Loading ...

Play interactive tourEdit tour

Windows Analysis Report PROFORMA.exe

Overview

General Information

Sample Name:PROFORMA.exe
Analysis ID:452728
MD5:e5b234b445e81c5a55f21bc75eb40e5e
SHA1:f01fbe23b71016e967f30700c3b547bbf9ba1ef3
SHA256:a76a64fda4a0e041ff234597f21fd66cf2ef66b2d3f56fea86316c997bb0e5bb
Tags:agentteslaexe
Infos:

Most interesting Screenshot:

Detection

AgentTesla
Score:92
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Multi AV Scanner detection for submitted file
Yara detected AgentTesla
Yara detected AgentTesla
.NET source code contains very large array initializations
Injects a PE file into a foreign processes
Machine Learning detection for sample
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)
Antivirus or Machine Learning detection for unpacked file
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Creates a window with clipboard capturing capabilities
Detected potential crypto function
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
May sleep (evasive loops) to hinder dynamic analysis
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)
Yara detected Credential Stealer

Classification

Process Tree

  • System is w10x64
  • PROFORMA.exe (PID: 3452 cmdline: 'C:\Users\user\Desktop\PROFORMA.exe' MD5: E5B234B445E81C5A55F21BC75EB40E5E)
    • PROFORMA.exe (PID: 5924 cmdline: C:\Users\user\Desktop\PROFORMA.exe MD5: E5B234B445E81C5A55F21BC75EB40E5E)
  • cleanup

Malware Configuration

Threatname: Agenttesla

{"Exfil Mode": "SMTP", "Username": "exports@standardfastners.com", "Password": "Exports@208", "Host": "mail.standardfastners.com"}

Yara Overview

Memory Dumps

SourceRuleDescriptionAuthorStrings
00000004.00000002.598204242.0000000000402000.00000040.00000001.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
    00000004.00000002.598204242.0000000000402000.00000040.00000001.sdmpJoeSecurity_AgentTesla_2Yara detected AgentTeslaJoe Security
      00000004.00000002.600534622.0000000002E11000.00000004.00000001.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
        Process Memory Space: PROFORMA.exe PID: 5924JoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
          Process Memory Space: PROFORMA.exe PID: 5924JoeSecurity_CredentialStealerYara detected Credential StealerJoe Security

            Unpacked PEs

            SourceRuleDescriptionAuthorStrings
            4.2.PROFORMA.exe.400000.0.unpackJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
              4.2.PROFORMA.exe.400000.0.unpackJoeSecurity_AgentTesla_2Yara detected AgentTeslaJoe Security

                Sigma Overview

                No Sigma rule has matched

                Jbx Signature Overview

                Click to jump to signature section

                Show All Signature Results

                AV Detection:

                barindex
                Found malware configurationShow sources
                Source: 4.2.PROFORMA.exe.400000.0.unpackMalware Configuration Extractor: Agenttesla {"Exfil Mode": "SMTP", "Username": "exports@standardfastners.com", "Password": "Exports@208", "Host": "mail.standardfastners.com"}
                Multi AV Scanner detection for submitted fileShow sources
                Source: PROFORMA.exeVirustotal: Detection: 37%Perma Link
                Source: PROFORMA.exeReversingLabs: Detection: 28%
                Machine Learning detection for sampleShow sources
                Source: PROFORMA.exeJoe Sandbox ML: detected
                Source: 4.2.PROFORMA.exe.400000.0.unpackAvira: Label: TR/Spy.Gen8
                Source: PROFORMA.exeStatic PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE
                Source: PROFORMA.exeStatic PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
                Source: PROFORMA.exe, 00000004.00000002.600534622.0000000002E11000.00000004.00000001.sdmpString found in binary or memory: http://127.0.0.1:HTTP/1.1
                Source: PROFORMA.exe, 00000004.00000002.600534622.0000000002E11000.00000004.00000001.sdmp, PROFORMA.exe, 00000004.00000002.602649512.000000000315B000.00000004.00000001.sdmp, PROFORMA.exe, 00000004.00000002.602488728.0000000003119000.00000004.00000001.sdmpString found in binary or memory: http://1bkLydyXy3tVVGSqiSW.org
                Source: PROFORMA.exe, 00000004.00000002.600534622.0000000002E11000.00000004.00000001.sdmpString found in binary or memory: http://1bkLydyXy3tVVGSqiSW.org0
                Source: PROFORMA.exe, 00000004.00000002.600534622.0000000002E11000.00000004.00000001.sdmpString found in binary or memory: http://DynDns.comDynDNS
                Source: PROFORMA.exeString found in binary or memory: http://api.twitter.com/1/direct_messages.xml?since_id=
                Source: PROFORMA.exe, 00000001.00000003.334190170.0000000005BFD000.00000004.00000001.sdmpString found in binary or memory: http://fontfabrik.comX
                Source: PROFORMA.exe, 00000004.00000002.600534622.0000000002E11000.00000004.00000001.sdmpString found in binary or memory: http://jWLkXH.com
                Source: PROFORMA.exeString found in binary or memory: http://twitter.com/statuses/user_timeline.xml?screen_name=
                Source: PROFORMA.exe, 00000001.00000003.342109457.0000000005BC6000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.com
                Source: PROFORMA.exe, 00000001.00000003.342109457.0000000005BC6000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.com.
                Source: PROFORMA.exe, 00000001.00000003.342109457.0000000005BC6000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.com.TTFv
                Source: PROFORMA.exe, 00000001.00000003.340025859.0000000005BDF000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers/
                Source: PROFORMA.exe, 00000001.00000003.342109457.0000000005BC6000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designerss
                Source: PROFORMA.exe, 00000001.00000003.342109457.0000000005BC6000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.comR
                Source: PROFORMA.exe, 00000001.00000003.342109457.0000000005BC6000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.comalic
                Source: PROFORMA.exe, 00000001.00000003.342109457.0000000005BC6000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.comalicK
                Source: PROFORMA.exe, 00000001.00000003.342109457.0000000005BC6000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.comcomF
                Source: PROFORMA.exe, 00000001.00000003.333884707.0000000005BFD000.00000004.00000001.sdmpString found in binary or memory: http://www.fonts.com
                Source: PROFORMA.exe, 00000001.00000003.335552996.0000000005BCE000.00000004.00000001.sdmp, PROFORMA.exe, 00000001.00000003.335484225.0000000005BC3000.00000004.00000001.sdmpString found in binary or memory: http://www.founder.com.cn/cn
                Source: PROFORMA.exe, 00000001.00000003.336195214.0000000005BC6000.00000004.00000001.sdmpString found in binary or memory: http://www.founder.com.cn/cn/4
                Source: PROFORMA.exe, 00000001.00000003.335484225.0000000005BC3000.00000004.00000001.sdmpString found in binary or memory: http://www.founder.com.cn/cn5
                Source: PROFORMA.exe, 00000001.00000003.335622841.0000000005BD1000.00000004.00000001.sdmpString found in binary or memory: http://www.founder.com.cn/cnI
                Source: PROFORMA.exe, 00000001.00000003.335484225.0000000005BC3000.00000004.00000001.sdmpString found in binary or memory: http://www.founder.com.cn/cne-d
                Source: PROFORMA.exe, 00000001.00000003.335484225.0000000005BC3000.00000004.00000001.sdmpString found in binary or memory: http://www.founder.com.cn/cnn-uv
                Source: PROFORMA.exe, 00000001.00000003.335484225.0000000005BC3000.00000004.00000001.sdmpString found in binary or memory: http://www.founder.com.cn/cny
                Source: PROFORMA.exe, 00000001.00000003.337773505.0000000005BC6000.00000004.00000001.sdmp, PROFORMA.exe, 00000001.00000003.337940429.0000000005BC6000.00000004.00000001.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/
                Source: PROFORMA.exe, 00000001.00000003.337773505.0000000005BC6000.00000004.00000001.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/.
                Source: PROFORMA.exe, 00000001.00000003.337773505.0000000005BC6000.00000004.00000001.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp//
                Source: PROFORMA.exe, 00000001.00000003.337940429.0000000005BC6000.00000004.00000001.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp//typ
                Source: PROFORMA.exe, 00000001.00000003.337940429.0000000005BC6000.00000004.00000001.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/9
                Source: PROFORMA.exe, 00000001.00000003.337773505.0000000005BC6000.00000004.00000001.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/R
                Source: PROFORMA.exe, 00000001.00000003.337773505.0000000005BC6000.00000004.00000001.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/Y0
                Source: PROFORMA.exe, 00000001.00000003.337940429.0000000005BC6000.00000004.00000001.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/d
                Source: PROFORMA.exe, 00000001.00000003.337773505.0000000005BC6000.00000004.00000001.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/es-eK
                Source: PROFORMA.exe, 00000001.00000003.337421061.0000000005BC6000.00000004.00000001.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/g
                Source: PROFORMA.exe, 00000001.00000003.337773505.0000000005BC6000.00000004.00000001.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/jp/
                Source: PROFORMA.exe, 00000001.00000003.337940429.0000000005BC6000.00000004.00000001.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/jp/R
                Source: PROFORMA.exe, 00000001.00000003.337773505.0000000005BC6000.00000004.00000001.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/jp/v
                Source: PROFORMA.exe, 00000001.00000003.337679569.0000000005BC6000.00000004.00000001.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/n
                Source: PROFORMA.exe, 00000001.00000003.337773505.0000000005BC6000.00000004.00000001.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/o
                Source: PROFORMA.exe, 00000001.00000003.337679569.0000000005BC6000.00000004.00000001.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/v
                Source: PROFORMA.exe, 00000001.00000003.333660030.0000000000F3D000.00000004.00000001.sdmpString found in binary or memory: http://www.sajatypeworks.com
                Source: PROFORMA.exe, 00000001.00000003.333660030.0000000000F3D000.00000004.00000001.sdmpString found in binary or memory: http://www.sajatypeworks.com-n
                Source: PROFORMA.exe, 00000001.00000003.336204158.0000000005BCC000.00000004.00000001.sdmpString found in binary or memory: http://www.tiro.com
                Source: PROFORMA.exe, 00000001.00000003.337121220.0000000005BDB000.00000004.00000001.sdmpString found in binary or memory: http://www.tiro.comX
                Source: PROFORMA.exe, 00000001.00000003.337080083.0000000005BDB000.00000004.00000001.sdmpString found in binary or memory: http://www.tiro.comslnt
                Source: PROFORMA.exe, 00000001.00000003.342210139.0000000005BDF000.00000004.00000001.sdmpString found in binary or memory: http://www.urwpp.de
                Source: PROFORMA.exe, 00000001.00000003.339862573.0000000005BDF000.00000004.00000001.sdmpString found in binary or memory: http://www.urwpp.deFa
                Source: PROFORMA.exe, 00000001.00000003.339862573.0000000005BDF000.00000004.00000001.sdmpString found in binary or memory: http://www.urwpp.dei
                Source: PROFORMA.exe, 00000001.00000003.342210139.0000000005BDF000.00000004.00000001.sdmpString found in binary or memory: http://www.urwpp.delar
                Source: PROFORMA.exe, 00000001.00000003.342389996.0000000005BDF000.00000004.00000001.sdmpString found in binary or memory: http://www.urwpp.det
                Source: PROFORMA.exe, 00000001.00000003.336532127.0000000005BCE000.00000004.00000001.sdmpString found in binary or memory: http://www.zhongyicts.com.cn
                Source: PROFORMA.exe, 00000004.00000002.598204242.0000000000402000.00000040.00000001.sdmpString found in binary or memory: https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip
                Source: PROFORMA.exe, 00000004.00000002.600534622.0000000002E11000.00000004.00000001.sdmpString found in binary or memory: https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip%tordir%%ha
                Source: C:\Users\user\Desktop\PROFORMA.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior

