.00000002.364987356.0000000003771000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameMajorRevision.exe< vs SWIFT COPY.exe
                    Source: SWIFT COPY.exe, 00000001.00000002.358148905.0000000002771000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilename vs SWIFT COPY.exe
                    Source: SWIFT COPY.exe, 00000009.00000000.350366821.0000000000A8E000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameLXxo.exe> vs SWIFT COPY.exe
                    Source: SWIFT COPY.exe, 00000009.00000002.550659347.0000000000402000.00000040.00000400.00020000.00000000.sdmpBinary or memory string: OriginalFilenamevahVwxOAZJLNxjsBZVUHZQtsv.exe4 vs SWIFT COPY.exe
                    Source: SWIFT COPY.exe, 00000009.00000002.554461839.000000000678B000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameLXxo.exe> vs SWIFT COPY.exe
                    Source: SWIFT COPY.exeBinary or memory string: OriginalFilenameLXxo.exe> vs SWIFT COPY.exe
                    Source: SWIFT COPY.exeStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
                    Source: QTzKSOrs.exe.1.drStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
                    Source: tKZVPq.exe.9.drStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
                    Source: SWIFT COPY.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                    Source: QTzKSOrs.exe.1.drStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                    Source: tKZVPq.exe.9.drStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                    Source: SWIFT COPY.exeReversingLabs: Detection: 75%
                    Source: C:\Users\user\Desktop\SWIFT COPY.exeFile read: C:\Users\user\Desktop\SWIFT COPY.exeJump to behavior
                    Source: SWIFT COPY.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                    Source: C:\Users\user\Desktop\SWIFT COPY.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
                    Source: unknownProcess created: C:\Users\user\Desktop\SWIFT COPY.exe "C:\Users\user\Desktop\SWIFT COPY.exe"
                    Source: C:\Users\user\Desktop\SWIFT COPY.exeProcess created: C:\Windows\SysWOW64\schtasks.exe C:\Windows\System32\schtasks.exe" /Create /TN "Updates\QTzKSOrs" /XML "C:\Users\user\AppData\Local\Temp\tmpF17F.tmp
                    Source: C:\Windows\SysWOW64\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                    Source: C:\Users\user\Desktop\SWIFT COPY.exeProcess created: C:\Users\user\Desktop\SWIFT COPY.exe {path}
                    Source: unknownProcess created: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exe "C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exe"
                    Source: unknownProcess created: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exe "C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exe"
                    Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeProcess created: C:\Windows\SysWOW64\schtasks.exe C:\Windows\System32\schtasks.exe" /Create /TN "Updates\QTzKSOrs" /XML "C:\Users\user\AppData\Local\Temp\tmpFAA2.tmp
                    Source: C:\Windows\SysWOW64\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                    Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeProcess created: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exe {path}
                    Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeProcess created: C:\Windows\SysWOW64\schtasks.exe C:\Windows\System32\schtasks.exe" /Create /TN "Updates\QTzKSOrs" /XML "C:\Users\user\AppData\Local\Temp\tmp2099.tmp
                    Source: C:\Windows\SysWOW64\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                    Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeProcess created: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exe {path}
                    Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeProcess created: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exe {path}
                    Source: C:\Users\user\Desktop\SWIFT COPY.exeProcess created: C:\Windows\SysWOW64\schtasks.exe C:\Windows\System32\schtasks.exe" /Create /TN "Updates\QTzKSOrs" /XML "C:\Users\user\AppData\Local\Temp\tmpF17F.tmp
                    Source: C:\Users\user\Desktop\SWIFT COPY.exeProcess created: C:\Users\user\Desktop\SWIFT COPY.exe {path}
                    Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeProcess created: C:\Windows\SysWOW64\schtasks.exe C:\Windows\System32\schtasks.exe" /Create /TN "Updates\QTzKSOrs" /XML "C:\Users\user\AppData\Local\Temp\tmpFAA2.tmp
                    Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeProcess created: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exe {path}
                    Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeProcess created: C:\Windows\SysWOW64\schtasks.exe C:\Windows\System32\schtasks.exe" /Create /TN "Updates\QTzKSOrs" /XML "C:\Users\user\AppData\Local\Temp\tmp2099.tmp
                    Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeProcess created: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exe {path}
                    Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeProcess created: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exe {path}
                    Source: C:\Users\user\Desktop\SWIFT COPY.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{8856F961-340A-11D0-A96B-00C04FD705A2}\InProcServer32
                    Source: C:\Users\user\Desktop\SWIFT COPY.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                    Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                    Source: C:\Users\user\Desktop\SWIFT COPY.exeFile created: C:\Users\user\AppData\Roaming\QTzKSOrs.exeJump to behavior
                    Source: C:\Users\user\Desktop\SWIFT COPY.exeFile created: C:\Users\user\AppData\Local\Temp\tmpF17F.tmpJump to behavior
                    Source: classification engineClassification label: mal100.troj.adwa.evad.winEXE@20/9@0/0
                    Source: C:\Users\user\Desktop\SWIFT COPY.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
                    Source: C:\Users\user\Desktop\SWIFT COPY.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
                    Source: C:\Users\user\Desktop\SWIFT COPY.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
                    Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
                    Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
                    Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
                    Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
                    Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6452:120:WilError_01
                    Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6788:120:WilError_01
                    Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6256:120:WilError_01
                    Source: 9.2.SWIFT COPY.exe.400000.0.unpack, A/b2.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
                    Source: 9.2.SWIFT COPY.exe.400000.0.unpack, A/b2.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
                    Source: 9.0.SWIFT COPY.exe.400000.6.unpack, A/b2.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
                    Source: 9.0.SWIFT COPY.exe.400000.6.unpack, A/b2.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
                    Source: 9.0.SWIFT COPY.exe.400000.8.unpack, A/b2.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
                    Source: 9.0.SWIFT COPY.exe.400000.8.unpack, A/b2.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
                    Source: C:\Users\user\Desktop\SWIFT COPY.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dll
                    Source: SWIFT COPY.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
                    Source: SWIFT COPY.exeStatic PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT

                    Data Obfuscation

                    barindex
                    Source: SWIFT COPY.exe, Form1.cs.Net Code: _B System.Reflection.Assembly System.AppDomain::Load(System.Byte[])
                    Source: QTzKSOrs.exe.1.dr, Form1.cs.Net Code: _B System.Reflection.Assembly System.AppDomain::Load(System.Byte[])
                    Source: tKZVPq.exe.9.dr, Form1.cs.Net Code: _B System.Reflection.Assembly System.AppDomain::Load(System.Byte[])
                    Source: C:\Users\user\Desktop\SWIFT COPY.exeCode function: 1_2_0031B3BA push ds; retf
                    Source: C:\Users\user\Desktop\SWIFT COPY.exeCode function: 1_2_0711C5AF pushfd ; iretd
                    Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeCode function: 19_2_078A7BB0 pushfd ; iretd
                    Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeCode function: 19_2_078A61C8 pushfd ; ret
                    Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeCode function: 20_2_0813EDB7 pushfd ; retf
                    Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeCode function: 20_2_0813EDBE pushfd ; retf
                    Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeCode function: 20_2_0813EE6B push dword ptr [ebx]; iretd
                    Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeCode function: 20_2_0813F3B0 push eax; retf
                    Source: initial sampleStatic PE information: section name: .text entropy: 7.7506405165
                    Source: initial sampleStatic PE information: section name: .text entropy: 7.7506405165
                    Source: initial sampleStatic PE information: section name: .text entropy: 7.7506405165
                    Source: C:\Users\user\Desktop\SWIFT COPY.exeFile created: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeJump to dropped file
                    Source: C:\Users\user\Desktop\SWIFT COPY.exeFile created: C:\Users\user\AppData\Roaming\QTzKSOrs.exeJump to dropped file

                    Boot Survival

                    barindex
                    Source: C:\Users\user\Desktop\SWIFT COPY.exeProcess created: C:\Windows\SysWOW64\schtasks.exe C:\Windows\System32\schtasks.exe" /Create /TN "Updates\QTzKSOrs" /XML "C:\Users\user\AppData\Local\Temp\tmpF17F.tmp
                    Source: C:\Users\user\Desktop\SWIFT COPY.exeRegistry value created or modified: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run tKZVPqJump to behavior
                    Source: C:\Users\user\Desktop\SWIFT COPY.exeRegistry value created or modified: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run tKZVPqJump to behavior

                    Hooking and other Techniques for Hiding and Protection

                    barindex
                    Source: C:\Users\user\Desktop\SWIFT COPY.exeFile opened: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exe:Zone.Identifier read attributes | delete
                    Source: C:\Users\user\Desktop\SWIFT COPY.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\SWIFT COPY.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\SWIFT COPY.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\SWIFT COPY.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\SWIFT COPY.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\SWIFT COPY.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\SWIFT COPY.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\SWIFT COPY.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\SWIFT COPY.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\SWIFT COPY.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\SWIFT COPY.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\SWIFT COPY.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\SWIFT COPY.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\SWIFT COPY.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\SWIFT COPY.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\SWIFT COPY.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\SWIFT COPY.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\SWIFT COPY.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\SWIFT COPY.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\SWIFT COPY.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\SWIFT COPY.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\SWIFT COPY.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\SWIFT COPY.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\SWIFT COPY.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\SWIFT COPY.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\SWIFT COPY.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\SWIFT COPY.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\SWIFT COPY.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\SWIFT COPY.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\SWIFT COPY.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\SWIFT COPY.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\SWIFT COPY.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\SWIFT COPY.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\SWIFT COPY.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\SWIFT COPY.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\SWIFT COPY.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\SWIFT COPY.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\SWIFT COPY.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\SWIFT COPY.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\SWIFT COPY.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\SWIFT COPY.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\SWIFT COPY.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\SWIFT COPY.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\SWIFT COPY.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\SWIFT COPY.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\SWIFT COPY.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\SWIFT COPY.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\SWIFT COPY.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\SWIFT COPY.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\SWIFT COPY.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\SWIFT COPY.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\SWIFT COPY.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\SWIFT COPY.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\SWIFT COPY.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\SWIFT COPY.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\SWIFT COPY.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\SWIFT COPY.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\SWIFT COPY.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\SWIFT COPY.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\SWIFT COPY.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\SWIFT COPY.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\SWIFT COPY.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\SWIFT COPY.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\SWIFT COPY.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\SWIFT COPY.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\SWIFT COPY.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\SWIFT COPY.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\SWIFT COPY.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\SWIFT COPY.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\SWIFT COPY.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\SWIFT COPY.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\SWIFT COPY.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\SWIFT COPY.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\SWIFT COPY.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\SWIFT COPY.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\SWIFT COPY.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\SWIFT COPY.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\SWIFT COPY.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\SWIFT COPY.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\SWIFT COPY.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\SWIFT COPY.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeProcess information set: NOOPENFILEERRORBOX

                    Malware Analysis System Evasion

                    barindex
                    Source: Yara matchFile source: 20.2.tKZVPq.exe.27b8098.1.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 00000014.00000002.528760408.000000000278B000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: SWIFT COPY.exe PID: 4364, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: tKZVPq.exe PID: 4024, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: tKZVPq.exe PID: 4556, type: MEMORYSTR
                    Source: SWIFT COPY.exe, 00000001.00000002.358645831.00000000027AB000.00000004.00000800.00020000.00000000.sdmp, tKZVPq.exe, 00000013.00000002.502240420.00000000032CB000.00000004.00000800.00020000.00000000.sdmp, tKZVPq.exe, 00000014.00000002.528760408.000000000278B000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: WINE_GET_UNIX_FILE_NAME
                    Source: SWIFT COPY.exe, 00000001.00000002.358645831.00000000027AB000.00000004.00000800.00020000.00000000.sdmp, tKZVPq.exe, 00000013.00000002.502240420.00000000032CB000.00000004.00000800.00020000.00000000.sdmp, tKZVPq.exe, 00000014.00000002.528760408.000000000278B000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: SBIEDLL.DLL
                    Source: C:\Users\user\Desktop\SWIFT COPY.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_NetworkAdapterConfiguration
                    Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_NetworkAdapterConfiguration
                    Source: C:\Users\user\Desktop\SWIFT COPY.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
                    Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
                    Source: C:\Users\user\Desktop\SWIFT COPY.exe TID: 6388Thread sleep time: -922337203685477s >= -30000s
                    Source: C:\Users\user\Desktop\SWIFT COPY.exe TID: 4432Thread sleep time: -17524406870024063s >= -30000s
                    Source: C:\Users\user\Desktop\SWIFT COPY.exe TID: 5880Thread sleep count: 4726 > 30
                    Source: C:\Users\user\Desktop\SWIFT COPY.exe TID: 5880Thread sleep count: 5098 > 30
                    Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exe TID: 5256Thread sleep time: -922337203685477s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exe TID: 2928Thread sleep time: -922337203685477s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exe TID: 6424Thread sleep time: -4611686018427385s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exe TID: 7084Thread sleep count: 535 > 30
                    Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exe TID: 7084Thread sleep count: 2053 > 30
                    Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                    Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                    Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeLast function: Thread delayed
                    Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                    Source: C:\Users\user\Desktop\SWIFT COPY.exeThread delayed: delay time: 922337203685477
                    Source: C:\Users\user\Desktop\SWIFT COPY.exeThread delayed: delay time: 922337203685477
                    Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeThread delayed: delay time: 922337203685477
                    Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeThread delayed: delay time: 922337203685477
                    Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeThread delayed: delay time: 922337203685477
                    Source: C:\Users\user\Desktop\SWIFT COPY.exeWindow / User API: threadDelayed 4726
                    Source: C:\Users\user\Desktop\SWIFT COPY.exeWindow / User API: threadDelayed 5098
                    Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeWindow / User API: threadDelayed 535
                    Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeWindow / User API: threadDelayed 2053
                    Source: C:\Users\user\Desktop\SWIFT COPY.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                    Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                    Source: C:\Users\user\Desktop\SWIFT COPY.exeProcess information queried: ProcessInformation
                    Source: C:\Users\user\Desktop\SWIFT COPY.exeThread delayed: delay time: 922337203685477
                    Source: C:\Users\user\Desktop\SWIFT COPY.exeThread delayed: delay time: 922337203685477
                    Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeThread delayed: delay time: 922337203685477
                    Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeThread delayed: delay time: 922337203685477
                    Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeThread delayed: delay time: 922337203685477
                    Source: tKZVPq.exe, 00000014.00000002.528760408.000000000278B000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: VMware SVGA IIOData Source=localhost\sqlexpress;Initial Catalog=dbSMS;Integrated Security=True
                    Source: tKZVPq.exe, 00000014.00000002.528760408.000000000278B000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: vmware
                    Source: tKZVPq.exe, 00000014.00000002.528760408.000000000278B000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: C:\PROGRAM FILES\VMWARE\VMWARE TOOLS\
                    Source: tKZVPq.exe, 00000014.00000002.528760408.000000000278B000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: SOFTWARE\VMware, Inc.\VMware Tools
                    Source: tKZVPq.exe, 00000013.00000002.508617394.0000000007551000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&280b647&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\Device\CdRom0\??\Volume{e6e9dfd8-98f2-11e9-90ce-806e6f6e6963}\DosDevices\D:
                    Source: tKZVPq.exe, 00000014.00000002.528760408.000000000278B000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: VMWARE
                    Source: tKZVPq.exe, 00000014.00000002.528760408.000000000278B000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: InstallPath%C:\PROGRAM FILES\VMWARE\VMWARE TOOLS\
                    Source: tKZVPq.exe, 00000014.00000002.528760408.000000000278B000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: VMWARE"SOFTWARE\VMware, Inc.\VMware ToolsLHARDWARE\DEVICEMAP\Scsi\Scsi Port 1\Scsi Bus 0\Target Id 0\Logical Unit Id 0LHARDWARE\DEVICEMAP\Scsi\Scsi Port 2\Scsi Bus 0\Target Id 0\Logical Unit Id 0'SYSTEM\ControlSet001\Services\Disk\Enum
                    Source: tKZVPq.exe, 00000014.00000002.528760408.000000000278B000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: VMware SVGA II
                    Source: tKZVPq.exe, 00000014.00000002.528760408.000000000278B000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: vmwareNSYSTEM\ControlSet001\Control\Class\{4D36E968-E325-11CE-BFC1-08002BE10318}\0000
                    Source: C:\Users\user\Desktop\SWIFT COPY.exeProcess token adjusted: Debug
                    Source: C:\Users\user\Desktop\SWIFT COPY.exeMemory allocated: page read and write | page guard

