Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
payment swift.exe

Overview

General Information

Sample Name:payment swift.exe
Analysis ID:755998
MD5:0eb99950c8a30fee01ebfdaa33498b22
SHA1:54557815e576ac70fcbcdfcb6765f3d2a2dff507
SHA256:469dae2eed97bbfe08ae548308e77aedcd0795fb4b2b1abcdd1a0315fe1ff216
Tags:exe
Infos:

Detection

AgentTesla
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
Malicious sample detected (through community Yara rule)
Yara detected AgentTesla
Yara detected AntiVM3
Multi AV Scanner detection for dropped file
Tries to steal Mail credentials (via file / registry access)
Initial sample is a PE file and has a suspicious name
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Machine Learning detection for sample
.NET source code contains very large array initializations
Machine Learning detection for dropped file
Hides that the sample has been downloaded from the Internet (zone.identifier)
Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)
Tries to harvest and steal browser information (history, passwords, etc)
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Uses 32bit PE files
Queries the volume information (name, serial number etc) of a device
Yara signature match
Antivirus or Machine Learning detection for unpacked file
May sleep (evasive loops) to hinder dynamic analysis
Uses code obfuscation techniques (call, push, ret)
Detected potential crypto function
Yara detected Credential Stealer
IP address seen in connection with other malware
Contains long sleeps (>= 3 min)
Enables debug privileges
Creates a DirectInput object (often for capturing keystrokes)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Sample file is different than original file name gathered from version info
Drops PE files
Detected TCP or UDP traffic on non-standard ports
Uses SMTP (mail sending)
Found evasive API chain (may stop execution after accessing registry keys)
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Creates a process in suspended mode (likely to inject code)
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)

Classification

  • System is w10x64
  • payment swift.exe (PID: 3100 cmdline: C:\Users\user\Desktop\payment swift.exe MD5: 0EB99950C8A30FEE01EBFDAA33498B22)
    • payment swift.exe (PID: 4460 cmdline: C:\Users\user\Desktop\payment swift.exe MD5: 0EB99950C8A30FEE01EBFDAA33498B22)
  • WdFVsOe.exe (PID: 2460 cmdline: "C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exe" MD5: 0EB99950C8A30FEE01EBFDAA33498B22)
    • WdFVsOe.exe (PID: 4768 cmdline: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exe MD5: 0EB99950C8A30FEE01EBFDAA33498B22)
  • WdFVsOe.exe (PID: 5992 cmdline: "C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exe" MD5: 0EB99950C8A30FEE01EBFDAA33498B22)
    • WdFVsOe.exe (PID: 972 cmdline: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exe MD5: 0EB99950C8A30FEE01EBFDAA33498B22)
    • WdFVsOe.exe (PID: 1276 cmdline: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exe MD5: 0EB99950C8A30FEE01EBFDAA33498B22)
  • cleanup
{"Exfil Mode": "SMTP", "Host": "host39.registrar-servers.com", "Username": "dickson@potashin.us", "Password": "*r4} Du LH  n87G"}
SourceRuleDescriptionAuthorStrings
00000001.00000000.313645910.0000000000402000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
    00000001.00000000.313645910.0000000000402000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_AgentTesla_2Yara detected AgentTeslaJoe Security
      00000001.00000000.313645910.0000000000402000.00000040.00000400.00020000.00000000.sdmpWindows_Trojan_AgentTesla_d3ac2b2funknownunknown
      • 0x31d17:$a13: get_DnsResolver
      • 0x30424:$a20: get_LastAccessed
      • 0x32745:$a27: set_InternalServerPort
      • 0x32a7a:$a30: set_GuidMasterKey
      • 0x30536:$a33: get_Clipboard
      • 0x30544:$a34: get_Keyboard
      • 0x31911:$a35: get_ShiftKeyDown
      • 0x31922:$a36: get_AltKeyDown
      • 0x30551:$a37: get_Password
      • 0x3106c:$a38: get_PasswordHash
      • 0x32179:$a39: get_DefaultCredentials
      00000000.00000002.315807649.00000000030D5000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_AntiVM_3Yara detected AntiVM_3Joe Security
        00000002.00000002.360649511.0000000002655000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_AntiVM_3Yara detected AntiVM_3Joe Security
          Click to see the 22 entries
          SourceRuleDescriptionAuthorStrings
          2.2.WdFVsOe.exe.25e063c.1.raw.unpackJoeSecurity_AntiVM_3Yara detected AntiVM_3Joe Security
            2.2.WdFVsOe.exe.25e063c.1.raw.unpackINDICATOR_SUSPICIOUS_EXE_Anti_OldCopyPasteDetects executables potentially checking for WinJail sandbox windowditekSHen
            • 0xcfea:$v1: SbieDll.dll
            • 0xd004:$v2: USER
            • 0xd010:$v3: SANDBOX
            • 0xd022:$v4: VIRUS
            • 0xd072:$v4: VIRUS
            • 0xd030:$v5: MALWARE
            • 0xd042:$v6: SCHMIDTI
            • 0xd056:$v7: CURRENTUSER
            0.2.payment swift.exe.4392240.6.unpackJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
              0.2.payment swift.exe.4392240.6.unpackJoeSecurity_AgentTesla_2Yara detected AgentTeslaJoe Security
                0.2.payment swift.exe.4392240.6.unpackMALWARE_Win_AgentTeslaV3AgentTeslaV3 infostealer payloadditekSHen
                • 0x32c56:$s10: logins
                • 0x326d0:$s11: credential
                • 0x2e936:$g1: get_Clipboard
                • 0x2e944:$g2: get_Keyboard
                • 0x2e951:$g3: get_Password
                • 0x2fd01:$g4: get_CtrlKeyDown
                • 0x2fd11:$g5: get_ShiftKeyDown
                • 0x2fd22:$g6: get_AltKeyDown
                Click to see the 25 entries
                No Sigma rule has matched
                No Snort rule has matched

                Click to jump to signature section

                Show All Signature Results

                AV Detection

                barindex
                Source: payment swift.exeReversingLabs: Detection: 30%
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeReversingLabs: Detection: 30%
                Source: payment swift.exeJoe Sandbox ML: detected
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeJoe Sandbox ML: detected
                Source: 1.0.payment swift.exe.400000.0.unpackAvira: Label: TR/Spy.Gen8
                Source: 0.2.payment swift.exe.4392240.6.unpackMalware Configuration Extractor: Agenttesla {"Exfil Mode": "SMTP", "Host": "host39.registrar-servers.com", "Username": "dickson@potashin.us", "Password": "*r4} Du LH n87G"}
                Source: payment swift.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                Source: payment swift.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                Source: Joe Sandbox ViewIP Address: 68.65.122.214 68.65.122.214
                Source: global trafficTCP traffic: 192.168.2.4:49695 -> 68.65.122.214:587
                Source: global trafficTCP traffic: 192.168.2.4:49695 -> 68.65.122.214:587
                Source: payment swift.exe, 00000001.00000002.570872866.0000000002B41000.00000004.00000800.00020000.00000000.sdmp, WdFVsOe.exe, 00000003.00000002.569999847.0000000002841000.00000004.00000800.00020000.00000000.sdmp, WdFVsOe.exe, 00000006.00000002.571356587.0000000002B2C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://127.0.0.1:HTTP/1.1
                Source: WdFVsOe.exe, 00000006.00000002.571356587.0000000002B2C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://DynDns.comDynDNSnamejidpasswordPsi/Psi
                Source: payment swift.exe, 00000001.00000002.568239695.0000000000C61000.00000004.00000020.00020000.00000000.sdmp, payment swift.exe, 00000001.00000002.578503982.0000000002E6F000.00000004.00000800.00020000.00000000.sdmp, WdFVsOe.exe, 00000003.00000002.578453028.0000000002BC4000.00000004.00000800.00020000.00000000.sdmp, WdFVsOe.exe, 00000003.00000002.587147691.0000000006360000.00000004.00000800.00020000.00000000.sdmp, WdFVsOe.exe, 00000006.00000002.579742937.0000000002EA2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl.comodoca.com/AAACertificateServices.crl04
                Source: payment swift.exe, 00000001.00000002.585869850.0000000006020000.00000004.00000800.00020000.00000000.sdmp, WdFVsOe.exe, 00000003.00000002.587147691.0000000006360000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl.comodoca.com/AAACertificateServices.crl06
                Source: WdFVsOe.exe, 00000003.00000002.587147691.0000000006360000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl.comor
                Source: payment swift.exe, 00000001.00000002.568239695.0000000000C61000.00000004.00000020.00020000.00000000.sdmp, payment swift.exe, 00000001.00000002.568309572.0000000000C69000.00000004.00000020.00020000.00000000.sdmp, payment swift.exe, 00000001.00000002.578503982.0000000002E6F000.00000004.00000800.00020000.00000000.sdmp, WdFVsOe.exe, 00000003.00000002.578453028.0000000002BC4000.00000004.00000800.00020000.00000000.sdmp, WdFVsOe.exe, 00000003.00000002.587147691.0000000006360000.00000004.00000800.00020000.00000000.sdmp, WdFVsOe.exe, 00000006.00000002.579742937.0000000002EA2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crt.sectigo.com/SectigoRSADomainValidationSecureServerCA.crt0#
                Source: payment swift.exe, 00000000.00000002.319963745.0000000006F82000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://fontfabrik.com
                Source: payment swift.exe, 00000001.00000002.578503982.0000000002E6F000.00000004.00000800.00020000.00000000.sdmp, WdFVsOe.exe, 00000003.00000002.578453028.0000000002BC4000.00000004.00000800.00020000.00000000.sdmp, WdFVsOe.exe, 00000006.00000002.579742937.0000000002EA2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://host39.registrar-servers.com
                Source: WdFVsOe.exe, 00000006.00000002.571356587.0000000002B2C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://kjkcOA.com
                Source: payment swift.exe, 00000001.00000002.568239695.0000000000C61000.00000004.00000020.00020000.00000000.sdmp, payment swift.exe, 00000001.00000002.578503982.0000000002E6F000.00000004.00000800.00020000.00000000.sdmp, WdFVsOe.exe, 00000003.00000002.578453028.0000000002BC4000.00000004.00000800.00020000.00000000.sdmp, WdFVsOe.exe, 00000003.00000002.587147691.0000000006360000.00000004.00000800.00020000.00000000.sdmp, WdFVsOe.exe, 00000006.00000002.579742937.0000000002EA2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ocsp.comodoca.com0
                Source: payment swift.exe, 00000001.00000002.568239695.0000000000C61000.00000004.00000020.00020000.00000000.sdmp, payment swift.exe, 00000001.00000002.568309572.0000000000C69000.00000004.00000020.00020000.00000000.sdmp, payment swift.exe, 00000001.00000002.578503982.0000000002E6F000.00000004.00000800.00020000.00000000.sdmp, WdFVsOe.exe, 00000003.00000002.578453028.0000000002BC4000.00000004.00000800.00020000.00000000.sdmp, WdFVsOe.exe, 00000003.00000002.587147691.0000000006360000.00000004.00000800.00020000.00000000.sdmp, WdFVsOe.exe, 00000006.00000002.579742937.0000000002EA2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ocsp.sectigo.com09
                Source: payment swift.exe, 00000000.00000002.319963745.0000000006F82000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0
                Source: payment swift.exe, 00000000.00000002.319963745.0000000006F82000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.carterandcone.coml
                Source: payment swift.exe, 00000000.00000002.319963745.0000000006F82000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com
                Source: payment swift.exe, 00000000.00000002.319963745.0000000006F82000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers
                Source: payment swift.exe, 00000000.00000002.319963745.0000000006F82000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/?
                Source: payment swift.exe, 00000000.00000002.319963745.0000000006F82000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/cabarga.htmlN
                Source: payment swift.exe, 00000000.00000002.319963745.0000000006F82000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/frere-user.html
                Source: payment swift.exe, 00000000.00000002.319963745.0000000006F82000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers8
                Source: payment swift.exe, 00000000.00000002.319963745.0000000006F82000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers?
                Source: payment swift.exe, 00000000.00000002.319963745.0000000006F82000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designersG
                Source: payment swift.exe, 00000000.00000002.319963745.0000000006F82000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fonts.com
                Source: payment swift.exe, 00000000.00000002.319963745.0000000006F82000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn
                Source: payment swift.exe, 00000000.00000002.319963745.0000000006F82000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn/bThe
                Source: payment swift.exe, 00000000.00000002.319963745.0000000006F82000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn/cThe
                Source: payment swift.exe, 00000000.00000002.319963745.0000000006F82000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.galapagosdesign.com/DPlease
                Source: payment swift.exe, 00000000.00000002.319963745.0000000006F82000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.galapagosdesign.com/staff/dennis.htm
                Source: payment swift.exe, 00000000.00000002.319963745.0000000006F82000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.goodfont.co.kr
                Source: payment swift.exe, 00000000.00000002.319963745.0000000006F82000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/
                Source: payment swift.exe, 00000000.00000002.319963745.0000000006F82000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sajatypeworks.com
                Source: payment swift.exe, 00000000.00000002.319963745.0000000006F82000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sakkal.com
                Source: payment swift.exe, 00000000.00000002.319963745.0000000006F82000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sandoll.co.kr
                Source: payment swift.exe, 00000000.00000002.319963745.0000000006F82000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.tiro.com
                Source: payment swift.exe, 00000000.00000002.319963745.0000000006F82000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.typography.netD
                Source: payment swift.exe, 00000000.00000002.319963745.0000000006F82000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.urwpp.deDPlease
                Source: payment swift.exe, 00000000.00000002.319963745.0000000006F82000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.zhongyicts.com.cn
                Source: WdFVsOe.exe, 00000006.00000002.578885319.0000000002E4C000.00000004.00000800.00020000.00000000.sdmp, WdFVsOe.exe, 00000006.00000002.579991612.0000000002EC5000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://D16a0atI7uWaj.com
                Source: WdFVsOe.exe, 00000003.00000002.577583432.0000000002B6F000.00000004.00000800.00020000.00000000.sdmp, WdFVsOe.exe, 00000006.00000002.578885319.0000000002E4C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://D16a0atI7uWaj.comX
                Source: payment swift.exe, 00000001.00000002.568239695.0000000000C61000.00000004.00000020.00020000.00000000.sdmp, payment swift.exe, 00000001.00000002.568309572.0000000000C69000.00000004.00000020.00020000.00000000.sdmp, payment swift.exe, 00000001.00000002.578503982.0000000002E6F000.00000004.00000800.00020000.00000000.sdmp, WdFVsOe.exe, 00000003.00000002.578453028.0000000002BC4000.00000004.00000800.00020000.00000000.sdmp, WdFVsOe.exe, 00000003.00000002.587147691.0000000006360000.00000004.00000800.00020000.00000000.sdmp, WdFVsOe.exe, 00000006.00000002.579742937.0000000002EA2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://sectigo.com/CPS0
                Source: payment swift.exe, 00000001.00000002.570872866.0000000002B41000.00000004.00000800.00020000.00000000.sdmp, WdFVsOe.exe, 00000003.00000002.569999847.0000000002841000.00000004.00000800.00020000.00000000.sdmp, WdFVsOe.exe, 00000006.00000002.571356587.0000000002B2C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.ziphttps://www
                Source: unknownDNS traffic detected: queries for: host39.registrar-servers.com
                Source: payment swift.exe, 00000000.00000002.314965866.0000000001240000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: <HOOK MODULE="DDRAW.DLL" FUNCTION="DirectDrawCreateEx"/>