                System Summary:

                barindex
                .NET source code contains very large array initializationsShow sources
                Source: 4.2.PROFORMA.exe.400000.0.unpack, u003cPrivateImplementationDetailsu003eu007b1E58433Au002d00F2u002d4767u002d95F5u002dE33C70F925C1u007d/F51F3358u002d1AABu002d46A7u002dBE23u002d498067C4E488.csLarge array initialization: .cctor: array initializer size 11968
                Source: C:\Users\user\Desktop\PROFORMA.exeCode function: 4_2_00ACBF7F4_2_00ACBF7F
                Source: C:\Users\user\Desktop\PROFORMA.exeCode function: 4_2_02CF47A04_2_02CF47A0
                Source: C:\Users\user\Desktop\PROFORMA.exeCode function: 4_2_02CF47904_2_02CF4790
                Source: C:\Users\user\Desktop\PROFORMA.exeCode function: 4_2_02CF47304_2_02CF4730
                Source: C:\Users\user\Desktop\PROFORMA.exeCode function: 4_2_02CFD6704_2_02CFD670
                Source: C:\Users\user\Desktop\PROFORMA.exeCode function: 4_2_062565104_2_06256510
                Source: C:\Users\user\Desktop\PROFORMA.exeCode function: 4_2_062590F04_2_062590F0
                Source: C:\Users\user\Desktop\PROFORMA.exeCode function: 4_2_062571284_2_06257128
                Source: C:\Users\user\Desktop\PROFORMA.exeCode function: 4_2_062568584_2_06256858
                Source: C:\Users\user\Desktop\PROFORMA.exeCode function: 4_2_00AC20504_2_00AC2050
                Source: PROFORMA.exe, 00000001.00000000.331214844.0000000000732000.00000002.00020000.sdmpBinary or memory string: OriginalFilenameAccessControlSectio.exe8 vs PROFORMA.exe
                Source: PROFORMA.exeBinary or memory string: OriginalFilename vs PROFORMA.exe
                Source: PROFORMA.exe, 00000004.00000002.605107482.0000000005F60000.00000002.00000001.sdmpBinary or memory string: OriginalFilenameKernelbase.dll.muij% vs PROFORMA.exe
                Source: PROFORMA.exe, 00000004.00000002.598204242.0000000000402000.00000040.00000001.sdmpBinary or memory string: OriginalFilenamekzZmXoBwHcNalckDBEBYBjqTJf.exe4 vs PROFORMA.exe
                Source: PROFORMA.exe, 00000004.00000002.598408050.0000000000AC2000.00000002.00020000.sdmpBinary or memory string: OriginalFilenameAccessControlSectio.exe8 vs PROFORMA.exe
                Source: PROFORMA.exeBinary or memory string: OriginalFilenameAccessControlSectio.exe8 vs PROFORMA.exe
                Source: PROFORMA.exeStatic PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE
                Source: PROFORMA.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                Source: PROFORMA.exe, ControlePorTwitter/Business/Seguranca.csCryptographic APIs: 'CreateDecryptor'
                Source: 1.0.PROFORMA.exe.730000.0.unpack, ControlePorTwitter/Business/Seguranca.csCryptographic APIs: 'CreateDecryptor'
                Source: 4.2.PROFORMA.exe.ac0000.1.unpack, ControlePorTwitter/Business/Seguranca.csCryptographic APIs: 'CreateDecryptor'
                Source: 4.2.PROFORMA.exe.400000.0.unpack, A/b2.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
                Source: 4.2.PROFORMA.exe.400000.0.unpack, A/b2.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
                Source: 4.0.PROFORMA.exe.ac0000.0.unpack, ControlePorTwitter/Business/Seguranca.csCryptographic APIs: 'CreateDecryptor'
                Source: classification engineClassification label: mal92.troj.evad.winEXE@3/1@0/0
                Source: C:\Users\user\Desktop\PROFORMA.exeFile created: C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\PROFORMA.exe.logJump to behavior
                Source: C:\Users\user\Desktop\PROFORMA.exeMutant created: \Sessions\1\BaseNamedObjects\tEatoAXfYWfW
                Source: PROFORMA.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                Source: C:\Users\user\Desktop\PROFORMA.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dllJump to behavior
                Source: C:\Users\user\Desktop\PROFORMA.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dllJump to behavior
                Source: C:\Users\user\Desktop\PROFORMA.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                Source: C:\Users\user\Desktop\PROFORMA.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                Source: PROFORMA.exeVirustotal: Detection: 37%
                Source: PROFORMA.exeReversingLabs: Detection: 28%
                Source: unknownProcess created: C:\Users\user\Desktop\PROFORMA.exe 'C:\Users\user\Desktop\PROFORMA.exe'
                Source: C:\Users\user\Desktop\PROFORMA.exeProcess created: C:\Users\user\Desktop\PROFORMA.exe C:\Users\user\Desktop\PROFORMA.exe
                Source: C:\Users\user\Desktop\PROFORMA.exeProcess created: C:\Users\user\Desktop\PROFORMA.exe C:\Users\user\Desktop\PROFORMA.exeJump to behavior
                Source: C:\Users\user\Desktop\PROFORMA.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{172BDDF8-CEEA-11D1-8B05-00600806D9B6}\InProcServer32Jump to behavior
                Source: C:\Users\user\Desktop\PROFORMA.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dllJump to behavior
                Source: PROFORMA.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
                Source: PROFORMA.exeStatic PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
                Source: C:\Users\user\Desktop\PROFORMA.exeCode function: 4_2_0625C070 push es; ret 4_2_0625C080
                Source: initial sampleStatic PE information: section name: .text entropy: 7.63187397239
                Source: C:\Users\user\Desktop\PROFORMA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\PROFORMA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\PROFORMA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\PROFORMA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\PROFORMA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\PROFORMA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\PROFORMA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\PROFORMA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\PROFORMA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\PROFORMA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\PROFORMA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\PROFORMA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\PROFORMA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\PROFORMA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\PROFORMA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\PROFORMA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\PROFORMA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\PROFORMA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\PROFORMA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\PROFORMA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\PROFORMA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\PROFORMA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\PROFORMA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\PROFORMA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\PROFORMA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\PROFORMA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\PROFORMA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\PROFORMA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\PROFORMA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\PROFORMA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\PROFORMA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\PROFORMA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\PROFORMA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\PROFORMA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\PROFORMA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\PROFORMA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\PROFORMA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\PROFORMA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\PROFORMA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\PROFORMA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\PROFORMA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\PROFORMA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\PROFORMA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\PROFORMA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\PROFORMA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\PROFORMA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\PROFORMA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\PROFORMA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\PROFORMA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\PROFORMA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\PROFORMA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\PROFORMA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\PROFORMA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\PROFORMA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\PROFORMA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\PROFORMA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\PROFORMA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\PROFORMA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\PROFORMA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\PROFORMA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\PROFORMA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\PROFORMA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\PROFORMA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\PROFORMA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\PROFORMA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\PROFORMA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\PROFORMA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\PROFORMA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\PROFORMA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\PROFORMA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\PROFORMA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\PROFORMA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\PROFORMA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\PROFORMA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\PROFORMA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\PROFORMA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\PROFORMA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\PROFORMA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\PROFORMA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\PROFORMA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

                Malware Analysis System Evasion:

                barindex
                Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)Show sources
                Source: C:\Users\user\Desktop\PROFORMA.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
                Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)Show sources
                Source: C:\Users\user\Desktop\PROFORMA.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_NetworkAdapterConfiguration
                Source: C:\Users\user\Desktop\PROFORMA.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Users\user\Desktop\PROFORMA.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Users\user\Desktop\PROFORMA.exeWindow / User API: threadDelayed 6967Jump to behavior
                Source: C:\Users\user\Desktop\PROFORMA.exeWindow / User API: threadDelayed 2858Jump to behavior
                Source: C:\Users\user\Desktop\PROFORMA.exe TID: 5740Thread sleep time: -41231s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\PROFORMA.exe TID: 4140Thread sleep time: -922337203685477s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\PROFORMA.exe TID: 2692Thread sleep time: -22136092888451448s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\PROFORMA.exe TID: 2696Thread sleep count: 6967 > 30Jump to behavior
                Source: C:\Users\user\Desktop\PROFORMA.exe TID: 2696Thread sleep count: 2858 > 30Jump to behavior
                Source: C:\Users\user\Desktop\PROFORMA.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                Source: C:\Users\user\Desktop\PROFORMA.exeThread delayed: delay time: 41231Jump to behavior
                Source: C:\Users\user\Desktop\PROFORMA.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Users\user\Desktop\PROFORMA.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: PROFORMA.exe, 00000004.00000002.605107482.0000000005F60000.00000002.00000001.sdmpBinary or memory string: A Virtual Machine could not be started because Hyper-V is not installed.
                Source: PROFORMA.exeBinary or memory string: DdUXhZQ[fUE6Ws]YTSk6WLInYD73f[o5QsEYYq{nV]8XY[8XVpEzfoQZd5M[]WMZ][<IgogJD}4pfy]3[3Y5]DL[]}Y4[3Y5]D75esU[\moJezE[TiU[]qET]m8Z\3QqeMU[]K<IgogJD|YJg4E[eyQ3[3Y5]DL6e3Q5\xDjfoUZd5<pfTU6\osp\SQ[]mopg|Y5XlY5Y843[wEjfoUZd5<pfTU6\osp\SQ[e|<pU843[wEjfoQ[YDL[]nopgyMKX3QZ
                Source: PROFORMA.exe, 00000004.00000002.605107482.0000000005F60000.00000002.00000001.sdmpBinary or memory string: A communication protocol error has occurred between the Hyper-V Host and Guest Compute Service.
                Source: PROFORMA.exe, 00000004.00000002.605107482.0000000005F60000.00000002.00000001.sdmpBinary or memory string: The communication protocol version between the Hyper-V Host and Guest Compute Services is not supported.
                Source: PROFORMA.exe, 00000004.00000002.605107482.0000000005F60000.00000002.00000001.sdmpBinary or memory string: An unknown internal message was received by the Hyper-V Compute Service.
                Source: C:\Users\user\Desktop\PROFORMA.exeProcess information queried: ProcessInformationJump to behavior
                Source: C:\Users\user\Desktop\PROFORMA.exeProcess token adjusted: DebugJump to behavior
                Source: C:\Users\user\Desktop\PROFORMA.exeProcess token adjusted: DebugJump to behavior
                Source: C:\Users\user\Desktop\PROFORMA.exeMemory allocated: page read and write | page guardJump to behavior

                HIPS / PFW / Operating System Protection Evasion:

                barindex
                Injects a PE file into a foreign processesShow sources
                Source: C:\Users\user\Desktop\PROFORMA.exeMemory written: C:\Users\user\Desktop\PROFORMA.exe base: 400000 value starts with: 4D5AJump to behavior
                Source: C:\Users\user\Desktop\PROFORMA.exeProcess created: C:\Users\user\Desktop\PROFORMA.exe C:\Users\user\Desktop\PROFORMA.exeJump to behavior
                Source: PROFORMA.exe, 00000004.00000002.600201661.0000000001800000.00000002.00000001.sdmpBinary or memory string: Shell_TrayWnd
                Source: PROFORMA.exe, 00000004.00000002.600201661.0000000001800000.00000002.00000001.sdmpBinary or memory string: Progman
                Source: PROFORMA.exe, 00000004.00000002.600201661.0000000001800000.00000002.00000001.sdmpBinary or memory string: &Program Manager
                Source: PROFORMA.exe, 00000004.00000002.600201661.0000000001800000.00000002.00000001.sdmpBinary or memory string: Progmanlock
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Users\user\Desktop\PROFORMA.exe VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Runtime.Remoting\v4.0_4.0.0.0__b77a5c561934e089\System.Runtime.Remoting.dll VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\arial.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\ariali.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\arialbd.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\arialbi.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\ARIALN.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\ariblk.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\ARIALNI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\ARIALNB.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\ARIALNBI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\calibri.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\calibril.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\calibrii.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\calibrili.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\calibrib.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\calibriz.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\cambria.ttc VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\cambriai.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\cambriab.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\cambriaz.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\Candara.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\Candarai.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\Candarab.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\Candaraz.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\comic.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\comici.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\comicbd.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\comicz.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\consola.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\consolai.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\consolab.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\consolaz.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\constan.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\constani.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\constanb.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\constanz.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\corbel.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\corbeli.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\corbelb.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\corbelz.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\cour.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\couri.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\courbd.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\courbi.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\ebrima.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\ebrimabd.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\framd.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\FRADM.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\framdit.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\FRADMIT.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\FRAMDCN.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\FRADMCN.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\FRAHV.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\FRAHVIT.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\Gabriola.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\gadugi.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\gadugib.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\georgia.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\georgiai.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\georgiab.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\georgiaz.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\impact.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\Inkfree.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\javatext.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\LeelawUI.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\LeelUIsl.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\LeelaUIb.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\lucon.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\l_10646.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\malgun.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\malgunsl.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\malgunbd.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\himalaya.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\msjh.ttc VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\msjhl.ttc VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\msjhbd.ttc VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\ntailu.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\ntailub.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\phagspa.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\phagspab.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\taile.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\taileb.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\msyh.ttc VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\msyhl.ttc VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\msyhbd.ttc VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\msyi.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\mingliub.ttc VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\monbaiti.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\msgothic.ttc VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\mvboli.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\mmrtext.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\mmrtextb.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\Nirmala.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\NirmalaS.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\NirmalaB.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\pala.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\palai.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\palab.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\palabi.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\segoepr.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\segoeprb.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\segoesc.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\segoescb.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\seguiemj.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\seguihis.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\seguisym.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\simsun.ttc VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\simsunb.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\Sitka.ttc VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\SitkaI.ttc VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\SitkaB.ttc VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\SitkaZ.ttc VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\sylfaen.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\symbol.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\tahoma.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\tahomabd.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\trebuc.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\trebucit.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\trebucbd.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\trebucbi.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\verdana.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\verdanai.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\verdanab.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\verdanaz.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\webdings.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\wingding.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\YuGothR.ttc VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\YuGothM.ttc VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\YuGothL.ttc VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\YuGothB.ttc VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\holomdl2.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\CENTURY.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\LEELAWAD.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\LEELAWDB.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\MSUIGHUR.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\MSUIGHUB.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\WINGDNG2.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\WINGDNG3.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\TEMPSITC.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\PRISTINA.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\PAPYRUS.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\MISTRAL.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\LHANDW.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\ITCKRIST.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\JUICE___.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\FRSCRIPT.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\FREESCPT.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\BRADHITC.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\OUTLOOK.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\BKANT.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\ANTQUAI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\ANTQUAB.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\ANTQUABI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\GARA.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\GARAIT.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\GARABD.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\MTCORSVA.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\GOTHIC.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\GOTHICI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\GOTHICB.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\GOTHICBI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\ALGER.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\BASKVILL.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\BAUHS93.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\BELL.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\BELLI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\BELLB.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\BRLNSR.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\BRLNSDB.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\BRLNSB.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\BERNHC.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\BOD_PSTC.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\BRITANIC.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\BROADW.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\BRUSHSCI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\CALIFR.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\CALIFI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\CALIFB.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\CENTAUR.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\CHILLER.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\COLONNA.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\COOPBL.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\FTLTLT.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\HARLOWSI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\HARNGTON.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\HTOWERT.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\HTOWERTI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\JOKERMAN.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\KUNSTLER.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\LBRITE.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\LBRITED.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\LBRITEI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\LBRITEDI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\LCALLIG.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\LFAX.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\LFAXD.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\LFAXI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\LFAXDI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\MAGNETOB.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\MATURASC.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\MOD20.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\NIAGENG.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\NIAGSOL.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\OLDENGL.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\ONYX.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\PARCHM.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\PLAYBILL.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\POORICH.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\RAVIE.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\INFROMAN.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\SHOWG.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\SNAP____.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\STENCIL.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\VINERITC.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\VIVALDII.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\VLADIMIR.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\LATINWD.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\TCM_____.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\TCMI____.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\TCB_____.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\TCBI____.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\TCCM____.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\TCCB____.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\TCCEB.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\SCRIPTBL.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\ROCK.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\ROCKI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\ROCKB.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\ROCKEB.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\ROCKBI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\ROCC____.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\ROCCB___.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\RAGE.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\PERTILI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\PERTIBD.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\PER_____.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\PERI____.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\PERB____.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\PERBI___.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\PALSCRI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\OCRAEXT.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\MAIAN.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\LTYPE.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\LTYPEO.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\LTYPEB.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\LTYPEBO.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\LSANS.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\LSANSD.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\LSANSI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\LSANSDI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\IMPRISHA.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\HATTEN.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\GOUDYSTO.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\GOUDOS.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\GOUDOSI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\GOUDOSB.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\GLECB.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\GIL_____.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\GILI____.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\GILB____.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\GILBI___.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\GILC____.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\GLSNECB.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\GIGI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\FRABK.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\FRABKIT.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\FORTE.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\FELIXTI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\ERASMD.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\ERASLGHT.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\ERASDEMI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\ERASBD.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\ENGR.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\ELEPHNT.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\ELEPHNTI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\ITCEDSCR.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\CURLZ___.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\COPRGTL.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\COPRGTB.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\CENSCBK.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\SCHLBKI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\SCHLBKB.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\SCHLBKBI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\CASTELAR.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\CALIST.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\CALISTI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\CALISTB.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\CALISTBI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\BOOKOS.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\BOOKOSB.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\BOOKOSI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\BOOKOSBI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\BOD_R.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\BOD_I.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\BOD_B.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\BOD_BI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\BOD_CR.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\BOD_BLAR.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\BOD_CI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\BOD_CB.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\BOD_BLAI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\BOD_CBI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\ITCBLKAD.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\ARLRDBD.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\AGENCYR.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\AGENCYB.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\BSSYM7.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\REFSAN.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\REFSPCL.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\MTEXTRA.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\marlett.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Users\user\Desktop\PROFORMA.exe VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Management.dll VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PROFORMA.exeCode function: 4_2_062554E4 GetUserNameW,4_2_062554E4
                Source: C:\Users\user\Desktop\PROFORMA.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

                Stealing of Sensitive Information:

                barindex
                Yara detected AgentTeslaShow sources
                Source: Yara matchFile source: 4.2.PROFORMA.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000004.00000002.598204242.0000000000402000.00000040.00000001.sdmp, type: MEMORY
                Yara detected AgentTeslaShow sources
                Source: Yara matchFile source: 4.2.PROFORMA.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000004.00000002.598204242.0000000000402000.00000040.00000001.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: PROFORMA.exe PID: 5924, type: MEMORY
                Source: Yara matchFile source: 00000004.00000002.600534622.0000000002E11000.00000004.00000001.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: PROFORMA.exe PID: 5924, type: MEMORY

                Remote Access Functionality:

                barindex
                Yara detected AgentTeslaShow sources
                Source: Yara matchFile source: 4.2.PROFORMA.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000004.00000002.598204242.0000000000402000.00000040.00000001.sdmp, type: MEMORY
                Yara detected AgentTeslaShow sources
                Source: Yara matchFile source: 4.2.PROFORMA.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000004.00000002.598204242.0000000000402000.00000040.00000001.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: PROFORMA.exe PID: 5924, type: MEMORY

                Mitre Att&ck Matrix

                Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
                Valid AccountsWindows Management Instrumentation211Path InterceptionProcess Injection112Masquerading1OS Credential DumpingSecurity Software Discovery111Remote ServicesArchive Collected Data11Exfiltration Over Other Network MediumEncrypted Channel1Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
                Default AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization ScriptsDisable or Modify Tools1LSASS MemoryProcess Discovery2Remote Desktop ProtocolClipboard Data1Exfiltration Over BluetoothJunk DataExploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
                Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)Virtualization/Sandbox Evasion131Security Account ManagerVirtualization/Sandbox Evasion131SMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationSteganographyExploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
                Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)Process Injection112NTDSApplication Window Discovery1Distributed Component Object ModelInput CaptureScheduled TransferProtocol ImpersonationSIM Card SwapCarrier Billing Fraud
                Cloud AccountsCronNetwork Logon ScriptNetwork Logon ScriptDeobfuscate/Decode Files or Information1LSA SecretsAccount Discovery1SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
                Replication Through Removable MediaLaunchdRc.commonRc.commonObfuscated Files or Information2Cached Domain CredentialsSystem Owner/User Discovery1VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
                External Remote ServicesScheduled TaskStartup ItemsStartup ItemsSoftware Packing3DCSyncSystem Information Discovery113Windows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact

                Behavior Graph

                Hide Legend

                Legend:

                • Process
                • Signature
                • Created File
                • DNS/IP Info
                • Is Dropped
                • Is Windows Process
                • Number of created Registry Values
                • Number of created Files
                • Visual Basic
                • Delphi
                • Java
                • .Net C# or VB.NET
                • C, C++ or other language
                • Is malicious
                • Internet

                Screenshots

                Thumbnails

                This section contains all screenshots as thumbnails, including those not shown in the slideshow.

                windows-stand

                Antivirus, Machine Learning and Genetic Malware Detection

                Initial Sample

                SourceDetectionScannerLabelLink
                PROFORMA.exe38%VirustotalBrowse
                PROFORMA.exe28%ReversingLabsByteCode-MSIL.Trojan.AgentTesla
                PROFORMA.exe100%Joe Sandbox ML

                Dropped Files

                No Antivirus matches

                Unpacked PE Files

                SourceDetectionScannerLabelLinkDownload
                4.2.PROFORMA.exe.400000.0.unpack100%AviraTR/Spy.Gen8Download File

                Domains

                No Antivirus matches

                URLs

                SourceDetectionScannerLabelLink
                http://127.0.0.1:HTTP/1.10%Avira URL Cloudsafe
                http://fontfabrik.comX0%Avira URL Cloudsafe
                http://www.tiro.com0%URL Reputationsafe
                http://www.tiro.com0%URL Reputationsafe
                http://www.tiro.com0%URL Reputationsafe
                http://www.tiro.com0%URL Reputationsafe
                http://www.founder.com.cn/cnn-uv0%Avira URL Cloudsafe
                http://www.founder.com.cn/cnI0%Avira URL Cloudsafe
                http://www.sajatypeworks.com0%URL Reputationsafe
                http://www.sajatypeworks.com0%URL Reputationsafe
                http://www.sajatypeworks.com0%URL Reputationsafe
                http://www.jiyu-kobo.co.jp/90%URL Reputationsafe
                http://www.jiyu-kobo.co.jp/90%URL Reputationsafe
                http://www.jiyu-kobo.co.jp/90%URL Reputationsafe
                http://www.jiyu-kobo.co.jp//typ0%Avira URL Cloudsafe
                http://www.urwpp.deFa0%Avira URL Cloudsafe
                http://www.fontbureau.com.TTFv0%Avira URL Cloudsafe
                http://www.founder.com.cn/cny0%URL Reputationsafe
                http://www.founder.com.cn/cny0%URL Reputationsafe
                http://www.founder.com.cn/cny0%URL Reputationsafe
                http://www.jiyu-kobo.co.jp//0%URL Reputationsafe
                http://www.jiyu-kobo.co.jp//0%URL Reputationsafe
                http://www.jiyu-kobo.co.jp//0%URL Reputationsafe
                http://www.jiyu-kobo.co.jp/.0%URL Reputationsafe
                http://www.jiyu-kobo.co.jp/.0%URL Reputationsafe
                http://www.jiyu-kobo.co.jp/.0%URL Reputationsafe
                http://www.jiyu-kobo.co.jp/Y00%URL Reputationsafe
                http://www.jiyu-kobo.co.jp/Y00%URL Reputationsafe
                http://www.jiyu-kobo.co.jp/Y00%URL Reputationsafe
                http://www.jiyu-kobo.co.jp/jp/R0%Avira URL Cloudsafe
                http://www.urwpp.delar0%Avira URL Cloudsafe
                http://www.urwpp.de0%URL Reputationsafe
                http://www.urwpp.de0%URL Reputationsafe
                http://www.urwpp.de0%URL Reputationsafe
                http://www.zhongyicts.com.cn0%URL Reputationsafe
                http://www.zhongyicts.com.cn0%URL Reputationsafe
                http://www.zhongyicts.com.cn0%URL Reputationsafe
                http://1bkLydyXy3tVVGSqiSW.org0%Avira URL Cloudsafe
                https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip0%URL Reputationsafe
                https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip0%URL Reputationsafe
                https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip0%URL Reputationsafe
                http://www.jiyu-kobo.co.jp/es-eK0%Avira URL Cloudsafe
                http://DynDns.comDynDNS0%URL Reputationsafe
                http://DynDns.comDynDNS0%URL Reputationsafe
                http://DynDns.comDynDNS0%URL Reputationsafe
                http://www.tiro.comslnt0%URL Reputationsafe
                http://www.tiro.comslnt0%URL Reputationsafe
                http://www.tiro.comslnt0%URL Reputationsafe
                http://www.fontbureau.comR0%Avira URL Cloudsafe
                https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip%tordir%%ha0%URL Reputationsafe
                https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip%tordir%%ha0%URL Reputationsafe
                https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip%tordir%%ha0%URL Reputationsafe
                http://www.jiyu-kobo.co.jp/R0%URL Reputationsafe
                http://www.jiyu-kobo.co.jp/R0%URL Reputationsafe
                http://www.jiyu-kobo.co.jp/R0%URL Reputationsafe
                http://www.sajatypeworks.com-n0%Avira URL Cloudsafe
                http://www.jiyu-kobo.co.jp/jp/0%URL Reputationsafe
                http://www.jiyu-kobo.co.jp/jp/0%URL Reputationsafe
                http://www.jiyu-kobo.co.jp/jp/0%URL Reputationsafe
                http://www.jiyu-kobo.co.jp/jp/v0%Avira URL Cloudsafe
                http://www.founder.com.cn/cn0%URL Reputationsafe
                http://www.founder.com.cn/cn0%URL Reputationsafe
                http://www.founder.com.cn/cn0%URL Reputationsafe
                http://www.jiyu-kobo.co.jp/v0%URL Reputationsafe
                http://www.jiyu-kobo.co.jp/v0%URL Reputationsafe
                http://www.jiyu-kobo.co.jp/v0%URL Reputationsafe
                http://www.tiro.comX0%Avira URL Cloudsafe
                http://www.fontbureau.comcomF0%URL Reputationsafe
                http://www.fontbureau.comcomF0%URL Reputationsafe
                http://www.fontbureau.comcomF0%URL Reputationsafe
                http://www.jiyu-kobo.co.jp/o0%URL Reputationsafe
                http://www.jiyu-kobo.co.jp/o0%URL Reputationsafe
                http://www.jiyu-kobo.co.jp/o0%URL Reputationsafe
                http://www.fontbureau.comalicK0%Avira URL Cloudsafe
                http://www.urwpp.det0%Avira URL Cloudsafe
                http://www.founder.com.cn/cne-d0%Avira URL Cloudsafe
                http://www.jiyu-kobo.co.jp/0%URL Reputationsafe
                http://www.jiyu-kobo.co.jp/0%URL Reputationsafe
                http://www.jiyu-kobo.co.jp/0%URL Reputationsafe
                http://www.jiyu-kobo.co.jp/n0%URL Reputationsafe
                http://www.jiyu-kobo.co.jp/n0%URL Reputationsafe
                http://www.jiyu-kobo.co.jp/n0%URL Reputationsafe
                http://www.founder.com.cn/cn50%Avira URL Cloudsafe
                http://jWLkXH.com0%Avira URL Cloudsafe
                http://www.urwpp.dei0%Avira URL Cloudsafe
                http://www.jiyu-kobo.co.jp/g0%URL Reputationsafe
                http://www.jiyu-kobo.co.jp/g0%URL Reputationsafe
                http://www.jiyu-kobo.co.jp/g0%URL Reputationsafe
                http://www.fontbureau.comalic0%URL Reputationsafe
                http://www.fontbureau.comalic0%URL Reputationsafe
                http://www.fontbureau.comalic0%URL Reputationsafe
                http://1bkLydyXy3tVVGSqiSW.org00%Avira URL Cloudsafe
                http://www.jiyu-kobo.co.jp/d0%URL Reputationsafe
                http://www.jiyu-kobo.co.jp/d0%URL Reputationsafe
                http://www.jiyu-kobo.co.jp/d0%URL Reputationsafe
                http://www.founder.com.cn/cn/40%Avira URL Cloudsafe