                    HIPS / PFW / Operating System Protection Evasion

                    barindex
                    Source: C:\Users\user\Desktop\SWIFT COPY.exeFile written: C:\Windows\System32\drivers\etc\hostsJump to behavior
                    Source: C:\Users\user\Desktop\SWIFT COPY.exeMemory written: C:\Users\user\Desktop\SWIFT COPY.exe base: 400000 value starts with: 4D5A
                    Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeMemory written: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exe base: 400000 value starts with: 4D5A
                    Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeMemory written: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exe base: 400000 value starts with: 4D5A
                    Source: C:\Users\user\Desktop\SWIFT COPY.exeProcess created: C:\Windows\SysWOW64\schtasks.exe C:\Windows\System32\schtasks.exe" /Create /TN "Updates\QTzKSOrs" /XML "C:\Users\user\AppData\Local\Temp\tmpF17F.tmp
                    Source: C:\Users\user\Desktop\SWIFT COPY.exeProcess created: C:\Users\user\Desktop\SWIFT COPY.exe {path}
                    Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeProcess created: C:\Windows\SysWOW64\schtasks.exe C:\Windows\System32\schtasks.exe" /Create /TN "Updates\QTzKSOrs" /XML "C:\Users\user\AppData\Local\Temp\tmpFAA2.tmp
                    Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeProcess created: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exe {path}
                    Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeProcess created: C:\Windows\SysWOW64\schtasks.exe C:\Windows\System32\schtasks.exe" /Create /TN "Updates\QTzKSOrs" /XML "C:\Users\user\AppData\Local\Temp\tmp2099.tmp
                    Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeProcess created: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exe {path}
                    Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeProcess created: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exe {path}
                    Source: C:\Users\user\Desktop\SWIFT COPY.exeQueries volume information: C:\Users\user\Desktop\SWIFT COPY.exe VolumeInformation
                    Source: C:\Users\user\Desktop\SWIFT COPY.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
                    Source: C:\Users\user\Desktop\SWIFT COPY.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
                    Source: C:\Users\user\Desktop\SWIFT COPY.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
                    Source: C:\Users\user\Desktop\SWIFT COPY.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
                    Source: C:\Users\user\Desktop\SWIFT COPY.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Runtime.Remoting\v4.0_4.0.0.0__b77a5c561934e089\System.Runtime.Remoting.dll VolumeInformation
                    Source: C:\Users\user\Desktop\SWIFT COPY.exeQueries volume information: C:\Windows\Fonts\arial.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\SWIFT COPY.exeQueries volume information: C:\Windows\Fonts\ariali.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\SWIFT COPY.exeQueries volume information: C:\Windows\Fonts\arialbd.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\SWIFT COPY.exeQueries volume information: C:\Windows\Fonts\arialbi.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\SWIFT COPY.exeQueries volume information: C:\Windows\Fonts\ARIALN.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\SWIFT COPY.exeQueries volume information: C:\Windows\Fonts\ariblk.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\SWIFT COPY.exeQueries volume information: C:\Windows\Fonts\ARIALNI.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\SWIFT COPY.exeQueries volume information: C:\Windows\Fonts\ARIALNB.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\SWIFT COPY.exeQueries volume information: C:\Windows\Fonts\ARIALNBI.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\SWIFT COPY.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\SWIFT COPY.exeQueries volume information: C:\Windows\Fonts\calibri.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\SWIFT COPY.exeQueries volume information: C:\Windows\Fonts\calibril.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\SWIFT COPY.exeQueries volume information: C:\Windows\Fonts\calibrii.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\SWIFT COPY.exeQueries volume information: C:\Windows\Fonts\calibrili.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\SWIFT COPY.exeQueries volume information: C:\Windows\Fonts\calibrib.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\SWIFT COPY.exeQueries volume information: C:\Windows\Fonts\calibriz.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\SWIFT COPY.exeQueries volume information: C:\Windows\Fonts\cambria.ttc VolumeInformation
                    Source: C:\Users\user\Desktop\SWIFT COPY.exeQueries volume information: C:\Windows\Fonts\cambriai.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\SWIFT COPY.exeQueries volume information: C:\Windows\Fonts\cambriab.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\SWIFT COPY.exeQueries volume information: C:\Windows\Fonts\cambriaz.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\SWIFT COPY.exeQueries volume information: C:\Windows\Fonts\Candara.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\SWIFT COPY.exeQueries volume information: C:\Windows\Fonts\Candarai.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\SWIFT COPY.exeQueries volume information: C:\Windows\Fonts\Candarab.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\SWIFT COPY.exeQueries volume information: C:\Windows\Fonts\Candaraz.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\SWIFT COPY.exeQueries volume information: C:\Windows\Fonts\comic.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\SWIFT COPY.exeQueries volume information: C:\Windows\Fonts\comici.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\SWIFT COPY.exeQueries volume information: C:\Windows\Fonts\comicbd.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\SWIFT COPY.exeQueries volume information: C:\Windows\Fonts\comicz.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\SWIFT COPY.exeQueries volume information: C:\Windows\Fonts\consola.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\SWIFT COPY.exeQueries volume information: C:\Windows\Fonts\consolai.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\SWIFT COPY.exeQueries volume information: C:\Windows\Fonts\consolab.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\SWIFT COPY.exeQueries volume information: C:\Windows\Fonts\consolaz.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\SWIFT COPY.exeQueries volume information: C:\Windows\Fonts\constan.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\SWIFT COPY.exeQueries volume information: C:\Windows\Fonts\constani.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\SWIFT COPY.exeQueries volume information: C:\Windows\Fonts\constanb.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\SWIFT COPY.exeQueries volume information: C:\Windows\Fonts\constanz.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\SWIFT COPY.exeQueries volume information: C:\Windows\Fonts\corbel.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\SWIFT COPY.exeQueries volume information: C:\Windows\Fonts\corbeli.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\SWIFT COPY.exeQueries volume information: C:\Windows\Fonts\corbelb.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\SWIFT COPY.exeQueries volume information: C:\Windows\Fonts\corbelz.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\SWIFT COPY.exeQueries volume information: C:\Windows\Fonts\cour.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\SWIFT COPY.exeQueries volume information: C:\Windows\Fonts\couri.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\SWIFT COPY.exeQueries volume information: C:\Windows\Fonts\courbd.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\SWIFT COPY.exeQueries volume information: C:\Windows\Fonts\courbi.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\SWIFT COPY.exeQueries volume information: C:\Windows\Fonts\ebrima.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\SWIFT COPY.exeQueries volume information: C:\Windows\Fonts\ebrimabd.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\SWIFT COPY.exeQueries volume information: C:\Windows\Fonts\framd.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\SWIFT COPY.exeQueries volume information: C:\Windows\Fonts\FRADM.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\SWIFT COPY.exeQueries volume information: C:\Windows\Fonts\framdit.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\SWIFT COPY.exeQueries volume information: C:\Windows\Fonts\FRADMIT.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\SWIFT COPY.exeQueries volume information: C:\Windows\Fonts\FRAMDCN.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\SWIFT COPY.exeQueries volume information: C:\Windows\Fonts\FRADMCN.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\SWIFT COPY.exeQueries volume information: C:\Windows\Fonts\FRAHV.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\SWIFT COPY.exeQueries volume information: C:\Windows\Fonts\FRAHVIT.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\SWIFT COPY.exeQueries volume information: C:\Windows\Fonts\Gabriola.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\SWIFT COPY.exeQueries volume information: C:\Windows\Fonts\gadugi.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\SWIFT COPY.exeQueries volume information: C:\Windows\Fonts\gadugib.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\SWIFT COPY.exeQueries volume information: C:\Windows\Fonts\georgia.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\SWIFT COPY.exeQueries volume information: C:\Windows\Fonts\georgiai.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\SWIFT COPY.exeQueries volume information: C:\Windows\Fonts\georgiab.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\SWIFT COPY.exeQueries volume information: C:\Windows\Fonts\georgiaz.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\SWIFT COPY.exeQueries volume information: C:\Windows\Fonts\impact.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\SWIFT COPY.exeQueries volume information: C:\Windows\Fonts\Inkfree.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\SWIFT COPY.exeQueries volume information: C:\Windows\Fonts\javatext.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\SWIFT COPY.exeQueries volume information: C:\Windows\Fonts\LeelawUI.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\SWIFT COPY.exeQueries volume information: C:\Windows\Fonts\LeelUIsl.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\SWIFT COPY.exeQueries volume information: C:\Windows\Fonts\LeelaUIb.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\SWIFT COPY.exeQueries volume information: C:\Windows\Fonts\lucon.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\SWIFT COPY.exeQueries volume information: C:\Windows\Fonts\l_10646.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\SWIFT COPY.exeQueries volume information: C:\Windows\Fonts\malgun.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\SWIFT COPY.exeQueries volume information: C:\Windows\Fonts\malgunsl.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\SWIFT COPY.exeQueries volume information: C:\Windows\Fonts\malgunbd.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\SWIFT COPY.exeQueries volume information: C:\Windows\Fonts\himalaya.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\SWIFT COPY.exeQueries volume information: C:\Windows\Fonts\msjh.ttc VolumeInformation
                    Source: C:\Users\user\Desktop\SWIFT COPY.exeQueries volume information: C:\Windows\Fonts\msjhl.ttc VolumeInformation
                    Source: C:\Users\user\Desktop\SWIFT COPY.exeQueries volume information: C:\Windows\Fonts\msjhbd.ttc VolumeInformation
                    Source: C:\Users\user\Desktop\SWIFT COPY.exeQueries volume information: C:\Windows\Fonts\ntailu.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\SWIFT COPY.exeQueries volume information: C:\Windows\Fonts\ntailub.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\SWIFT COPY.exeQueries volume information: C:\Windows\Fonts\phagspa.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\SWIFT COPY.exeQueries volume information: C:\Windows\Fonts\phagspab.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\SWIFT COPY.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\SWIFT COPY.exeQueries volume information: C:\Windows\Fonts\taile.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\SWIFT COPY.exeQueries volume information: C:\Windows\Fonts\taileb.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\SWIFT COPY.exeQueries volume information: C:\Windows\Fonts\msyh.ttc VolumeInformation
                    Source: C:\Users\user\Desktop\SWIFT COPY.exeQueries volume information: C:\Windows\Fonts\msyhl.ttc VolumeInformation
                    Source: C:\Users\user\Desktop\SWIFT COPY.exeQueries volume information: C:\Windows\Fonts\msyhbd.ttc VolumeInformation
                    Source: C:\Users\user\Desktop\SWIFT COPY.exeQueries volume information: C:\Windows\Fonts\msyi.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\SWIFT COPY.exeQueries volume information: C:\Windows\Fonts\mingliub.ttc VolumeInformation
                    Source: C:\Users\user\Desktop\SWIFT COPY.exeQueries volume information: C:\Windows\Fonts\monbaiti.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\SWIFT COPY.exeQueries volume information: C:\Windows\Fonts\msgothic.ttc VolumeInformation
                    Source: C:\Users\user\Desktop\SWIFT COPY.exeQueries volume information: C:\Windows\Fonts\mvboli.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\SWIFT COPY.exeQueries volume information: C:\Windows\Fonts\mmrtext.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\SWIFT COPY.exeQueries volume information: C:\Windows\Fonts\mmrtextb.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\SWIFT COPY.exeQueries volume information: C:\Windows\Fonts\Nirmala.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\SWIFT COPY.exeQueries volume information: C:\Windows\Fonts\NirmalaS.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\SWIFT COPY.exeQueries volume information: C:\Windows\Fonts\NirmalaB.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\SWIFT COPY.exeQueries volume information: C:\Windows\Fonts\pala.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\SWIFT COPY.exeQueries volume information: C:\Windows\Fonts\palai.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\SWIFT COPY.exeQueries volume information: C:\Windows\Fonts\palab.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\SWIFT COPY.exeQueries volume information: C:\Windows\Fonts\palabi.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\SWIFT COPY.exeQueries volume information: C:\Windows\Fonts\segoepr.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\SWIFT COPY.exeQueries volume information: C:\Windows\Fonts\segoeprb.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\SWIFT COPY.exeQueries volume information: C:\Windows\Fonts\segoesc.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\SWIFT COPY.exeQueries volume information: C:\Windows\Fonts\segoescb.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\SWIFT COPY.exeQueries volume information: C:\Windows\Fonts\segoeuii.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\SWIFT COPY.exeQueries volume information: C:\Windows\Fonts\seguisli.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\SWIFT COPY.exeQueries volume information: C:\Windows\Fonts\seguili.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\SWIFT COPY.exeQueries volume information: C:\Windows\Fonts\seguisbi.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\SWIFT COPY.exeQueries volume information: C:\Windows\Fonts\segoeuiz.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\SWIFT COPY.exeQueries volume information: C:\Windows\Fonts\seguibl.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\SWIFT COPY.exeQueries volume information: C:\Windows\Fonts\seguibli.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\SWIFT COPY.exeQueries volume information: C:\Windows\Fonts\seguiemj.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\SWIFT COPY.exeQueries volume information: C:\Windows\Fonts\seguihis.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\SWIFT COPY.exeQueries volume information: C:\Windows\Fonts\seguisym.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\SWIFT COPY.exeQueries volume information: C:\Windows\Fonts\simsun.ttc VolumeInformation
                    Source: C:\Users\user\Desktop\SWIFT COPY.exeQueries volume information: C:\Windows\Fonts\simsunb.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\SWIFT COPY.exeQueries volume information: C:\Windows\Fonts\Sitka.ttc VolumeInformation
                    Source: C:\Users\user\Desktop\SWIFT COPY.exeQueries volume information: C:\Windows\Fonts\SitkaI.ttc VolumeInformation
                    Source: C:\Users\user\Desktop\SWIFT COPY.exeQueries volume information: C:\Windows\Fonts\SitkaB.ttc VolumeInformation
                    Source: C:\Users\user\Desktop\SWIFT COPY.exeQueries volume information: C:\Windows\Fonts\SitkaZ.ttc VolumeInformation
                    Source: C:\Users\user\Desktop\SWIFT COPY.exeQueries volume information: C:\Windows\Fonts\sylfaen.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\SWIFT COPY.exeQueries volume information: C:\Windows\Fonts\symbol.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\SWIFT COPY.exeQueries volume information: C:\Windows\Fonts\tahoma.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\SWIFT COPY.exeQueries volume information: C:\Windows\Fonts\tahomabd.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\SWIFT COPY.exeQueries volume information: C:\Windows\Fonts\timesi.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\SWIFT COPY.exeQueries volume information: C:\Windows\Fonts\timesbd.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\SWIFT COPY.exeQueries volume information: C:\Windows\Fonts\timesbi.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\SWIFT COPY.exeQueries volume information: C:\Windows\Fonts\trebuc.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\SWIFT COPY.exeQueries volume information: C:\Windows\Fonts\trebucit.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\SWIFT COPY.exeQueries volume information: C:\Windows\Fonts\trebucbd.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\SWIFT COPY.exeQueries volume information: C:\Windows\Fonts\trebucbi.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\SWIFT COPY.exeQueries volume information: C:\Windows\Fonts\verdana.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\SWIFT COPY.exeQueries volume information: C:\Windows\Fonts\verdanai.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\SWIFT COPY.exeQueries volume information: C:\Windows\Fonts\verdanab.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\SWIFT COPY.exeQueries volume information: C:\Windows\Fonts\verdanaz.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\SWIFT COPY.exeQueries volume information: C:\Windows\Fonts\webdings.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\SWIFT COPY.exeQueries volume information: C:\Windows\Fonts\wingding.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\SWIFT COPY.exeQueries volume information: C:\Windows\Fonts\YuGothR.ttc VolumeInformation
                    Source: C:\Users\user\Desktop\SWIFT COPY.exeQueries volume information: C:\Windows\Fonts\YuGothM.ttc VolumeInformation
                    Source: C:\Users\user\Desktop\SWIFT COPY.exeQueries volume information: C:\Windows\Fonts\YuGothL.ttc VolumeInformation
                    Source: C:\Users\user\Desktop\SWIFT COPY.exeQueries volume information: C:\Windows\Fonts\YuGothB.ttc VolumeInformation
