Loading ...

Play interactive tourEdit tour

Windows Analysis Report PROFORMA.exe

Overview

General Information

Sample Name:PROFORMA.exe
Analysis ID:452728
MD5:e5b234b445e81c5a55f21bc75eb40e5e
SHA1:f01fbe23b71016e967f30700c3b547bbf9ba1ef3
SHA256:a76a64fda4a0e041ff234597f21fd66cf2ef66b2d3f56fea86316c997bb0e5bb
Tags:agentteslaexe
Infos:

Most interesting Screenshot:

Detection

AgentTesla
Score:92
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Multi AV Scanner detection for submitted file
Yara detected AgentTesla
Yara detected AgentTesla
.NET source code contains very large array initializations
Injects a PE file into a foreign processes
Machine Learning detection for sample
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)
Antivirus or Machine Learning detection for unpacked file
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Creates a window with clipboard capturing capabilities
Detected potential crypto function
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
May sleep (evasive loops) to hinder dynamic analysis
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)
Yara detected Credential Stealer

Classification

Process Tree

  • System is w10x64
  • PROFORMA.exe (PID: 3452 cmdline: 'C:\Users\user\Desktop\PROFORMA.exe' MD5: E5B234B445E81C5A55F21BC75EB40E5E)
    • PROFORMA.exe (PID: 5924 cmdline: C:\Users\user\Desktop\PROFORMA.exe MD5: E5B234B445E81C5A55F21BC75EB40E5E)
  • cleanup

Malware Configuration

Threatname: Agenttesla

{"Exfil Mode": "SMTP", "Username": "exports@standardfastners.com", "Password": "Exports@208", "Host": "mail.standardfastners.com"}

Yara Overview

Memory Dumps

SourceRuleDescriptionAuthorStrings
00000004.00000002.598204242.0000000000402000.00000040.00000001.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
    00000004.00000002.598204242.0000000000402000.00000040.00000001.sdmpJoeSecurity_AgentTesla_2Yara detected AgentTeslaJoe Security
      00000004.00000002.600534622.0000000002E11000.00000004.00000001.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
        Process Memory Space: PROFORMA.exe PID: 5924JoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
          Process Memory Space: PROFORMA.exe PID: 5924JoeSecurity_CredentialStealerYara detected Credential StealerJoe Security

            Unpacked PEs

            SourceRuleDescriptionAuthorStrings
            4.2.PROFORMA.exe.400000.0.unpackJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
              4.2.PROFORMA.exe.400000.0.unpackJoeSecurity_AgentTesla_2Yara detected AgentTeslaJoe Security

                Sigma Overview

                No Sigma rule has matched

                Jbx Signature Overview

                Click to jump to signature section

                Show All Signature Results

                AV Detection:

                barindex
                Found malware configurationShow sources
                Source: 4.2.PROFORMA.exe.400000.0.unpackMalware Configuration Extractor: Agenttesla {"Exfil Mode": "SMTP", "Username": "exports@standardfastners.com", "Password": "Exports@208", "Host": "mail.standardfastners.com"}
                Multi AV Scanner detection for submitted fileShow sources
                Source: PROFORMA.exeVirustotal: Detection: 37%Perma Link
                Source: PROFORMA.exeReversingLabs: Detection: 28%
                Machine Learning detection for sampleShow sources
                Source: PROFORMA.exeJoe Sandbox ML: detected
                Source: 4.2.PROFORMA.exe.400000.0.unpackAvira: Label: TR/Spy.Gen8
                Source: PROFORMA.exeStatic PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE
                Source: PROFORMA.exeStatic PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
                Source: PROFORMA.exe, 00000004.00000002.600534622.0000000002E11000.00000004.00000001.sdmpString found in binary or memory: http://127.0.0.1:HTTP/1.1
                Source: PROFORMA.exe, 00000004.00000002.600534622.0000000002E11000.00000004.00000001.sdmp, PROFORMA.exe, 00000004.00000002.602649512.000000000315B000.00000004.00000001.sdmp, PROFORMA.exe, 00000004.00000002.602488728.0000000003119000.00000004.00000001.sdmpString found in binary or memory: http://1bkLydyXy3tVVGSqiSW.org
                Source: PROFORMA.exe, 00000004.00000002.600534622.0000000002E11000.00000004.00000001.sdmpString found in binary or memory: http://1bkLydyXy3tVVGSqiSW.org0
                Source: PROFORMA.exe, 00000004.00000002.600534622.0000000002E11000.00000004.00000001.sdmpString found in binary or memory: http://DynDns.comDynDNS
                Source: PROFORMA.exeString found in binary or memory: http://api.twitter.com/1/direct_messages.xml?since_id=
                Source: PROFORMA.exe, 00000001.00000003.334190170.0000000005BFD000.00000004.00000001.sdmpString found in binary or memory: http://fontfabrik.comX
                Source: PROFORMA.exe, 00000004.00000002.600534622.0000000002E11000.00000004.00000001.sdmpString found in binary or memory: http://jWLkXH.com
                Source: PROFORMA.exeString found in binary or memory: http://twitter.com/statuses/user_timeline.xml?screen_name=
                Source: PROFORMA.exe, 00000001.00000003.342109457.0000000005BC6000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.com
                Source: PROFORMA.exe, 00000001.00000003.342109457.0000000005BC6000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.com.
                Source: PROFORMA.exe, 00000001.00000003.342109457.0000000005BC6000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.com.TTFv
                Source: PROFORMA.exe, 00000001.00000003.340025859.0000000005BDF000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers/
                Source: PROFORMA.exe, 00000001.00000003.342109457.0000000005BC6000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designerss
                Source: PROFORMA.exe, 00000001.00000003.342109457.0000000005BC6000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.comR
                Source: PROFORMA.exe, 00000001.00000003.342109457.0000000005BC6000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.comalic
                Source: PROFORMA.exe, 00000001.00000003.342109457.0000000005BC6000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.comalicK
                Source: PROFORMA.exe, 00000001.00000003.342109457.0000000005BC6000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.comcomF
                Source: PROFORMA.exe, 00000001.00000003.333884707.0000000005BFD000.00000004.00000001.sdmpString found in binary or memory: http://www.fonts.com
                Source: PROFORMA.exe, 00000001.00000003.335552996.0000000005BCE000.00000004.00000001.sdmp, PROFORMA.exe, 00000001.00000003.335484225.0000000005BC3000.00000004.00000001.sdmpString found in binary or memory: http://www.founder.com.cn/cn
                Source: PROFORMA.exe, 00000001.00000003.336195214.0000000005BC6000.00000004.00000001.sdmpString found in binary or memory: http://www.founder.com.cn/cn/4
                Source: PROFORMA.exe, 00000001.00000003.335484225.0000000005BC3000.00000004.00000001.sdmpString found in binary or memory: http://www.founder.com.cn/cn5
                Source: PROFORMA.exe, 00000001.00000003.335622841.0000000005BD1000.00000004.00000001.sdmpString found in binary or memory: http://www.founder.com.cn/cnI
                Source: PROFORMA.exe, 00000001.00000003.335484225.0000000005BC3000.00000004.00000001.sdmpString found in binary or memory: http://www.founder.com.cn/cne-d
                Source: PROFORMA.exe, 00000001.00000003.335484225.0000000005BC3000.00000004.00000001.sdmpString found in binary or memory: http://www.founder.com.cn/cnn-uv
                Source: PROFORMA.exe, 00000001.00000003.335484225.0000000005BC3000.00000004.00000001.sdmpString found in binary or memory: http://www.founder.com.cn/cny