                Domains and IPs

                Contacted Domains

                No contacted domains info

                URLs from Memory and Binaries

                NameSourceMaliciousAntivirus DetectionReputation
                http://127.0.0.1:HTTP/1.1PROFORMA.exe, 00000004.00000002.600534622.0000000002E11000.00000004.00000001.sdmpfalse
                • Avira URL Cloud: safe
                low
                http://fontfabrik.comXPROFORMA.exe, 00000001.00000003.334190170.0000000005BFD000.00000004.00000001.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                http://api.twitter.com/1/direct_messages.xml?since_id=PROFORMA.exefalse
                  high
                  http://www.tiro.comPROFORMA.exe, 00000001.00000003.336204158.0000000005BCC000.00000004.00000001.sdmpfalse
                  • URL Reputation: safe
                  • URL Reputation: safe
                  • URL Reputation: safe
                  • URL Reputation: safe
                  unknown
                  http://twitter.com/statuses/user_timeline.xml?screen_name=PROFORMA.exefalse
                    high
                    http://www.founder.com.cn/cnn-uvPROFORMA.exe, 00000001.00000003.335484225.0000000005BC3000.00000004.00000001.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    http://www.founder.com.cn/cnIPROFORMA.exe, 00000001.00000003.335622841.0000000005BD1000.00000004.00000001.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    http://www.sajatypeworks.comPROFORMA.exe, 00000001.00000003.333660030.0000000000F3D000.00000004.00000001.sdmpfalse
                    • URL Reputation: safe
                    • URL Reputation: safe
                    • URL Reputation: safe
                    unknown
                    http://www.jiyu-kobo.co.jp/9PROFORMA.exe, 00000001.00000003.337940429.0000000005BC6000.00000004.00000001.sdmpfalse
                    • URL Reputation: safe
                    • URL Reputation: safe
                    • URL Reputation: safe
                    unknown
                    http://www.jiyu-kobo.co.jp//typPROFORMA.exe, 00000001.00000003.337940429.0000000005BC6000.00000004.00000001.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    http://www.urwpp.deFaPROFORMA.exe, 00000001.00000003.339862573.0000000005BDF000.00000004.00000001.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    http://www.fontbureau.com.TTFvPROFORMA.exe, 00000001.00000003.342109457.0000000005BC6000.00000004.00000001.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    http://www.founder.com.cn/cnyPROFORMA.exe, 00000001.00000003.335484225.0000000005BC3000.00000004.00000001.sdmpfalse
                    • URL Reputation: safe
                    • URL Reputation: safe
                    • URL Reputation: safe
                    unknown
                    http://www.jiyu-kobo.co.jp//PROFORMA.exe, 00000001.00000003.337773505.0000000005BC6000.00000004.00000001.sdmpfalse
                    • URL Reputation: safe
                    • URL Reputation: safe
                    • URL Reputation: safe
                    unknown
                    http://www.fontbureau.com.PROFORMA.exe, 00000001.00000003.342109457.0000000005BC6000.00000004.00000001.sdmpfalse
                      high
                      http://www.jiyu-kobo.co.jp/.PROFORMA.exe, 00000001.00000003.337773505.0000000005BC6000.00000004.00000001.sdmpfalse
                      • URL Reputation: safe
                      • URL Reputation: safe
                      • URL Reputation: safe
                      unknown
                      http://www.jiyu-kobo.co.jp/Y0PROFORMA.exe, 00000001.00000003.337773505.0000000005BC6000.00000004.00000001.sdmpfalse
                      • URL Reputation: safe
                      • URL Reputation: safe
                      • URL Reputation: safe
                      unknown
                      http://www.fonts.comPROFORMA.exe, 00000001.00000003.333884707.0000000005BFD000.00000004.00000001.sdmpfalse
                        high
                        http://www.jiyu-kobo.co.jp/jp/RPROFORMA.exe, 00000001.00000003.337940429.0000000005BC6000.00000004.00000001.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        http://www.urwpp.delarPROFORMA.exe, 00000001.00000003.342210139.0000000005BDF000.00000004.00000001.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        http://www.urwpp.dePROFORMA.exe, 00000001.00000003.342210139.0000000005BDF000.00000004.00000001.sdmpfalse
                        • URL Reputation: safe
                        • URL Reputation: safe
                        • URL Reputation: safe
                        unknown
                        http://www.zhongyicts.com.cnPROFORMA.exe, 00000001.00000003.336532127.0000000005BCE000.00000004.00000001.sdmpfalse
                        • URL Reputation: safe
                        • URL Reputation: safe
                        • URL Reputation: safe
                        unknown
                        http://1bkLydyXy3tVVGSqiSW.orgPROFORMA.exe, 00000004.00000002.600534622.0000000002E11000.00000004.00000001.sdmp, PROFORMA.exe, 00000004.00000002.602649512.000000000315B000.00000004.00000001.sdmp, PROFORMA.exe, 00000004.00000002.602488728.0000000003119000.00000004.00000001.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zipPROFORMA.exe, 00000004.00000002.598204242.0000000000402000.00000040.00000001.sdmpfalse
                        • URL Reputation: safe
                        • URL Reputation: safe
                        • URL Reputation: safe
                        unknown
                        http://www.fontbureau.com/designerssPROFORMA.exe, 00000001.00000003.342109457.0000000005BC6000.00000004.00000001.sdmpfalse
                          high
                          http://www.jiyu-kobo.co.jp/es-eKPROFORMA.exe, 00000001.00000003.337773505.0000000005BC6000.00000004.00000001.sdmpfalse
                          • Avira URL Cloud: safe
                          unknown
                          http://www.fontbureau.comPROFORMA.exe, 00000001.00000003.342109457.0000000005BC6000.00000004.00000001.sdmpfalse
                            high
                            http://DynDns.comDynDNSPROFORMA.exe, 00000004.00000002.600534622.0000000002E11000.00000004.00000001.sdmpfalse
                            • URL Reputation: safe
                            • URL Reputation: safe
                            • URL Reputation: safe
                            unknown
                            http://www.tiro.comslntPROFORMA.exe, 00000001.00000003.337080083.0000000005BDB000.00000004.00000001.sdmpfalse
                            • URL Reputation: safe
                            • URL Reputation: safe
                            • URL Reputation: safe
                            unknown
                            http://www.fontbureau.comRPROFORMA.exe, 00000001.00000003.342109457.0000000005BC6000.00000004.00000001.sdmpfalse
                            • Avira URL Cloud: safe
                            unknown
                            https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip%tordir%%haPROFORMA.exe, 00000004.00000002.600534622.0000000002E11000.00000004.00000001.sdmpfalse
                            • URL Reputation: safe
                            • URL Reputation: safe
                            • URL Reputation: safe
                            unknown
                            http://www.jiyu-kobo.co.jp/RPROFORMA.exe, 00000001.00000003.337773505.0000000005BC6000.00000004.00000001.sdmpfalse
                            • URL Reputation: safe
                            • URL Reputation: safe
                            • URL Reputation: safe
                            unknown
                            http://www.sajatypeworks.com-nPROFORMA.exe, 00000001.00000003.333660030.0000000000F3D000.00000004.00000001.sdmpfalse
                            • Avira URL Cloud: safe
                            unknown
                            http://www.jiyu-kobo.co.jp/jp/PROFORMA.exe, 00000001.00000003.337773505.0000000005BC6000.00000004.00000001.sdmpfalse
                            • URL Reputation: safe
                            • URL Reputation: safe
                            • URL Reputation: safe
                            unknown
                            http://www.jiyu-kobo.co.jp/jp/vPROFORMA.exe, 00000001.00000003.337773505.0000000005BC6000.00000004.00000001.sdmpfalse
                            • Avira URL Cloud: safe
                            unknown
                            http://www.founder.com.cn/cnPROFORMA.exe, 00000001.00000003.335552996.0000000005BCE000.00000004.00000001.sdmp, PROFORMA.exe, 00000001.00000003.335484225.0000000005BC3000.00000004.00000001.sdmpfalse
                            • URL Reputation: safe
                            • URL Reputation: safe
                            • URL Reputation: safe
                            unknown
                            http://www.jiyu-kobo.co.jp/vPROFORMA.exe, 00000001.00000003.337679569.0000000005BC6000.00000004.00000001.sdmpfalse
                            • URL Reputation: safe
                            • URL Reputation: safe
                            • URL Reputation: safe
                            unknown
                            http://www.tiro.comXPROFORMA.exe, 00000001.00000003.337121220.0000000005BDB000.00000004.00000001.sdmpfalse
                            • Avira URL Cloud: safe
                            unknown
                            http://www.fontbureau.comcomFPROFORMA.exe, 00000001.00000003.342109457.0000000005BC6000.00000004.00000001.sdmpfalse
                            • URL Reputation: safe
                            • URL Reputation: safe
                            • URL Reputation: safe
                            unknown
                            http://www.jiyu-kobo.co.jp/oPROFORMA.exe, 00000001.00000003.337773505.0000000005BC6000.00000004.00000001.sdmpfalse
                            • URL Reputation: safe
                            • URL Reputation: safe
                            • URL Reputation: safe
                            unknown
                            http://www.fontbureau.comalicKPROFORMA.exe, 00000001.00000003.342109457.0000000005BC6000.00000004.00000001.sdmpfalse
                            • Avira URL Cloud: safe
                            unknown
                            http://www.urwpp.detPROFORMA.exe, 00000001.00000003.342389996.0000000005BDF000.00000004.00000001.sdmpfalse
                            • Avira URL Cloud: safe
                            unknown
                            http://www.founder.com.cn/cne-dPROFORMA.exe, 00000001.00000003.335484225.0000000005BC3000.00000004.00000001.sdmpfalse
                            • Avira URL Cloud: safe
                            unknown
                            http://www.jiyu-kobo.co.jp/PROFORMA.exe, 00000001.00000003.337773505.0000000005BC6000.00000004.00000001.sdmp, PROFORMA.exe, 00000001.00000003.337940429.0000000005BC6000.00000004.00000001.sdmpfalse
                            • URL Reputation: safe
                            • URL Reputation: safe
                            • URL Reputation: safe
                            unknown
                            http://www.jiyu-kobo.co.jp/nPROFORMA.exe, 00000001.00000003.337679569.0000000005BC6000.00000004.00000001.sdmpfalse
                            • URL Reputation: safe
                            • URL Reputation: safe
                            • URL Reputation: safe
                            unknown
                            http://www.founder.com.cn/cn5PROFORMA.exe, 00000001.00000003.335484225.0000000005BC3000.00000004.00000001.sdmpfalse
                            • Avira URL Cloud: safe
                            unknown
                            http://jWLkXH.comPROFORMA.exe, 00000004.00000002.600534622.0000000002E11000.00000004.00000001.sdmpfalse
                            • Avira URL Cloud: safe
                            unknown
                            http://www.urwpp.deiPROFORMA.exe, 00000001.00000003.339862573.0000000005BDF000.00000004.00000001.sdmpfalse
                            • Avira URL Cloud: safe
                            unknown
                            http://www.jiyu-kobo.co.jp/gPROFORMA.exe, 00000001.00000003.337421061.0000000005BC6000.00000004.00000001.sdmpfalse
                            • URL Reputation: safe
                            • URL Reputation: safe
                            • URL Reputation: safe
                            unknown
                            http://www.fontbureau.comalicPROFORMA.exe, 00000001.00000003.342109457.0000000005BC6000.00000004.00000001.sdmpfalse
                            • URL Reputation: safe
                            • URL Reputation: safe
                            • URL Reputation: safe
                            unknown
                            http://1bkLydyXy3tVVGSqiSW.org0PROFORMA.exe, 00000004.00000002.600534622.0000000002E11000.00000004.00000001.sdmpfalse
                            • Avira URL Cloud: safe
                            unknown
                            http://www.jiyu-kobo.co.jp/dPROFORMA.exe, 00000001.00000003.337940429.0000000005BC6000.00000004.00000001.sdmpfalse
                            • URL Reputation: safe
                            • URL Reputation: safe
                            • URL Reputation: safe
                            unknown
                            http://www.founder.com.cn/cn/4PROFORMA.exe, 00000001.00000003.336195214.0000000005BC6000.00000004.00000001.sdmpfalse
                            • Avira URL Cloud: safe
                            unknown
                            http://www.fontbureau.com/designers/PROFORMA.exe, 00000001.00000003.340025859.0000000005BDF000.00000004.00000001.sdmpfalse
                              high