                    Source: C:\Users\user\Desktop\SWIFT COPY.exeQueries volume information: C:\Windows\Fonts\holomdl2.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\SWIFT COPY.exeQueries volume information: C:\Windows\Fonts\CENTURY.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\SWIFT COPY.exeQueries volume information: C:\Windows\Fonts\LEELAWAD.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\SWIFT COPY.exeQueries volume information: C:\Windows\Fonts\LEELAWDB.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\SWIFT COPY.exeQueries volume information: C:\Windows\Fonts\MSUIGHUR.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\SWIFT COPY.exeQueries volume information: C:\Windows\Fonts\MSUIGHUB.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\SWIFT COPY.exeQueries volume information: C:\Windows\Fonts\WINGDNG2.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\SWIFT COPY.exeQueries volume information: C:\Windows\Fonts\WINGDNG3.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\SWIFT COPY.exeQueries volume information: C:\Windows\Fonts\TEMPSITC.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\SWIFT COPY.exeQueries volume information: C:\Windows\Fonts\PRISTINA.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\SWIFT COPY.exeQueries volume information: C:\Windows\Fonts\PAPYRUS.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\SWIFT COPY.exeQueries volume information: C:\Windows\Fonts\MISTRAL.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\SWIFT COPY.exeQueries volume information: C:\Windows\Fonts\LHANDW.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\SWIFT COPY.exeQueries volume information: C:\Windows\Fonts\ITCKRIST.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\SWIFT COPY.exeQueries volume information: C:\Windows\Fonts\JUICE___.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\SWIFT COPY.exeQueries volume information: C:\Windows\Fonts\FRSCRIPT.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\SWIFT COPY.exeQueries volume information: C:\Windows\Fonts\FREESCPT.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\SWIFT COPY.exeQueries volume information: C:\Windows\Fonts\BRADHITC.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\SWIFT COPY.exeQueries volume information: C:\Windows\Fonts\OUTLOOK.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\SWIFT COPY.exeQueries volume information: C:\Windows\Fonts\BKANT.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\SWIFT COPY.exeQueries volume information: C:\Windows\Fonts\ANTQUAI.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\SWIFT COPY.exeQueries volume information: C:\Windows\Fonts\ANTQUAB.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\SWIFT COPY.exeQueries volume information: C:\Windows\Fonts\ANTQUABI.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\SWIFT COPY.exeQueries volume information: C:\Windows\Fonts\GARA.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\SWIFT COPY.exeQueries volume information: C:\Windows\Fonts\GARAIT.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\SWIFT COPY.exeQueries volume information: C:\Windows\Fonts\GARABD.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\SWIFT COPY.exeQueries volume information: C:\Windows\Fonts\MTCORSVA.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\SWIFT COPY.exeQueries volume information: C:\Windows\Fonts\GOTHIC.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\SWIFT COPY.exeQueries volume information: C:\Windows\Fonts\GOTHICI.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\SWIFT COPY.exeQueries volume information: C:\Windows\Fonts\GOTHICB.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\SWIFT COPY.exeQueries volume information: C:\Windows\Fonts\GOTHICBI.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\SWIFT COPY.exeQueries volume information: C:\Windows\Fonts\ALGER.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\SWIFT COPY.exeQueries volume information: C:\Windows\Fonts\BASKVILL.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\SWIFT COPY.exeQueries volume information: C:\Windows\Fonts\BAUHS93.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\SWIFT COPY.exeQueries volume information: C:\Windows\Fonts\BELL.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\SWIFT COPY.exeQueries volume information: C:\Windows\Fonts\BELLI.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\SWIFT COPY.exeQueries volume information: C:\Windows\Fonts\BELLB.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\SWIFT COPY.exeQueries volume information: C:\Windows\Fonts\BRLNSR.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\SWIFT COPY.exeQueries volume information: C:\Windows\Fonts\BRLNSDB.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\SWIFT COPY.exeQueries volume information: C:\Windows\Fonts\BRLNSB.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\SWIFT COPY.exeQueries volume information: C:\Windows\Fonts\BERNHC.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\SWIFT COPY.exeQueries volume information: C:\Windows\Fonts\BOD_PSTC.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\SWIFT COPY.exeQueries volume information: C:\Windows\Fonts\BRITANIC.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\SWIFT COPY.exeQueries volume information: C:\Windows\Fonts\BROADW.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\SWIFT COPY.exeQueries volume information: C:\Windows\Fonts\BRUSHSCI.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\SWIFT COPY.exeQueries volume information: C:\Windows\Fonts\CALIFR.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\SWIFT COPY.exeQueries volume information: C:\Windows\Fonts\CALIFI.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\SWIFT COPY.exeQueries volume information: C:\Windows\Fonts\CALIFB.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\SWIFT COPY.exeQueries volume information: C:\Windows\Fonts\CENTAUR.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\SWIFT COPY.exeQueries volume information: C:\Windows\Fonts\CHILLER.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\SWIFT COPY.exeQueries volume information: C:\Windows\Fonts\COLONNA.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\SWIFT COPY.exeQueries volume information: C:\Windows\Fonts\COOPBL.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\SWIFT COPY.exeQueries volume information: C:\Windows\Fonts\FTLTLT.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\SWIFT COPY.exeQueries volume information: C:\Windows\Fonts\HARLOWSI.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\SWIFT COPY.exeQueries volume information: C:\Windows\Fonts\HARNGTON.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\SWIFT COPY.exeQueries volume information: C:\Windows\Fonts\HTOWERT.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\SWIFT COPY.exeQueries volume information: C:\Windows\Fonts\HTOWERTI.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\SWIFT COPY.exeQueries volume information: C:\Windows\Fonts\JOKERMAN.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\SWIFT COPY.exeQueries volume information: C:\Windows\Fonts\KUNSTLER.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\SWIFT COPY.exeQueries volume information: C:\Windows\Fonts\LBRITE.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\SWIFT COPY.exeQueries volume information: C:\Windows\Fonts\LBRITED.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\SWIFT COPY.exeQueries volume information: C:\Windows\Fonts\LBRITEI.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\SWIFT COPY.exeQueries volume information: C:\Windows\Fonts\LBRITEDI.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\SWIFT COPY.exeQueries volume information: C:\Windows\Fonts\LCALLIG.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\SWIFT COPY.exeQueries volume information: C:\Windows\Fonts\LFAX.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\SWIFT COPY.exeQueries volume information: C:\Windows\Fonts\LFAXD.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\SWIFT COPY.exeQueries volume information: C:\Windows\Fonts\LFAXI.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\SWIFT COPY.exeQueries volume information: C:\Windows\Fonts\LFAXDI.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\SWIFT COPY.exeQueries volume information: C:\Windows\Fonts\MAGNETOB.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\SWIFT COPY.exeQueries volume information: C:\Windows\Fonts\MATURASC.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\SWIFT COPY.exeQueries volume information: C:\Windows\Fonts\MOD20.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\SWIFT COPY.exeQueries volume information: C:\Windows\Fonts\NIAGENG.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\SWIFT COPY.exeQueries volume information: C:\Windows\Fonts\NIAGSOL.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\SWIFT COPY.exeQueries volume information: C:\Windows\Fonts\OLDENGL.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\SWIFT COPY.exeQueries volume information: C:\Windows\Fonts\ONYX.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\SWIFT COPY.exeQueries volume information: C:\Windows\Fonts\PARCHM.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\SWIFT COPY.exeQueries volume information: C:\Windows\Fonts\PLAYBILL.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\SWIFT COPY.exeQueries volume information: C:\Windows\Fonts\POORICH.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\SWIFT COPY.exeQueries volume information: C:\Windows\Fonts\RAVIE.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\SWIFT COPY.exeQueries volume information: C:\Windows\Fonts\INFROMAN.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\SWIFT COPY.exeQueries volume information: C:\Windows\Fonts\SHOWG.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\SWIFT COPY.exeQueries volume information: C:\Windows\Fonts\SNAP____.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\SWIFT COPY.exeQueries volume information: C:\Windows\Fonts\STENCIL.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\SWIFT COPY.exeQueries volume information: C:\Windows\Fonts\VINERITC.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\SWIFT COPY.exeQueries volume information: C:\Windows\Fonts\VIVALDII.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\SWIFT COPY.exeQueries volume information: C:\Windows\Fonts\VLADIMIR.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\SWIFT COPY.exeQueries volume information: C:\Windows\Fonts\LATINWD.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\SWIFT COPY.exeQueries volume information: C:\Windows\Fonts\TCM_____.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\SWIFT COPY.exeQueries volume information: C:\Windows\Fonts\TCMI____.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\SWIFT COPY.exeQueries volume information: C:\Windows\Fonts\TCB_____.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\SWIFT COPY.exeQueries volume information: C:\Windows\Fonts\TCBI____.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\SWIFT COPY.exeQueries volume information: C:\Windows\Fonts\TCCM____.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\SWIFT COPY.exeQueries volume information: C:\Windows\Fonts\TCCB____.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\SWIFT COPY.exeQueries volume information: C:\Windows\Fonts\TCCEB.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\SWIFT COPY.exeQueries volume information: C:\Windows\Fonts\SCRIPTBL.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\SWIFT COPY.exeQueries volume information: C:\Windows\Fonts\ROCK.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\SWIFT COPY.exeQueries volume information: C:\Windows\Fonts\ROCKI.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\SWIFT COPY.exeQueries volume information: C:\Windows\Fonts\ROCKB.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\SWIFT COPY.exeQueries volume information: C:\Windows\Fonts\ROCKEB.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\SWIFT COPY.exeQueries volume information: C:\Windows\Fonts\ROCKBI.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\SWIFT COPY.exeQueries volume information: C:\Windows\Fonts\ROCC____.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\SWIFT COPY.exeQueries volume information: C:\Windows\Fonts\ROCCB___.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\SWIFT COPY.exeQueries volume information: C:\Windows\Fonts\RAGE.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\SWIFT COPY.exeQueries volume information: C:\Windows\Fonts\PERTILI.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\SWIFT COPY.exeQueries volume information: C:\Windows\Fonts\PERTIBD.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\SWIFT COPY.exeQueries volume information: C:\Windows\Fonts\PER_____.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\SWIFT COPY.exeQueries volume information: C:\Windows\Fonts\PERI____.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\SWIFT COPY.exeQueries volume information: C:\Windows\Fonts\PERB____.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\SWIFT COPY.exeQueries volume information: C:\Windows\Fonts\PERBI___.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\SWIFT COPY.exeQueries volume information: C:\Windows\Fonts\PALSCRI.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\SWIFT COPY.exeQueries volume information: C:\Windows\Fonts\OCRAEXT.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\SWIFT COPY.exeQueries volume information: C:\Windows\Fonts\MAIAN.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\SWIFT COPY.exeQueries volume information: C:\Windows\Fonts\LTYPE.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\SWIFT COPY.exeQueries volume information: C:\Windows\Fonts\LTYPEO.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\SWIFT COPY.exeQueries volume information: C:\Windows\Fonts\LTYPEB.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\SWIFT COPY.exeQueries volume information: C:\Windows\Fonts\LTYPEBO.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\SWIFT COPY.exeQueries volume information: C:\Windows\Fonts\LSANS.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\SWIFT COPY.exeQueries volume information: C:\Windows\Fonts\LSANSD.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\SWIFT COPY.exeQueries volume information: C:\Windows\Fonts\LSANSI.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\SWIFT COPY.exeQueries volume information: C:\Windows\Fonts\LSANSDI.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\SWIFT COPY.exeQueries volume information: C:\Windows\Fonts\IMPRISHA.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\SWIFT COPY.exeQueries volume information: C:\Windows\Fonts\HATTEN.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\SWIFT COPY.exeQueries volume information: C:\Windows\Fonts\GOUDYSTO.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\SWIFT COPY.exeQueries volume information: C:\Windows\Fonts\GOUDOS.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\SWIFT COPY.exeQueries volume information: C:\Windows\Fonts\GOUDOSI.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\SWIFT COPY.exeQueries volume information: C:\Windows\Fonts\GOUDOSB.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\SWIFT COPY.exeQueries volume information: C:\Windows\Fonts\GLECB.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\SWIFT COPY.exeQueries volume information: C:\Windows\Fonts\GIL_____.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\SWIFT COPY.exeQueries volume information: C:\Windows\Fonts\GILI____.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\SWIFT COPY.exeQueries volume information: C:\Windows\Fonts\GILB____.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\SWIFT COPY.exeQueries volume information: C:\Windows\Fonts\GILBI___.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\SWIFT COPY.exeQueries volume information: C:\Windows\Fonts\GILC____.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\SWIFT COPY.exeQueries volume information: C:\Windows\Fonts\GLSNECB.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\SWIFT COPY.exeQueries volume information: C:\Windows\Fonts\GIGI.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\SWIFT COPY.exeQueries volume information: C:\Windows\Fonts\FRABK.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\SWIFT COPY.exeQueries volume information: C:\Windows\Fonts\FRABKIT.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\SWIFT COPY.exeQueries volume information: C:\Windows\Fonts\FORTE.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\SWIFT COPY.exeQueries volume information: C:\Windows\Fonts\FELIXTI.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\SWIFT COPY.exeQueries volume information: C:\Windows\Fonts\ERASMD.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\SWIFT COPY.exeQueries volume information: C:\Windows\Fonts\ERASLGHT.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\SWIFT COPY.exeQueries volume information: C:\Windows\Fonts\ERASDEMI.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\SWIFT COPY.exeQueries volume information: C:\Windows\Fonts\ERASBD.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\SWIFT COPY.exeQueries volume information: C:\Windows\Fonts\ENGR.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\SWIFT COPY.exeQueries volume information: C:\Windows\Fonts\ELEPHNT.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\SWIFT COPY.exeQueries volume information: C:\Windows\Fonts\ELEPHNTI.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\SWIFT COPY.exeQueries volume information: C:\Windows\Fonts\ITCEDSCR.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\SWIFT COPY.exeQueries volume information: C:\Windows\Fonts\CURLZ___.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\SWIFT COPY.exeQueries volume information: C:\Windows\Fonts\COPRGTL.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\SWIFT COPY.exeQueries volume information: C:\Windows\Fonts\COPRGTB.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\SWIFT COPY.exeQueries volume information: C:\Windows\Fonts\CENSCBK.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\SWIFT COPY.exeQueries volume information: C:\Windows\Fonts\SCHLBKI.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\SWIFT COPY.exeQueries volume information: C:\Windows\Fonts\SCHLBKB.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\SWIFT COPY.exeQueries volume information: C:\Windows\Fonts\SCHLBKBI.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\SWIFT COPY.exeQueries volume information: C:\Windows\Fonts\CASTELAR.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\SWIFT COPY.exeQueries volume information: C:\Windows\Fonts\CALIST.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\SWIFT COPY.exeQueries volume information: C:\Windows\Fonts\CALISTI.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\SWIFT COPY.exeQueries volume information: C:\Windows\Fonts\CALISTB.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\SWIFT COPY.exeQueries volume information: C:\Windows\Fonts\CALISTBI.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\SWIFT COPY.exeQueries volume information: C:\Windows\Fonts\BOOKOS.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\SWIFT COPY.exeQueries volume information: C:\Windows\Fonts\BOOKOSB.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\SWIFT COPY.exeQueries volume information: C:\Windows\Fonts\BOOKOSI.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\SWIFT COPY.exeQueries volume information: C:\Windows\Fonts\BOOKOSBI.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\SWIFT COPY.exeQueries volume information: C:\Windows\Fonts\BOD_R.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\SWIFT COPY.exeQueries volume information: C:\Windows\Fonts\BOD_I.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\SWIFT COPY.exeQueries volume information: C:\Windows\Fonts\BOD_B.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\SWIFT COPY.exeQueries volume information: C:\Windows\Fonts\BOD_BI.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\SWIFT COPY.exeQueries volume information: C:\Windows\Fonts\BOD_CR.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\SWIFT COPY.exeQueries volume information: C:\Windows\Fonts\BOD_BLAR.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\SWIFT COPY.exeQueries volume information: C:\Windows\Fonts\BOD_CI.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\SWIFT COPY.exeQueries volume information: C:\Windows\Fonts\BOD_CB.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\SWIFT COPY.exeQueries volume information: C:\Windows\Fonts\BOD_BLAI.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\SWIFT COPY.exeQueries volume information: C:\Windows\Fonts\BOD_CBI.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\SWIFT COPY.exeQueries volume information: C:\Windows\Fonts\ITCBLKAD.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\SWIFT COPY.exeQueries volume information: C:\Windows\Fonts\ARLRDBD.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\SWIFT COPY.exeQueries volume information: C:\Windows\Fonts\AGENCYR.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\SWIFT COPY.exeQueries volume information: C:\Windows\Fonts\AGENCYB.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\SWIFT COPY.exeQueries volume information: C:\Windows\Fonts\BSSYM7.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\SWIFT COPY.exeQueries volume information: C:\Windows\Fonts\REFSAN.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\SWIFT COPY.exeQueries volume information: C:\Windows\Fonts\REFSPCL.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\SWIFT COPY.exeQueries volume information: C:\Windows\Fonts\MTEXTRA.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\SWIFT COPY.exeQueries volume information: C:\Windows\Fonts\marlett.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\SWIFT COPY.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\SWIFT COPY.exeQueries volume information: C:\Windows\Fonts\segoeuii.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\SWIFT COPY.exeQueries volume information: C:\Windows\Fonts\segoeuiz.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\SWIFT COPY.exeQueries volume information: C:\Windows\Fonts\LTYPE.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\SWIFT COPY.exeQueries volume information: C:\Windows\Fonts\LTYPEO.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\SWIFT COPY.exeQueries volume information: C:\Windows\Fonts\LTYPEB.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\SWIFT COPY.exeQueries volume information: C:\Windows\Fonts\LTYPEBO.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\SWIFT COPY.exeQueries volume information: C:\Users\user\Desktop\SWIFT COPY.exe VolumeInformation
                    Source: C:\Users\user\Desktop\SWIFT COPY.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
                    Source: C:\Users\user\Desktop\SWIFT COPY.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
                    Source: C:\Users\user\Desktop\SWIFT COPY.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformation
                    Source: C:\Users\user\Desktop\SWIFT COPY.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformation
                    Source: C:\Users\user\Desktop\SWIFT COPY.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformation
                    Source: C:\Users\user\Desktop\SWIFT COPY.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Management.dll VolumeInformation
                    Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeQueries volume information: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exe VolumeInformation
                    Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
                    Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
                    Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
                    Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
                    Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Runtime.Remoting\v4.0_4.0.0.0__b77a5c561934e089\System.Runtime.Remoting.dll VolumeInformation
                    Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeQueries volume information: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exe VolumeInformation
                    Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
                    Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
                    Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
                    Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
                    Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Runtime.Remoting\v4.0_4.0.0.0__b77a5c561934e089\System.Runtime.Remoting.dll VolumeInformation
                    Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeQueries volume information: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exe VolumeInformation
                    Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
                    Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
                    Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformation
                    Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformation
                    Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformation
                    Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Management.dll VolumeInformation
                    Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeQueries volume information: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exe VolumeInformation
                    Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
                    Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
                    Source: C:\Users\user\Desktop\SWIFT COPY.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid

                    Lowering of HIPS / PFW / Operating System Security Settings

                    barindex
                    Source: C:\Users\user\Desktop\SWIFT COPY.exeFile written: C:\Windows\System32\drivers\etc\hostsJump to behavior

                    Stealing of Sensitive Information

                    barindex
                    Source: Yara matchFile source: 23.0.tKZVPq.exe.400000.12.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 23.2.tKZVPq.exe.400000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 9.2.SWIFT COPY.exe.400000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 27.0.tKZVPq.exe.400000.6.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 9.0.SWIFT COPY.exe.400000.8.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 9.0.SWIFT COPY.exe.400000.6.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 27.0.tKZVPq.exe.400000.8.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 9.0.SWIFT COPY.exe.400000.10.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 23.0.tKZVPq.exe.400000.6.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 23.0.tKZVPq.exe.400000.10.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 27.2.tKZVPq.exe.400000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 9.0.SWIFT COPY.exe.400000.4.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 19.2.tKZVPq.exe.43cc6b0.3.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 9.0.SWIFT COPY.exe.400000.12.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 27.0.tKZVPq.exe.400000.12.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 23.0.tKZVPq.exe.400000.8.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 1.2.SWIFT COPY.exe.38ac6b0.4.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 27.0.tKZVPq.exe.400000.4.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 27.0.tKZVPq.exe.400000.10.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 20.2.tKZVPq.exe.388c6b0.3.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 23.0.tKZVPq.exe.400000.4.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 19.2.tKZVPq.exe.43cc6b0.3.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 20.2.tKZVPq.exe.388c6b0.3.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 1.2.SWIFT COPY.exe.38ac6b0.4.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 00000009.00000002.550659347.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000001B.00000000.525359202.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000017.00000000.496018922.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000017.00000000.498474265.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000001B.00000000.524760833.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000017.00000002.535519360.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000009.00000000.352110699.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000009.00000000.350128548.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000017.00000000.497131882.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000009.00000000.350721259.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000001B.00000002.550679328.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000017.00000000.497871827.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000009.00000000.349638861.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000001B.00000000.523515962.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000013.00000002.507129144.0000000004291000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000001B.00000000.525782576.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000014.00000002.532671197.0000000003751000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000001.00000002.364987356.0000000003771000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000017.00000002.536878272.00000000032D1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000009.00000002.552462552.0000000002DC1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000001B.00000002.552996616.0000000003301000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: SWIFT COPY.exe PID: 4364, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: SWIFT COPY.exe PID: 6848, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: tKZVPq.exe PID: 4024, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: tKZVPq.exe PID: 4556, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: tKZVPq.exe PID: 360, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: tKZVPq.exe PID: 7000, type: MEMORYSTR
                    Source: Yara matchFile source: 00000017.00000002.536878272.00000000032D1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000009.00000002.552462552.0000000002DC1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000001B.00000002.552996616.0000000003301000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: SWIFT COPY.exe PID: 6848, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: tKZVPq.exe PID: 360, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: tKZVPq.exe PID: 7000, type: MEMORYSTR

                    Remote Access Functionality

                    barindex
                    Source: Yara matchFile source: 23.0.tKZVPq.exe.400000.12.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 23.2.tKZVPq.exe.400000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 9.2.SWIFT COPY.exe.400000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 27.0.tKZVPq.exe.400000.6.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 9.0.SWIFT COPY.exe.400000.8.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 9.0.SWIFT COPY.exe.400000.6.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 27.0.tKZVPq.exe.400000.8.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 9.0.SWIFT COPY.exe.400000.10.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 23.0.tKZVPq.exe.400000.6.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 23.0.tKZVPq.exe.400000.10.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 27.2.tKZVPq.exe.400000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 9.0.SWIFT COPY.exe.400000.4.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 19.2.tKZVPq.exe.43cc6b0.3.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 9.0.SWIFT COPY.exe.400000.12.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 27.0.tKZVPq.exe.400000.12.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 23.0.tKZVPq.exe.400000.8.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 1.2.SWIFT COPY.exe.38ac6b0.4.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 27.0.tKZVPq.exe.400000.4.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 27.0.tKZVPq.exe.400000.10.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 20.2.tKZVPq.exe.388c6b0.3.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 23.0.tKZVPq.exe.400000.4.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 19.2.tKZVPq.exe.43cc6b0.3.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 20.2.tKZVPq.exe.388c6b0.3.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 1.2.SWIFT COPY.exe.38ac6b0.4.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 00000009.00000002.550659347.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000001B.00000000.525359202.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000017.00000000.496018922.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000017.00000000.498474265.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000001B.00000000.524760833.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000017.00000002.535519360.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000009.00000000.352110699.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000009.00000000.350128548.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000017.00000000.497131882.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000009.00000000.350721259.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000001B.00000002.550679328.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000017.00000000.497871827.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000009.00000000.349638861.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000001B.00000000.523515962.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000013.00000002.507129144.0000000004291000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000001B.00000000.525782576.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000014.00000002.532671197.0000000003751000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000001.00000002.364987356.0000000003771000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000017.00000002.536878272.00000000032D1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000009.00000002.552462552.0000000002DC1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000001B.00000002.552996616.0000000003301000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: SWIFT COPY.exe PID: 4364, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: SWIFT COPY.exe PID: 6848, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: tKZVPq.exe PID: 4024, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: tKZVPq.exe PID: 4556, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: tKZVPq.exe PID: 360, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: tKZVPq.exe PID: 7000, type: MEMORYSTR
                    Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
                    Valid Accounts211
                    Windows Management Instrumentation
                    1
                    Scheduled Task/Job
                    111
                    Process Injection
                    1
                    Masquerading
                    1
                    Input Capture
                    311
                    Security Software Discovery
                    Remote Services1
                    Input Capture
                    Exfiltration Over Other Network Medium1
                    Encrypted Channel
                    Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
                    Default Accounts1
                    Scheduled Task/Job
                    1
                    Registry Run Keys / Startup Folder
                    1
                    Scheduled Task/Job
                    1
                    File and Directory Permissions Modification
                    LSASS Memory1
                    Process Discovery
                    Remote Desktop Protocol11
                    Archive Collected Data
                    Exfiltration Over BluetoothJunk DataExploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
                    Domain AccountsAt (Linux)Logon Script (Windows)1
                    Registry Run Keys / Startup Folder
                    1
                    Disable or Modify Tools
                    Security Account Manager131
                    Virtualization/Sandbox Evasion
                    SMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationSteganographyExploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
                    Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)131
                    Virtualization/Sandbox Evasion
                    NTDS1
                    Application Window Discovery
                    Distributed Component Object ModelInput CaptureScheduled TransferProtocol ImpersonationSIM Card SwapCarrier Billing Fraud
                    Cloud AccountsCronNetwork Logon ScriptNetwork Logon Script111
                    Process Injection
                    LSA Secrets1
                    File and Directory Discovery
                    SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
                    Replication Through Removable MediaLaunchdRc.commonRc.common1
                    Deobfuscate/Decode Files or Information
                    Cached Domain Credentials113
                    System Information Discovery
                    VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
                    External Remote ServicesScheduled TaskStartup ItemsStartup Items1
                    Hidden Files and Directories
                    DCSyncNetwork SniffingWindows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
                    Drive-by CompromiseCommand and Scripting InterpreterScheduled Task/JobScheduled Task/Job3
                    Obfuscated Files or Information
                    Proc FilesystemNetwork Service ScanningShared WebrootCredential API HookingExfiltration Over Symmetric Encrypted Non-C2 ProtocolApplication Layer ProtocolDowngrade to Insecure ProtocolsGenerate Fraudulent Advertising Revenue
                    Exploit Public-Facing ApplicationPowerShellAt (Linux)At (Linux)13
                    Software Packing
                    /etc/passwd and /etc/shadowSystem Network Connections DiscoverySoftware Deployment ToolsData StagedExfiltration Over Asymmetric Encrypted Non-C2 ProtocolWeb ProtocolsRogue Cellular Base StationData Destruction
                    Hide Legend

                    Legend:

                    • Process
                    • Signature
                    • Created File
                    • DNS/IP Info
                    • Is Dropped
                    • Is Windows Process
                    • Number of created Registry Values
                    • Number of created Files
                    • Visual Basic
                    • Delphi
                    • Java
                    • .Net C# or VB.NET
                    • C, C++ or other language
                    • Is malicious
                    • Internet
                    behaviorgraph top1 signatures2 2 Behavior Graph ID: 562442 Sample: SWIFT COPY.exe Startdate: 28/01/2022 Architecture: WINDOWS Score: 100 53 Found malware configuration 2->53 55 Malicious sample detected (through community Yara rule) 2->55 57 Multi AV Scanner detection for dropped file 2->57 59 13 other signatures 2->59 7 SWIFT COPY.exe 6 2->7         started        11 tKZVPq.exe 5 2->11         started        13 tKZVPq.exe 4 2->13         started        process3 file4 37 C:\Users\user\AppData\Roaming\QTzKSOrs.exe, PE32 7->37 dropped 39 C:\Users\user\AppData\Local\...\tmpF17F.tmp, XML 7->39 dropped 41 C:\Users\user\AppData\...\SWIFT COPY.exe.log, ASCII 7->41 dropped 61 Injects a PE file into a foreign processes 7->61 15 SWIFT COPY.exe 2 5 7->15         started        19 schtasks.exe 1 7->19         started        63 Multi AV Scanner detection for dropped file 11->63 65 Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines) 11->65 67 Machine Learning detection for dropped file 11->67 69 Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines) 11->69 21 schtasks.exe 1 11->21         started        23 tKZVPq.exe 11->23         started        25 schtasks.exe 13->25         started        27 tKZVPq.exe 13->27         started        29 tKZVPq.exe 13->29         started        signatures5 process6 file7 43 C:\Users\user\AppData\Roaming\...\tKZVPq.exe, PE32 15->43 dropped 45 C:\Windows\System32\drivers\etc\hosts, ASCII 15->45 dropped 47 C:\Users\user\...\tKZVPq.exe:Zone.Identifier, ASCII 15->47 dropped 49 Modifies the hosts file 15->49 51 Hides that the sample has been downloaded from the Internet (zone.identifier) 15->51 31 conhost.exe 19->31         started        33 conhost.exe 21->33         started        35 conhost.exe 25->35         started        signatures8 process9