                System Summary

                barindex
                Source: 2.2.WdFVsOe.exe.25e063c.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables potentially checking for WinJail sandbox window Author: ditekSHen
                Source: 0.2.payment swift.exe.4392240.6.unpack, type: UNPACKEDPEMatched rule: AgentTeslaV3 infostealer payload Author: ditekSHen
                Source: 0.2.payment swift.exe.4392240.6.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f Author: unknown
                Source: 0.2.payment swift.exe.30605f0.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables potentially checking for WinJail sandbox window Author: ditekSHen
                Source: 1.0.payment swift.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: AgentTeslaV3 infostealer payload Author: ditekSHen
                Source: 1.0.payment swift.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f Author: unknown
                Source: 0.2.payment swift.exe.42fe420.8.raw.unpack, type: UNPACKEDPEMatched rule: AgentTeslaV3 infostealer payload Author: ditekSHen
                Source: 0.2.payment swift.exe.42fe420.8.raw.unpack, type: UNPACKEDPEMatched rule: Detects zgRAT Author: ditekSHen
                Source: 0.2.payment swift.exe.42fe420.8.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f Author: unknown
                Source: 0.2.payment swift.exe.4392240.6.raw.unpack, type: UNPACKEDPEMatched rule: AgentTeslaV3 infostealer payload Author: ditekSHen
                Source: 0.2.payment swift.exe.4392240.6.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f Author: unknown
                Source: 2.2.WdFVsOe.exe.25c2e6c.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables potentially checking for WinJail sandbox window Author: ditekSHen
                Source: 0.2.payment swift.exe.3042e20.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables potentially checking for WinJail sandbox window Author: ditekSHen
                Source: 0.2.payment swift.exe.427e9d0.7.raw.unpack, type: UNPACKEDPEMatched rule: AgentTeslaV3 infostealer payload Author: ditekSHen
                Source: 0.2.payment swift.exe.427e9d0.7.raw.unpack, type: UNPACKEDPEMatched rule: Detects zgRAT Author: ditekSHen
                Source: 0.2.payment swift.exe.427e9d0.7.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f Author: unknown
                Source: 00000001.00000000.313645910.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f Author: unknown
                Source: 00000000.00000002.318247702.000000000427E000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f Author: unknown
                Source: Process Memory Space: payment swift.exe PID: 3100, type: MEMORYSTRMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f Author: unknown
                Source: Process Memory Space: payment swift.exe PID: 4460, type: MEMORYSTRMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f Author: unknown
                Source: initial sampleStatic PE information: Filename: payment swift.exe
                Source: 1.0.payment swift.exe.400000.0.unpack, u003cPrivateImplementationDetailsu003eu007b0E0679B2u002d33DEu002d4D95u002d91A6u002dB53FD5CAAFFCu007d/C3E9AD79u002dA89Eu002d49B7u002dBD79u002dAAE98BEF935A.csLarge array initialization: .cctor: array initializer size 10947
                Source: payment swift.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                Source: 2.2.WdFVsOe.exe.25e063c.1.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_Anti_OldCopyPaste author = ditekSHen, description = Detects executables potentially checking for WinJail sandbox window
                Source: 0.2.payment swift.exe.4392240.6.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload
                Source: 0.2.payment swift.exe.4392240.6.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f reference_sample = 65463161760af7ab85f5c475a0f7b1581234a1e714a2c5a555783bdd203f85f4, os = windows, severity = x86, creation_date = 2021-03-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.AgentTesla, fingerprint = cbbb56fe6cd7277ae9595a10e05e2ce535a4e6bf205810be0bbce3a883b6f8bc, id = d3ac2b2f-14fc-4851-8a57-41032e386aeb, last_modified = 2022-06-20
                Source: 0.2.payment swift.exe.30605f0.2.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_Anti_OldCopyPaste author = ditekSHen, description = Detects executables potentially checking for WinJail sandbox window
                Source: 1.0.payment swift.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload
                Source: 1.0.payment swift.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f reference_sample = 65463161760af7ab85f5c475a0f7b1581234a1e714a2c5a555783bdd203f85f4, os = windows, severity = x86, creation_date = 2021-03-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.AgentTesla, fingerprint = cbbb56fe6cd7277ae9595a10e05e2ce535a4e6bf205810be0bbce3a883b6f8bc, id = d3ac2b2f-14fc-4851-8a57-41032e386aeb, last_modified = 2022-06-20
                Source: 0.2.payment swift.exe.42fe420.8.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload
                Source: 0.2.payment swift.exe.42fe420.8.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_zgRAT author = ditekSHen, description = Detects zgRAT
                Source: 0.2.payment swift.exe.42fe420.8.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f reference_sample = 65463161760af7ab85f5c475a0f7b1581234a1e714a2c5a555783bdd203f85f4, os = windows, severity = x86, creation_date = 2021-03-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.AgentTesla, fingerprint = cbbb56fe6cd7277ae9595a10e05e2ce535a4e6bf205810be0bbce3a883b6f8bc, id = d3ac2b2f-14fc-4851-8a57-41032e386aeb, last_modified = 2022-06-20
                Source: 0.2.payment swift.exe.4392240.6.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload
                Source: 0.2.payment swift.exe.4392240.6.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f reference_sample = 65463161760af7ab85f5c475a0f7b1581234a1e714a2c5a555783bdd203f85f4, os = windows, severity = x86, creation_date = 2021-03-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.AgentTesla, fingerprint = cbbb56fe6cd7277ae9595a10e05e2ce535a4e6bf205810be0bbce3a883b6f8bc, id = d3ac2b2f-14fc-4851-8a57-41032e386aeb, last_modified = 2022-06-20
                Source: 2.2.WdFVsOe.exe.25c2e6c.0.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_Anti_OldCopyPaste author = ditekSHen, description = Detects executables potentially checking for WinJail sandbox window
                Source: 0.2.payment swift.exe.3042e20.1.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_Anti_OldCopyPaste author = ditekSHen, description = Detects executables potentially checking for WinJail sandbox window
                Source: 0.2.payment swift.exe.427e9d0.7.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload
                Source: 0.2.payment swift.exe.427e9d0.7.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_zgRAT author = ditekSHen, description = Detects zgRAT
                Source: 0.2.payment swift.exe.427e9d0.7.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f reference_sample = 65463161760af7ab85f5c475a0f7b1581234a1e714a2c5a555783bdd203f85f4, os = windows, severity = x86, creation_date = 2021-03-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.AgentTesla, fingerprint = cbbb56fe6cd7277ae9595a10e05e2ce535a4e6bf205810be0bbce3a883b6f8bc, id = d3ac2b2f-14fc-4851-8a57-41032e386aeb, last_modified = 2022-06-20
                Source: 00000001.00000000.313645910.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f reference_sample = 65463161760af7ab85f5c475a0f7b1581234a1e714a2c5a555783bdd203f85f4, os = windows, severity = x86, creation_date = 2021-03-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.AgentTesla, fingerprint = cbbb56fe6cd7277ae9595a10e05e2ce535a4e6bf205810be0bbce3a883b6f8bc, id = d3ac2b2f-14fc-4851-8a57-41032e386aeb, last_modified = 2022-06-20
                Source: 00000000.00000002.318247702.000000000427E000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f reference_sample = 65463161760af7ab85f5c475a0f7b1581234a1e714a2c5a555783bdd203f85f4, os = windows, severity = x86, creation_date = 2021-03-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.AgentTesla, fingerprint = cbbb56fe6cd7277ae9595a10e05e2ce535a4e6bf205810be0bbce3a883b6f8bc, id = d3ac2b2f-14fc-4851-8a57-41032e386aeb, last_modified = 2022-06-20
                Source: Process Memory Space: payment swift.exe PID: 3100, type: MEMORYSTRMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f reference_sample = 65463161760af7ab85f5c475a0f7b1581234a1e714a2c5a555783bdd203f85f4, os = windows, severity = x86, creation_date = 2021-03-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.AgentTesla, fingerprint = cbbb56fe6cd7277ae9595a10e05e2ce535a4e6bf205810be0bbce3a883b6f8bc, id = d3ac2b2f-14fc-4851-8a57-41032e386aeb, last_modified = 2022-06-20
                Source: Process Memory Space: payment swift.exe PID: 4460, type: MEMORYSTRMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f reference_sample = 65463161760af7ab85f5c475a0f7b1581234a1e714a2c5a555783bdd203f85f4, os = windows, severity = x86, creation_date = 2021-03-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.AgentTesla, fingerprint = cbbb56fe6cd7277ae9595a10e05e2ce535a4e6bf205810be0bbce3a883b6f8bc, id = d3ac2b2f-14fc-4851-8a57-41032e386aeb, last_modified = 2022-06-20
                Source: C:\Users\user\Desktop\payment swift.exeCode function: 0_2_0146C164
                Source: C:\Users\user\Desktop\payment swift.exeCode function: 0_2_0146E5A2
                Source: C:\Users\user\Desktop\payment swift.exeCode function: 0_2_0146E5B0
                Source: C:\Users\user\Desktop\payment swift.exeCode function: 0_2_07AC6EC0
                Source: C:\Users\user\Desktop\payment swift.exeCode function: 0_2_07AC0006
                Source: C:\Users\user\Desktop\payment swift.exeCode function: 1_2_0290FAA0
                Source: C:\Users\user\Desktop\payment swift.exeCode function: 1_2_02906CA2
                Source: C:\Users\user\Desktop\payment swift.exeCode function: 1_2_0290BB27
                Source: C:\Users\user\Desktop\payment swift.exeCode function: 1_2_05C6C550
                Source: C:\Users\user\Desktop\payment swift.exeCode function: 1_2_05C6A088
                Source: C:\Users\user\Desktop\payment swift.exeCode function: 1_2_05C6D2B0
                Source: C:\Users\user\Desktop\payment swift.exeCode function: 1_2_05C629F8
                Source: C:\Users\user\Desktop\payment swift.exeCode function: 1_2_05C60910
                Source: C:\Users\user\Desktop\payment swift.exeCode function: 1_2_05C60040
                Source: C:\Users\user\Desktop\payment swift.exeCode function: 1_2_06138EF0
                Source: C:\Users\user\Desktop\payment swift.exeCode function: 1_2_0613E778
                Source: C:\Users\user\Desktop\payment swift.exeCode function: 1_2_06130040
                Source: C:\Users\user\Desktop\payment swift.exeCode function: 1_2_0613B910
                Source: C:\Users\user\Desktop\payment swift.exeCode function: 1_2_06138E8C
                Source: C:\Users\user\Desktop\payment swift.exeCode function: 1_2_06134758
                Source: C:\Users\user\Desktop\payment swift.exeCode function: 1_2_06131F88
                Source: C:\Users\user\Desktop\payment swift.exeCode function: 1_2_061369E0
                Source: C:\Users\user\Desktop\payment swift.exeCode function: 1_2_061652A8
                Source: C:\Users\user\Desktop\payment swift.exeCode function: 1_2_06166320
                Source: C:\Users\user\Desktop\payment swift.exeCode function: 1_2_06160040
                Source: C:\Users\user\Desktop\payment swift.exeCode function: 1_2_0616BF48
                Source: C:\Users\user\Desktop\payment swift.exeCode function: 1_2_06165B98
                Source: C:\Users\user\Desktop\payment swift.exeCode function: 1_2_0616A7B1
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeCode function: 2_2_0243C164
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeCode function: 2_2_0243E5A2
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeCode function: 2_2_0243E5B0
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeCode function: 2_2_06B76EC0
                Source: payment swift.exe, 00000000.00000002.320676583.0000000007820000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameCollins.dll8 vs payment swift.exe
                Source: payment swift.exe, 00000000.00000002.314965866.0000000001240000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameclr.dllT vs payment swift.exe
                Source: payment swift.exe, 00000000.00000002.318247702.000000000427E000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameCollins.dll8 vs payment swift.exe
                Source: payment swift.exe, 00000000.00000002.318247702.000000000427E000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilename249b56aa-023a-4323-a10f-63343cbc6341.exe4 vs payment swift.exe
                Source: payment swift.exe, 00000000.00000002.315641125.0000000003021000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenamePrecision.dll6 vs payment swift.exe
                Source: payment swift.exe, 00000000.00000002.315641125.0000000003021000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameInspector.dllN vs payment swift.exe
                Source: payment swift.exe, 00000000.00000002.315641125.0000000003021000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilename249b56aa-023a-4323-a10f-63343cbc6341.exe4 vs payment swift.exe
                Source: payment swift.exe, 00000000.00000000.297023516.0000000000B6A000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenamebHnw.exeB vs payment swift.exe
                Source: payment swift.exe, 00000001.00000002.564549054.0000000000B58000.00000004.00000010.00020000.00000000.sdmpBinary or memory string: OriginalFilenameUNKNOWN_FILET vs payment swift.exe
                Source: payment swift.exe, 00000001.00000000.313798542.0000000000438000.00000040.00000400.00020000.00000000.sdmpBinary or memory string: OriginalFilename249b56aa-023a-4323-a10f-63343cbc6341.exe4 vs payment swift.exe
                Source: payment swift.exeBinary or memory string: OriginalFilenamebHnw.exeB vs payment swift.exe
                Source: payment swift.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                Source: WdFVsOe.exe.1.drStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                Source: payment swift.exeReversingLabs: Detection: 30%
                Source: C:\Users\user\Desktop\payment swift.exeFile read: C:\Users\user\Desktop\payment swift.exeJump to behavior
                Source: payment swift.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                Source: C:\Users\user\Desktop\payment swift.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
                Source: unknownProcess created: C:\Users\user\Desktop\payment swift.exe C:\Users\user\Desktop\payment swift.exe
                Source: C:\Users\user\Desktop\payment swift.exeProcess created: C:\Users\user\Desktop\payment swift.exe C:\Users\user\Desktop\payment swift.exe
                Source: unknownProcess created: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exe "C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exe"
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess created: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exe C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exe
                Source: unknownProcess created: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exe "C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exe"
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess created: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exe C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exe
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess created: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exe C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exe
                Source: C:\Users\user\Desktop\payment swift.exeProcess created: C:\Users\user\Desktop\payment swift.exe C:\Users\user\Desktop\payment swift.exe
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess created: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exe C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exe
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess created: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exe C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exe
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess created: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exe C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exe
                Source: C:\Users\user\Desktop\payment swift.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{172BDDF8-CEEA-11D1-8B05-00600806D9B6}\InProcServer32
                Source: C:\Users\user\Desktop\payment swift.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                Source: C:\Users\user\Desktop\payment swift.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                Source: C:\Users\user\Desktop\payment swift.exeFile created: C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\payment swift.exe.logJump to behavior
                Source: C:\Users\user\Desktop\payment swift.exeFile created: C:\Users\user\AppData\Local\Temp\tmp13F9.tmpJump to behavior
                Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@11/4@3/1
                Source: payment swift.exe, 00000000.00000000.296923534.0000000000A82000.00000002.00000001.01000000.00000003.sdmp, WdFVsOe.exe.1.drBinary or memory string: insert into User_Transportation(UserID,TransportationID) values (@UserID,@TransID);
                Source: payment swift.exe, 00000000.00000000.296923534.0000000000A82000.00000002.00000001.01000000.00000003.sdmp, WdFVsOe.exe.1.drBinary or memory string: insert into TourPlace(Name,Location,TicketPrice) values (@name,@location,@ticket);
                Source: payment swift.exe, 00000000.00000000.296923534.0000000000A82000.00000002.00000001.01000000.00000003.sdmp, WdFVsOe.exe.1.drBinary or memory string: insert into User_TourPlace(UserID,TourPlaceID) values (@UserID,@TourplaceID);
                Source: payment swift.exe, 00000001.00000002.578471634.0000000002E6A000.00000004.00000800.00020000.00000000.sdmp, WdFVsOe.exe, 00000003.00000002.577540601.0000000002B6A000.00000004.00000800.00020000.00000000.sdmp, WdFVsOe.exe, 00000006.00000002.578850588.0000000002E47000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: CREATE TABLE password_notes (id INTEGER PRIMARY KEY AUTOINCREMENT, parent_id INTEGER NOT NULL REFERENCES logins ON UPDATE CASCADE ON DELETE CASCADE DEFERRABLE INITIALLY DEFERRED, key VARCHAR NOT NULL, value BLOB, date_created INTEGER NOT NULL, confidential INTEGER, UNIQUE (parent_id, key));
                Source: payment swift.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 49.80%
                Source: C:\Users\user\Desktop\payment swift.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
                Source: C:\Users\user\Desktop\payment swift.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
                Source: payment swift.exeString found in binary or memory: AddUserButton'AddUserPhoneTextbox'AdduserEmailtextbox-Adduserpasswordtextbox
                Source: payment swift.exeString found in binary or memory: Username:-AddusertextBoxUsernameCash
                Source: 1.0.payment swift.exe.400000.0.unpack, A/f2.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
                Source: 1.0.payment swift.exe.400000.0.unpack, A/f2.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
                Source: C:\Users\user\Desktop\payment swift.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                Source: C:\Users\user\Desktop\payment swift.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                Source: Window RecorderWindow detected: More than 3 window changes detected
                Source: C:\Users\user\Desktop\payment swift.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dll
                Source: C:\Users\user\Desktop\payment swift.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676
                Source: payment swift.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
                Source: payment swift.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                Source: C:\Users\user\Desktop\payment swift.exeCode function: 0_2_07AC35FB push eax; retf
                Source: C:\Users\user\Desktop\payment swift.exeCode function: 1_2_06130040 push es; iretd
                Source: C:\Users\user\Desktop\payment swift.exeCode function: 1_2_061344FD push es; retf
                Source: C:\Users\user\Desktop\payment swift.exeCode function: 1_2_06134141 push es; retf
                Source: C:\Users\user\Desktop\payment swift.exeCode function: 1_2_06134549 push es; retf
                Source: C:\Users\user\Desktop\payment swift.exeCode function: 1_2_06133590 push es; retf
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeCode function: 2_2_06B735FB push eax; retf
                Source: initial sampleStatic PE information: section name: .text entropy: 7.664774300353232
                Source: initial sampleStatic PE information: section name: .text entropy: 7.664774300353232
                Source: C:\Users\user\Desktop\payment swift.exeFile created: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeJump to dropped file
                Source: C:\Users\user\Desktop\payment swift.exeRegistry value created or modified: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run WdFVsOeJump to behavior
                Source: C:\Users\user\Desktop\payment swift.exeRegistry value created or modified: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run WdFVsOeJump to behavior