                              Contacted IPs

                              No contacted IP infos

                              General Information

                              Joe Sandbox Version:33.0.0 White Diamond
                              Analysis ID:452728
                              Start date:22.07.2021
                              Start time:19:05:12
                              Joe Sandbox Product:CloudBasic
                              Overall analysis duration:0h 7m 2s
                              Hypervisor based Inspection enabled:false
                              Report type:full
                              Sample file name:PROFORMA.exe
                              Cookbook file name:default.jbs
                              Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
                              Number of analysed new started processes analysed:20
                              Number of new started drivers analysed:0
                              Number of existing processes analysed:0
                              Number of existing drivers analysed:0
                              Number of injected processes analysed:0
                              Technologies:
                              • HCA enabled
                              • EGA enabled
                              • HDC enabled
                              • AMSI enabled
                              Analysis Mode:default
                              Analysis stop reason:Timeout
                              Detection:MAL
                              Classification:mal92.troj.evad.winEXE@3/1@0/0
                              EGA Information:Failed
                              HDC Information:
                              • Successful, ratio: 0.8% (good quality ratio 0.7%)
                              • Quality average: 59.4%
                              • Quality standard deviation: 28.3%
                              HCA Information:
                              • Successful, ratio: 99%
                              • Number of executed functions: 29
                              • Number of non-executed functions: 3
                              Cookbook Comments:
                              • Adjust boot time
                              • Enable AMSI
                              • Found application associated with file extension: .exe
                              Warnings:
                              Show All
                              • Exclude process from analysis (whitelisted): MpCmdRun.exe, audiodg.exe, BackgroundTransferHost.exe, WMIADAP.exe, backgroundTaskHost.exe, conhost.exe, svchost.exe, wuapihost.exe
                              • Not all processes where analyzed, report is missing behavior information
                              • Report size getting too big, too many NtAllocateVirtualMemory calls found.
                              • Report size getting too big, too many NtOpenKeyEx calls found.

                              Simulations

                              Behavior and APIs

                              TimeTypeDescription
                              19:06:33API Interceptor601x Sleep call for process: PROFORMA.exe modified

                              Joe Sandbox View / Context

                              IPs

                              No context

                              Domains

                              No context

                              ASN

                              No context

                              JA3 Fingerprints

                              No context

                              Dropped Files

                              No context

                              Created / dropped Files

                              C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\PROFORMA.exe.log
                              Process:C:\Users\user\Desktop\PROFORMA.exe
                              File Type:ASCII text, with CRLF line terminators
                              Category:dropped
                              Size (bytes):1314
                              Entropy (8bit):5.350128552078965
                              Encrypted:false
                              SSDEEP:24:MLU84jE4K5E4Ks2E1qE4qXKDE4KhK3VZ9pKhPKIE4oKFKHKoZAE4Kzr7FE4sAmEw:MgvjHK5HKXE1qHiYHKhQnoPtHoxHhAHR
                              MD5:1DC1A2DCC9EFAA84EABF4F6D6066565B
                              SHA1:B7FCF805B6DD8DE815EA9BC089BD99F1E617F4E9
                              SHA-256:28D63442C17BF19558655C88A635CB3C3FF1BAD1CCD9784090B9749A7E71FCEF
                              SHA-512:95DD7E2AB0884A3EFD9E26033B337D1F97DDF9A8E9E9C4C32187DCD40622D8B1AC8CCDBA12A70A6B9075DF5E7F68DF2F8FBA4AB33DB4576BE9806B8E191802B7
                              Malicious:true
                              Reputation:high, very likely benign file
                              Preview: 1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"Microsoft.VisualBasic, Version=10.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\4f0a7eefa3cd3e0ba98b5ebddbbc72e6\System.ni.dll",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\f1d8480152e0da9a60ad49c6d16a3b6d\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\8d67d92724ba494b6c7fd089d6f25b48\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a

                              Static File Info

                              General

                              File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                              Entropy (8bit):7.623330273746814
                              TrID:
                              • Win32 Executable (generic) Net Framework (10011505/4) 49.80%
                              • Win32 Executable (generic) a (10002005/4) 49.75%
                              • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                              • Windows Screen Saver (13104/52) 0.07%
                              • Generic Win/DOS Executable (2004/3) 0.01%
                              File name:PROFORMA.exe
                              File size:778240
                              MD5:e5b234b445e81c5a55f21bc75eb40e5e
                              SHA1:f01fbe23b71016e967f30700c3b547bbf9ba1ef3
                              SHA256:a76a64fda4a0e041ff234597f21fd66cf2ef66b2d3f56fea86316c997bb0e5bb
                              SHA512:a8c0dce7d564ea6d2d01acb15cd300683fdd6c0bb5a699e14584d02e5f0aab1998e512257985dc8fb80f3b589d643f6cad3616d4d80b6de11ae72a0221a7c4a4
                              SSDEEP:12288:XS+lyzDi60EZRXFqsWe35M6Y35rFoD7jTxiMmJlsasyaUVKnp:XS+6DBdhdWe35MjprQ9eljzahp
                              File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L......`..............P.............>.... ........@.. .......................@............@................................

                              File Icon

                              Icon Hash:00828e8e8686b000

                              Static PE Info

                              General

                              Entrypoint:0x4bf23e
                              Entrypoint Section:.text
                              Digitally signed:false
                              Imagebase:0x400000
                              Subsystem:windows gui
                              Image File Characteristics:32BIT_MACHINE, EXECUTABLE_IMAGE
                              DLL Characteristics:NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
                              Time Stamp:0x60F8C1BB [Thu Jul 22 00:54:19 2021 UTC]
                              TLS Callbacks:
                              CLR (.Net) Version:v4.0.30319
                              OS Version Major:4
                              OS Version Minor:0
                              File Version Major:4
                              File Version Minor:0
                              Subsystem Version Major:4
                              Subsystem Version Minor:0
                              Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744

                              Entrypoint Preview

                              Instruction
                              jmp dword ptr [00402000h]
                              int3
                              jnc 00007F0F8C9D36BDh
                              test al, EAh
                              pushfd
                              inc esi
                              add eax, 35C2CDF9h
                              adc ebp, dword ptr [edi+0Fh]
                              stc
                              int C2h
                              xor eax, 0F6F132Eh
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al

                              Data Directories

                              NameVirtual AddressVirtual Size Is in Section
                              IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                              IMAGE_DIRECTORY_ENTRY_IMPORT0xbf1ec0x4f.text
                              IMAGE_DIRECTORY_ENTRY_RESOURCE0xc00000x618.rsrc
                              IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                              IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                              IMAGE_DIRECTORY_ENTRY_BASERELOC0xc20000xc.reloc
                              IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                              IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                              IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                              IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                              IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                              IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                              IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                              IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                              IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                              IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0

                              Sections

                              NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                              .text0x20000xbd25c0xbd400False0.794932195343data7.63187397239IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                              .rsrc0xc00000x6180x800False0.33251953125data3.47371010242IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                              .reloc0xc20000xc0x200False0.044921875data0.101910425663IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ

                              Resources

                              NameRVASizeTypeLanguageCountry
                              RT_VERSION0xc00900x386data
                              RT_MANIFEST0xc04280x1eaXML 1.0 document, UTF-8 Unicode (with BOM) text, with CRLF line terminators

                              Imports

                              DLLImport
                              mscoree.dll_CorExeMain

                              Version Infos

                              DescriptionData
                              Translation0x0000 0x04b0
                              LegalCopyright(c) 2019 Riot Games, Inc.
                              Assembly Version2.0.26.9
                              InternalNameAccessControlSectio.exe
                              FileVersion2.0.26.9
                              CompanyNameRiot Games, Inc.
                              LegalTrademarks
                              Comments
                              ProductNameRiot Client
                              ProductVersion2.0.26.9
                              FileDescriptionRiot Client
                              OriginalFilenameAccessControlSectio.exe

                              Network Behavior

                              No network behavior found

                              Code Manipulations

                              Statistics

                              CPU Usage

                              Click to jump to process

                              Memory Usage

                              Click to jump to process

                              High Level Behavior Distribution

                              Click to dive into process behavior distribution

                              Behavior

                              Click to jump to process

                              System Behavior

                              General

                              Start time:19:06:04
                              Start date:22/07/2021
                              Path:C:\Users\user\Desktop\PROFORMA.exe
                              Wow64 process (32bit):true
                              Commandline:'C:\Users\user\Desktop\PROFORMA.exe'
                              Imagebase:0x730000
                              File size:778240 bytes
                              MD5 hash:E5B234B445E81C5A55F21BC75EB40E5E
                              Has elevated privileges:true
                              Has administrator privileges:true
                              Programmed in:.Net C# or VB.NET
                              Reputation:low

                              General

                              Start time:19:06:33
                              Start date:22/07/2021
                              Path:C:\Users\user\Desktop\PROFORMA.exe
                              Wow64 process (32bit):true
                              Commandline:C:\Users\user\Desktop\PROFORMA.exe
                              Imagebase:0xac0000
                              File size:778240 bytes
                              MD5 hash:E5B234B445E81C5A55F21BC75EB40E5E
                              Has elevated privileges:true
                              Has administrator privileges:true
                              Programmed in:.Net C# or VB.NET
                              Yara matches:
                              • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000004.00000002.598204242.0000000000402000.00000040.00000001.sdmp, Author: Joe Security
                              • Rule: JoeSecurity_AgentTesla_2, Description: Yara detected AgentTesla, Source: 00000004.00000002.598204242.0000000000402000.00000040.00000001.sdmp, Author: Joe Security
                              • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000004.00000002.600534622.0000000002E11000.00000004.00000001.sdmp, Author: Joe Security
                              Reputation:low

                              Disassembly

                              Code Analysis

                              Reset < >

                                Executed Functions

                                APIs
                                • GetUserNameW.ADVAPI32(00000000,00000000), ref: 0625B223
                                Memory Dump Source
                                • Source File: 00000004.00000002.605616212.0000000006250000.00000040.00000001.sdmp, Offset: 06250000, based on PE: false
                                Similarity
                                • API ID: NameUser
                                • String ID:
                                • API String ID: 2645101109-0
                                • Opcode ID: 26153daa1ebc506233d3c5f505a7354b7edd8800c204dc911d592c52d634fe65
                                • Instruction ID: d5fbf7a3a5d21c7b8a2f3df2b0dc173e1bda9a44819445e645648c90f7d2bb6c
                                • Opcode Fuzzy Hash: 26153daa1ebc506233d3c5f505a7354b7edd8800c204dc911d592c52d634fe65
                                • Instruction Fuzzy Hash: 96513470D202198FDB64CFA9C8987DDBBB1BF48315F158119EC15BB350DB74A844CB91
                                Uniqueness

                                Uniqueness Score: -1.00%

                                Memory Dump Source
                                • Source File: 00000004.00000002.605616212.0000000006250000.00000040.00000001.sdmp, Offset: 06250000, based on PE: false
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 4d7c1994e3859d33d7129fd73a1281b80d07ed9e58759e4ec3f5ec4ceb245292
                                • Instruction ID: f0bff70bd826041c147f72e315a7ff363062dcad937570121096393d1c09d6e9
                                • Opcode Fuzzy Hash: 4d7c1994e3859d33d7129fd73a1281b80d07ed9e58759e4ec3f5ec4ceb245292
                                • Instruction Fuzzy Hash: 8AD17D70E10249DFCB14DFA8C484AEEFBF5FF48314F158519E919AB291DB34A986CB90
                                Uniqueness