                    This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                    windows-stand
                    SourceDetectionScannerLabelLink
                    SWIFT COPY.exe75%ReversingLabsByteCode-MSIL.Trojan.AgentTesla
                    SWIFT COPY.exe100%Joe Sandbox ML
                    SourceDetectionScannerLabelLink
                    C:\Users\user\AppData\Roaming\QTzKSOrs.exe100%Joe Sandbox ML
                    C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exe100%Joe Sandbox ML
                    C:\Users\user\AppData\Roaming\QTzKSOrs.exe75%ReversingLabsByteCode-MSIL.Trojan.AgentTesla
                    C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exe75%ReversingLabsByteCode-MSIL.Trojan.AgentTesla
                    SourceDetectionScannerLabelLinkDownload
                    27.0.tKZVPq.exe.400000.6.unpack100%AviraTR/Spy.Gen8Download File
                    9.2.SWIFT COPY.exe.400000.0.unpack100%AviraTR/Spy.Gen8Download File
                    9.0.SWIFT COPY.exe.400000.6.unpack100%AviraTR/Spy.Gen8Download File
                    23.2.tKZVPq.exe.400000.0.unpack100%AviraTR/Spy.Gen8Download File
                    27.0.tKZVPq.exe.400000.8.unpack100%AviraTR/Spy.Gen8Download File
                    23.0.tKZVPq.exe.400000.12.unpack100%AviraTR/Spy.Gen8Download File
                    9.0.SWIFT COPY.exe.400000.8.unpack100%AviraTR/Spy.Gen8Download File
                    9.0.SWIFT COPY.exe.400000.10.unpack100%AviraTR/Spy.Gen8Download File
                    23.0.tKZVPq.exe.400000.10.unpack100%AviraTR/Spy.Gen8Download File
                    27.2.tKZVPq.exe.400000.0.unpack100%AviraTR/Spy.Gen8Download File
                    23.0.tKZVPq.exe.400000.6.unpack100%AviraTR/Spy.Gen8Download File
                    9.0.SWIFT COPY.exe.400000.4.unpack100%AviraTR/Spy.Gen8Download File
                    9.0.SWIFT COPY.exe.400000.12.unpack100%AviraTR/Spy.Gen8Download File
                    27.0.tKZVPq.exe.400000.12.unpack100%AviraTR/Spy.Gen8Download File
                    23.0.tKZVPq.exe.400000.8.unpack100%AviraTR/Spy.Gen8Download File
                    27.0.tKZVPq.exe.400000.4.unpack100%AviraTR/Spy.Gen8Download File
                    23.0.tKZVPq.exe.400000.4.unpack100%AviraTR/Spy.Gen8Download File
                    27.0.tKZVPq.exe.400000.10.unpack100%AviraTR/Spy.Gen8Download File
                    No Antivirus matches
                    SourceDetectionScannerLabelLink
                    http://127.0.0.1:HTTP/1.10%Avira URL Cloudsafe
                    http://www.founder.com.cn/cn/bThe0%URL Reputationsafe
                    http://www.fontbureau.comitu30%Avira URL Cloudsafe
                    http://www.tiro.com0%URL Reputationsafe
                    http://www.fontbureau.comessed0%URL Reputationsafe
                    http://www.goodfont.co.kr0%URL Reputationsafe
                    http://www.carterandcone.com0%URL Reputationsafe
                    http://www.fontbureau.comp70%Avira URL Cloudsafe
                    http://www.sajatypeworks.com0%URL Reputationsafe
                    http://www.typography.netD0%URL Reputationsafe
                    http://www.founder.com.cn/cn/cThe0%URL Reputationsafe
                    http://www.galapagosdesign.com/staff/dennis.htm0%URL Reputationsafe
                    http://fontfabrik.com0%URL Reputationsafe
                    http://www.jiyu-kobo.co.jp/Kurs0%Avira URL Cloudsafe
                    http://www.jiyu-kobo.co.jp/40%URL Reputationsafe
                    http://www.monot6mb.e0%Avira URL Cloudsafe
                    http://www.galapagosdesign.com/DPlease0%URL Reputationsafe
                    http://www.sandoll.co.kr0%URL Reputationsafe
                    http://www.urwpp.deDPlease0%URL Reputationsafe
                    http://www.zhongyicts.com.cn0%URL Reputationsafe
                    http://www.sakkal.com0%URL Reputationsafe
                    https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip0%URL Reputationsafe
                    http://hCnGLP.com0%Avira URL Cloudsafe
                    http://www.carterandcone.comic0%URL Reputationsafe
                    http://www.jiyu-kobo.co.jp/p70%Avira URL Cloudsafe
                    http://www.fontbureau.comlicF0%URL Reputationsafe
                    http://DynDns.comDynDNS0%URL Reputationsafe
                    http://www.fontbureau.comcomd0%URL Reputationsafe
                    https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip%tordir%%ha0%URL Reputationsafe
                    http://www.jiyu-kobo.co.jp/N0%URL Reputationsafe
                    http://www.jiyu-kobo.co.jp/jp/s0%URL Reputationsafe
                    http://www.jiyu-kobo.co.jp/jp/0%URL Reputationsafe
                    http://www.jiyu-kobo.co.jp/perm0%Avira URL Cloudsafe
                    http://www.carterandcone.comg0%URL Reputationsafe
                    http://www.jiyu-kobo.co.jp/=0%URL Reputationsafe
                    http://www.carterandcone.coml0%URL Reputationsafe
                    http://www.founder.com.cn/cn0%URL Reputationsafe
                    http://www.jiyu-kobo.co.jp/s0%URL Reputationsafe
                    http://www.jiyu-kobo.co.jp/Y0/0%URL Reputationsafe
                    http://www.fontbureau.coms0%Avira URL Cloudsafe
                    http://www.jiyu-kobo.co.jp/0%URL Reputationsafe
                    http://www.fontbureau.como0%URL Reputationsafe
                    http://www.founder.com.cn/cn/Xd0%Avira URL Cloudsafe
                    http://www.tiro.comk0%Avira URL Cloudsafe
                    http://www.jiyu-kobo.co.jp/j0%URL Reputationsafe
                    http://www.tiro.comm0%URL Reputationsafe
                    http://www.jiyu-kobo.co.jp/uckmN0%Avira URL Cloudsafe
                    No contacted domains info
                    NameSourceMaliciousAntivirus DetectionReputation
                    http://127.0.0.1:HTTP/1.1SWIFT COPY.exe, 00000009.00000002.552462552.0000000002DC1000.00000004.00000800.00020000.00000000.sdmp, tKZVPq.exe, 00000017.00000002.536878272.00000000032D1000.00000004.00000800.00020000.00000000.sdmp, tKZVPq.exe, 0000001B.00000002.552996616.0000000003301000.00000004.00000800.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: safe
                    low
                    http://www.fontbureau.com/designersGSWIFT COPY.exe, 00000001.00000002.368180307.0000000006932000.00000004.00000800.00020000.00000000.sdmpfalse
                      high
                      http://www.fontbureau.com/designers/?SWIFT COPY.exe, 00000001.00000002.368180307.0000000006932000.00000004.00000800.00020000.00000000.sdmpfalse
                        high
                        http://www.founder.com.cn/cn/bTheSWIFT COPY.exe, 00000001.00000002.368180307.0000000006932000.00000004.00000800.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        http://www.fontbureau.com/designers?SWIFT COPY.exe, 00000001.00000002.368180307.0000000006932000.00000004.00000800.00020000.00000000.sdmpfalse
                          high
                          http://www.fontbureau.comitu3SWIFT COPY.exe, 00000001.00000003.308668335.0000000005739000.00000004.00000800.00020000.00000000.sdmpfalse
                          • Avira URL Cloud: safe
                          unknown
                          http://www.tiro.comSWIFT COPY.exe, 00000001.00000002.368180307.0000000006932000.00000004.00000800.00020000.00000000.sdmpfalse
                          • URL Reputation: safe
                          unknown
                          http://www.fontbureau.com/designersSWIFT COPY.exe, 00000001.00000002.368180307.0000000006932000.00000004.00000800.00020000.00000000.sdmpfalse
                            high
                            http://www.fontbureau.comessedSWIFT COPY.exe, 00000001.00000003.308668335.0000000005739000.00000004.00000800.00020000.00000000.sdmp, SWIFT COPY.exe, 00000001.00000003.307714916.0000000005739000.00000004.00000800.00020000.00000000.sdmpfalse
                            • URL Reputation: safe
                            unknown
                            http://www.goodfont.co.krSWIFT COPY.exe, 00000001.00000002.368180307.0000000006932000.00000004.00000800.00020000.00000000.sdmpfalse
                            • URL Reputation: safe
                            unknown
                            http://www.carterandcone.comSWIFT COPY.exe, 00000001.00000003.302686183.0000000005725000.00000004.00000800.00020000.00000000.sdmp, SWIFT COPY.exe, 00000001.00000003.303068912.000000000572C000.00000004.00000800.00020000.00000000.sdmp, SWIFT COPY.exe, 00000001.00000003.303313014.000000000572A000.00000004.00000800.00020000.00000000.sdmp, SWIFT COPY.exe, 00000001.00000003.303731903.000000000572C000.00000004.00000800.00020000.00000000.sdmpfalse
                            • URL Reputation: safe
                            unknown
                            http://www.fontbureau.comp7SWIFT COPY.exe, 00000001.00000003.308668335.0000000005739000.00000004.00000800.00020000.00000000.sdmpfalse
                            • Avira URL Cloud: safe
                            unknown
                            http://www.sajatypeworks.comSWIFT COPY.exe, 00000001.00000002.368180307.0000000006932000.00000004.00000800.00020000.00000000.sdmpfalse
                            • URL Reputation: safe
                            unknown
                            http://www.typography.netDSWIFT COPY.exe, 00000001.00000002.368180307.0000000006932000.00000004.00000800.00020000.00000000.sdmpfalse
                            • URL Reputation: safe
                            unknown
                            http://www.founder.com.cn/cn/cTheSWIFT COPY.exe, 00000001.00000002.368180307.0000000006932000.00000004.00000800.00020000.00000000.sdmpfalse
                            • URL Reputation: safe
                            unknown
                            http://www.galapagosdesign.com/staff/dennis.htmSWIFT COPY.exe, 00000001.00000002.368180307.0000000006932000.00000004.00000800.00020000.00000000.sdmpfalse
                            • URL Reputation: safe
                            unknown
                            http://fontfabrik.comSWIFT COPY.exe, 00000001.00000002.368180307.0000000006932000.00000004.00000800.00020000.00000000.sdmpfalse
                            • URL Reputation: safe
                            unknown
                            http://www.jiyu-kobo.co.jp/KursSWIFT COPY.exe, 00000001.00000003.303319950.0000000005732000.00000004.00000800.00020000.00000000.sdmp, SWIFT COPY.exe, 00000001.00000003.303074834.0000000005732000.00000004.00000800.00020000.00000000.sdmpfalse
                            • Avira URL Cloud: safe
                            unknown
                            http://www.jiyu-kobo.co.jp/4SWIFT COPY.exe, 00000001.00000003.303319950.0000000005732000.00000004.00000800.00020000.00000000.sdmp, SWIFT COPY.exe, 00000001.00000003.303074834.0000000005732000.00000004.00000800.00020000.00000000.sdmpfalse
                            • URL Reputation: safe
                            unknown
                            http://www.monot6mb.eSWIFT COPY.exe, 00000001.00000003.309521502.0000000005732000.00000004.00000800.00020000.00000000.sdmpfalse
                            • Avira URL Cloud: safe
                            unknown
                            http://www.galapagosdesign.com/DPleaseSWIFT COPY.exe, 00000001.00000002.368180307.0000000006932000.00000004.00000800.00020000.00000000.sdmpfalse
                            • URL Reputation: safe
                            unknown
                            http://www.fonts.comSWIFT COPY.exe, 00000001.00000002.368180307.0000000006932000.00000004.00000800.00020000.00000000.sdmpfalse
                              high
                              http://www.sandoll.co.krSWIFT COPY.exe, 00000001.00000002.368180307.0000000006932000.00000004.00000800.00020000.00000000.sdmpfalse
                              • URL Reputation: safe
                              unknown
                              http://www.urwpp.deDPleaseSWIFT COPY.exe, 00000001.00000002.368180307.0000000006932000.00000004.00000800.00020000.00000000.sdmpfalse
                              • URL Reputation: safe
                              unknown
                              http://www.zhongyicts.com.cnSWIFT COPY.exe, 00000001.00000002.368180307.0000000006932000.00000004.00000800.00020000.00000000.sdmpfalse
                              • URL Reputation: safe
                              unknown
                              http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameSWIFT COPY.exe, 00000001.00000002.358148905.0000000002771000.00000004.00000800.00020000.00000000.sdmp, tKZVPq.exe, 00000013.00000002.502198914.0000000003291000.00000004.00000800.00020000.00000000.sdmp, tKZVPq.exe, 00000014.00000002.528563746.0000000002751000.00000004.00000800.00020000.00000000.sdmpfalse
                                high
                                http://www.sakkal.comSWIFT COPY.exe, 00000001.00000002.368180307.0000000006932000.00000004.00000800.00020000.00000000.sdmpfalse
                                • URL Reputation: safe
                                unknown
                                https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zipSWIFT COPY.exe, 00000001.00000002.364987356.0000000003771000.00000004.00000800.00020000.00000000.sdmp, SWIFT COPY.exe, 00000009.00000002.550659347.0000000000402000.00000040.00000400.00020000.00000000.sdmp, SWIFT COPY.exe, 00000009.00000000.349638861.0000000000402000.00000040.00000400.00020000.00000000.sdmp, tKZVPq.exe, 00000013.00000002.507129144.0000000004291000.00000004.00000800.00020000.00000000.sdmp, tKZVPq.exe, 00000014.00000002.532671197.0000000003751000.00000004.00000800.00020000.00000000.sdmp, tKZVPq.exe, 00000017.00000000.496018922.0000000000402000.00000040.00000400.00020000.00000000.sdmp, tKZVPq.exe, 00000017.00000000.498474265.0000000000402000.00000040.00000400.00020000.00000000.sdmp, tKZVPq.exe, 0000001B.00000000.525359202.0000000000402000.00000040.00000400.00020000.00000000.sdmp, tKZVPq.exe, 0000001B.00000000.523515962.0000000000402000.00000040.00000400.00020000.00000000.sdmpfalse
                                • URL Reputation: safe
                                unknown
                                http://hCnGLP.comtKZVPq.exe, 0000001B.00000002.552996616.0000000003301000.00000004.00000800.00020000.00000000.sdmpfalse
                                • Avira URL Cloud: safe
                                unknown
                                http://www.carterandcone.comicSWIFT COPY.exe, 00000001.00000003.302686183.0000000005725000.00000004.00000800.00020000.00000000.sdmp, SWIFT COPY.exe, 00000001.00000003.303068912.000000000572C000.00000004.00000800.00020000.00000000.sdmp, SWIFT COPY.exe, 00000001.00000003.303313014.000000000572A000.00000004.00000800.00020000.00000000.sdmp, SWIFT COPY.exe, 00000001.00000003.303731903.000000000572C000.00000004.00000800.00020000.00000000.sdmpfalse
                                • URL Reputation: safe
                                unknown
                                http://www.jiyu-kobo.co.jp/p7SWIFT COPY.exe, 00000001.00000003.303319950.0000000005732000.00000004.00000800.00020000.00000000.sdmp, SWIFT COPY.exe, 00000001.00000003.303748281.0000000005732000.00000004.00000800.00020000.00000000.sdmp, SWIFT COPY.exe, 00000001.00000003.303074834.0000000005732000.00000004.00000800.00020000.00000000.sdmpfalse
                                • Avira URL Cloud: safe
                                unknown
                                http://www.fontbureau.comlicFSWIFT COPY.exe, 00000001.00000003.308668335.0000000005739000.00000004.00000800.00020000.00000000.sdmpfalse
                                • URL Reputation: safe
                                unknown
                                http://www.apache.org/licenses/LICENSE-2.0SWIFT COPY.exe, 00000001.00000002.368180307.0000000006932000.00000004.00000800.00020000.00000000.sdmpfalse
                                  high
                                  http://www.fontbureau.comSWIFT COPY.exe, 00000001.00000002.368180307.0000000006932000.00000004.00000800.00020000.00000000.sdmp, SWIFT COPY.exe, 00000001.00000003.308668335.0000000005739000.00000004.00000800.00020000.00000000.sdmpfalse
                                    high
                                    http://DynDns.comDynDNStKZVPq.exe, 0000001B.00000002.552996616.0000000003301000.00000004.00000800.00020000.00000000.sdmpfalse
                                    • URL Reputation: safe
                                    unknown
                                    http://www.fontbureau.comcomdSWIFT COPY.exe, 00000001.00000003.308668335.0000000005739000.00000004.00000800.00020000.00000000.sdmpfalse
                                    • URL Reputation: safe
                                    unknown
                                    https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip%tordir%%haSWIFT COPY.exe, 00000009.00000002.552462552.0000000002DC1000.00000004.00000800.00020000.00000000.sdmp, tKZVPq.exe, 00000017.00000002.536878272.00000000032D1000.00000004.00000800.00020000.00000000.sdmp, tKZVPq.exe, 0000001B.00000002.552996616.0000000003301000.00000004.00000800.00020000.00000000.sdmpfalse
                                    • URL Reputation: safe
                                    unknown
                                    http://www.jiyu-kobo.co.jp/NSWIFT COPY.exe, 00000001.00000003.303748281.0000000005732000.00000004.00000800.00020000.00000000.sdmpfalse
                                    • URL Reputation: safe
                                    unknown
                                    http://www.jiyu-kobo.co.jp/jp/sSWIFT COPY.exe, 00000001.00000003.303319950.0000000005732000.00000004.00000800.00020000.00000000.sdmp, SWIFT COPY.exe, 00000001.00000003.303748281.0000000005732000.00000004.00000800.00020000.00000000.sdmp, SWIFT COPY.exe, 00000001.00000003.304374380.0000000005739000.00000004.00000800.00020000.00000000.sdmpfalse
                                    • URL Reputation: safe
                                    unknown