                Source: PROFORMA.exe, 00000001.00000003.337773505.0000000005BC6000.00000004.00000001.sdmp, PROFORMA.exe, 00000001.00000003.337940429.0000000005BC6000.00000004.00000001.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/
                Source: PROFORMA.exe, 00000001.00000003.337773505.0000000005BC6000.00000004.00000001.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/.
                Source: PROFORMA.exe, 00000001.00000003.337773505.0000000005BC6000.00000004.00000001.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp//
                Source: PROFORMA.exe, 00000001.00000003.337940429.0000000005BC6000.00000004.00000001.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp//typ
                Source: PROFORMA.exe, 00000001.00000003.337940429.0000000005BC6000.00000004.00000001.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/9
                Source: PROFORMA.exe, 00000001.00000003.337773505.0000000005BC6000.00000004.00000001.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/R
                Source: PROFORMA.exe, 00000001.00000003.337773505.0000000005BC6000.00000004.00000001.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/Y0
                Source: PROFORMA.exe, 00000001.00000003.337940429.0000000005BC6000.00000004.00000001.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/d
                Source: PROFORMA.exe, 00000001.00000003.337773505.0000000005BC6000.00000004.00000001.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/es-eK
                Source: PROFORMA.exe, 00000001.00000003.337421061.0000000005BC6000.00000004.00000001.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/g
                Source: PROFORMA.exe, 00000001.00000003.337773505.0000000005BC6000.00000004.00000001.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/jp/
                Source: PROFORMA.exe, 00000001.00000003.337940429.0000000005BC6000.00000004.00000001.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/jp/R
                Source: PROFORMA.exe, 00000001.00000003.337773505.0000000005BC6000.00000004.00000001.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/jp/v
                Source: PROFORMA.exe, 00000001.00000003.337679569.0000000005BC6000.00000004.00000001.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/n
                Source: PROFORMA.exe, 00000001.00000003.337773505.0000000005BC6000.00000004.00000001.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/o
                Source: PROFORMA.exe, 00000001.00000003.337679569.0000000005BC6000.00000004.00000001.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/v
                Source: PROFORMA.exe, 00000001.00000003.333660030.0000000000F3D000.00000004.00000001.sdmpString found in binary or memory: http://www.sajatypeworks.com
                Source: PROFORMA.exe, 00000001.00000003.333660030.0000000000F3D000.00000004.00000001.sdmpString found in binary or memory: http://www.sajatypeworks.com-n
                Source: PROFORMA.exe, 00000001.00000003.336204158.0000000005BCC000.00000004.00000001.sdmpString found in binary or memory: http://www.tiro.com
                Source: PROFORMA.exe, 00000001.00000003.337121220.0000000005BDB000.00000004.00000001.sdmpString found in binary or memory: http://www.tiro.comX
                Source: PROFORMA.exe, 00000001.00000003.337080083.0000000005BDB000.00000004.00000001.sdmpString found in binary or memory: http://www.tiro.comslnt
                Source: PROFORMA.exe, 00000001.00000003.342210139.0000000005BDF000.00000004.00000001.sdmpString found in binary or memory: http://www.urwpp.de
                Source: PROFORMA.exe, 00000001.00000003.339862573.0000000005BDF000.00000004.00000001.sdmpString found in binary or memory: http://www.urwpp.deFa
                Source: PROFORMA.exe, 00000001.00000003.339862573.0000000005BDF000.00000004.00000001.sdmpString found in binary or memory: http://www.urwpp.dei
                Source: PROFORMA.exe, 00000001.00000003.342210139.0000000005BDF000.00000004.00000001.sdmpString found in binary or memory: http://www.urwpp.delar
                Source: PROFORMA.exe, 00000001.00000003.342389996.0000000005BDF000.00000004.00000001.sdmpString found in binary or memory: http://www.urwpp.det
                Source: PROFORMA.exe, 00000001.00000003.336532127.0000000005BCE000.00000004.00000001.sdmpString found in binary or memory: http://www.zhongyicts.com.cn
                Source: PROFORMA.exe, 00000004.00000002.598204242.0000000000402000.00000040.00000001.sdmpString found in binary or memory: https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip
                Source: PROFORMA.exe, 00000004.00000002.600534622.0000000002E11000.00000004.00000001.sdmpString found in binary or memory: https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip%tordir%%ha
                Source: C:\Users\user\Desktop\PROFORMA.exeWindow created: window name: CLIPBRDWNDCLASS