                                Uniqueness Score: -1.00%

                                Memory Dump Source
                                • Source File: 00000004.00000002.600456396.0000000002CF0000.00000040.00000001.sdmp, Offset: 02CF0000, based on PE: false
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: b3454b693166646a69a3bab3923050cd6c399066140a2535a362cd2a141bdede
                                • Instruction ID: 1b7d1a56d432bbfb7ec41ae6078b59acddd9d83753384a90172fc6acaa39ee4b
                                • Opcode Fuzzy Hash: b3454b693166646a69a3bab3923050cd6c399066140a2535a362cd2a141bdede
                                • Instruction Fuzzy Hash: 181280B0465746CBE311DFA5E94A1853FA9B745718F60C20CF2613FAE1DBB9118ACF88
                                Uniqueness

                                Uniqueness Score: -1.00%

                                Memory Dump Source
                                • Source File: 00000004.00000002.605616212.0000000006250000.00000040.00000001.sdmp, Offset: 06250000, based on PE: false
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 2249a4316c98060573cf1b65480631f3caf87b21d33caaf02fefe3c9d4733080
                                • Instruction ID: d8fdd25d75bd79a377e69c45316a86ee06cf240641458ce0e5e18995691c84f1
                                • Opcode Fuzzy Hash: 2249a4316c98060573cf1b65480631f3caf87b21d33caaf02fefe3c9d4733080
                                • Instruction Fuzzy Hash: 53B18D70E2021A8FDB60CFA9C8857EDBBF2AF88314F158129EC15E7754EB749845CB81
                                Uniqueness

                                Uniqueness Score: -1.00%

                                Memory Dump Source
                                • Source File: 00000004.00000002.605616212.0000000006250000.00000040.00000001.sdmp, Offset: 06250000, based on PE: false
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 4ae5a3d2210f9ddebcab18977c70b6ebe6200973671856bded8195fe9ebf6feb
                                • Instruction ID: d1b964f58a0fe16d17bd66b202ec6f0687a6537f682a974e56f3a224d5969669
                                • Opcode Fuzzy Hash: 4ae5a3d2210f9ddebcab18977c70b6ebe6200973671856bded8195fe9ebf6feb
                                • Instruction Fuzzy Hash: E8917D70E1020A8FDF60CFA8C8847DDBBF2EF88714F558529EC05AB2A4DB749845CB91
                                Uniqueness

                                Uniqueness Score: -1.00%

                                Memory Dump Source
                                • Source File: 00000004.00000002.600456396.0000000002CF0000.00000040.00000001.sdmp, Offset: 02CF0000, based on PE: false
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: ba21428c01f198dfbf7a9ffc351422e349ed7961490ce26bebd1b9accc1699e8
                                • Instruction ID: 34051437c868af42065265872e04febcae4b4aff8cd0c0a45e853ad1f6241282
                                • Opcode Fuzzy Hash: ba21428c01f198dfbf7a9ffc351422e349ed7961490ce26bebd1b9accc1699e8
                                • Instruction Fuzzy Hash: 81C1E6B0820745CAD711DFA5E84A1893FB9BB85318F21C31CE2613FAD0DBB9208ACF44
                                Uniqueness

                                Uniqueness Score: -1.00%

                                Memory Dump Source
                                • Source File: 00000004.00000002.600456396.0000000002CF0000.00000040.00000001.sdmp, Offset: 02CF0000, based on PE: false
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 86d97770be9efa64b1a843f42705e1307f8c970cbd254a4e8b217c6ccd7bccbc
                                • Instruction ID: 64d581e313a3b77a7a360903ed32c60d7e50b0b9b03b9b56493c4b16ecd85486
                                • Opcode Fuzzy Hash: 86d97770be9efa64b1a843f42705e1307f8c970cbd254a4e8b217c6ccd7bccbc
                                • Instruction Fuzzy Hash: A9C1F5B0821745CBD711DFA5E94A1893FB9BB85318F20C21CE2617FAD1DBB9608ACF44
                                Uniqueness

                                Uniqueness Score: -1.00%

                                Memory Dump Source
                                • Source File: 00000004.00000002.600456396.0000000002CF0000.00000040.00000001.sdmp, Offset: 02CF0000, based on PE: false
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 026121b2aaec35f2c09b5ec8e95e412b02ab07c2cf4f6ff7e16450727d4525ce
                                • Instruction ID: a1a355bdfb63a2bd578cede7795dcd1efaa8ce72749f1ea0e04542771077c348
                                • Opcode Fuzzy Hash: 026121b2aaec35f2c09b5ec8e95e412b02ab07c2cf4f6ff7e16450727d4525ce
                                • Instruction Fuzzy Hash: 487157B1C043899FDB02CFA9C844ACEBFB1FF49344F1981AAE508AB262D3359845CF51
                                Uniqueness

                                Uniqueness Score: -1.00%

                                APIs
                                • GetUserNameW.ADVAPI32(00000000,00000000), ref: 0625B223
                                Memory Dump Source
                                • Source File: 00000004.00000002.605616212.0000000006250000.00000040.00000001.sdmp, Offset: 06250000, based on PE: false
                                Similarity
                                • API ID: NameUser
                                • String ID:
                                • API String ID: 2645101109-0
                                • Opcode ID: 9ad34156fb20ad42d7daadade28961349586fba431233da1fb8307698ae37c7d
                                • Instruction ID: f56615cb1087599c53ad5b93768b02a2ff3e9525c77582db999e990055115017
                                • Opcode Fuzzy Hash: 9ad34156fb20ad42d7daadade28961349586fba431233da1fb8307698ae37c7d
                                • Instruction Fuzzy Hash: 08515470E102188FDB64CFA9C898BEDBBB1BF48315F158019EC15AB750CB74A845CBA1
                                Uniqueness

                                Uniqueness Score: -1.00%

                                APIs
                                • GetUserNameW.ADVAPI32(00000000,00000000), ref: 0625B223
                                Memory Dump Source
                                • Source File: 00000004.00000002.605616212.0000000006250000.00000040.00000001.sdmp, Offset: 06250000, based on PE: false
                                Similarity
                                • API ID: NameUser
                                • String ID:
                                • API String ID: 2645101109-0
                                • Opcode ID: 73dc1fd4d0020d0fe862ac00cbed1526494b7f3cf2663653c37b1761166813d1
                                • Instruction ID: e4c301cccdecf0e3c5d4774f4ae0cac58204374f5c3f133f53437cab00d2f326
                                • Opcode Fuzzy Hash: 73dc1fd4d0020d0fe862ac00cbed1526494b7f3cf2663653c37b1761166813d1
                                • Instruction Fuzzy Hash: 9F512570D202198FDB64CFA9C898BEDBBB1BF48315F15811AEC15BB750DB74A844CBA1
                                Uniqueness

                                Uniqueness Score: -1.00%

                                APIs
                                • GetUserNameW.ADVAPI32(00000000,00000000), ref: 0625B223
                                Memory Dump Source
                                • Source File: 00000004.00000002.605616212.0000000006250000.00000040.00000001.sdmp, Offset: 06250000, based on PE: false
                                Similarity
                                • API ID: NameUser
                                • String ID:
                                • API String ID: 2645101109-0
                                • Opcode ID: 9f4b3e76a34ef30accc42ec20064201af45a013ff7af82c945f00b76a1ce814c
                                • Instruction ID: f1bffc530fdfa6165c525b3f2045f657419a75912c0f4bee55d182355de64ba3
                                • Opcode Fuzzy Hash: 9f4b3e76a34ef30accc42ec20064201af45a013ff7af82c945f00b76a1ce814c
                                • Instruction Fuzzy Hash: 45512470D202198FDB64CFA9C8987DDBBB1BF48315F158119EC15BB390DB74A844CB91
                                Uniqueness

                                Uniqueness Score: -1.00%

                                APIs
                                • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 02CF52A2
                                Memory Dump Source
                                • Source File: 00000004.00000002.600456396.0000000002CF0000.00000040.00000001.sdmp, Offset: 02CF0000, based on PE: false
                                Similarity
                                • API ID: CreateWindow
                                • String ID:
                                • API String ID: 716092398-0
                                • Opcode ID: 59eb6e7ad1b5f3d18f937a119d058c0cb0b581fd188cae493e9c0767fb4e7b3a
                                • Instruction ID: 17316d0f760c2f0f7b555c463ada5683aa3d744a5611c7f723265a3d866d476d
                                • Opcode Fuzzy Hash: 59eb6e7ad1b5f3d18f937a119d058c0cb0b581fd188cae493e9c0767fb4e7b3a
                                • Instruction Fuzzy Hash: 1B51D1B1D003099FDB54CF99C884ADEBBB5BF88354F64822AE919AB210D774A945CF90
                                Uniqueness

                                Uniqueness Score: -1.00%

                                APIs
                                • CallWindowProcW.USER32(?,?,?,?,?), ref: 02CF7D01
                                Memory Dump Source
                                • Source File: 00000004.00000002.600456396.0000000002CF0000.00000040.00000001.sdmp, Offset: 02CF0000, based on PE: false
                                Similarity
                                • API ID: CallProcWindow
                                • String ID:
                                • API String ID: 2714655100-0
                                • Opcode ID: dfb5e0e8d65c1db1cdc287db02256fa3f3acb7ec68993eb8b967c2fe860597e5
                                • Instruction ID: 28a44c412acd9b3108639def5e928d52a55367eef817c1769e13ec67368b4b85
                                • Opcode Fuzzy Hash: dfb5e0e8d65c1db1cdc287db02256fa3f3acb7ec68993eb8b967c2fe860597e5
                                • Instruction Fuzzy Hash: 5D414AB9A00205CFDB54CF59C488AAAFBF5FF88314F14C498E519AB321C734A845CFA0
                                Uniqueness

                                Uniqueness Score: -1.00%

                                APIs
                                • LoadLibraryA.KERNELBASE(?), ref: 06253E4A
                                Memory Dump Source
                                • Source File: 00000004.00000002.605616212.0000000006250000.00000040.00000001.sdmp, Offset: 06250000, based on PE: false
                                Similarity
                                • API ID: LibraryLoad
                                • String ID:
                                • API String ID: 1029625771-0
                                • Opcode ID: 177c12e3ae6950abfe47c952ff4864bff9ac9482c8d644f6d277dee1c3e03606
                                • Instruction ID: 3421a2f8af6b78a7cd0f383eba3e1490c139c410335df4feb8865171773d23c4
                                • Opcode Fuzzy Hash: 177c12e3ae6950abfe47c952ff4864bff9ac9482c8d644f6d277dee1c3e03606
                                • Instruction Fuzzy Hash: 013132B0D202498FDB64CFA8D8857DEBBF1AF08354F158529E815E7380E7749885CF92
                                Uniqueness

                                Uniqueness Score: -1.00%

                                APIs
                                • LoadLibraryA.KERNELBASE(?), ref: 06253E4A
                                Memory Dump Source
                                • Source File: 00000004.00000002.605616212.0000000006250000.00000040.00000001.sdmp, Offset: 06250000, based on PE: false
                                Similarity
                                • API ID: LibraryLoad
                                • String ID:
                                • API String ID: 1029625771-0
                                • Opcode ID: b4305f3e069f3d6052e61d0fb4cf8fcdfc12eeffe0937dbe0c66ea2f1048f1ac
                                • Instruction ID: f1a934148fe632de713c0adb16a870f4e20da6baa8e9b43d41d97e74bbc71f51
                                • Opcode Fuzzy Hash: b4305f3e069f3d6052e61d0fb4cf8fcdfc12eeffe0937dbe0c66ea2f1048f1ac
                                • Instruction Fuzzy Hash: 893142B0D202498FDB64CFA8C88979EBBF1AF48354F158529EC15E7380E7749885CF92
                                Uniqueness

                                Uniqueness Score: -1.00%

                                APIs
                                • KiUserCallbackDispatcher.NTDLL(00000000,?,?,?,?,?,?,?,?,0625B787), ref: 0625B81F
                                Memory Dump Source
                                • Source File: 00000004.00000002.605616212.0000000006250000.00000040.00000001.sdmp, Offset: 06250000, based on PE: false
                                Similarity
                                • API ID: CallbackDispatcherUser
                                • String ID:
                                • API String ID: 2492992576-0
                                • Opcode ID: 0814c18d25864900138391da4c88e3d378da6ea32d690e3188cd22d2ef179f8f
                                • Instruction ID: 561f0eafa6ad08a83b9eff399dce2e04f3329d1701fdc27f3a061878ea14f42e
                                • Opcode Fuzzy Hash: 0814c18d25864900138391da4c88e3d378da6ea32d690e3188cd22d2ef179f8f
                                • Instruction Fuzzy Hash: 9621CDB28053489FDB20DFA9D844BDEBFF8EF49324F15445AE404A7640CB34A845CBA2
                                Uniqueness