                                    http://www.jiyu-kobo.co.jp/jp/SWIFT COPY.exe, 00000001.00000003.303319950.0000000005732000.00000004.00000800.00020000.00000000.sdmp, SWIFT COPY.exe, 00000001.00000003.302697738.0000000005732000.00000004.00000800.00020000.00000000.sdmp, SWIFT COPY.exe, 00000001.00000003.303748281.0000000005732000.00000004.00000800.00020000.00000000.sdmp, SWIFT COPY.exe, 00000001.00000003.304374380.0000000005739000.00000004.00000800.00020000.00000000.sdmp, SWIFT COPY.exe, 00000001.00000003.303074834.0000000005732000.00000004.00000800.00020000.00000000.sdmpfalse
                                    • URL Reputation: safe
                                    unknown
                                    http://www.jiyu-kobo.co.jp/permSWIFT COPY.exe, 00000001.00000003.303319950.0000000005732000.00000004.00000800.00020000.00000000.sdmp, SWIFT COPY.exe, 00000001.00000003.303748281.0000000005732000.00000004.00000800.00020000.00000000.sdmpfalse
                                    • Avira URL Cloud: safe
                                    unknown
                                    http://www.carterandcone.comgSWIFT COPY.exe, 00000001.00000003.302686183.0000000005725000.00000004.00000800.00020000.00000000.sdmp, SWIFT COPY.exe, 00000001.00000003.303068912.000000000572C000.00000004.00000800.00020000.00000000.sdmp, SWIFT COPY.exe, 00000001.00000003.303313014.000000000572A000.00000004.00000800.00020000.00000000.sdmp, SWIFT COPY.exe, 00000001.00000003.303731903.000000000572C000.00000004.00000800.00020000.00000000.sdmpfalse
                                    • URL Reputation: safe
                                    unknown
                                    http://www.jiyu-kobo.co.jp/=SWIFT COPY.exe, 00000001.00000003.303319950.0000000005732000.00000004.00000800.00020000.00000000.sdmp, SWIFT COPY.exe, 00000001.00000003.302697738.0000000005732000.00000004.00000800.00020000.00000000.sdmp, SWIFT COPY.exe, 00000001.00000003.303748281.0000000005732000.00000004.00000800.00020000.00000000.sdmp, SWIFT COPY.exe, 00000001.00000003.303074834.0000000005732000.00000004.00000800.00020000.00000000.sdmpfalse
                                    • URL Reputation: safe
                                    unknown
                                    http://www.carterandcone.comlSWIFT COPY.exe, 00000001.00000002.368180307.0000000006932000.00000004.00000800.00020000.00000000.sdmpfalse
                                    • URL Reputation: safe
                                    unknown
                                    http://www.fontbureau.com/designers/cabarga.htmlNSWIFT COPY.exe, 00000001.00000002.368180307.0000000006932000.00000004.00000800.00020000.00000000.sdmpfalse
                                      high
                                      http://www.founder.com.cn/cnSWIFT COPY.exe, 00000001.00000002.368180307.0000000006932000.00000004.00000800.00020000.00000000.sdmp, SWIFT COPY.exe, 00000001.00000003.300366233.0000000005737000.00000004.00000800.00020000.00000000.sdmpfalse
                                      • URL Reputation: safe
                                      unknown
                                      http://www.fontbureau.com/designers/frere-jones.htmlSWIFT COPY.exe, 00000001.00000002.368180307.0000000006932000.00000004.00000800.00020000.00000000.sdmpfalse
                                        high
                                        http://www.jiyu-kobo.co.jp/sSWIFT COPY.exe, 00000001.00000003.303074834.0000000005732000.00000004.00000800.00020000.00000000.sdmpfalse
                                        • URL Reputation: safe
                                        unknown
                                        http://www.jiyu-kobo.co.jp/Y0/SWIFT COPY.exe, 00000001.00000003.303319950.0000000005732000.00000004.00000800.00020000.00000000.sdmp, SWIFT COPY.exe, 00000001.00000003.303748281.0000000005732000.00000004.00000800.00020000.00000000.sdmp, SWIFT COPY.exe, 00000001.00000003.303074834.0000000005732000.00000004.00000800.00020000.00000000.sdmpfalse
                                        • URL Reputation: safe
                                        unknown
                                        http://www.fontbureau.comsSWIFT COPY.exe, 00000001.00000003.308668335.0000000005739000.00000004.00000800.00020000.00000000.sdmpfalse
                                        • Avira URL Cloud: safe
                                        unknown
                                        http://www.jiyu-kobo.co.jp/SWIFT COPY.exe, 00000001.00000003.303074834.0000000005732000.00000004.00000800.00020000.00000000.sdmpfalse
                                        • URL Reputation: safe
                                        unknown
                                        http://www.fontbureau.comoSWIFT COPY.exe, 00000001.00000003.354222788.0000000005732000.00000004.00000800.00020000.00000000.sdmp, SWIFT COPY.exe, 00000001.00000002.367958819.0000000005732000.00000004.00000800.00020000.00000000.sdmpfalse
                                        • URL Reputation: safe
                                        unknown
                                        http://www.founder.com.cn/cn/XdSWIFT COPY.exe, 00000001.00000003.300675717.0000000005736000.00000004.00000800.00020000.00000000.sdmpfalse
                                        • Avira URL Cloud: safe
                                        unknown
                                        http://www.tiro.comkSWIFT COPY.exe, 00000001.00000003.298668690.000000000573B000.00000004.00000800.00020000.00000000.sdmpfalse
                                        • Avira URL Cloud: safe
                                        unknown
                                        http://www.fontbureau.com/designers8SWIFT COPY.exe, 00000001.00000002.368180307.0000000006932000.00000004.00000800.00020000.00000000.sdmpfalse
                                          high
                                          http://www.jiyu-kobo.co.jp/jSWIFT COPY.exe, 00000001.00000003.303319950.0000000005732000.00000004.00000800.00020000.00000000.sdmp, SWIFT COPY.exe, 00000001.00000003.303748281.0000000005732000.00000004.00000800.00020000.00000000.sdmp, SWIFT COPY.exe, 00000001.00000003.303074834.0000000005732000.00000004.00000800.00020000.00000000.sdmpfalse
                                          • URL Reputation: safe
                                          unknown
                                          http://www.tiro.commSWIFT COPY.exe, 00000001.00000003.298523725.000000000573B000.00000004.00000800.00020000.00000000.sdmp, SWIFT COPY.exe, 00000001.00000003.298404697.000000000573B000.00000004.00000800.00020000.00000000.sdmp, SWIFT COPY.exe, 00000001.00000003.298177012.000000000573B000.00000004.00000800.00020000.00000000.sdmpfalse
                                          • URL Reputation: safe
                                          unknown
                                          http://www.jiyu-kobo.co.jp/uckmNSWIFT COPY.exe, 00000001.00000003.303319950.0000000005732000.00000004.00000800.00020000.00000000.sdmp, SWIFT COPY.exe, 00000001.00000003.303074834.0000000005732000.00000004.00000800.00020000.00000000.sdmpfalse
                                          • Avira URL Cloud: safe
                                          unknown
                                          No contacted IP infos
                                          Joe Sandbox Version:34.0.0 Boulder Opal
                                          Analysis ID:562442
                                          Start date:28.01.2022
                                          Start time:21:44:43
                                          Joe Sandbox Product:CloudBasic
                                          Overall analysis duration:0h 13m 12s
                                          Hypervisor based Inspection enabled:false
                                          Report type:light
                                          Sample file name:SWIFT COPY.exe
                                          Cookbook file name:default.jbs
                                          Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
                                          Number of analysed new started processes analysed:30
                                          Number of new started drivers analysed:0
                                          Number of existing processes analysed:0
                                          Number of existing drivers analysed:0
                                          Number of injected processes analysed:0
                                          Technologies:
                                          • HCA enabled
                                          • EGA enabled
                                          • HDC enabled
                                          • AMSI enabled
                                          Analysis Mode:default
                                          Analysis stop reason:Timeout
                                          Detection:MAL
                                          Classification:mal100.troj.adwa.evad.winEXE@20/9@0/0
                                          EGA Information:
                                          • Successful, ratio: 100%
                                          HDC Information:
                                          • Successful, ratio: 0.7% (good quality ratio 0.4%)
                                          • Quality average: 31.6%
                                          • Quality standard deviation: 35.7%
                                          HCA Information:
                                          • Successful, ratio: 96%
                                          • Number of executed functions: 0
                                          • Number of non-executed functions: 0
                                          Cookbook Comments:
                                          • Adjust boot time
                                          • Enable AMSI
                                          • Found application associated with file extension: .exe
                                          • Exclude process from analysis (whitelisted): MpCmdRun.exe, audiodg.exe, BackgroundTransferHost.exe, WMIADAP.exe, SgrmBroker.exe, backgroundTaskHost.exe, conhost.exe, svchost.exe, wuapihost.exe
                                          • Excluded domains from analysis (whitelisted): ris.api.iris.microsoft.com, client.wns.windows.com, ctldl.windowsupdate.com, displaycatalog.mp.microsoft.com, img-prod-cms-rt-microsoft-com.akamaized.net, arc.msn.com
                                          • Not all processes where analyzed, report is missing behavior information
                                          • Report creation exceeded maximum time and may have missing disassembly code information.
                                          • Report size exceeded maximum capacity and may have missing behavior information.
                                          • Report size getting too big, too many NtAllocateVirtualMemory calls found.
                                          • Report size getting too big, too many NtOpenKeyEx calls found.
                                          • Report size getting too big, too many NtProtectVirtualMemory calls found.
                                          • Report size getting too big, too many NtQueryValueKey calls found.
                                          • VT rate limit hit for: SWIFT COPY.exe
                                          TimeTypeDescription
                                          21:46:00API Interceptor472x Sleep call for process: SWIFT COPY.exe modified
                                          21:46:45AutostartRun: HKCU\Software\Microsoft\Windows\CurrentVersion\Run tKZVPq C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exe
                                          21:46:53AutostartRun: HKCU64\Software\Microsoft\Windows\CurrentVersion\Run tKZVPq C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exe
                                          21:47:06API Interceptor15x Sleep call for process: tKZVPq.exe modified
                                          No context
                                          No context
                                          No context
                                          No context
                                          No context
                                          Process:C:\Users\user\Desktop\SWIFT COPY.exe
                                          File Type:ASCII text, with CRLF line terminators
                                          Category:dropped
                                          Size (bytes):1314
                                          Entropy (8bit):5.350128552078965
                                          Encrypted:false
                                          SSDEEP:24:MLU84jE4K5E4Ks2E1qE4qXKDE4KhK3VZ9pKhPKIE4oKFKHKoZAE4Kzr7FE4sAmEw:MgvjHK5HKXE1qHiYHKhQnoPtHoxHhAHR
                                          MD5:1DC1A2DCC9EFAA84EABF4F6D6066565B
                                          SHA1:B7FCF805B6DD8DE815EA9BC089BD99F1E617F4E9
                                          SHA-256:28D63442C17BF19558655C88A635CB3C3FF1BAD1CCD9784090B9749A7E71FCEF
                                          SHA-512:95DD7E2AB0884A3EFD9E26033B337D1F97DDF9A8E9E9C4C32187DCD40622D8B1AC8CCDBA12A70A6B9075DF5E7F68DF2F8FBA4AB33DB4576BE9806B8E191802B7
                                          Malicious:true
                                          Reputation:unknown
                                          Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"Microsoft.VisualBasic, Version=10.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\4f0a7eefa3cd3e0ba98b5ebddbbc72e6\System.ni.dll",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\f1d8480152e0da9a60ad49c6d16a3b6d\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\8d67d92724ba494b6c7fd089d6f25b48\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a
                                          Process:C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exe
                                          File Type:ASCII text, with CRLF line terminators
                                          Category:dropped
                                          Size (bytes):1314
                                          Entropy (8bit):5.350128552078965
                                          Encrypted:false
                                          SSDEEP:24:MLU84jE4K5E4Ks2E1qE4qXKDE4KhK3VZ9pKhPKIE4oKFKHKoZAE4Kzr7FE4sAmEw:MgvjHK5HKXE1qHiYHKhQnoPtHoxHhAHR
                                          MD5:1DC1A2DCC9EFAA84EABF4F6D6066565B
                                          SHA1:B7FCF805B6DD8DE815EA9BC089BD99F1E617F4E9
                                          SHA-256:28D63442C17BF19558655C88A635CB3C3FF1BAD1CCD9784090B9749A7E71FCEF
                                          SHA-512:95DD7E2AB0884A3EFD9E26033B337D1F97DDF9A8E9E9C4C32187DCD40622D8B1AC8CCDBA12A70A6B9075DF5E7F68DF2F8FBA4AB33DB4576BE9806B8E191802B7
                                          Malicious:false
                                          Reputation:unknown
                                          Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"Microsoft.VisualBasic, Version=10.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\4f0a7eefa3cd3e0ba98b5ebddbbc72e6\System.ni.dll",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\f1d8480152e0da9a60ad49c6d16a3b6d\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\8d67d92724ba494b6c7fd089d6f25b48\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a
                                          Process:C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exe
                                          File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                          Category:dropped
                                          Size (bytes):1641
                                          Entropy (8bit):5.188207529406658
                                          Encrypted:false
                                          SSDEEP:24:2dH4+SEqC/Q7hxlNMFp1/rlMhEMjnGpwjpIgUYODOLD9RJh7h8gKB+tn:cbh47TlNQ//rydbz9I3YODOLNdq3y
                                          MD5:765737756A8DBC946758080E162B286F
                                          SHA1:6D8055B03D430778409DF3FC1740E88ABE93BEE9
                                          SHA-256:45D19D2E1EADB08E832491309FFA262D40CD19819A9D8490F6E19BB2DE6DE19B
                                          SHA-512:E9EE4479288A54968C4E4B5C3877E70418DAFCC1942DCE59072EA29CED6F206F09A08391F7CBB334EBA91602AFC542546BDFD03EA1A3B06DB7AE58A2549CFA7E
                                          Malicious:false
                                          Reputation:unknown
                                          Preview:<?xml version="1.0" encoding="UTF-16"?>..<Task version="1.2" xmlns="http://schemas.microsoft.com/windows/2004/02/mit/task">.. <RegistrationInfo>.. <Date>2014-10-25T14:27:44.8929027</Date>.. <Author>computer\user</Author>.. </RegistrationInfo>.. <Triggers>.. <LogonTrigger>.. <Enabled>true</Enabled>.. <UserId>computer\user</UserId>.. </LogonTrigger>.. <RegistrationTrigger>.. <Enabled>false</Enabled>.. </RegistrationTrigger>.. </Triggers>.. <Principals>.. <Principal id="Author">.. <UserId>computer\user</UserId>.. <LogonType>InteractiveToken</LogonType>.. <RunLevel>LeastPrivilege</RunLevel>.. </Principal>.. </Principals>.. <Settings>.. <MultipleInstancesPolicy>StopExisting</MultipleInstancesPolicy>.. <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>.. <StopIfGoingOnBatteries>true</StopIfGoingOnBatteries>.. <AllowHardTerminate>false</AllowHardTerminate>.. <StartWhenAvailable>true
                                          Process:C:\Users\user\Desktop\SWIFT COPY.exe
                                          File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                          Category:dropped
                                          Size (bytes):1641
                                          Entropy (8bit):5.188207529406658
                                          Encrypted:false
                                          SSDEEP:24:2dH4+SEqC/Q7hxlNMFp1/rlMhEMjnGpwjpIgUYODOLD9RJh7h8gKB+tn:cbh47TlNQ//rydbz9I3YODOLNdq3y
                                          MD5:765737756A8DBC946758080E162B286F
                                          SHA1:6D8055B03D430778409DF3FC1740E88ABE93BEE9