                Hooking and other Techniques for Hiding and Protection

                barindex
                Source: C:\Users\user\Desktop\payment swift.exeFile opened: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exe:Zone.Identifier read attributes | delete
                Source: C:\Users\user\Desktop\payment swift.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\payment swift.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\payment swift.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\payment swift.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\payment swift.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\payment swift.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\payment swift.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\payment swift.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\payment swift.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\payment swift.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\payment swift.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\payment swift.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\payment swift.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\payment swift.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\payment swift.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\payment swift.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\payment swift.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\payment swift.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\payment swift.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\payment swift.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\payment swift.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\payment swift.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\payment swift.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\payment swift.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\payment swift.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\payment swift.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\payment swift.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\payment swift.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\payment swift.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\payment swift.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\payment swift.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\payment swift.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\payment swift.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\payment swift.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\payment swift.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\payment swift.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\payment swift.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\payment swift.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\payment swift.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\payment swift.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\payment swift.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\payment swift.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\payment swift.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\payment swift.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\payment swift.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\payment swift.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\payment swift.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\payment swift.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\payment swift.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\payment swift.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\payment swift.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\payment swift.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\payment swift.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\payment swift.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\payment swift.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\payment swift.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\payment swift.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\payment swift.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\payment swift.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\payment swift.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\payment swift.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\payment swift.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\payment swift.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\payment swift.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\payment swift.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\payment swift.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\payment swift.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\payment swift.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\payment swift.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\payment swift.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\payment swift.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\payment swift.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\payment swift.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\payment swift.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\payment swift.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\payment swift.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\payment swift.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\payment swift.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\payment swift.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\payment swift.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\payment swift.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\payment swift.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\payment swift.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\payment swift.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\payment swift.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\payment swift.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\payment swift.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\payment swift.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\payment swift.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\payment swift.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\payment swift.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOX

                Malware Analysis System Evasion

                barindex
                Source: Yara matchFile source: 2.2.WdFVsOe.exe.25e063c.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.payment swift.exe.30605f0.2.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 2.2.WdFVsOe.exe.25c2e6c.0.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.payment swift.exe.3042e20.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000000.00000002.315807649.00000000030D5000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000002.00000002.360649511.0000000002655000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000002.00000002.360150897.00000000025A1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000002.315641125.0000000003021000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: payment swift.exe PID: 3100, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: WdFVsOe.exe PID: 2460, type: MEMORYSTR
                Source: payment swift.exe, 00000000.00000002.315807649.00000000030D5000.00000004.00000800.00020000.00000000.sdmp, payment swift.exe, 00000000.00000002.315641125.0000000003021000.00000004.00000800.00020000.00000000.sdmp, WdFVsOe.exe, 00000002.00000002.360649511.0000000002655000.00000004.00000800.00020000.00000000.sdmp, WdFVsOe.exe, 00000002.00000002.360150897.00000000025A1000.00000004.00000800.00020000.00000000.sdmp, WdFVsOe.exe, 00000004.00000002.387309784.00000000028A8000.00000004.00000800.00020000.00000000.sdmp, WdFVsOe.exe, 00000004.00000002.387853297.0000000002B65000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: SBIEDLL.DLL
                Source: payment swift.exe, 00000000.00000002.315807649.00000000030D5000.00000004.00000800.00020000.00000000.sdmp, payment swift.exe, 00000000.00000002.315641125.0000000003021000.00000004.00000800.00020000.00000000.sdmp, WdFVsOe.exe, 00000002.00000002.360649511.0000000002655000.00000004.00000800.00020000.00000000.sdmp, WdFVsOe.exe, 00000002.00000002.360150897.00000000025A1000.00000004.00000800.00020000.00000000.sdmp, WdFVsOe.exe, 00000004.00000002.387309784.00000000028A8000.00000004.00000800.00020000.00000000.sdmp, WdFVsOe.exe, 00000004.00000002.387853297.0000000002B65000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: KERNEL32.DLL.WINE_GET_UNIX_FILE_NAME
                Source: C:\Users\user\Desktop\payment swift.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_NetworkAdapterConfiguration
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_NetworkAdapterConfiguration
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_NetworkAdapterConfiguration
                Source: C:\Users\user\Desktop\payment swift.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
                Source: C:\Users\user\Desktop\payment swift.exe TID: 400Thread sleep time: -38122s >= -30000s
                Source: C:\Users\user\Desktop\payment swift.exe TID: 4832Thread sleep time: -922337203685477s >= -30000s
                Source: C:\Users\user\Desktop\payment swift.exe TID: 5900Thread sleep time: -16602069666338586s >= -30000s
                Source: C:\Users\user\Desktop\payment swift.exe TID: 5900Thread sleep time: -100000s >= -30000s
                Source: C:\Users\user\Desktop\payment swift.exe TID: 5892Thread sleep count: 9812 > 30
                Source: C:\Users\user\Desktop\payment swift.exe TID: 5900Thread sleep time: -99858s >= -30000s
                Source: C:\Users\user\Desktop\payment swift.exe TID: 5900Thread sleep time: -99732s >= -30000s
                Source: C:\Users\user\Desktop\payment swift.exe TID: 5900Thread sleep time: -99623s >= -30000s
                Source: C:\Users\user\Desktop\payment swift.exe TID: 5900Thread sleep time: -99504s >= -30000s
                Source: C:\Users\user\Desktop\payment swift.exe TID: 5900Thread sleep time: -99344s >= -30000s
                Source: C:\Users\user\Desktop\payment swift.exe TID: 5900Thread sleep time: -99234s >= -30000s
                Source: C:\Users\user\Desktop\payment swift.exe TID: 5900Thread sleep time: -99123s >= -30000s
                Source: C:\Users\user\Desktop\payment swift.exe TID: 5900Thread sleep time: -99015s >= -30000s
                Source: C:\Users\user\Desktop\payment swift.exe TID: 5900Thread sleep time: -98904s >= -30000s
                Source: C:\Users\user\Desktop\payment swift.exe TID: 5900Thread sleep time: -98793s >= -30000s
                Source: C:\Users\user\Desktop\payment swift.exe TID: 5900Thread sleep time: -98657s >= -30000s
                Source: C:\Users\user\Desktop\payment swift.exe TID: 5900Thread sleep time: -98484s >= -30000s
                Source: C:\Users\user\Desktop\payment swift.exe TID: 5900Thread sleep time: -98370s >= -30000s
                Source: C:\Users\user\Desktop\payment swift.exe TID: 5900Thread sleep time: -98264s >= -30000s
                Source: C:\Users\user\Desktop\payment swift.exe TID: 5900Thread sleep time: -98124s >= -30000s
                Source: C:\Users\user\Desktop\payment swift.exe TID: 5900Thread sleep time: -98015s >= -30000s
                Source: C:\Users\user\Desktop\payment swift.exe TID: 5900Thread sleep time: -97906s >= -30000s
                Source: C:\Users\user\Desktop\payment swift.exe TID: 5900Thread sleep time: -97793s >= -30000s
                Source: C:\Users\user\Desktop\payment swift.exe TID: 5900Thread sleep time: -97687s >= -30000s
                Source: C:\Users\user\Desktop\payment swift.exe TID: 5900Thread sleep time: -97578s >= -30000s
                Source: C:\Users\user\Desktop\payment swift.exe TID: 5900Thread sleep time: -97468s >= -30000s
                Source: C:\Users\user\Desktop\payment swift.exe TID: 5900Thread sleep time: -97356s >= -30000s
                Source: C:\Users\user\Desktop\payment swift.exe TID: 5900Thread sleep time: -97218s >= -30000s
                Source: C:\Users\user\Desktop\payment swift.exe TID: 5900Thread sleep time: -97109s >= -30000s
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exe TID: 3720Thread sleep time: -38122s >= -30000s
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exe TID: 5048Thread sleep time: -922337203685477s >= -30000s
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exe TID: 5104Thread sleep time: -20291418481080494s >= -30000s
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exe TID: 5104Thread sleep time: -100000s >= -30000s
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exe TID: 4920Thread sleep count: 9817 > 30
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exe TID: 5104Thread sleep time: -99844s >= -30000s
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exe TID: 5104Thread sleep time: -99719s >= -30000s
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exe TID: 5104Thread sleep time: -99602s >= -30000s
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exe TID: 5104Thread sleep time: -99453s >= -30000s
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exe TID: 5104Thread sleep time: -99328s >= -30000s
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exe TID: 5104Thread sleep time: -99219s >= -30000s
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exe TID: 5104Thread sleep time: -99108s >= -30000s
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exe TID: 5104Thread sleep time: -98982s >= -30000s
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exe TID: 5104Thread sleep time: -98868s >= -30000s
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exe TID: 5104Thread sleep time: -98643s >= -30000s
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exe TID: 5104Thread sleep time: -98500s >= -30000s
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exe TID: 5104Thread sleep time: -98371s >= -30000s
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exe TID: 5104Thread sleep time: -98219s >= -30000s
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exe TID: 5104Thread sleep time: -98109s >= -30000s
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exe TID: 5104Thread sleep time: -97998s >= -30000s
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exe TID: 5104Thread sleep time: -97501s >= -30000s
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exe TID: 5104Thread sleep time: -97360s >= -30000s
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exe TID: 5104Thread sleep time: -97202s >= -30000s
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exe TID: 5104Thread sleep time: -97072s >= -30000s
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exe TID: 5104Thread sleep time: -96515s >= -30000s
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exe TID: 5104Thread sleep time: -96405s >= -30000s
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exe TID: 5976Thread sleep time: -38122s >= -30000s
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exe TID: 3456Thread sleep time: -922337203685477s >= -30000s
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exe TID: 5248Thread sleep time: -15679732462653109s >= -30000s
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exe TID: 5248Thread sleep time: -100000s >= -30000s
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exe TID: 1244Thread sleep count: 9836 > 30
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exe TID: 5248Thread sleep time: -99870s >= -30000s
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exe TID: 5248Thread sleep time: -99750s >= -30000s
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exe TID: 5248Thread sleep time: -99620s >= -30000s
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exe TID: 5248Thread sleep time: -99500s >= -30000s
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exe TID: 5248Thread sleep time: -99391s >= -30000s
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exe TID: 5248Thread sleep time: -99265s >= -30000s
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exe TID: 5248Thread sleep time: -99156s >= -30000s
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exe TID: 5248Thread sleep time: -99043s >= -30000s
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exe TID: 5248Thread sleep time: -98906s >= -30000s
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exe TID: 5248Thread sleep time: -98797s >= -30000s
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exe TID: 5248Thread sleep time: -98656s >= -30000s
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exe TID: 5248Thread sleep time: -98523s >= -30000s
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exe TID: 5248Thread sleep time: -98406s >= -30000s
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exe TID: 5248Thread sleep time: -98297s >= -30000s
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exe TID: 5248Thread sleep time: -98185s >= -30000s
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exe TID: 5248Thread sleep time: -98078s >= -30000s
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exe TID: 5248Thread sleep time: -97964s >= -30000s
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exe TID: 5248Thread sleep time: -97856s >= -30000s
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exe TID: 5248Thread sleep time: -97744s >= -30000s
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exe TID: 5248Thread sleep time: -97637s >= -30000s
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exe TID: 5248Thread sleep time: -97512s >= -30000s
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exe TID: 5248Thread sleep time: -97344s >= -30000s
                Source: C:\Users\user\Desktop\payment swift.exeThread delayed: delay time: 922337203685477
                Source: C:\Users\user\Desktop\payment swift.exeThread delayed: delay time: 922337203685477
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeThread delayed: delay time: 922337203685477
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeThread delayed: delay time: 922337203685477
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeThread delayed: delay time: 922337203685477
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeThread delayed: delay time: 922337203685477
                Source: C:\Users\user\Desktop\payment swift.exeWindow / User API: threadDelayed 9812
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeWindow / User API: threadDelayed 9817
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeWindow / User API: threadDelayed 9836
                Source: C:\Users\user\Desktop\payment swift.exeEvasive API call chain: RegQueryValue,DecisionNodes,Sleep
                Source: C:\Users\user\Desktop\payment swift.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                Source: C:\Users\user\Desktop\payment swift.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                Source: C:\Users\user\Desktop\payment swift.exeProcess information queried: ProcessInformation
                Source: C:\Users\user\Desktop\payment swift.exeThread delayed: delay time: 38122
                Source: C:\Users\user\Desktop\payment swift.exeThread delayed: delay time: 922337203685477
                Source: C:\Users\user\Desktop\payment swift.exeThread delayed: delay time: 922337203685477
                Source: C:\Users\user\Desktop\payment swift.exeThread delayed: delay time: 100000
                Source: C:\Users\user\Desktop\payment swift.exeThread delayed: delay time: 99858
                Source: C:\Users\user\Desktop\payment swift.exeThread delayed: delay time: 99732
                Source: C:\Users\user\Desktop\payment swift.exeThread delayed: delay time: 99623
                Source: C:\Users\user\Desktop\payment swift.exeThread delayed: delay time: 99504
                Source: C:\Users\user\Desktop\payment swift.exeThread delayed: delay time: 99344
                Source: C:\Users\user\Desktop\payment swift.exeThread delayed: delay time: 99234
                Source: C:\Users\user\Desktop\payment swift.exeThread delayed: delay time: 99123
                Source: C:\Users\user\Desktop\payment swift.exeThread delayed: delay time: 99015
                Source: C:\Users\user\Desktop\payment swift.exeThread delayed: delay time: 98904
                Source: C:\Users\user\Desktop\payment swift.exeThread delayed: delay time: 98793
                Source: C:\Users\user\Desktop\payment swift.exeThread delayed: delay time: 98657
                Source: C:\Users\user\Desktop\payment swift.exeThread delayed: delay time: 98484
                Source: C:\Users\user\Desktop\payment swift.exeThread delayed: delay time: 98370
                Source: C:\Users\user\Desktop\payment swift.exeThread delayed: delay time: 98264
                Source: C:\Users\user\Desktop\payment swift.exeThread delayed: delay time: 98124
                Source: C:\Users\user\Desktop\payment swift.exeThread delayed: delay time: 98015
                Source: C:\Users\user\Desktop\payment swift.exeThread delayed: delay time: 97906
                Source: C:\Users\user\Desktop\payment swift.exeThread delayed: delay time: 97793
                Source: C:\Users\user\Desktop\payment swift.exeThread delayed: delay time: 97687
                Source: C:\Users\user\Desktop\payment swift.exeThread delayed: delay time: 97578
                Source: C:\Users\user\Desktop\payment swift.exeThread delayed: delay time: 97468
                Source: C:\Users\user\Desktop\payment swift.exeThread delayed: delay time: 97356
                Source: C:\Users\user\Desktop\payment swift.exeThread delayed: delay time: 97218
                Source: C:\Users\user\Desktop\payment swift.exeThread delayed: delay time: 97109
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeThread delayed: delay time: 38122
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeThread delayed: delay time: 922337203685477
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeThread delayed: delay time: 922337203685477
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeThread delayed: delay time: 100000
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeThread delayed: delay time: 99844
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeThread delayed: delay time: 99719
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeThread delayed: delay time: 99602
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeThread delayed: delay time: 99453
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeThread delayed: delay time: 99328
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeThread delayed: delay time: 99219
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeThread delayed: delay time: 99108
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeThread delayed: delay time: 98982
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeThread delayed: delay time: 98868
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeThread delayed: delay time: 98643
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeThread delayed: delay time: 98500
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeThread delayed: delay time: 98371
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeThread delayed: delay time: 98219
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeThread delayed: delay time: 98109
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeThread delayed: delay time: 97998
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeThread delayed: delay time: 97501
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeThread delayed: delay time: 97360
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeThread delayed: delay time: 97202
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeThread delayed: delay time: 97072
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeThread delayed: delay time: 96515
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeThread delayed: delay time: 96405
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeThread delayed: delay time: 38122
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeThread delayed: delay time: 922337203685477
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeThread delayed: delay time: 922337203685477
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeThread delayed: delay time: 100000
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeThread delayed: delay time: 99870
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeThread delayed: delay time: 99750
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeThread delayed: delay time: 99620
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeThread delayed: delay time: 99500
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeThread delayed: delay time: 99391
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeThread delayed: delay time: 99265
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeThread delayed: delay time: 99156
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeThread delayed: delay time: 99043
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeThread delayed: delay time: 98906
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeThread delayed: delay time: 98797
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeThread delayed: delay time: 98656
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeThread delayed: delay time: 98523
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeThread delayed: delay time: 98406
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeThread delayed: delay time: 98297
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeThread delayed: delay time: 98185
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeThread delayed: delay time: 98078
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeThread delayed: delay time: 97964
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeThread delayed: delay time: 97856
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeThread delayed: delay time: 97744
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeThread delayed: delay time: 97637
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeThread delayed: delay time: 97512
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeThread delayed: delay time: 97344
                Source: WdFVsOe.exe, 00000004.00000002.387853297.0000000002B65000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: InstallPathJC:\PROGRAM FILES\VMWARE\VMWARE TOOLS\
                Source: WdFVsOe.exe, 00000004.00000002.387853297.0000000002B65000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: vmware
                Source: WdFVsOe.exe, 00000004.00000002.387309784.00000000028A8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: VMware SVGA II
                Source: WdFVsOe.exe, 00000004.00000002.387853297.0000000002B65000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: VMWAREDSOFTWARE\VMware, Inc.\VMware Tools
                Source: C:\Users\user\Desktop\payment swift.exeProcess token adjusted: Debug
                Source: C:\Users\user\Desktop\payment swift.exeCode function: 1_2_06135110 LdrInitializeThunk,
                Source: C:\Users\user\Desktop\payment swift.exeMemory allocated: page read and write | page guard
                Source: C:\Users\user\Desktop\payment swift.exeProcess created: C:\Users\user\Desktop\payment swift.exe C:\Users\user\Desktop\payment swift.exe
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess created: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exe C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exe
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess created: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exe C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exe
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess created: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exe C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exe
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Users\user\Desktop\payment swift.exe VolumeInformation
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\arial.ttf VolumeInformation
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\ariali.ttf VolumeInformation
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\arialbd.ttf VolumeInformation
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\arialbi.ttf VolumeInformation
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\ARIALN.TTF VolumeInformation
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\ariblk.ttf VolumeInformation
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\ARIALNI.TTF VolumeInformation
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\ARIALNB.TTF VolumeInformation
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\ARIALNBI.TTF VolumeInformation
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformation
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\calibri.ttf VolumeInformation
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\calibril.ttf VolumeInformation
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\calibrii.ttf VolumeInformation
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\calibrili.ttf VolumeInformation
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\calibrib.ttf VolumeInformation
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\calibriz.ttf VolumeInformation
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\cambria.ttc VolumeInformation
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\cambriai.ttf VolumeInformation
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\cambriab.ttf VolumeInformation
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\cambriaz.ttf VolumeInformation
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\Candara.ttf VolumeInformation
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\Candarai.ttf VolumeInformation
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\Candarab.ttf VolumeInformation
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\Candaraz.ttf VolumeInformation
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\comic.ttf VolumeInformation
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\comici.ttf VolumeInformation
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\comicbd.ttf VolumeInformation
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\comicz.ttf VolumeInformation
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\consola.ttf VolumeInformation
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\consolai.ttf VolumeInformation
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\consolab.ttf VolumeInformation
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\consolaz.ttf VolumeInformation
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\constan.ttf VolumeInformation
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\constani.ttf VolumeInformation
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\constanb.ttf VolumeInformation
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\constanz.ttf VolumeInformation
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\corbel.ttf VolumeInformation
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\corbeli.ttf VolumeInformation
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\corbelb.ttf VolumeInformation
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\corbelz.ttf VolumeInformation
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\cour.ttf VolumeInformation
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\couri.ttf VolumeInformation
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\courbd.ttf VolumeInformation
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\courbi.ttf VolumeInformation
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\ebrima.ttf VolumeInformation
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\ebrimabd.ttf VolumeInformation
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\framd.ttf VolumeInformation
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\FRADM.TTF VolumeInformation
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\framdit.ttf VolumeInformation
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\FRADMIT.TTF VolumeInformation
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\FRAMDCN.TTF VolumeInformation
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\FRADMCN.TTF VolumeInformation
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\FRAHV.TTF VolumeInformation
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\FRAHVIT.TTF VolumeInformation
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\Gabriola.ttf VolumeInformation
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\gadugi.ttf VolumeInformation
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\gadugib.ttf VolumeInformation
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\georgia.ttf VolumeInformation
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\georgiai.ttf VolumeInformation
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\georgiab.ttf VolumeInformation
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\georgiaz.ttf VolumeInformation
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\impact.ttf VolumeInformation
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\Inkfree.ttf VolumeInformation
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\javatext.ttf VolumeInformation
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\LeelawUI.ttf VolumeInformation
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\LeelUIsl.ttf VolumeInformation
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\LeelaUIb.ttf VolumeInformation
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\lucon.ttf VolumeInformation
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\l_10646.ttf VolumeInformation
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\malgun.ttf VolumeInformation
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\malgunsl.ttf VolumeInformation
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\malgunbd.ttf VolumeInformation
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\himalaya.ttf VolumeInformation
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\msjh.ttc VolumeInformation
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\msjhl.ttc VolumeInformation
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\msjhbd.ttc VolumeInformation
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\ntailu.ttf VolumeInformation
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\ntailub.ttf VolumeInformation
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\phagspa.ttf VolumeInformation
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\phagspab.ttf VolumeInformation
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformation
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\taile.ttf VolumeInformation
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\taileb.ttf VolumeInformation
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\msyh.ttc VolumeInformation
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\msyhl.ttc VolumeInformation
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\msyhbd.ttc VolumeInformation
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\msyi.ttf VolumeInformation
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\mingliub.ttc VolumeInformation
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\monbaiti.ttf VolumeInformation
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\msgothic.ttc VolumeInformation
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\mvboli.ttf VolumeInformation
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\mmrtext.ttf VolumeInformation
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\mmrtextb.ttf VolumeInformation
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\Nirmala.ttf VolumeInformation
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\NirmalaS.ttf VolumeInformation
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\NirmalaB.ttf VolumeInformation
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\pala.ttf VolumeInformation
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\palai.ttf VolumeInformation
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\palab.ttf VolumeInformation
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\palabi.ttf VolumeInformation
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\segoepr.ttf VolumeInformation
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\segoeprb.ttf VolumeInformation
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\segoesc.ttf VolumeInformation
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\segoescb.ttf VolumeInformation
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\seguisb.ttf VolumeInformation
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\segoeuii.ttf VolumeInformation
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\seguisli.ttf VolumeInformation
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\seguili.ttf VolumeInformation
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\seguisbi.ttf VolumeInformation
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\segoeuiz.ttf VolumeInformation
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\seguibl.ttf VolumeInformation
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\seguibli.ttf VolumeInformation
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\seguiemj.ttf VolumeInformation
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\seguihis.ttf VolumeInformation
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\seguisym.ttf VolumeInformation
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\simsun.ttc VolumeInformation
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\simsunb.ttf VolumeInformation
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\Sitka.ttc VolumeInformation
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\SitkaI.ttc VolumeInformation
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\SitkaB.ttc VolumeInformation
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\SitkaZ.ttc VolumeInformation
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\sylfaen.ttf VolumeInformation
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\symbol.ttf VolumeInformation
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\tahoma.ttf VolumeInformation
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\tahomabd.ttf VolumeInformation
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\timesi.ttf VolumeInformation
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\timesbd.ttf VolumeInformation
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\timesbi.ttf VolumeInformation
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\trebuc.ttf VolumeInformation
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\trebucit.ttf VolumeInformation
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\trebucbd.ttf VolumeInformation
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\trebucbi.ttf VolumeInformation
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\verdana.ttf VolumeInformation
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\verdanai.ttf VolumeInformation
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\verdanab.ttf VolumeInformation
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\verdanaz.ttf VolumeInformation
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\webdings.ttf VolumeInformation
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\wingding.ttf VolumeInformation
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\YuGothR.ttc VolumeInformation
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\YuGothM.ttc VolumeInformation
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\YuGothL.ttc VolumeInformation
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\YuGothB.ttc VolumeInformation
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\holomdl2.ttf VolumeInformation
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\CENTURY.TTF VolumeInformation
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\LEELAWAD.TTF VolumeInformation
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\LEELAWDB.TTF VolumeInformation
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\MSUIGHUR.TTF VolumeInformation
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\MSUIGHUB.TTF VolumeInformation
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\WINGDNG2.TTF VolumeInformation
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\WINGDNG3.TTF VolumeInformation
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\TEMPSITC.TTF VolumeInformation
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\PRISTINA.TTF VolumeInformation
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\PAPYRUS.TTF VolumeInformation
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\MISTRAL.TTF VolumeInformation
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\LHANDW.TTF VolumeInformation
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\ITCKRIST.TTF VolumeInformation
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\JUICE___.TTF VolumeInformation
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\FRSCRIPT.TTF VolumeInformation
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\FREESCPT.TTF VolumeInformation
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\BRADHITC.TTF VolumeInformation
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\OUTLOOK.TTF VolumeInformation
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\BKANT.TTF VolumeInformation
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\ANTQUAI.TTF VolumeInformation
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\ANTQUAB.TTF VolumeInformation
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\ANTQUABI.TTF VolumeInformation
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\GARA.TTF VolumeInformation
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\GARAIT.TTF VolumeInformation
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\GARABD.TTF VolumeInformation
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\MTCORSVA.TTF VolumeInformation
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\GOTHIC.TTF VolumeInformation
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\GOTHICI.TTF VolumeInformation
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\GOTHICB.TTF VolumeInformation
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\GOTHICBI.TTF VolumeInformation
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\ALGER.TTF VolumeInformation
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\BASKVILL.TTF VolumeInformation
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\BAUHS93.TTF VolumeInformation
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\BELL.TTF VolumeInformation
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\BELLI.TTF VolumeInformation
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\BELLB.TTF VolumeInformation
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\BRLNSR.TTF VolumeInformation
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\BRLNSDB.TTF VolumeInformation
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\BRLNSB.TTF VolumeInformation
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\BERNHC.TTF VolumeInformation
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\BOD_PSTC.TTF VolumeInformation
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\BRITANIC.TTF VolumeInformation
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\BROADW.TTF VolumeInformation
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\BRUSHSCI.TTF VolumeInformation
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\CALIFR.TTF VolumeInformation
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\CALIFI.TTF VolumeInformation
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\CALIFB.TTF VolumeInformation
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\CENTAUR.TTF VolumeInformation
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\CHILLER.TTF VolumeInformation
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\COLONNA.TTF VolumeInformation
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\COOPBL.TTF VolumeInformation
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\FTLTLT.TTF VolumeInformation
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\HARLOWSI.TTF VolumeInformation
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\HARNGTON.TTF VolumeInformation
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\HTOWERT.TTF VolumeInformation
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\HTOWERTI.TTF VolumeInformation
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\JOKERMAN.TTF VolumeInformation
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\KUNSTLER.TTF VolumeInformation
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\LBRITE.TTF VolumeInformation
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\LBRITED.TTF VolumeInformation
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\LBRITEI.TTF VolumeInformation
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\LBRITEDI.TTF VolumeInformation
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\LCALLIG.TTF VolumeInformation
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\LFAX.TTF VolumeInformation
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\LFAXD.TTF VolumeInformation
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\LFAXI.TTF VolumeInformation
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\LFAXDI.TTF VolumeInformation
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\MAGNETOB.TTF VolumeInformation
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\MATURASC.TTF VolumeInformation
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\MOD20.TTF VolumeInformation
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\NIAGENG.TTF VolumeInformation
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\NIAGSOL.TTF VolumeInformation
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\OLDENGL.TTF VolumeInformation
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\ONYX.TTF VolumeInformation
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\PARCHM.TTF VolumeInformation
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\PLAYBILL.TTF VolumeInformation
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\POORICH.TTF VolumeInformation
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\RAVIE.TTF VolumeInformation
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\INFROMAN.TTF VolumeInformation
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\SHOWG.TTF VolumeInformation
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\SNAP____.TTF VolumeInformation
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\STENCIL.TTF VolumeInformation
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\VINERITC.TTF VolumeInformation
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\VIVALDII.TTF VolumeInformation
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\VLADIMIR.TTF VolumeInformation
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\LATINWD.TTF VolumeInformation
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\TCM_____.TTF VolumeInformation
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\TCMI____.TTF VolumeInformation
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\TCB_____.TTF VolumeInformation
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\TCBI____.TTF VolumeInformation
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\TCCM____.TTF VolumeInformation
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\TCCB____.TTF VolumeInformation
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\TCCEB.TTF VolumeInformation
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\SCRIPTBL.TTF VolumeInformation
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\ROCK.TTF VolumeInformation
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\ROCKI.TTF VolumeInformation
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\ROCKB.TTF VolumeInformation
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\ROCKEB.TTF VolumeInformation
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\ROCKBI.TTF VolumeInformation
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\ROCC____.TTF VolumeInformation
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\ROCCB___.TTF VolumeInformation
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\RAGE.TTF VolumeInformation
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\PERTILI.TTF VolumeInformation
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\PERTIBD.TTF VolumeInformation
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\PER_____.TTF VolumeInformation
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\PERI____.TTF VolumeInformation
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\PERB____.TTF VolumeInformation
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\PERBI___.TTF VolumeInformation
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\PALSCRI.TTF VolumeInformation
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\OCRAEXT.TTF VolumeInformation
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\MAIAN.TTF VolumeInformation
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\LTYPE.TTF VolumeInformation
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\LTYPEO.TTF VolumeInformation
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\LTYPEB.TTF VolumeInformation
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\LTYPEBO.TTF VolumeInformation
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\LSANS.TTF VolumeInformation
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\LSANSD.TTF VolumeInformation
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\LSANSI.TTF VolumeInformation
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\LSANSDI.TTF VolumeInformation
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\IMPRISHA.TTF VolumeInformation
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\HATTEN.TTF VolumeInformation
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\GOUDYSTO.TTF VolumeInformation
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\GOUDOS.TTF VolumeInformation
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\GOUDOSI.TTF VolumeInformation
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\GOUDOSB.TTF VolumeInformation
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\GLECB.TTF VolumeInformation
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\GIL_____.TTF VolumeInformation
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\GILI____.TTF VolumeInformation
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\GILB____.TTF VolumeInformation
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\GILBI___.TTF VolumeInformation
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\GILC____.TTF VolumeInformation
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\GLSNECB.TTF VolumeInformation
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\GIGI.TTF VolumeInformation
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\FRABK.TTF VolumeInformation
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\FRABKIT.TTF VolumeInformation
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\FORTE.TTF VolumeInformation
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\FELIXTI.TTF VolumeInformation
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\ERASMD.TTF VolumeInformation
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\ERASLGHT.TTF VolumeInformation
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\ERASDEMI.TTF VolumeInformation
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\ERASBD.TTF VolumeInformation
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\ENGR.TTF VolumeInformation
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\ELEPHNT.TTF VolumeInformation
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\ELEPHNTI.TTF VolumeInformation
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\ITCEDSCR.TTF VolumeInformation
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\CURLZ___.TTF VolumeInformation
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\COPRGTL.TTF VolumeInformation
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\COPRGTB.TTF VolumeInformation
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\CENSCBK.TTF VolumeInformation
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\SCHLBKI.TTF VolumeInformation
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\SCHLBKB.TTF VolumeInformation
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\SCHLBKBI.TTF VolumeInformation
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\CASTELAR.TTF VolumeInformation
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\CALIST.TTF VolumeInformation
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\CALISTI.TTF VolumeInformation
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\CALISTB.TTF VolumeInformation
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\CALISTBI.TTF VolumeInformation
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\BOOKOS.TTF VolumeInformation
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\BOOKOSB.TTF VolumeInformation
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\BOOKOSI.TTF VolumeInformation
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\BOOKOSBI.TTF VolumeInformation
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\BOD_R.TTF VolumeInformation
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\BOD_I.TTF VolumeInformation
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\BOD_B.TTF VolumeInformation
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\BOD_BI.TTF VolumeInformation
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\BOD_CR.TTF VolumeInformation
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\BOD_BLAR.TTF VolumeInformation
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\BOD_CI.TTF VolumeInformation
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\BOD_CB.TTF VolumeInformation
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\BOD_BLAI.TTF VolumeInformation
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\BOD_CBI.TTF VolumeInformation
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\ITCBLKAD.TTF VolumeInformation
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\ARLRDBD.TTF VolumeInformation
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\AGENCYR.TTF VolumeInformation
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\AGENCYB.TTF VolumeInformation
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\BSSYM7.TTF VolumeInformation
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\REFSAN.TTF VolumeInformation
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\REFSPCL.TTF VolumeInformation
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\MTEXTRA.TTF VolumeInformation
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\marlett.ttf VolumeInformation
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\tahoma.ttf VolumeInformation
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\tahomabd.ttf VolumeInformation
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformation
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Users\user\Desktop\payment swift.exe VolumeInformation
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformation
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformation
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformation
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Management.dll VolumeInformation
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeQueries volume information: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exe VolumeInformation
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeQueries volume information: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exe VolumeInformation
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformation
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformation
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformation
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Management.dll VolumeInformation
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeQueries volume information: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exe VolumeInformation
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeQueries volume information: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exe VolumeInformation
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformation
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformation
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformation
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Management.dll VolumeInformation
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
                Source: C:\Users\user\Desktop\payment swift.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid

                Stealing of Sensitive Information

                barindex
                Source: Yara matchFile source: 0.2.payment swift.exe.4392240.6.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 1.0.payment swift.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.payment swift.exe.42fe420.8.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.payment swift.exe.4392240.6.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.payment swift.exe.427e9d0.7.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000001.00000000.313645910.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000002.318247702.000000000427E000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000001.00000002.570872866.0000000002B41000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000006.00000002.571356587.0000000002B2C000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000003.00000002.569999847.0000000002841000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: payment swift.exe PID: 3100, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: payment swift.exe PID: 4460, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: WdFVsOe.exe PID: 4768, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: WdFVsOe.exe PID: 1276, type: MEMORYSTR
                Source: C:\Users\user\Desktop\payment swift.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.ini
                Source: C:\Users\user\Desktop\payment swift.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.ini
                Source: C:\Users\user\Desktop\payment swift.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676
                Source: C:\Users\user\Desktop\payment swift.exeKey opened: HKEY_CURRENT_USER\Software\IncrediMail\Identities
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.ini
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.ini
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeKey opened: HKEY_CURRENT_USER\Software\IncrediMail\Identities
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.ini
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.ini
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeKey opened: HKEY_CURRENT_USER\Software\IncrediMail\Identities
                Source: C:\Users\user\Desktop\payment swift.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Martin Prikryl\WinSCP 2\Sessions
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Martin Prikryl\WinSCP 2\Sessions
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Martin Prikryl\WinSCP 2\Sessions
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeFile opened: C:\Users\user\AppData\Roaming\FileZilla\recentservers.xml
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeFile opened: C:\Users\user\AppData\Roaming\SmartFTP\Client 2.0\Favorites\Quick Connect\
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login Data
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.ini
                Source: Yara matchFile source: 00000001.00000002.570872866.0000000002B41000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000006.00000002.571356587.0000000002B2C000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000003.00000002.569999847.0000000002841000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: payment swift.exe PID: 4460, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: WdFVsOe.exe PID: 4768, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: WdFVsOe.exe PID: 1276, type: MEMORYSTR

                Remote Access Functionality

                barindex
                Source: Yara matchFile source: 0.2.payment swift.exe.4392240.6.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 1.0.payment swift.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.payment swift.exe.42fe420.8.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.payment swift.exe.4392240.6.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.payment swift.exe.427e9d0.7.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000001.00000000.313645910.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000002.318247702.000000000427E000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000001.00000002.570872866.0000000002B41000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000006.00000002.571356587.0000000002B2C000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000003.00000002.569999847.0000000002841000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: payment swift.exe PID: 3100, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: payment swift.exe PID: 4460, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: WdFVsOe.exe PID: 4768, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: WdFVsOe.exe PID: 1276, type: MEMORYSTR
                Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
                Valid Accounts211
                Windows Management Instrumentation
                1
                Registry Run Keys / Startup Folder
                11
                Process Injection
                1
                Disable or Modify Tools
                2
                OS Credential Dumping
                114
                System Information Discovery
                Remote Services11
                Archive Collected Data
                Exfiltration Over Other Network Medium1
                Encrypted Channel
                Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
                Default Accounts2
                Command and Scripting Interpreter
                Boot or Logon Initialization Scripts1
                Registry Run Keys / Startup Folder
                1
                Deobfuscate/Decode Files or Information
                1
                Input Capture
                311
                Security Software Discovery
                Remote Desktop Protocol2
                Data from Local System
                Exfiltration Over Bluetooth1
                Non-Standard Port
                Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
                Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)2
                Obfuscated Files or Information
                1
                Credentials in Registry
                1
                Process Discovery
                SMB/Windows Admin Shares1
                Email Collection
                Automated Exfiltration1
                Non-Application Layer Protocol
                Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
                Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)3
                Software Packing
                NTDS131
                Virtualization/Sandbox Evasion
                Distributed Component Object Model1
                Input Capture
                Scheduled Transfer11
                Application Layer Protocol
                SIM Card SwapCarrier Billing Fraud
                Cloud AccountsCronNetwork Logon ScriptNetwork Logon Script1
                Masquerading
                LSA Secrets1
                Application Window Discovery
                SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
                Replication Through Removable MediaLaunchdRc.commonRc.common131
                Virtualization/Sandbox Evasion
                Cached Domain Credentials1
                Remote System Discovery
                VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
                External Remote ServicesScheduled TaskStartup ItemsStartup Items11
                Process Injection
                DCSyncNetwork SniffingWindows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
                Drive-by CompromiseCommand and Scripting InterpreterScheduled Task/JobScheduled Task/Job1
                Hidden Files and Directories
                Proc FilesystemNetwork Service ScanningShared WebrootCredential API HookingExfiltration Over Symmetric Encrypted Non-C2 ProtocolApplication Layer ProtocolDowngrade to Insecure ProtocolsGenerate Fraudulent Advertising Revenue
                Hide Legend

                Legend:

                • Process
                • Signature
                • Created File
                • DNS/IP Info
                • Is Dropped
                • Is Windows Process
                • Number of created Registry Values
                • Number of created Files
                • Visual Basic
                • Delphi
                • Java
                • .Net C# or VB.NET
                • C, C++ or other language
                • Is malicious
                • Internet
                behaviorgraph top1 signatures2 2 Behavior Graph ID: 755998 Sample: payment swift.exe Startdate: 29/11/2022 Architecture: WINDOWS Score: 100 33 Malicious sample detected (through community Yara rule) 2->33 35 Multi AV Scanner detection for submitted file 2->35 37 Yara detected AgentTesla 2->37 39 7 other signatures 2->39 6 WdFVsOe.exe 3 2->6         started        9 payment swift.exe 3 2->9         started        12 WdFVsOe.exe 2 2->12         started        process3 file4 41 Multi AV Scanner detection for dropped file 6->41 43 Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines) 6->43 45 Machine Learning detection for dropped file 6->45 47 Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines) 6->47 14 WdFVsOe.exe 3 6->14         started        29 C:\Users\user\...\payment swift.exe.log, ASCII 9->29 dropped 18 payment swift.exe 2 6 9->18         started        21 WdFVsOe.exe 3 12->21         started        23 WdFVsOe.exe 12->23         started        signatures5 process6 dnsIp7 31 host39.registrar-servers.com 68.65.122.214, 49695, 49696, 49697 NAMECHEAP-NETUS United States 18->31 25 C:\Users\user\AppData\Roaming\...\WdFVsOe.exe, PE32 18->25 dropped 27 C:\Users\user\...\WdFVsOe.exe:Zone.Identifier, ASCII 18->27 dropped 49 Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc) 18->49 51 Tries to steal Mail credentials (via file / registry access) 18->51 53 Hides that the sample has been downloaded from the Internet (zone.identifier) 18->53 55 Tries to harvest and steal ftp login credentials 21->55 57 Tries to harvest and steal browser information (history, passwords, etc) 21->57 file8 signatures9