                                Uniqueness Score: -1.00%

                                APIs
                                Memory Dump Source
                                • Source File: 00000004.00000002.605616212.0000000006250000.00000040.00000001.sdmp, Offset: 06250000, based on PE: false
                                Similarity
                                • API ID: Clipboard
                                • String ID:
                                • API String ID: 220874293-0
                                • Opcode ID: 00d3eaa36d0f22fbf99efed083c6639ef2fa3408e9a5b3599aeabb052ac63a80
                                • Instruction ID: b4b92f7c22310c32e984e3f2b59f65d0d28a5492c3edb6a2aa1d024c2239dda4
                                • Opcode Fuzzy Hash: 00d3eaa36d0f22fbf99efed083c6639ef2fa3408e9a5b3599aeabb052ac63a80
                                • Instruction Fuzzy Hash: B13113B0E113499FDB24CFA9C885BDEBBF5AF48314F258069E804BB390D7749945CBA1
                                Uniqueness

                                Uniqueness Score: -1.00%

                                APIs
                                Memory Dump Source
                                • Source File: 00000004.00000002.605616212.0000000006250000.00000040.00000001.sdmp, Offset: 06250000, based on PE: false
                                Similarity
                                • API ID: Clipboard
                                • String ID:
                                • API String ID: 220874293-0
                                • Opcode ID: 95613b7852ef7d755438ea87ae565a801579505a4b2308e71bef464a1a0038c6
                                • Instruction ID: 6900011174ccec606e88a1bd5fc478f2bffce22c641ad7fa1dea2d76100c45e0
                                • Opcode Fuzzy Hash: 95613b7852ef7d755438ea87ae565a801579505a4b2308e71bef464a1a0038c6
                                • Instruction Fuzzy Hash: 1B3104B0E10348DFDB24DF99C884BDEBBF5AB48314F258069E804BB390D774A945CBA1
                                Uniqueness

                                Uniqueness Score: -1.00%

                                APIs
                                • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?,?,?,?,02CF6D3E,?,?,?,?,?), ref: 02CF6DFF
                                Memory Dump Source
                                • Source File: 00000004.00000002.600456396.0000000002CF0000.00000040.00000001.sdmp, Offset: 02CF0000, based on PE: false
                                Similarity
                                • API ID: DuplicateHandle
                                • String ID:
                                • API String ID: 3793708945-0
                                • Opcode ID: 2f0473c75269cbc64c663b84e8c00945db39e69f6cb0e45d92209adc529eebdd
                                • Instruction ID: 0925176865d95a47ce945705a41aa8851c3ee570ed387208d8724719a0931949
                                • Opcode Fuzzy Hash: 2f0473c75269cbc64c663b84e8c00945db39e69f6cb0e45d92209adc529eebdd
                                • Instruction Fuzzy Hash: 3D21E6B59002489FDB50DFAAD484ADEBFF8EB48324F14805AE914A7310D374A954CFA1
                                Uniqueness

                                Uniqueness Score: -1.00%

                                APIs
                                • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?,?,?,?,02CF6D3E,?,?,?,?,?), ref: 02CF6DFF
                                Memory Dump Source
                                • Source File: 00000004.00000002.600456396.0000000002CF0000.00000040.00000001.sdmp, Offset: 02CF0000, based on PE: false
                                Similarity
                                • API ID: DuplicateHandle
                                • String ID:
                                • API String ID: 3793708945-0
                                • Opcode ID: fa9a33996ccdb6a09e50926c8534b81351521832e05aca50b48e933cb24a1e68
                                • Instruction ID: 7dfd86ec33268ea25253f494fdb332b484f304d2ce54b3763a34eca3d9b24b85
                                • Opcode Fuzzy Hash: fa9a33996ccdb6a09e50926c8534b81351521832e05aca50b48e933cb24a1e68
                                • Instruction Fuzzy Hash: 1821F5B5900259AFDB10DFA9D884ADEBFF8FB48324F14801AE914A3310D374A954CFA1
                                Uniqueness

                                Uniqueness Score: -1.00%

                                APIs
                                • RtlEncodePointer.NTDLL(00000000), ref: 02CFBE82
                                Memory Dump Source
                                • Source File: 00000004.00000002.600456396.0000000002CF0000.00000040.00000001.sdmp, Offset: 02CF0000, based on PE: false
                                Similarity
                                • API ID: EncodePointer
                                • String ID:
                                • API String ID: 2118026453-0
                                • Opcode ID: 4064da036397e8284d9fb70b2d0ee78ecf5acbc8e8cae3ef5f747430cd647545
                                • Instruction ID: d2d1a09b11a25987ff15bae4cea0ad07c6b1434f0ee14f996494c5c5fd42599a
                                • Opcode Fuzzy Hash: 4064da036397e8284d9fb70b2d0ee78ecf5acbc8e8cae3ef5f747430cd647545
                                • Instruction Fuzzy Hash: EF2181B19003498FDB50EF66C5493EABBF8FB48318F248419D509A7601D739A905CFA1
                                Uniqueness

                                Uniqueness Score: -1.00%

                                APIs
                                • RtlEncodePointer.NTDLL(00000000), ref: 02CFBE82
                                Memory Dump Source
                                • Source File: 00000004.00000002.600456396.0000000002CF0000.00000040.00000001.sdmp, Offset: 02CF0000, based on PE: false
                                Similarity
                                • API ID: EncodePointer
                                • String ID:
                                • API String ID: 2118026453-0
                                • Opcode ID: 588bf82aac406c9cf84ef6e40d94a175e968116c52bcacac833e3d1d1251b796
                                • Instruction ID: 6345733eef64d07c6a082946e47a4cae0c5fc75b3692343d0dc6cb73cff3ea87
                                • Opcode Fuzzy Hash: 588bf82aac406c9cf84ef6e40d94a175e968116c52bcacac833e3d1d1251b796
                                • Instruction Fuzzy Hash: E6117FB19003498FDB90EFA6D5487AEBFF8FB48328F148429D509A7640D739A944CFA1
                                Uniqueness

                                Uniqueness Score: -1.00%

                                APIs
                                • KiUserCallbackDispatcher.NTDLL(00000000,?,?,?,?,?,?,?,?,0625B787), ref: 0625B81F
                                Memory Dump Source
                                • Source File: 00000004.00000002.605616212.0000000006250000.00000040.00000001.sdmp, Offset: 06250000, based on PE: false
                                Similarity
                                • API ID: CallbackDispatcherUser
                                • String ID:
                                • API String ID: 2492992576-0
                                • Opcode ID: 1e8ad78f06af480fb1f7d8b733524f33f0c434ca1de721bc3398b483ab34dcab
                                • Instruction ID: c96a2ba38a15ffaac74c73e6aee6a95a5f6b03d0c13795afb1125530f26095c5
                                • Opcode Fuzzy Hash: 1e8ad78f06af480fb1f7d8b733524f33f0c434ca1de721bc3398b483ab34dcab
                                • Instruction Fuzzy Hash: BF1128B19042098FDB20DF9AD8487DEFBF4EB48324F258459E919A7300C774A944CFA1
                                Uniqueness

                                Uniqueness Score: -1.00%

                                APIs
                                • OleInitialize.OLE32(00000000), ref: 0625C39D
                                Memory Dump Source
                                • Source File: 00000004.00000002.605616212.0000000006250000.00000040.00000001.sdmp, Offset: 06250000, based on PE: false
                                Similarity
                                • API ID: Initialize
                                • String ID:
                                • API String ID: 2538663250-0
                                • Opcode ID: 1dfc99c3dbd467777b9bd17b7e84dfe2281f4e7893b0da3587b315cf31b7c942
                                • Instruction ID: 74fbc9b08d66e7020eabf0ba2c57ba8cec8245d78e56b4659bd3fe2d9da0289d
                                • Opcode Fuzzy Hash: 1dfc99c3dbd467777b9bd17b7e84dfe2281f4e7893b0da3587b315cf31b7c942
                                • Instruction Fuzzy Hash: B91148B49003498FCB20DFA9D448BDEBFF4AB48324F14845AE859A7300C338A544CFA1
                                Uniqueness

                                Uniqueness Score: -1.00%

                                APIs
                                • OleInitialize.OLE32(00000000), ref: 0625C39D
                                Memory Dump Source
                                • Source File: 00000004.00000002.605616212.0000000006250000.00000040.00000001.sdmp, Offset: 06250000, based on PE: false
                                Similarity
                                • API ID: Initialize
                                • String ID:
                                • API String ID: 2538663250-0
                                • Opcode ID: d101805b784aa2075f1eb53a146d8eb898445db943d0ed6093074c911944a029
                                • Instruction ID: 7fdd143544f2faee13d1d2d65f480e99702bc16f00b78ad19144f89fe9cdb4d7
                                • Opcode Fuzzy Hash: d101805b784aa2075f1eb53a146d8eb898445db943d0ed6093074c911944a029
                                • Instruction Fuzzy Hash: A61127B59043099FCB60DF9AD488BDEBBF4EB48324F148459E919B7300D778A944CFA1
                                Uniqueness

                                Uniqueness Score: -1.00%

                                Memory Dump Source
                                • Source File: 00000004.00000002.600067844.000000000130D000.00000040.00000001.sdmp, Offset: 0130D000, based on PE: false
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: dd9026f5ecc0d6c3a1d88431ea66a5259d2413292dc03d5c19d47720b9cb354d
                                • Instruction ID: 3131045a82148669783cda6b72f6e1db6a2d36f8ef871f376b2d6b35593a1e3d
                                • Opcode Fuzzy Hash: dd9026f5ecc0d6c3a1d88431ea66a5259d2413292dc03d5c19d47720b9cb354d
                                • Instruction Fuzzy Hash: B5213671504204EFDB12DF94D8C0B67BFE5FB84328F24C568E9055B286C736E806C7A1
                                Uniqueness

                                Uniqueness Score: -1.00%

                                Memory Dump Source
                                • Source File: 00000004.00000002.600097116.000000000131D000.00000040.00000001.sdmp, Offset: 0131D000, based on PE: false
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 7cb6991dd78b07aa884e76afe0ac8575cdae997d73dfc4fad514d72104b04d94
                                • Instruction ID: a77eb4556ecf0094ecdac8afd0be1a747b15b1d557c577fdb3e32ae12154bba3
                                • Opcode Fuzzy Hash: 7cb6991dd78b07aa884e76afe0ac8575cdae997d73dfc4fad514d72104b04d94
                                • Instruction Fuzzy Hash: FB214571504204EFCB18DF54D8C8B12BB65FB85358F20C5ADE8094B24AC336D807CB61
                                Uniqueness

                                Uniqueness Score: -1.00%

                                Memory Dump Source
                                • Source File: 00000004.00000002.600067844.000000000130D000.00000040.00000001.sdmp, Offset: 0130D000, based on PE: false
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 51ec13b725027092ed1aa9eddd4cc34221202fdb6ccf77713265fee64c56290e
                                • Instruction ID: 20b74a777d4dc5ec6a83f542187a8d00e3848064e7b043402c68d05682835c86
                                • Opcode Fuzzy Hash: 51ec13b725027092ed1aa9eddd4cc34221202fdb6ccf77713265fee64c56290e
                                • Instruction Fuzzy Hash: B211B176404280CFDB12CF54D5C4B26BFB1FB84328F2486A9DC050B657C33AD45ACBA1
                                Uniqueness

                                Uniqueness Score: -1.00%

                                Memory Dump Source
                                • Source File: 00000004.00000002.600097116.000000000131D000.00000040.00000001.sdmp, Offset: 0131D000, based on PE: false
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 8e28340385b1710160ca1763a38498d136049f55007f6243fe0149fbfabe2558
                                • Instruction ID: e91cd9305100d671d3c67409093934f13c32ef162e1347bc10e0c56887365680
                                • Opcode Fuzzy Hash: 8e28340385b1710160ca1763a38498d136049f55007f6243fe0149fbfabe2558
                                • Instruction Fuzzy Hash: 0E11BE75504280CFCB16CF14D5C8B15BB61FB45318F24C6A9D8094B65AC33AD44BCB62
                                Uniqueness

                                Uniqueness Score: -1.00%

                                Non-executed Functions

                                C-Code - Quality: 83%
                                			E00ACBF7F(signed int __eax, signed char __ebx, signed int __ecx, signed int* __edx, intOrPtr* __edi, intOrPtr* __esi, void* __fp0) {
                                				signed char _t434;
                                				signed char _t436;
                                				signed int _t438;
                                				signed int _t439;
                                				intOrPtr* _t442;
                                				signed char _t443;
                                				signed char _t444;
                                				signed char _t451;
                                				intOrPtr* _t834;
                                				intOrPtr* _t838;
                                				signed char _t839;
                                				signed char _t840;
                                				signed int _t841;
                                				void* _t842;
                                				signed char _t844;
                                				signed char _t845;
                                				void* _t846;
                                				signed char _t847;
                                				void* _t848;
                                				signed int _t874;
                                				intOrPtr* _t1030;
                                				intOrPtr* _t1036;
                                				void* _t1038;
                                				void* _t1050;
                                				signed char _t1059;
                                				void* _t1396;
                                