                                          SHA-256:45D19D2E1EADB08E832491309FFA262D40CD19819A9D8490F6E19BB2DE6DE19B
                                          SHA-512:E9EE4479288A54968C4E4B5C3877E70418DAFCC1942DCE59072EA29CED6F206F09A08391F7CBB334EBA91602AFC542546BDFD03EA1A3B06DB7AE58A2549CFA7E
                                          Malicious:true
                                          Reputation:unknown
                                          Preview:<?xml version="1.0" encoding="UTF-16"?>..<Task version="1.2" xmlns="http://schemas.microsoft.com/windows/2004/02/mit/task">.. <RegistrationInfo>.. <Date>2014-10-25T14:27:44.8929027</Date>.. <Author>computer\user</Author>.. </RegistrationInfo>.. <Triggers>.. <LogonTrigger>.. <Enabled>true</Enabled>.. <UserId>computer\user</UserId>.. </LogonTrigger>.. <RegistrationTrigger>.. <Enabled>false</Enabled>.. </RegistrationTrigger>.. </Triggers>.. <Principals>.. <Principal id="Author">.. <UserId>computer\user</UserId>.. <LogonType>InteractiveToken</LogonType>.. <RunLevel>LeastPrivilege</RunLevel>.. </Principal>.. </Principals>.. <Settings>.. <MultipleInstancesPolicy>StopExisting</MultipleInstancesPolicy>.. <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>.. <StopIfGoingOnBatteries>true</StopIfGoingOnBatteries>.. <AllowHardTerminate>false</AllowHardTerminate>.. <StartWhenAvailable>true
                                          Process:C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exe
                                          File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                          Category:dropped
                                          Size (bytes):1641
                                          Entropy (8bit):5.188207529406658
                                          Encrypted:false
                                          SSDEEP:24:2dH4+SEqC/Q7hxlNMFp1/rlMhEMjnGpwjpIgUYODOLD9RJh7h8gKB+tn:cbh47TlNQ//rydbz9I3YODOLNdq3y
                                          MD5:765737756A8DBC946758080E162B286F
                                          SHA1:6D8055B03D430778409DF3FC1740E88ABE93BEE9
                                          SHA-256:45D19D2E1EADB08E832491309FFA262D40CD19819A9D8490F6E19BB2DE6DE19B
                                          SHA-512:E9EE4479288A54968C4E4B5C3877E70418DAFCC1942DCE59072EA29CED6F206F09A08391F7CBB334EBA91602AFC542546BDFD03EA1A3B06DB7AE58A2549CFA7E
                                          Malicious:false
                                          Reputation:unknown
                                          Preview:<?xml version="1.0" encoding="UTF-16"?>..<Task version="1.2" xmlns="http://schemas.microsoft.com/windows/2004/02/mit/task">.. <RegistrationInfo>.. <Date>2014-10-25T14:27:44.8929027</Date>.. <Author>computer\user</Author>.. </RegistrationInfo>.. <Triggers>.. <LogonTrigger>.. <Enabled>true</Enabled>.. <UserId>computer\user</UserId>.. </LogonTrigger>.. <RegistrationTrigger>.. <Enabled>false</Enabled>.. </RegistrationTrigger>.. </Triggers>.. <Principals>.. <Principal id="Author">.. <UserId>computer\user</UserId>.. <LogonType>InteractiveToken</LogonType>.. <RunLevel>LeastPrivilege</RunLevel>.. </Principal>.. </Principals>.. <Settings>.. <MultipleInstancesPolicy>StopExisting</MultipleInstancesPolicy>.. <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>.. <StopIfGoingOnBatteries>true</StopIfGoingOnBatteries>.. <AllowHardTerminate>false</AllowHardTerminate>.. <StartWhenAvailable>true
                                          Process:C:\Users\user\Desktop\SWIFT COPY.exe
                                          File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                          Category:dropped
                                          Size (bytes):930304
                                          Entropy (8bit):7.520851252899785
                                          Encrypted:false
                                          SSDEEP:12288:nLMmwjApx7xvv0AJ0OVO4sGcY6riZTIywRAa1Z8P2LKSYFH0D3ruhj4r+:LMmwjADxNsZoZcRRz1Nh+YruWy
                                          MD5:25906D2539670F9F9160D38FE5EA1444
                                          SHA1:333660A6407757BE305CA516E9B7E1E5E799B93F
                                          SHA-256:D979E436ABF4F48C18C8D2670D60C72ABFC4741400E04DA1894B4A228316278E
                                          SHA-512:59CBADF7498C68DD1E201E83AA69479B3D6F977216DA5452805C621679D944E1C86C4ECF3C6D1E5389FCD700381F1A89042F521B4C3A72B51C41D4918DAAC9EE
                                          Malicious:true
                                          Antivirus:
                                          • Antivirus: Joe Sandbox ML, Detection: 100%
                                          • Antivirus: ReversingLabs, Detection: 75%
                                          Reputation:unknown
                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...>3.a..............P.............".... ........@.. ....................................@....................................O.................................................................................... ............... ..H............text...(.... ...................... ..`.rsrc...............................@..@.reloc...............0..............@..B........................H.......\....H..........0................................................0............(....(..........(.....o.....*.....................( ......(!......("......(#......($....*N..(....o+...(%....*&..(&....*.s'........s(........s)........s*........s+........*....0...........~....o,....+..*.0...........~....o-....+..*.0...........~....o.....+..*.0...........~....o/....+..*.0...........~....o0....+..*.0..<........~.....(1.....,!r...p.....(2...o3...s4............~.....+..*.0......
                                          Process:C:\Users\user\Desktop\SWIFT COPY.exe
                                          File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                          Category:dropped
                                          Size (bytes):930304
                                          Entropy (8bit):7.520851252899785
                                          Encrypted:false
                                          SSDEEP:12288:nLMmwjApx7xvv0AJ0OVO4sGcY6riZTIywRAa1Z8P2LKSYFH0D3ruhj4r+:LMmwjADxNsZoZcRRz1Nh+YruWy
                                          MD5:25906D2539670F9F9160D38FE5EA1444
                                          SHA1:333660A6407757BE305CA516E9B7E1E5E799B93F
                                          SHA-256:D979E436ABF4F48C18C8D2670D60C72ABFC4741400E04DA1894B4A228316278E
                                          SHA-512:59CBADF7498C68DD1E201E83AA69479B3D6F977216DA5452805C621679D944E1C86C4ECF3C6D1E5389FCD700381F1A89042F521B4C3A72B51C41D4918DAAC9EE
                                          Malicious:true
                                          Antivirus:
                                          • Antivirus: Joe Sandbox ML, Detection: 100%
                                          • Antivirus: ReversingLabs, Detection: 75%
                                          Reputation:unknown
                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...>3.a..............P.............".... ........@.. ....................................@....................................O.................................................................................... ............... ..H............text...(.... ...................... ..`.rsrc...............................@..@.reloc...............0..............@..B........................H.......\....H..........0................................................0............(....(..........(.....o.....*.....................( ......(!......("......(#......($....*N..(....o+...(%....*&..(&....*.s'........s(........s)........s*........s+........*....0...........~....o,....+..*.0...........~....o-....+..*.0...........~....o.....+..*.0...........~....o/....+..*.0...........~....o0....+..*.0..<........~.....(1.....,!r...p.....(2...o3...s4............~.....+..*.0......
                                          Process:C:\Users\user\Desktop\SWIFT COPY.exe
                                          File Type:ASCII text, with CRLF line terminators
                                          Category:dropped
                                          Size (bytes):26
                                          Entropy (8bit):3.95006375643621
                                          Encrypted:false
                                          SSDEEP:3:ggPYV:rPYV
                                          MD5:187F488E27DB4AF347237FE461A079AD
                                          SHA1:6693BA299EC1881249D59262276A0D2CB21F8E64
                                          SHA-256:255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309
                                          SHA-512:89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E
                                          Malicious:true
                                          Reputation:unknown
                                          Preview:[ZoneTransfer]....ZoneId=0
                                          Process:C:\Users\user\Desktop\SWIFT COPY.exe
                                          File Type:ASCII text, with CRLF line terminators
                                          Category:modified
                                          Size (bytes):835
                                          Entropy (8bit):4.694294591169137
                                          Encrypted:false
                                          SSDEEP:24:QWDZh+ragzMZfuMMs1L/JU5fFCkK8T1rTt8:vDZhyoZWM9rU5fFcP
                                          MD5:6EB47C1CF858E25486E42440074917F2
                                          SHA1:6A63F93A95E1AE831C393A97158C526A4FA0FAAE
                                          SHA-256:9B13A3EA948A1071A81787AAC1930B89E30DF22CE13F8FF751F31B5D83E79FFB
                                          SHA-512:08437AB32E7E905EB11335E670CDD5D999803390710ED39CBC31A2D3F05868D5D0E5D051CCD7B06A85BB466932F99A220463D27FAC29116D241E8ADAC495FA2F
                                          Malicious:true
                                          Reputation:unknown
                                          Preview:# Copyright (c) 1993-2009 Microsoft Corp...#..# This is a sample HOSTS file used by Microsoft TCP/IP for Windows...#..# This file contains the mappings of IP addresses to host names. Each..# entry should be kept on an individual line. The IP address should..# be placed in the first column followed by the corresponding host name...# The IP address and the host name should be separated by at least one..# space...#..# Additionally, comments (such as these) may be inserted on individual..# lines or following the machine name denoted by a '#' symbol...#..# For example:..#..# 102.54.94.97 rhino.acme.com # source server..# 38.25.63.10 x.acme.com # x client host....# localhost name resolution is handled within DNS itself...#.127.0.0.1 localhost..#.::1 localhost....127.0.0.1
                                          File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                          Entropy (8bit):7.520851252899785
                                          TrID:
                                          • Win32 Executable (generic) Net Framework (10011505/4) 49.83%
                                          • Win32 Executable (generic) a (10002005/4) 49.78%
                                          • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                                          • Generic Win/DOS Executable (2004/3) 0.01%
                                          • DOS Executable Generic (2002/1) 0.01%
                                          File name:SWIFT COPY.exe
                                          File size:930304
                                          MD5:25906d2539670f9f9160d38fe5ea1444
                                          SHA1:333660a6407757be305ca516e9b7e1e5e799b93f
                                          SHA256:d979e436abf4f48c18c8d2670d60c72abfc4741400e04da1894b4a228316278e
                                          SHA512:59cbadf7498c68dd1e201e83aa69479b3d6f977216da5452805c621679d944e1c86c4ecf3c6d1e5389fcd700381f1a89042f521b4c3a72b51c41d4918daac9ee
                                          SSDEEP:12288:nLMmwjApx7xvv0AJ0OVO4sGcY6riZTIywRAa1Z8P2LKSYFH0D3ruhj4r+:LMmwjADxNsZoZcRRz1Nh+YruWy
                                          File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...>3.a..............P.............".... ........@.. ....................................@................................
                                          Icon Hash:0eae829ab2b2b200
                                          Entrypoint:0x4ac022
                                          Entrypoint Section:.text
                                          Digitally signed:false
                                          Imagebase:0x400000
                                          Subsystem:windows gui
                                          Image File Characteristics:32BIT_MACHINE, EXECUTABLE_IMAGE
                                          DLL Characteristics:NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
                                          Time Stamp:0x61F3333E [Fri Jan 28 00:05:18 2022 UTC]
                                          TLS Callbacks:
                                          CLR (.Net) Version:v4.0.30319
                                          OS Version Major:4
                                          OS Version Minor:0
                                          File Version Major:4
                                          File Version Minor:0
                                          Subsystem Version Major:4
                                          Subsystem Version Minor:0
                                          Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
                                          Instruction
                                          jmp dword ptr [00402000h]
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          NameVirtual AddressVirtual Size Is in Section
                                          IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                          IMAGE_DIRECTORY_ENTRY_IMPORT0xabfd00x4f.text
                                          IMAGE_DIRECTORY_ENTRY_RESOURCE0xae0000x38abc.rsrc
                                          IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                          IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                          IMAGE_DIRECTORY_ENTRY_BASERELOC0xe80000xc.reloc
                                          IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                          IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                          IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                          IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                          IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                          IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                          IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                                          IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                          IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                                          IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                          NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                          .text0x20000xaa0280xaa200False0.829680611683data7.7506405165IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                                          .rsrc0xae0000x38abc0x38c00False0.583425110132data6.48541043629IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                          .reloc0xe80000xc0x200False0.044921875data0.101910425663IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                          NameRVASizeTypeLanguageCountry
                                          RT_ICON0xae2b00x10a08PNG image data, 256 x 256, 8-bit/color RGBA, non-interlaced
                                          RT_ICON0xbecb80x10828dBase IV DBT, blocks size 0, block length 2048, next free block index 40, next free block 0, next used block 0
                                          RT_ICON0xcf4e00x94a8data
                                          RT_ICON0xd89880x5488data
                                          RT_ICON0xdde100x4228dBase IV DBT of \200.DBF, blocks size 0, block length 16896, next free block index 40, next free block 4294967295, next used block 4294967295
                                          RT_ICON0xe20380x25a8data
                                          RT_ICON0xe45e00x10a8data
                                          RT_ICON0xe56880x988data
                                          RT_ICON0xe60100x468GLS_BINARY_LSB_FIRST
                                          RT_GROUP_ICON0xe64780x84data
                                          RT_VERSION0xe64fc0x3d4data
                                          RT_MANIFEST0xe68d00x1eaXML 1.0 document, UTF-8 Unicode (with BOM) text, with CRLF line terminators
                                          DLLImport
                                          mscoree.dll_CorExeMain
                                          DescriptionData
                                          Translation0x0000 0x04b0
                                          LegalCopyrightCopyright 2009-2021 Alexey Nicolaychuk aka Unwinder, developed special for Micro-Star Intl Co., Ltd.
                                          Assembly Version1.0.0.0
                                          InternalNameLXxo.exe
                                          FileVersion1.0.0.0
                                          CompanyName
                                          LegalTrademarks
                                          Comments
                                          ProductNameMSIAfterburner
                                          ProductVersion1.0.0.0
                                          FileDescriptionMSIAfterburner
                                          OriginalFilenameLXxo.exe
                                          No network behavior found