                This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                windows-stand
                SourceDetectionScannerLabelLink
                payment swift.exe30%ReversingLabsByteCode-MSIL.Trojan.AgentTesla
                payment swift.exe100%Joe Sandbox ML
                SourceDetectionScannerLabelLink
                C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exe100%Joe Sandbox ML
                C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exe30%ReversingLabsByteCode-MSIL.Trojan.AgentTesla
                SourceDetectionScannerLabelLinkDownload
                1.0.payment swift.exe.400000.0.unpack100%AviraTR/Spy.Gen8Download File
                No Antivirus matches
                SourceDetectionScannerLabelLink
                http://crt.sectigo.com/SectigoRSADomainValidationSecureServerCA.crt0#0%URL Reputationsafe
                https://sectigo.com/CPS00%URL Reputationsafe
                http://127.0.0.1:HTTP/1.10%Avira URL Cloudsafe
                http://www.founder.com.cn/cn/bThe0%URL Reputationsafe
                http://www.founder.com.cn/cn/bThe0%URL Reputationsafe
                https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.ziphttps://www0%URL Reputationsafe
                http://www.tiro.com0%URL Reputationsafe
                http://www.goodfont.co.kr0%URL Reputationsafe
                http://www.carterandcone.coml0%URL Reputationsafe
                http://www.sajatypeworks.com0%URL Reputationsafe
                http://www.typography.netD0%URL Reputationsafe
                http://www.founder.com.cn/cn/cThe0%URL Reputationsafe
                http://www.galapagosdesign.com/staff/dennis.htm0%URL Reputationsafe
                http://fontfabrik.com0%URL Reputationsafe
                http://www.founder.com.cn/cn0%URL Reputationsafe
                http://www.jiyu-kobo.co.jp/0%URL Reputationsafe
                http://DynDns.comDynDNSnamejidpasswordPsi/Psi0%URL Reputationsafe
                http://www.galapagosdesign.com/DPlease0%URL Reputationsafe
                http://www.sandoll.co.kr0%URL Reputationsafe
                http://www.urwpp.deDPlease0%URL Reputationsafe
                http://www.zhongyicts.com.cn0%URL Reputationsafe
                http://www.sakkal.com0%URL Reputationsafe
                https://D16a0atI7uWaj.comX0%Avira URL Cloudsafe
                http://ocsp.sectigo.com090%Avira URL Cloudsafe
                http://kjkcOA.com0%Avira URL Cloudsafe
                https://D16a0atI7uWaj.com0%Avira URL Cloudsafe
                http://crl.comor0%Avira URL Cloudsafe
                NameIPActiveMaliciousAntivirus DetectionReputation
                host39.registrar-servers.com
                68.65.122.214
                truefalse
                  high
                  NameSourceMaliciousAntivirus DetectionReputation
                  http://crt.sectigo.com/SectigoRSADomainValidationSecureServerCA.crt0#payment swift.exe, 00000001.00000002.568239695.0000000000C61000.00000004.00000020.00020000.00000000.sdmp, payment swift.exe, 00000001.00000002.568309572.0000000000C69000.00000004.00000020.00020000.00000000.sdmp, payment swift.exe, 00000001.00000002.578503982.0000000002E6F000.00000004.00000800.00020000.00000000.sdmp, WdFVsOe.exe, 00000003.00000002.578453028.0000000002BC4000.00000004.00000800.00020000.00000000.sdmp, WdFVsOe.exe, 00000003.00000002.587147691.0000000006360000.00000004.00000800.00020000.00000000.sdmp, WdFVsOe.exe, 00000006.00000002.579742937.0000000002EA2000.00000004.00000800.00020000.00000000.sdmpfalse
                  • URL Reputation: safe
                  unknown
                  http://127.0.0.1:HTTP/1.1payment swift.exe, 00000001.00000002.570872866.0000000002B41000.00000004.00000800.00020000.00000000.sdmp, WdFVsOe.exe, 00000003.00000002.569999847.0000000002841000.00000004.00000800.00020000.00000000.sdmp, WdFVsOe.exe, 00000006.00000002.571356587.0000000002B2C000.00000004.00000800.00020000.00000000.sdmpfalse
                  • Avira URL Cloud: safe
                  low
                  http://www.apache.org/licenses/LICENSE-2.0payment swift.exe, 00000000.00000002.319963745.0000000006F82000.00000004.00000800.00020000.00000000.sdmpfalse
                    high
                    http://www.fontbureau.compayment swift.exe, 00000000.00000002.319963745.0000000006F82000.00000004.00000800.00020000.00000000.sdmpfalse
                      high
                      http://www.fontbureau.com/designersGpayment swift.exe, 00000000.00000002.319963745.0000000006F82000.00000004.00000800.00020000.00000000.sdmpfalse
                        high
                        https://sectigo.com/CPS0payment swift.exe, 00000001.00000002.568239695.0000000000C61000.00000004.00000020.00020000.00000000.sdmp, payment swift.exe, 00000001.00000002.568309572.0000000000C69000.00000004.00000020.00020000.00000000.sdmp, payment swift.exe, 00000001.00000002.578503982.0000000002E6F000.00000004.00000800.00020000.00000000.sdmp, WdFVsOe.exe, 00000003.00000002.578453028.0000000002BC4000.00000004.00000800.00020000.00000000.sdmp, WdFVsOe.exe, 00000003.00000002.587147691.0000000006360000.00000004.00000800.00020000.00000000.sdmp, WdFVsOe.exe, 00000006.00000002.579742937.0000000002EA2000.00000004.00000800.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        http://www.fontbureau.com/designers/?payment swift.exe, 00000000.00000002.319963745.0000000006F82000.00000004.00000800.00020000.00000000.sdmpfalse
                          high
                          http://www.founder.com.cn/cn/bThepayment swift.exe, 00000000.00000002.319963745.0000000006F82000.00000004.00000800.00020000.00000000.sdmpfalse
                          • URL Reputation: safe
                          • URL Reputation: safe
                          unknown
                          http://ocsp.sectigo.com09payment swift.exe, 00000001.00000002.568239695.0000000000C61000.00000004.00000020.00020000.00000000.sdmp, payment swift.exe, 00000001.00000002.568309572.0000000000C69000.00000004.00000020.00020000.00000000.sdmp, payment swift.exe, 00000001.00000002.578503982.0000000002E6F000.00000004.00000800.00020000.00000000.sdmp, WdFVsOe.exe, 00000003.00000002.578453028.0000000002BC4000.00000004.00000800.00020000.00000000.sdmp, WdFVsOe.exe, 00000003.00000002.587147691.0000000006360000.00000004.00000800.00020000.00000000.sdmp, WdFVsOe.exe, 00000006.00000002.579742937.0000000002EA2000.00000004.00000800.00020000.00000000.sdmpfalse
                          • Avira URL Cloud: safe
                          unknown
                          http://www.fontbureau.com/designers?payment swift.exe, 00000000.00000002.319963745.0000000006F82000.00000004.00000800.00020000.00000000.sdmpfalse
                            high
                            http://host39.registrar-servers.compayment swift.exe, 00000001.00000002.578503982.0000000002E6F000.00000004.00000800.00020000.00000000.sdmp, WdFVsOe.exe, 00000003.00000002.578453028.0000000002BC4000.00000004.00000800.00020000.00000000.sdmp, WdFVsOe.exe, 00000006.00000002.579742937.0000000002EA2000.00000004.00000800.00020000.00000000.sdmpfalse
                              high
                              https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.ziphttps://wwwpayment swift.exe, 00000001.00000002.570872866.0000000002B41000.00000004.00000800.00020000.00000000.sdmp, WdFVsOe.exe, 00000003.00000002.569999847.0000000002841000.00000004.00000800.00020000.00000000.sdmp, WdFVsOe.exe, 00000006.00000002.571356587.0000000002B2C000.00000004.00000800.00020000.00000000.sdmpfalse
                              • URL Reputation: safe
                              unknown
                              http://www.tiro.compayment swift.exe, 00000000.00000002.319963745.0000000006F82000.00000004.00000800.00020000.00000000.sdmpfalse
                              • URL Reputation: safe
                              unknown
                              http://www.fontbureau.com/designerspayment swift.exe, 00000000.00000002.319963745.0000000006F82000.00000004.00000800.00020000.00000000.sdmpfalse
                                high
                                http://www.goodfont.co.krpayment swift.exe, 00000000.00000002.319963745.0000000006F82000.00000004.00000800.00020000.00000000.sdmpfalse
                                • URL Reputation: safe
                                unknown
                                http://www.carterandcone.comlpayment swift.exe, 00000000.00000002.319963745.0000000006F82000.00000004.00000800.00020000.00000000.sdmpfalse
                                • URL Reputation: safe
                                unknown
                                http://www.sajatypeworks.compayment swift.exe, 00000000.00000002.319963745.0000000006F82000.00000004.00000800.00020000.00000000.sdmpfalse
                                • URL Reputation: safe
                                unknown
                                http://www.typography.netDpayment swift.exe, 00000000.00000002.319963745.0000000006F82000.00000004.00000800.00020000.00000000.sdmpfalse
                                • URL Reputation: safe
                                unknown
                                http://www.fontbureau.com/designers/cabarga.htmlNpayment swift.exe, 00000000.00000002.319963745.0000000006F82000.00000004.00000800.00020000.00000000.sdmpfalse
                                  high
                                  http://www.founder.com.cn/cn/cThepayment swift.exe, 00000000.00000002.319963745.0000000006F82000.00000004.00000800.00020000.00000000.sdmpfalse
                                  • URL Reputation: safe
                                  unknown
                                  http://www.galapagosdesign.com/staff/dennis.htmpayment swift.exe, 00000000.00000002.319963745.0000000006F82000.00000004.00000800.00020000.00000000.sdmpfalse
                                  • URL Reputation: safe
                                  unknown
                                  http://fontfabrik.compayment swift.exe, 00000000.00000002.319963745.0000000006F82000.00000004.00000800.00020000.00000000.sdmpfalse
                                  • URL Reputation: safe
                                  unknown
                                  http://www.founder.com.cn/cnpayment swift.exe, 00000000.00000002.319963745.0000000006F82000.00000004.00000800.00020000.00000000.sdmpfalse
                                  • URL Reputation: safe
                                  unknown
                                  https://D16a0atI7uWaj.comXWdFVsOe.exe, 00000003.00000002.577583432.0000000002B6F000.00000004.00000800.00020000.00000000.sdmp, WdFVsOe.exe, 00000006.00000002.578885319.0000000002E4C000.00000004.00000800.00020000.00000000.sdmpfalse
                                  • Avira URL Cloud: safe
                                  unknown
                                  http://www.fontbureau.com/designers/frere-user.htmlpayment swift.exe, 00000000.00000002.319963745.0000000006F82000.00000004.00000800.00020000.00000000.sdmpfalse
                                    high
                                    http://www.jiyu-kobo.co.jp/payment swift.exe, 00000000.00000002.319963745.0000000006F82000.00000004.00000800.00020000.00000000.sdmpfalse
                                    • URL Reputation: safe
                                    unknown
                                    http://kjkcOA.comWdFVsOe.exe, 00000006.00000002.571356587.0000000002B2C000.00000004.00000800.00020000.00000000.sdmpfalse
                                    • Avira URL Cloud: safe
                                    unknown
                                    http://DynDns.comDynDNSnamejidpasswordPsi/PsiWdFVsOe.exe, 00000006.00000002.571356587.0000000002B2C000.00000004.00000800.00020000.00000000.sdmpfalse
                                    • URL Reputation: safe
                                    unknown
                                    http://www.galapagosdesign.com/DPleasepayment swift.exe, 00000000.00000002.319963745.0000000006F82000.00000004.00000800.00020000.00000000.sdmpfalse
                                    • URL Reputation: safe
                                    unknown
                                    http://www.fontbureau.com/designers8payment swift.exe, 00000000.00000002.319963745.0000000006F82000.00000004.00000800.00020000.00000000.sdmpfalse
                                      high
                                      http://www.fonts.compayment swift.exe, 00000000.00000002.319963745.0000000006F82000.00000004.00000800.00020000.00000000.sdmpfalse
                                        high
                                        http://www.sandoll.co.krpayment swift.exe, 00000000.00000002.319963745.0000000006F82000.00000004.00000800.00020000.00000000.sdmpfalse
                                        • URL Reputation: safe
                                        unknown
                                        https://D16a0atI7uWaj.comWdFVsOe.exe, 00000006.00000002.578885319.0000000002E4C000.00000004.00000800.00020000.00000000.sdmp, WdFVsOe.exe, 00000006.00000002.579991612.0000000002EC5000.00000004.00000800.00020000.00000000.sdmpfalse
                                        • Avira URL Cloud: safe
                                        unknown
                                        http://www.urwpp.deDPleasepayment swift.exe, 00000000.00000002.319963745.0000000006F82000.00000004.00000800.00020000.00000000.sdmpfalse
                                        • URL Reputation: safe
                                        unknown
                                        http://www.zhongyicts.com.cnpayment swift.exe, 00000000.00000002.319963745.0000000006F82000.00000004.00000800.00020000.00000000.sdmpfalse
                                        • URL Reputation: safe
                                        unknown
                                        http://www.sakkal.compayment swift.exe, 00000000.00000002.319963745.0000000006F82000.00000004.00000800.00020000.00000000.sdmpfalse
                                        • URL Reputation: safe
                                        unknown
                                        http://crl.comorWdFVsOe.exe, 00000003.00000002.587147691.0000000006360000.00000004.00000800.00020000.00000000.sdmpfalse
                                        • Avira URL Cloud: safe
                                        unknown
                                        • No. of IPs < 25%
                                        • 25% < No. of IPs < 50%
                                        • 50% < No. of IPs < 75%
                                        • 75% < No. of IPs
                                        IPDomainCountryFlagASNASN NameMalicious
                                        68.65.122.214
                                        host39.registrar-servers.comUnited States
                                        22612NAMECHEAP-NETUSfalse
                                        Joe Sandbox Version:36.0.0 Rainbow Opal
                                        Analysis ID:755998
                                        Start date and time:2022-11-29 13:26:11 +01:00
                                        Joe Sandbox Product:CloudBasic
                                        Overall analysis duration:0h 9m 5s
                                        Hypervisor based Inspection enabled:false
                                        Report type:light
                                        Sample file name:payment swift.exe
                                        Cookbook file name:default.jbs
                                        Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 104, IE 11, Adobe Reader DC 19, Java 8 Update 211
                                        Number of analysed new started processes analysed:12
                                        Number of new started drivers analysed:0
                                        Number of existing processes analysed:0
                                        Number of existing drivers analysed:0
                                        Number of injected processes analysed:0
                                        Technologies:
                                        • HCA enabled
                                        • EGA enabled
                                        • HDC enabled
                                        • AMSI enabled
                                        Analysis Mode:default
                                        Analysis stop reason:Timeout
                                        Detection:MAL
                                        Classification:mal100.troj.spyw.evad.winEXE@11/4@3/1
                                        EGA Information:
                                        • Successful, ratio: 100%
                                        HDC Information:Failed
                                        HCA Information:
                                        • Successful, ratio: 95%
                                        • Number of executed functions: 0
                                        • Number of non-executed functions: 0
                                        Cookbook Comments:
                                        • Found application associated with file extension: .exe
                                        • Exclude process from analysis (whitelisted): MpCmdRun.exe, audiodg.exe, WMIADAP.exe, conhost.exe, backgroundTaskHost.exe
                                        • TCP Packets have been reduced to 100
                                        • Not all processes where analyzed, report is missing behavior information
                                        • Report creation exceeded maximum time and may have missing disassembly code information.
                                        • Report size exceeded maximum capacity and may have missing behavior information.
                                        • Report size getting too big, too many NtAllocateVirtualMemory calls found.
                                        • Report size getting too big, too many NtOpenKeyEx calls found.
                                        • Report size getting too big, too many NtProtectVirtualMemory calls found.
                                        • Report size getting too big, too many NtQueryValueKey calls found.
                                        TimeTypeDescription
                                        13:27:09API Interceptor694x Sleep call for process: payment swift.exe modified
                                        13:27:19AutostartRun: HKCU\Software\Microsoft\Windows\CurrentVersion\Run WdFVsOe C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exe
                                        13:27:27AutostartRun: HKCU64\Software\Microsoft\Windows\CurrentVersion\Run WdFVsOe C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exe
                                        13:27:29API Interceptor947x Sleep call for process: WdFVsOe.exe modified
                                        No context
                                        No context
                                        No context
                                        No context
                                        No context
                                        Process:C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exe
                                        File Type:ASCII text, with CRLF line terminators
                                        Category:dropped
                                        Size (bytes):1216
                                        Entropy (8bit):5.355304211458859
                                        Encrypted:false
                                        SSDEEP:24:MLUE4K5E4Ks2E1qE4qXKDE4KhK3VZ9pKhPKIE4oKFKHKoZAE4Kzr7FE4x84j:MIHK5HKXE1qHiYHKhQnoPtHoxHhAHKzr
                                        MD5:FED34146BF2F2FA59DCF8702FCC8232E
                                        SHA1:B03BFEA175989D989850CF06FE5E7BBF56EAA00A
                                        SHA-256:123BE4E3590609A008E85501243AF5BC53FA0C26C82A92881B8879524F8C0D5C
                                        SHA-512:1CC89F2ED1DBD70628FA1DC41A32BA0BFA3E81EAE1A1CF3C5F6A48F2DA0BF1F21A5001B8A18B04043C5B8FE4FBE663068D86AA8C4BD8E17933F75687C3178FF6
                                        Malicious:false
                                        Reputation:high, very likely benign file
                                        Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\4f0a7eefa3cd3e0ba98b5ebddbbc72e6\System.ni.dll",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\f1d8480152e0da9a60ad49c6d16a3b6d\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\8d67d92724ba494b6c7fd089d6f25b48\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Xml\b219d4630d26b88041b59c21
                                        Process:C:\Users\user\Desktop\payment swift.exe
                                        File Type:ASCII text, with CRLF line terminators
                                        Category:dropped
                                        Size (bytes):1216
                                        Entropy (8bit):5.355304211458859
                                        Encrypted:false
                                        SSDEEP:24:MLUE4K5E4Ks2E1qE4qXKDE4KhK3VZ9pKhPKIE4oKFKHKoZAE4Kzr7FE4x84j:MIHK5HKXE1qHiYHKhQnoPtHoxHhAHKzr
                                        MD5:FED34146BF2F2FA59DCF8702FCC8232E
                                        SHA1:B03BFEA175989D989850CF06FE5E7BBF56EAA00A
                                        SHA-256:123BE4E3590609A008E85501243AF5BC53FA0C26C82A92881B8879524F8C0D5C
                                        SHA-512:1CC89F2ED1DBD70628FA1DC41A32BA0BFA3E81EAE1A1CF3C5F6A48F2DA0BF1F21A5001B8A18B04043C5B8FE4FBE663068D86AA8C4BD8E17933F75687C3178FF6
                                        Malicious:true
                                        Reputation:high, very likely benign file
                                        Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\4f0a7eefa3cd3e0ba98b5ebddbbc72e6\System.ni.dll",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\f1d8480152e0da9a60ad49c6d16a3b6d\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\8d67d92724ba494b6c7fd089d6f25b48\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Xml\b219d4630d26b88041b59c21
                                        Process:C:\Users\user\Desktop\payment swift.exe
                                        File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                        Category:dropped
                                        Size (bytes):945664
                                        Entropy (8bit):7.6581864683594505
                                        Encrypted:false
                                        SSDEEP:12288:3COqU+QmQCIcQNPy74FM33rWkwxrjbd9IWKRnyZ1V+Db6H6mXH7iODdzoa1cfN:SWmhQNzFM33KrNnO+V+Db6HNiODdEPf
                                        MD5:0EB99950C8A30FEE01EBFDAA33498B22
                                        SHA1:54557815E576AC70FCBCDFCB6765F3D2A2DFF507
                                        SHA-256:469DAE2EED97BBFE08AE548308E77AEDCD0795FB4B2B1ABCDD1A0315FE1FF216
                                        SHA-512:7641E3432CDEC9CCE11E474713DB3363403F85745F7AE8D92F576D5F4F1901E90C997BF11D3DC65F906B344F8D1FF6E28DE330C674623F9C9B251BE8E1342E2D
                                        Malicious:true
                                        Antivirus:
                                        • Antivirus: Joe Sandbox ML, Detection: 100%
                                        • Antivirus: ReversingLabs, Detection: 30%
                                        Reputation:low