                                				_t1396 = __fp0;
                                				_t1036 = __esi;
                                				_t1030 = __edi;
                                				_t993 = __edx;
                                				_t874 = __ecx;
                                				_t845 = __ebx;
                                				_t434 = __eax | 0xffff263a;
                                				asm("invalid");
                                				_pop(ss);
                                				asm("adc [ebx], ecx");
                                				if(_t434 == 0) {
                                					 *_t434 =  *_t434 + _t434;
                                					 *((intOrPtr*)(__ecx + 0x7b750b11)) =  *((intOrPtr*)(__ecx + 0x7b750b11)) + _t1038;
                                					 *_t434 =  *_t434 + _t434;
                                					 *((intOrPtr*)(__edi + 0x5d)) =  *((intOrPtr*)(__edi + 0x5d)) + _t1038;
                                					 *_t434 =  *_t434 + _t434;
                                					asm("fcom qword [ecx]");
                                					 *__edx =  *__edx | __ecx;
                                					_push(es);
                                					_t838 = (_t434 |  *_t434) -  *(_t434 |  *_t434) -  *((intOrPtr*)((_t434 |  *_t434) -  *(_t434 |  *_t434)));
                                					 *_t838 =  *_t838 + _t838;
                                					 *_t838 =  *_t838 + __edx;
                                					 *_t838 =  *_t838 + _t838;
                                					_t839 = _t838 +  *_t838;
                                					asm("insd");
                                					_t993 = __edx + __ecx;
                                					_push(__edi);
                                					L2:
                                					 *_t1030 =  *_t1030 + _t993;
                                					 *_t839 =  *_t839 + _t839;
                                					 *_t839 =  *_t839 + _t839;
                                					asm("adc esi, [eax]");
                                					_t840 = _t839;
                                					_push(_t993);
                                					 *_t840 =  *_t840 + _t840;
                                					 *_t1030 =  *_t1030 + _t874;
                                					 *_t874 =  *_t874 + _t993;
                                					 *_t840 =  *_t840 + _t840;
                                					 *_t840 =  *_t840 + _t840;
                                					_t841 = _t840 + 0xa;
                                					ss = es;
                                					_t874 = _t874 +  *[cs:ebx];
                                					 *_t841 =  *_t841 & _t841;
                                					_t845 = _t845 +  *((intOrPtr*)(_t845 - 0x47)) +  *((intOrPtr*)(_t845 +  *((intOrPtr*)(_t845 - 0x47)) - 0x46));
                                					 *_t841 =  *_t841 + _t841;
                                					_t842 = _t841 + 0x1f;
                                					asm("adc [ebp+0x10000ae], cl");
                                					L3:
                                					 *0xdcd0 =  *0xdcd0 + _t1050;
                                					_t844 = _t842 + 0x00000028 ^ 0x6f0a0001;
                                					 *[ss:eax] =  *[ss:eax] + _t844;
                                					_t839 = _t844 |  *_t844;
                                					_t1050 = _t1050 -  *_t839;
                                					 *_t993 =  *_t993 + _t839;
                                					if( *_t993 != 0) {
                                						goto L2;
                                					}
                                					 *_t839 =  *_t839 + _t839;
                                					_t434 = _t839 + 0x1e;
                                					_t1038 = _t1036 + 0x25010000;
                                					asm("rcr ch, 1");
                                					 *_t434 =  *_t434 + _t434;
                                				}
                                				_t436 = _t434 + 0x00000028 ^ 0x6f0a0001;
                                				 *[ss:eax] =  *[ss:eax] + _t436;
                                				_t438 = (_t436 |  *_t436) -  *(_t436 |  *_t436);
                                				 *_t993 =  *_t993 + _t874;
                                				while(1) {
                                					L6:
                                					 *_t438 =  *_t438 + _t438;
                                					asm("adc esi, [eax]");
                                					 *_t438 =  *_t438 + _t438;
                                					_t439 = _t438;
                                					 *_t439 =  *_t439 + _t439;
                                					 *_t439 =  *_t439 | _t439;
                                					 *_t874 =  *_t874 + _t993;
                                					while(1) {
                                						L7:
                                						asm("adc [eax], eax");
                                						_t846 = _t845 +  *((intOrPtr*)(_t845 - 0x48));
                                						 *_t439 =  *_t439 + _t439;
                                						_push(es);
                                						_t442 = _t439 + 0xa -  *((intOrPtr*)(_t439 + 0xa)) -  *_t1036;
                                						 *_t993 =  *_t993 + _t442;
                                						_t1030 = _t1030 +  *(_t1038 - 0x48);
                                						 *_t442 =  *_t442 + _t442;
                                						_t443 = _t442 + 0x2a;
                                						asm("into");
                                						 *_t993 =  *_t993 + _t443;
                                						 *_t993 =  *_t993 - _t846;
                                						 *_t443 =  *_t443 + _t443;
                                						_t444 = _t443 |  *_t443;
                                						_t847 = _t846 +  *((intOrPtr*)(_t1036 + 0x45));
                                						_t1059 = _t847;
                                						L9:
                                						while(1) {
                                							if(_t1059 > 0) {
                                								 *_t444 =  *_t444 + _t444;
                                								_t847 = _t847 |  *(_t1038 - 0x48);
                                								 *_t444 =  *_t444 + _t444;
                                								_t444 = _t444 + 2;
                                								if(_t444 >= 0) {
                                									L15:
                                									 *_t993 =  *_t993 + _t874;
                                									if ( *_t993 >= 0) goto L9;
                                								} else {
                                									 *_t444 =  *_t444 + _t444;
                                									_t845 = _t847 |  *(_t1038 - 0x46);
                                									 *_t444 =  *_t444 + _t444;
                                									_t438 = _t444 + 2;
                                									if(_t438 != 0) {
                                										goto L6;
                                									} else {
                                										 *_t438 =  *_t438 + _t438;
                                										_t439 = _t438 + 0x17;
                                										asm("outsd");
                                										 *_t993 =  *_t993 + _t874;
                                										 *_t993 =  *_t993 + _t439;
                                										_pop(ss);
                                										if( *_t993 >= 0) {
                                											goto L7;
                                										} else {
                                											 *_t439 =  *_t439 + _t439;
                                											_t834 = _t439 + 0x2a;
                                											 *_t834 =  *_t834 + _t834;
                                											asm("adc esi, [eax]");
                                											_t451 = _t845;
                                											_t848 = _t834 +  *_t834;
                                											 *_t451 =  *_t451 + _t451;
                                											 *_t1030 =  *_t1030 + _t874;
                                											 *_t874 =  *_t874 + _t993;
                                											 *_t993 =  *_t993 + _t451;
                                											 *_t993 =  *_t993 - _t848;
                                											 *_t451 =  *_t451 + _t451;
                                											_t444 = _t451 |  *_t451;
                                											_t847 = _t848 +  *((intOrPtr*)(_t1036 + 0x45));
                                											 *_t444 =  *_t444 + _t444;
                                											goto L15;
                                										}
                                									}
                                								}
                                							}
                                						}
                                					}
                                					goto L3;
                                				}
                                			}





























                                0x00acbf7f
                                0x00acbf7f
                                0x00acbf7f
                                0x00acbf7f
                                0x00acbf7f
                                0x00acbf7f
                                0x00acbf7f
                                0x00acbf84
                                0x00acbf86
                                0x00acbf87
                                0x00acbf89
                                0x00acbf8b
                                0x00acbf8d
                                0x00acbf94
                                0x00acbf96
                                0x00acbf99
                                0x00acbf9d
                                0x00acbf9f
                                0x00acbfa3
                                0x00acbfa4
                                0x00acbfa6
                                0x00acbfa8
                                0x00acbfaa
                                0x00acbfac
                                0x00acbfae
                                0x00acbfaf
                                0x00acbfb1
                                0x00acbfb2
                                0x00acbfb2
                                0x00acbfb4
                                0x00acbfb6
                                0x00acbfb8
                                0x00acbfba
                                0x00acbfbc
                                0x00acbfbd
                                0x00acbfbf
                                0x00acbfc2
                                0x00acbfc4
                                0x00acbfc9
                                0x00acbfcb
                                0x00acbfce
                                0x00acbfcf
                                0x00acbfd2
                                0x00acbfd4
                                0x00acbfd7
                                0x00acbfd9
                                0x00acbfdb
                                0x00acbfe0
                                0x00acbfe0
                                0x00acbfe8
                                0x00acbfed
                                0x00acbff0
                                0x00acbff2
                                0x00acbff4
                                0x00acbff6
                                0x00000000
                                0x00000000
                                0x00acbff8
                                0x00acbffa
                                0x00acbffc
                                0x00acc002
                                0x00acc004
                                0x00acc004
                                0x00acc008
                                0x00acc00d
                                0x00acc012
                                0x00acc014
                                0x00acc016
                                0x00acc016
                                0x00acc016
                                0x00acc018
                                0x00acc01a
                                0x00acc01c
                                0x00acc01e
                                0x00acc020
                                0x00acc022
                                0x00acc023
                                0x00acc023
                                0x00acc023
                                0x00acc025
                                0x00acc028
                                0x00acc02e
                                0x00acc02f
                                0x00acc031
                                0x00acc033
                                0x00acc036
                                0x00acc038
                                0x00acc03a
                                0x00acc03b
                                0x00acc03d
                                0x00acc03f
                                0x00acc041
                                0x00acc043
                                0x00acc043
                                0x00000000
                                0x00acc044
                                0x00acc044
                                0x00acc046
                                0x00acc048
                                0x00acc04b
                                0x00acc04d
                                0x00acc04f
                                0x00acc088
                                0x00acc088
                                0x00acc08a
                                0x00acc051
                                0x00acc051
                                0x00acc053
                                0x00acc056
                                0x00acc058
                                0x00acc05a
                                0x00000000
                                0x00acc05c
                                0x00acc05c
                                0x00acc05e
                                0x00acc060
                                0x00acc063
                                0x00acc065
                                0x00acc067
                                0x00acc068
                                0x00000000
                                0x00acc06a
                                0x00acc06a
                                0x00acc06c
                                0x00acc06e
                                0x00acc070
                                0x00acc074
                                0x00acc074
                                0x00acc075
                                0x00acc077
                                0x00acc07a
                                0x00acc07c
                                0x00acc07e
                                0x00acc080
                                0x00acc082
                                0x00acc084
                                0x00acc087
                                0x00000000
                                0x00acc087
                                0x00acc068
                                0x00acc05a
                                0x00acc04f
                                0x00acc08b
                                0x00acc044
                                0x00000000
                                0x00acc023

                                Memory Dump Source
                                • Source File: 00000004.00000002.598408050.0000000000AC2000.00000002.00020000.sdmp, Offset: 00AC0000, based on PE: true
                                • Associated: 00000004.00000002.598386774.0000000000AC0000.00000002.00020000.sdmp Download File
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 09d338813a4c9410a1ed9c7f38bd564bbcf8f758706c343c41eb44cd031112eb
                                • Instruction ID: c5679f2518c9fc45e35266487e5cdbe9f7f3e8205e1f6d6b358b19136474fa6c
                                • Opcode Fuzzy Hash: 09d338813a4c9410a1ed9c7f38bd564bbcf8f758706c343c41eb44cd031112eb
                                • Instruction Fuzzy Hash: FF33496140E7C29FCB034BB85C716E1BFB1AE5722431E49DBC4C08F4A3E219696AD776
                                Uniqueness

                                Uniqueness Score: -1.00%

                                Memory Dump Source
                                • Source File: 00000004.00000002.605616212.0000000006250000.00000040.00000001.sdmp, Offset: 06250000, based on PE: false
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 4b5c050533e963ebde2e0caa3aa05396faeb3cab345a80ff70782373a67f1bde
                                • Instruction ID: 48f61b1afe24d03ad6a95706421dcb038d4f27975188583cd9edb23c7c09064d
                                • Opcode Fuzzy Hash: 4b5c050533e963ebde2e0caa3aa05396faeb3cab345a80ff70782373a67f1bde
                                • Instruction Fuzzy Hash: 8BB16C70E102198FDB60DFA8C8857EEBBF2AF88354F55C129EC15A7364EB749845CB81
                                Uniqueness

                                Uniqueness Score: -1.00%

                                Memory Dump Source
                                • Source File: 00000004.00000002.600456396.0000000002CF0000.00000040.00000001.sdmp, Offset: 02CF0000, based on PE: false
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 9ca706bde5b0bc132d9f789aa4da13daf7acd712aec1b2c3c650d034ffd00315
                                • Instruction ID: 3cc6e5d8777724c2f5894d8b5026be539b8be5cff90858a66c6ec7140868badd
                                • Opcode Fuzzy Hash: 9ca706bde5b0bc132d9f789aa4da13daf7acd712aec1b2c3c650d034ffd00315
                                • Instruction Fuzzy Hash: B8818D34B042188BDB88AFB6985527E76B7BBC9315B15892DE907E7388DF348D02C791
                                Uniqueness

                                Uniqueness Score: -1.00%