                                          Click to jump to process

                                          Target ID:1
                                          Start time:21:45:37
                                          Start date:28/01/2022
                                          Path:C:\Users\user\Desktop\SWIFT COPY.exe
                                          Wow64 process (32bit):true
                                          Commandline:"C:\Users\user\Desktop\SWIFT COPY.exe"
                                          Imagebase:0x310000
                                          File size:930304 bytes
                                          MD5 hash:25906D2539670F9F9160D38FE5EA1444
                                          Has elevated privileges:true
                                          Has administrator privileges:true
                                          Programmed in:.Net C# or VB.NET
                                          Yara matches:
                                          • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000001.00000002.364987356.0000000003771000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                          • Rule: JoeSecurity_AgentTesla_2, Description: Yara detected AgentTesla, Source: 00000001.00000002.364987356.0000000003771000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                          Reputation:low

                                          Target ID:7
                                          Start time:21:46:05
                                          Start date:28/01/2022
                                          Path:C:\Windows\SysWOW64\schtasks.exe
                                          Wow64 process (32bit):true
                                          Commandline:C:\Windows\System32\schtasks.exe" /Create /TN "Updates\QTzKSOrs" /XML "C:\Users\user\AppData\Local\Temp\tmpF17F.tmp
                                          Imagebase:0xb30000
                                          File size:185856 bytes
                                          MD5 hash:15FF7D8324231381BAD48A052F85DF04
                                          Has elevated privileges:true
                                          Has administrator privileges:true
                                          Programmed in:C, C++ or other language
                                          Reputation:high

                                          Target ID:8
                                          Start time:21:46:06
                                          Start date:28/01/2022
                                          Path:C:\Windows\System32\conhost.exe
                                          Wow64 process (32bit):false
                                          Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                          Imagebase:0x7ff7f20f0000
                                          File size:625664 bytes
                                          MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                          Has elevated privileges:true
                                          Has administrator privileges:true
                                          Programmed in:C, C++ or other language
                                          Reputation:high

                                          Target ID:9
                                          Start time:21:46:07
                                          Start date:28/01/2022
                                          Path:C:\Users\user\Desktop\SWIFT COPY.exe
                                          Wow64 process (32bit):true
                                          Commandline:{path}
                                          Imagebase:0x9c0000
                                          File size:930304 bytes
                                          MD5 hash:25906D2539670F9F9160D38FE5EA1444
                                          Has elevated privileges:true
                                          Has administrator privileges:true
                                          Programmed in:.Net C# or VB.NET
                                          Yara matches:
                                          • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000009.00000002.550659347.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                          • Rule: JoeSecurity_AgentTesla_2, Description: Yara detected AgentTesla, Source: 00000009.00000002.550659347.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                          • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000009.00000000.352110699.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                          • Rule: JoeSecurity_AgentTesla_2, Description: Yara detected AgentTesla, Source: 00000009.00000000.352110699.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                          • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000009.00000000.350128548.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                          • Rule: JoeSecurity_AgentTesla_2, Description: Yara detected AgentTesla, Source: 00000009.00000000.350128548.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                          • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000009.00000000.350721259.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                          • Rule: JoeSecurity_AgentTesla_2, Description: Yara detected AgentTesla, Source: 00000009.00000000.350721259.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                          • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000009.00000000.349638861.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                          • Rule: JoeSecurity_AgentTesla_2, Description: Yara detected AgentTesla, Source: 00000009.00000000.349638861.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                          • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000009.00000002.552462552.0000000002DC1000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                          • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000009.00000002.552462552.0000000002DC1000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                          • Rule: MALWARE_Win_AgentTeslaV3, Description: AgentTeslaV3 infostealer payload, Source: 00000009.00000002.552462552.0000000002DC1000.00000004.00000800.00020000.00000000.sdmp, Author: ditekSHen
                                          Reputation:low

                                          Target ID:19
                                          Start time:21:46:54
                                          Start date:28/01/2022
                                          Path:C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exe
                                          Wow64 process (32bit):true
                                          Commandline:"C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exe"
                                          Imagebase:0xde0000
                                          File size:930304 bytes
                                          MD5 hash:25906D2539670F9F9160D38FE5EA1444
                                          Has elevated privileges:false
                                          Has administrator privileges:false
                                          Programmed in:.Net C# or VB.NET
                                          Yara matches:
                                          • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000013.00000002.507129144.0000000004291000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                          • Rule: JoeSecurity_AgentTesla_2, Description: Yara detected AgentTesla, Source: 00000013.00000002.507129144.0000000004291000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                          Antivirus matches:
                                          • Detection: 100%, Joe Sandbox ML
                                          • Detection: 75%, ReversingLabs
                                          Reputation:low

                                          Target ID:20
                                          Start time:21:47:02
                                          Start date:28/01/2022
                                          Path:C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exe
                                          Wow64 process (32bit):true
                                          Commandline:"C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exe"
                                          Imagebase:0x410000
                                          File size:930304 bytes
                                          MD5 hash:25906D2539670F9F9160D38FE5EA1444
                                          Has elevated privileges:false
                                          Has administrator privileges:false
                                          Programmed in:.Net C# or VB.NET
                                          Yara matches:
                                          • Rule: JoeSecurity_AntiVM_3, Description: Yara detected AntiVM_3, Source: 00000014.00000002.528760408.000000000278B000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                          • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000014.00000002.532671197.0000000003751000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                          • Rule: JoeSecurity_AgentTesla_2, Description: Yara detected AgentTesla, Source: 00000014.00000002.532671197.0000000003751000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                          Reputation:low

                                          Target ID:21
                                          Start time:21:47:13
                                          Start date:28/01/2022
                                          Path:C:\Windows\SysWOW64\schtasks.exe
                                          Wow64 process (32bit):true
                                          Commandline:C:\Windows\System32\schtasks.exe" /Create /TN "Updates\QTzKSOrs" /XML "C:\Users\user\AppData\Local\Temp\tmpFAA2.tmp
                                          Imagebase:0xb30000
                                          File size:185856 bytes
                                          MD5 hash:15FF7D8324231381BAD48A052F85DF04
                                          Has elevated privileges:false
                                          Has administrator privileges:false
                                          Programmed in:C, C++ or other language
                                          Reputation:high

                                          Target ID:22
                                          Start time:21:47:14
                                          Start date:28/01/2022
                                          Path:C:\Windows\System32\conhost.exe
                                          Wow64 process (32bit):false
                                          Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                          Imagebase:0x7ff7f20f0000
                                          File size:625664 bytes
                                          MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                          Has elevated privileges:false
                                          Has administrator privileges:false
                                          Programmed in:C, C++ or other language
                                          Reputation:high

                                          Target ID:23
                                          Start time:21:47:15
                                          Start date:28/01/2022
                                          Path:C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exe
                                          Wow64 process (32bit):true
                                          Commandline:{path}
                                          Imagebase:0xda0000
                                          File size:930304 bytes
                                          MD5 hash:25906D2539670F9F9160D38FE5EA1444
                                          Has elevated privileges:false
                                          Has administrator privileges:false
                                          Programmed in:.Net C# or VB.NET
                                          Yara matches:
                                          • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000017.00000000.496018922.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                          • Rule: JoeSecurity_AgentTesla_2, Description: Yara detected AgentTesla, Source: 00000017.00000000.496018922.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                          • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000017.00000000.498474265.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                          • Rule: JoeSecurity_AgentTesla_2, Description: Yara detected AgentTesla, Source: 00000017.00000000.498474265.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                          • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000017.00000002.535519360.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                          • Rule: JoeSecurity_AgentTesla_2, Description: Yara detected AgentTesla, Source: 00000017.00000002.535519360.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                          • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000017.00000000.497131882.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                          • Rule: JoeSecurity_AgentTesla_2, Description: Yara detected AgentTesla, Source: 00000017.00000000.497131882.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                          • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000017.00000000.497871827.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                          • Rule: JoeSecurity_AgentTesla_2, Description: Yara detected AgentTesla, Source: 00000017.00000000.497871827.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                          • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000017.00000002.536878272.00000000032D1000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                          • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000017.00000002.536878272.00000000032D1000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                          • Rule: MALWARE_Win_AgentTeslaV3, Description: AgentTeslaV3 infostealer payload, Source: 00000017.00000002.536878272.00000000032D1000.00000004.00000800.00020000.00000000.sdmp, Author: ditekSHen
                                          Reputation:low

                                          Target ID:24
                                          Start time:21:47:23
                                          Start date:28/01/2022
                                          Path:C:\Windows\SysWOW64\schtasks.exe
                                          Wow64 process (32bit):true
                                          Commandline:C:\Windows\System32\schtasks.exe" /Create /TN "Updates\QTzKSOrs" /XML "C:\Users\user\AppData\Local\Temp\tmp2099.tmp
                                          Imagebase:0xb30000
                                          File size:185856 bytes
                                          MD5 hash:15FF7D8324231381BAD48A052F85DF04
                                          Has elevated privileges:false
                                          Has administrator privileges:false
                                          Programmed in:C, C++ or other language
                                          Reputation:high

                                          Target ID:25
                                          Start time:21:47:24
                                          Start date:28/01/2022
                                          Path:C:\Windows\System32\conhost.exe
                                          Wow64 process (32bit):false
                                          Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                          Imagebase:0x7ff7f20f0000
                                          File size:625664 bytes
                                          MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                          Has elevated privileges:false
                                          Has administrator privileges:false
                                          Programmed in:C, C++ or other language
                                          Reputation:high

                                          Target ID:26
                                          Start time:21:47:25
                                          Start date:28/01/2022
                                          Path:C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exe
                                          Wow64 process (32bit):false
                                          Commandline:{path}
                                          Imagebase:0x300000
                                          File size:930304 bytes
                                          MD5 hash:25906D2539670F9F9160D38FE5EA1444
                                          Has elevated privileges:false
                                          Has administrator privileges:false
                                          Programmed in:C, C++ or other language
                                          Reputation:low

                                          Target ID:27
                                          Start time:21:47:27
                                          Start date:28/01/2022
                                          Path:C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exe
                                          Wow64 process (32bit):true
                                          Commandline:{path}
                                          Imagebase:0xf60000
                                          File size:930304 bytes
                                          MD5 hash:25906D2539670F9F9160D38FE5EA1444
                                          Has elevated privileges:false
                                          Has administrator privileges:false
                                          Programmed in:.Net C# or VB.NET
                                          Yara matches:
                                          • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 0000001B.00000000.525359202.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                          • Rule: JoeSecurity_AgentTesla_2, Description: Yara detected AgentTesla, Source: 0000001B.00000000.525359202.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                          • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 0000001B.00000000.524760833.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                          • Rule: JoeSecurity_AgentTesla_2, Description: Yara detected AgentTesla, Source: 0000001B.00000000.524760833.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                          • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 0000001B.00000002.550679328.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                          • Rule: JoeSecurity_AgentTesla_2, Description: Yara detected AgentTesla, Source: 0000001B.00000002.550679328.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                          • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 0000001B.00000000.523515962.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                          • Rule: JoeSecurity_AgentTesla_2, Description: Yara detected AgentTesla, Source: 0000001B.00000000.523515962.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                          • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 0000001B.00000002.552996616.0000000003301000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                          • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 0000001B.00000002.552996616.0000000003301000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                          • Rule: MALWARE_Win_AgentTeslaV3, Description: AgentTeslaV3 infostealer payload, Source: 0000001B.00000002.552996616.0000000003301000.00000004.00000800.00020000.00000000.sdmp, Author: ditekSHen
                                          • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 0000001B.00000000.525782576.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                          • Rule: JoeSecurity_AgentTesla_2, Description: Yara detected AgentTesla, Source: 0000001B.00000000.525782576.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                          Reputation:low

                                          No disassembly