                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L.....c..............0..f............... ........@.. ....................................@.................................X...O.................................................................................... ............... ..H............text....e... ...f.................. ..`.rsrc................h..............@..@.reloc...............l..............@..B........................H.......<...........l...8u.. ...........................................^..}.....(.......(.....*.0...........s......o......(.....*...0...........s......o......(.....*...0...........s......o......(.....*...0...........s......o......(.....*...0..+.........,..{.......+....,...{....o........(.....*..0..r.............(....s......s....}.....s....}.....s....}.....s....}.....(......{....(....o......{.....o......{.....o .....{....r...p"..@A...s!...o".....{....(#...o$.....{.... .... ..
                                        Process:C:\Users\user\Desktop\payment swift.exe
                                        File Type:ASCII text, with CRLF line terminators
                                        Category:modified
                                        Size (bytes):26
                                        Entropy (8bit):3.95006375643621
                                        Encrypted:false
                                        SSDEEP:3:ggPYV:rPYV
                                        MD5:187F488E27DB4AF347237FE461A079AD
                                        SHA1:6693BA299EC1881249D59262276A0D2CB21F8E64
                                        SHA-256:255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309
                                        SHA-512:89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E
                                        Malicious:true
                                        Reputation:high, very likely benign file
                                        Preview:[ZoneTransfer]....ZoneId=0
                                        File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                        Entropy (8bit):7.6581864683594505
                                        TrID:
                                        • Win32 Executable (generic) Net Framework (10011505/4) 49.80%
                                        • Win32 Executable (generic) a (10002005/4) 49.75%
                                        • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                                        • Windows Screen Saver (13104/52) 0.07%
                                        • Generic Win/DOS Executable (2004/3) 0.01%
                                        File name:payment swift.exe
                                        File size:945664
                                        MD5:0eb99950c8a30fee01ebfdaa33498b22
                                        SHA1:54557815e576ac70fcbcdfcb6765f3d2a2dff507
                                        SHA256:469dae2eed97bbfe08ae548308e77aedcd0795fb4b2b1abcdd1a0315fe1ff216
                                        SHA512:7641e3432cdec9cce11e474713db3363403f85745f7ae8d92f576d5f4f1901e90c997bf11d3dc65f906b344f8d1ff6e28de330c674623f9c9b251be8e1342e2d
                                        SSDEEP:12288:3COqU+QmQCIcQNPy74FM33rWkwxrjbd9IWKRnyZ1V+Db6H6mXH7iODdzoa1cfN:SWmhQNzFM33KrNnO+V+Db6HNiODdEPf
                                        TLSH:1E15D08033A2AF71F5296BF67821900827763C5EA5F1D2286EDDF0DE2676B5049F0B17
                                        File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L......c..............0..f............... ........@.. ....................................@................................
                                        Icon Hash:00828e8e8686b000
                                        Entrypoint:0x4e85aa
                                        Entrypoint Section:.text
                                        Digitally signed:false
                                        Imagebase:0x400000
                                        Subsystem:windows gui
                                        Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                                        DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                                        Time Stamp:0x6385B3CD [Tue Nov 29 07:25:01 2022 UTC]
                                        TLS Callbacks:
                                        CLR (.Net) Version:
                                        OS Version Major:4
                                        OS Version Minor:0
                                        File Version Major:4
                                        File Version Minor:0
                                        Subsystem Version Major:4
                                        Subsystem Version Minor:0
                                        Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
                                        Instruction
                                        jmp dword ptr [00402000h]
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        NameVirtual AddressVirtual Size Is in Section
                                        IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                        IMAGE_DIRECTORY_ENTRY_IMPORT0xe85580x4f.text
                                        IMAGE_DIRECTORY_ENTRY_RESOURCE0xea0000x388.rsrc
                                        IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                        IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                        IMAGE_DIRECTORY_ENTRY_BASERELOC0xec0000xc.reloc
                                        IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                        IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                        IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                        IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                        IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                        IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                        IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                                        IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                        IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                                        IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                        NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                        .text0x20000xe65b00xe6600False0.8272061940450353PGP symmetric key encrypted data - Plaintext or unencrypted data7.664774300353232IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                        .rsrc0xea0000x3880x400False0.3720703125data2.8564669469222315IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                        .reloc0xec0000xc0x200False0.044921875data0.10191042566270775IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                        NameRVASizeTypeLanguageCountry
                                        RT_VERSION0xea0580x32cdata
                                        DLLImport
                                        mscoree.dll_CorExeMain
                                        TimestampSource PortDest PortSource IPDest IP
                                        Nov 29, 2022 13:27:27.737919092 CET49695587192.168.2.468.65.122.214
                                        Nov 29, 2022 13:27:27.906387091 CET5874969568.65.122.214192.168.2.4
                                        Nov 29, 2022 13:27:27.906543970 CET49695587192.168.2.468.65.122.214
                                        Nov 29, 2022 13:27:28.230930090 CET5874969568.65.122.214192.168.2.4
                                        Nov 29, 2022 13:27:28.231297016 CET49695587192.168.2.468.65.122.214
                                        Nov 29, 2022 13:27:28.411633015 CET5874969568.65.122.214192.168.2.4
                                        Nov 29, 2022 13:27:28.412159920 CET49695587192.168.2.468.65.122.214
                                        Nov 29, 2022 13:27:28.582920074 CET5874969568.65.122.214192.168.2.4
                                        Nov 29, 2022 13:27:28.630537987 CET49695587192.168.2.468.65.122.214
                                        Nov 29, 2022 13:27:28.641078949 CET49695587192.168.2.468.65.122.214
                                        Nov 29, 2022 13:27:28.827491999 CET5874969568.65.122.214192.168.2.4
                                        Nov 29, 2022 13:27:28.827521086 CET5874969568.65.122.214192.168.2.4
                                        Nov 29, 2022 13:27:28.827538013 CET5874969568.65.122.214192.168.2.4
                                        Nov 29, 2022 13:27:28.827548981 CET5874969568.65.122.214192.168.2.4
                                        Nov 29, 2022 13:27:28.827672005 CET49695587192.168.2.468.65.122.214
                                        Nov 29, 2022 13:27:28.834069014 CET5874969568.65.122.214192.168.2.4
                                        Nov 29, 2022 13:27:28.880552053 CET49695587192.168.2.468.65.122.214
                                        Nov 29, 2022 13:27:28.943869114 CET49695587192.168.2.468.65.122.214
                                        Nov 29, 2022 13:27:29.123837948 CET5874969568.65.122.214192.168.2.4
                                        Nov 29, 2022 13:27:29.177495003 CET49695587192.168.2.468.65.122.214
                                        Nov 29, 2022 13:27:29.207124949 CET49695587192.168.2.468.65.122.214
                                        Nov 29, 2022 13:27:29.378030062 CET5874969568.65.122.214192.168.2.4
                                        Nov 29, 2022 13:27:29.382957935 CET49695587192.168.2.468.65.122.214
                                        Nov 29, 2022 13:27:29.555260897 CET5874969568.65.122.214192.168.2.4
                                        Nov 29, 2022 13:27:29.556241035 CET49695587192.168.2.468.65.122.214
                                        Nov 29, 2022 13:27:29.744044065 CET5874969568.65.122.214192.168.2.4
                                        Nov 29, 2022 13:27:29.745124102 CET49695587192.168.2.468.65.122.214
                                        Nov 29, 2022 13:27:29.913490057 CET5874969568.65.122.214192.168.2.4
                                        Nov 29, 2022 13:27:29.914035082 CET49695587192.168.2.468.65.122.214
                                        Nov 29, 2022 13:27:30.116836071 CET5874969568.65.122.214192.168.2.4
                                        Nov 29, 2022 13:27:30.117255926 CET49695587192.168.2.468.65.122.214
                                        Nov 29, 2022 13:27:30.285303116 CET5874969568.65.122.214192.168.2.4
                                        Nov 29, 2022 13:27:30.313560963 CET49695587192.168.2.468.65.122.214
                                        Nov 29, 2022 13:27:30.314049006 CET49695587192.168.2.468.65.122.214
                                        Nov 29, 2022 13:27:30.314532042 CET49695587192.168.2.468.65.122.214
                                        Nov 29, 2022 13:27:30.314614058 CET49695587192.168.2.468.65.122.214
                                        Nov 29, 2022 13:27:30.481308937 CET5874969568.65.122.214192.168.2.4
                                        Nov 29, 2022 13:27:30.481446028 CET5874969568.65.122.214192.168.2.4
                                        Nov 29, 2022 13:27:30.482685089 CET5874969568.65.122.214192.168.2.4
                                        Nov 29, 2022 13:27:30.493328094 CET5874969568.65.122.214192.168.2.4
                                        Nov 29, 2022 13:27:30.537200928 CET49695587192.168.2.468.65.122.214
                                        Nov 29, 2022 13:27:52.961391926 CET49696587192.168.2.468.65.122.214
                                        Nov 29, 2022 13:27:53.131294012 CET5874969668.65.122.214192.168.2.4
                                        Nov 29, 2022 13:27:53.139246941 CET49696587192.168.2.468.65.122.214
                                        Nov 29, 2022 13:27:53.371095896 CET5874969668.65.122.214192.168.2.4
                                        Nov 29, 2022 13:27:53.375797987 CET49696587192.168.2.468.65.122.214
                                        Nov 29, 2022 13:27:53.545335054 CET5874969668.65.122.214192.168.2.4
                                        Nov 29, 2022 13:27:53.545738935 CET49696587192.168.2.468.65.122.214
                                        Nov 29, 2022 13:27:53.718911886 CET5874969668.65.122.214192.168.2.4
                                        Nov 29, 2022 13:27:53.743896008 CET49696587192.168.2.468.65.122.214
                                        Nov 29, 2022 13:27:53.930495024 CET5874969668.65.122.214192.168.2.4
                                        Nov 29, 2022 13:27:53.930560112 CET5874969668.65.122.214192.168.2.4
                                        Nov 29, 2022 13:27:53.930602074 CET5874969668.65.122.214192.168.2.4
                                        Nov 29, 2022 13:27:53.930634022 CET5874969668.65.122.214192.168.2.4
                                        Nov 29, 2022 13:27:53.930641890 CET49696587192.168.2.468.65.122.214
                                        Nov 29, 2022 13:27:53.930711985 CET49696587192.168.2.468.65.122.214
                                        Nov 29, 2022 13:27:53.933422089 CET5874969668.65.122.214192.168.2.4
                                        Nov 29, 2022 13:27:53.976525068 CET49696587192.168.2.468.65.122.214
                                        Nov 29, 2022 13:27:54.141011953 CET49696587192.168.2.468.65.122.214
                                        Nov 29, 2022 13:27:54.312279940 CET5874969668.65.122.214192.168.2.4
                                        Nov 29, 2022 13:27:54.351562977 CET49696587192.168.2.468.65.122.214
                                        Nov 29, 2022 13:27:54.413350105 CET49696587192.168.2.468.65.122.214
                                        Nov 29, 2022 13:27:54.582950115 CET5874969668.65.122.214192.168.2.4
                                        Nov 29, 2022 13:27:54.583501101 CET49696587192.168.2.468.65.122.214
                                        Nov 29, 2022 13:27:54.753087997 CET5874969668.65.122.214192.168.2.4
                                        Nov 29, 2022 13:27:54.788609982 CET49696587192.168.2.468.65.122.214
                                        Nov 29, 2022 13:27:54.966085911 CET5874969668.65.122.214192.168.2.4
                                        Nov 29, 2022 13:27:55.007924080 CET49696587192.168.2.468.65.122.214
                                        Nov 29, 2022 13:27:55.286735058 CET49696587192.168.2.468.65.122.214
                                        Nov 29, 2022 13:27:55.456346035 CET5874969668.65.122.214192.168.2.4
                                        Nov 29, 2022 13:27:55.490048885 CET49696587192.168.2.468.65.122.214
                                        Nov 29, 2022 13:27:55.664738894 CET5874969668.65.122.214192.168.2.4
                                        Nov 29, 2022 13:27:55.710999966 CET49696587192.168.2.468.65.122.214
                                        Nov 29, 2022 13:27:55.712172985 CET49696587192.168.2.468.65.122.214
                                        Nov 29, 2022 13:27:55.881733894 CET5874969668.65.122.214192.168.2.4
                                        Nov 29, 2022 13:27:56.117333889 CET49696587192.168.2.468.65.122.214
                                        Nov 29, 2022 13:27:56.262183905 CET49696587192.168.2.468.65.122.214
                                        Nov 29, 2022 13:27:56.262289047 CET49696587192.168.2.468.65.122.214
                                        Nov 29, 2022 13:27:56.262352943 CET49696587192.168.2.468.65.122.214
                                        Nov 29, 2022 13:27:56.262420893 CET49696587192.168.2.468.65.122.214
                                        Nov 29, 2022 13:27:56.431560993 CET5874969668.65.122.214192.168.2.4
                                        Nov 29, 2022 13:27:56.431605101 CET5874969668.65.122.214192.168.2.4
                                        Nov 29, 2022 13:27:56.431633949 CET5874969668.65.122.214192.168.2.4
                                        Nov 29, 2022 13:27:56.431664944 CET5874969668.65.122.214192.168.2.4
                                        Nov 29, 2022 13:27:56.436434984 CET5874969668.65.122.214192.168.2.4
                                        Nov 29, 2022 13:27:56.617333889 CET49696587192.168.2.468.65.122.214
                                        Nov 29, 2022 13:28:05.598038912 CET49697587192.168.2.468.65.122.214
                                        Nov 29, 2022 13:28:05.764733076 CET5874969768.65.122.214192.168.2.4
                                        Nov 29, 2022 13:28:05.764971972 CET49697587192.168.2.468.65.122.214
                                        Nov 29, 2022 13:28:06.114202976 CET5874969768.65.122.214192.168.2.4
                                        Nov 29, 2022 13:28:06.114742041 CET49697587192.168.2.468.65.122.214
                                        Nov 29, 2022 13:28:06.282293081 CET5874969768.65.122.214192.168.2.4
                                        Nov 29, 2022 13:28:06.288638115 CET49697587192.168.2.468.65.122.214
                                        Nov 29, 2022 13:28:06.459296942 CET5874969768.65.122.214192.168.2.4
                                        Nov 29, 2022 13:28:06.486413956 CET49697587192.168.2.468.65.122.214
                                        Nov 29, 2022 13:28:06.701844931 CET5874969768.65.122.214192.168.2.4
                                        Nov 29, 2022 13:28:06.710268021 CET5874969768.65.122.214192.168.2.4
                                        Nov 29, 2022 13:28:06.710328102 CET5874969768.65.122.214192.168.2.4
                                        Nov 29, 2022 13:28:06.710361004 CET5874969768.65.122.214192.168.2.4
                                        Nov 29, 2022 13:28:06.710397005 CET5874969768.65.122.214192.168.2.4
                                        TimestampSource PortDest PortSource IPDest IP
                                        Nov 29, 2022 13:27:27.661490917 CET5657253192.168.2.48.8.8.8
                                        Nov 29, 2022 13:27:27.680375099 CET53565728.8.8.8192.168.2.4
                                        Nov 29, 2022 13:27:52.909621000 CET5091153192.168.2.48.8.8.8
                                        Nov 29, 2022 13:27:52.929089069 CET53509118.8.8.8192.168.2.4
                                        Nov 29, 2022 13:28:05.553168058 CET5968353192.168.2.48.8.8.8
                                        Nov 29, 2022 13:28:05.574378014 CET53596838.8.8.8192.168.2.4
                                        TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                        Nov 29, 2022 13:27:27.661490917 CET192.168.2.48.8.8.80x201dStandard query (0)host39.registrar-servers.comA (IP address)IN (0x0001)false
                                        Nov 29, 2022 13:27:52.909621000 CET192.168.2.48.8.8.80xe05dStandard query (0)host39.registrar-servers.comA (IP address)IN (0x0001)false
                                        Nov 29, 2022 13:28:05.553168058 CET192.168.2.48.8.8.80x22fdStandard query (0)host39.registrar-servers.comA (IP address)IN (0x0001)false
                                        TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                        Nov 29, 2022 13:27:27.680375099 CET8.8.8.8192.168.2.40x201dNo error (0)host39.registrar-servers.com68.65.122.214A (IP address)IN (0x0001)false
                                        Nov 29, 2022 13:27:52.929089069 CET8.8.8.8192.168.2.40xe05dNo error (0)host39.registrar-servers.com68.65.122.214A (IP address)IN (0x0001)false
                                        Nov 29, 2022 13:28:05.574378014 CET8.8.8.8192.168.2.40x22fdNo error (0)host39.registrar-servers.com68.65.122.214A (IP address)IN (0x0001)false
                                        TimestampSource PortDest PortSource IPDest IPCommands
                                        Nov 29, 2022 13:27:28.230930090 CET5874969568.65.122.214192.168.2.4220-host39.registrar-servers.com ESMTP Exim 4.95 #2 Tue, 29 Nov 2022 07:27:28 -0500
                                        220-We do not authorize the use of this system to transport unsolicited,
                                        220 and/or bulk e-mail.
                                        Nov 29, 2022 13:27:28.231297016 CET49695587192.168.2.468.65.122.214EHLO 767668
                                        Nov 29, 2022 13:27:28.411633015 CET5874969568.65.122.214192.168.2.4250-host39.registrar-servers.com Hello 767668 [102.129.143.49]
                                        250-SIZE 52428800
                                        250-8BITMIME
                                        250-PIPELINING
                                        250-PIPE_CONNECT
                                        250-AUTH PLAIN LOGIN
                                        250-STARTTLS
                                        250 HELP
                                        Nov 29, 2022 13:27:28.412159920 CET49695587192.168.2.468.65.122.214STARTTLS
                                        Nov 29, 2022 13:27:28.582920074 CET5874969568.65.122.214192.168.2.4220 TLS go ahead
                                        Nov 29, 2022 13:27:53.371095896 CET5874969668.65.122.214192.168.2.4220-host39.registrar-servers.com ESMTP Exim 4.95 #2 Tue, 29 Nov 2022 07:27:53 -0500
                                        220-We do not authorize the use of this system to transport unsolicited,
                                        220 and/or bulk e-mail.
                                        Nov 29, 2022 13:27:53.375797987 CET49696587192.168.2.468.65.122.214EHLO 767668
                                        Nov 29, 2022 13:27:53.545335054 CET5874969668.65.122.214192.168.2.4250-host39.registrar-servers.com Hello 767668 [102.129.143.49]
                                        250-SIZE 52428800
                                        250-8BITMIME
                                        250-PIPELINING
                                        250-PIPE_CONNECT
                                        250-AUTH PLAIN LOGIN
                                        250-STARTTLS
                                        250 HELP
                                        Nov 29, 2022 13:27:53.545738935 CET49696587192.168.2.468.65.122.214STARTTLS
                                        Nov 29, 2022 13:27:53.718911886 CET5874969668.65.122.214192.168.2.4220 TLS go ahead
                                        Nov 29, 2022 13:28:06.114202976 CET5874969768.65.122.214192.168.2.4220-host39.registrar-servers.com ESMTP Exim 4.95 #2 Tue, 29 Nov 2022 07:28:06 -0500
                                        220-We do not authorize the use of this system to transport unsolicited,
                                        220 and/or bulk e-mail.
                                        Nov 29, 2022 13:28:06.114742041 CET49697587192.168.2.468.65.122.214EHLO 767668
                                        Nov 29, 2022 13:28:06.282293081 CET5874969768.65.122.214192.168.2.4250-host39.registrar-servers.com Hello 767668 [102.129.143.49]
                                        250-SIZE 52428800
                                        250-8BITMIME
                                        250-PIPELINING
                                        250-PIPE_CONNECT
                                        250-AUTH PLAIN LOGIN
                                        250-STARTTLS
                                        250 HELP
                                        Nov 29, 2022 13:28:06.288638115 CET49697587192.168.2.468.65.122.214STARTTLS
                                        Nov 29, 2022 13:28:06.459296942 CET5874969768.65.122.214192.168.2.4220 TLS go ahead

                                        Click to jump to process

                                        Target ID:0
                                        Start time:13:27:03
                                        Start date:29/11/2022
                                        Path:C:\Users\user\Desktop\payment swift.exe
                                        Wow64 process (32bit):true
                                        Commandline:C:\Users\user\Desktop\payment swift.exe
                                        Imagebase:0xa80000
                                        File size:945664 bytes
                                        MD5 hash:0EB99950C8A30FEE01EBFDAA33498B22
                                        Has elevated privileges:true
                                        Has administrator privileges:true
                                        Programmed in:.Net C# or VB.NET
                                        Yara matches:
                                        • Rule: JoeSecurity_AntiVM_3, Description: Yara detected AntiVM_3, Source: 00000000.00000002.315807649.00000000030D5000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                        • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000000.00000002.318247702.000000000427E000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                        • Rule: JoeSecurity_AgentTesla_2, Description: Yara detected AgentTesla, Source: 00000000.00000002.318247702.000000000427E000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                        • Rule: Windows_Trojan_AgentTesla_d3ac2b2f, Description: unknown, Source: 00000000.00000002.318247702.000000000427E000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                                        • Rule: JoeSecurity_AntiVM_3, Description: Yara detected AntiVM_3, Source: 00000000.00000002.315641125.0000000003021000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                        Reputation:low

                                        Target ID:1
                                        Start time:13:27:11
                                        Start date:29/11/2022
                                        Path:C:\Users\user\Desktop\payment swift.exe
                                        Wow64 process (32bit):true
                                        Commandline:C:\Users\user\Desktop\payment swift.exe
                                        Imagebase:0x6d0000
                                        File size:945664 bytes
                                        MD5 hash:0EB99950C8A30FEE01EBFDAA33498B22
                                        Has elevated privileges:true
                                        Has administrator privileges:true
                                        Programmed in:.Net C# or VB.NET
                                        Yara matches:
                                        • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000001.00000000.313645910.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                        • Rule: JoeSecurity_AgentTesla_2, Description: Yara detected AgentTesla, Source: 00000001.00000000.313645910.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                        • Rule: Windows_Trojan_AgentTesla_d3ac2b2f, Description: unknown, Source: 00000001.00000000.313645910.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: unknown
                                        • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000001.00000002.570872866.0000000002B41000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                        • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000001.00000002.570872866.0000000002B41000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                        Reputation:low

                                        Target ID:2
                                        Start time:13:27:27
                                        Start date:29/11/2022
                                        Path:C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exe
                                        Wow64 process (32bit):true
                                        Commandline:"C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exe"
                                        Imagebase:0x1f0000
                                        File size:945664 bytes
                                        MD5 hash:0EB99950C8A30FEE01EBFDAA33498B22
                                        Has elevated privileges:false
                                        Has administrator privileges:false
                                        Programmed in:.Net C# or VB.NET
                                        Yara matches:
                                        • Rule: JoeSecurity_AntiVM_3, Description: Yara detected AntiVM_3, Source: 00000002.00000002.360649511.0000000002655000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                        • Rule: JoeSecurity_AntiVM_3, Description: Yara detected AntiVM_3, Source: 00000002.00000002.360150897.00000000025A1000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                        Antivirus matches:
                                        • Detection: 100%, Joe Sandbox ML
                                        • Detection: 30%, ReversingLabs
                                        Reputation:low

                                        Target ID:3
                                        Start time:13:27:31
                                        Start date:29/11/2022
                                        Path:C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exe
                                        Wow64 process (32bit):true
                                        Commandline:C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exe
                                        Imagebase:0x4c0000
                                        File size:945664 bytes
                                        MD5 hash:0EB99950C8A30FEE01EBFDAA33498B22
                                        Has elevated privileges:false
                                        Has administrator privileges:false
                                        Programmed in:.Net C# or VB.NET
                                        Yara matches:
                                        • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000003.00000002.569999847.0000000002841000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                        • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000003.00000002.569999847.0000000002841000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                        Reputation:low

                                        Target ID:4
                                        Start time:13:27:35
                                        Start date:29/11/2022
                                        Path:C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exe
                                        Wow64 process (32bit):true
                                        Commandline:"C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exe"
                                        Imagebase:0x400000
                                        File size:945664 bytes
                                        MD5 hash:0EB99950C8A30FEE01EBFDAA33498B22
                                        Has elevated privileges:false
                                        Has administrator privileges:false
                                        Programmed in:.Net C# or VB.NET
                                        Reputation:low

                                        Target ID:5
                                        Start time:13:27:43
                                        Start date:29/11/2022
                                        Path:C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exe
                                        Wow64 process (32bit):false
                                        Commandline:C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exe
                                        Imagebase:0xf0000
                                        File size:945664 bytes
                                        MD5 hash:0EB99950C8A30FEE01EBFDAA33498B22
                                        Has elevated privileges:false
                                        Has administrator privileges:false
                                        Programmed in:C, C++ or other language
                                        Reputation:low

                                        Target ID:6
                                        Start time:13:27:43
                                        Start date:29/11/2022
                                        Path:C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exe
                                        Wow64 process (32bit):true
                                        Commandline:C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exe
                                        Imagebase:0x650000
                                        File size:945664 bytes
                                        MD5 hash:0EB99950C8A30FEE01EBFDAA33498B22
                                        Has elevated privileges:false
                                        Has administrator privileges:false
                                        Programmed in:.Net C# or VB.NET
                                        Yara matches:
                                        • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000006.00000002.571356587.0000000002B2C000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                        • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000006.00000002.571356587.0000000002B2C000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                        Reputation:low

                                        No disassembly