                System Summary:

                barindex
                .NET source code contains very large array initializationsShow sources
                Source: 4.2.PROFORMA.exe.400000.0.unpack, u003cPrivateImplementationDetailsu003eu007b1E58433Au002d00F2u002d4767u002d95F5u002dE33C70F925C1u007d/F51F3358u002d1AABu002d46A7u002dBE23u002d498067C4E488.csLarge array initialization: .cctor: array initializer size 11968
                Source: C:\Users\user\Desktop\PROFORMA.exeCode function: 4_2_00ACBF7F
                Source: C:\Users\user\Desktop\PROFORMA.exeCode function: 4_2_02CF47A0
                Source: C:\Users\user\Desktop\PROFORMA.exeCode function: 4_2_02CF4790
                Source: C:\Users\user\Desktop\PROFORMA.exeCode function: 4_2_02CF4730
                Source: C:\Users\user\Desktop\PROFORMA.exeCode function: 4_2_02CFD670
                Source: C:\Users\user\Desktop\PROFORMA.exeCode function: 4_2_06256510
                Source: C:\Users\user\Desktop\PROFORMA.exeCode function: 4_2_062590F0
                Source: C:\Users\user\Desktop\PROFORMA.exeCode function: 4_2_06257128
                Source: C:\Users\user\Desktop\PROFORMA.exeCode function: 4_2_06256858
                Source: C:\Users\user\Desktop\PROFORMA.exeCode function: 4_2_00AC2050
                Source: PROFORMA.exe, 00000001.00000000.331214844.0000000000732000.00000002.00020000.sdmpBinary or memory string: OriginalFilenameAccessControlSectio.exe8 vs PROFORMA.exe
                Source: PROFORMA.exeBinary or memory string: OriginalFilename vs PROFORMA.exe
                Source: PROFORMA.exe, 00000004.00000002.605107482.0000000005F60000.00000002.00000001.sdmpBinary or memory string: OriginalFilenameKernelbase.dll.muij% vs PROFORMA.exe
                Source: PROFORMA.exe, 00000004.00000002.598204242.0000000000402000.00000040.00000001.sdmpBinary or memory string: OriginalFilenamekzZmXoBwHcNalckDBEBYBjqTJf.exe4 vs PROFORMA.exe
                Source: PROFORMA.exe, 00000004.00000002.598408050.0000000000AC2000.00000002.00020000.sdmpBinary or memory string: OriginalFilenameAccessControlSectio.exe8 vs PROFORMA.exe
                Source: PROFORMA.exeBinary or memory string: OriginalFilenameAccessControlSectio.exe8 vs PROFORMA.exe
                Source: PROFORMA.exeStatic PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE
                Source: PROFORMA.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                Source: PROFORMA.exe, ControlePorTwitter/Business/Seguranca.csCryptographic APIs: 'CreateDecryptor'
                Source: 1.0.PROFORMA.exe.730000.0.unpack, ControlePorTwitter/Business/Seguranca.csCryptographic APIs: 'CreateDecryptor'
                Source: 4.2.PROFORMA.exe.ac0000.1.unpack, ControlePorTwitter/Business/Seguranca.csCryptographic APIs: 'CreateDecryptor'
                Source: 4.2.PROFORMA.exe.400000.0.unpack, A/b2.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
                Source: 4.2.PROFORMA.exe.400000.0.unpack, A/b2.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
                Source: 4.0.PROFORMA.exe.ac0000.0.unpack, ControlePorTwitter/Business/Seguranca.csCryptographic APIs: 'CreateDecryptor'
                Source: classification engineClassification label: mal92.troj.evad.winEXE@3/1@0/0
                Source: C:\Users\user\Desktop\PROFORMA.exeFile created: C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\PROFORMA.exe.logJump to behavior
                Source: C:\Users\user\Desktop\PROFORMA.exeMutant created: \Sessions\1\BaseNamedObjects\tEatoAXfYWfW
                Source: PROFORMA.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                Source: C:\Users\user\Desktop\PROFORMA.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
                Source: C:\Users\user\Desktop\PROFORMA.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
                Source: C:\Users\user\Desktop\PROFORMA.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                Source: C:\Users\user\Desktop\PROFORMA.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
                Source: PROFORMA.exeVirustotal: Detection: 37%
                Source: PROFORMA.exeReversingLabs: Detection: 28%
                Source: unknownProcess created: C:\Users\user\Desktop\PROFORMA.exe 'C:\Users\user\Desktop\PROFORMA.exe'
                Source: C:\Users\user\Desktop\PROFORMA.exeProcess created: C:\Users\user\Desktop\PROFORMA.exe C:\Users\user\Desktop\PROFORMA.exe
                Source: C:\Users\user\Desktop\PROFORMA.exeProcess created: C:\Users\user\Desktop\PROFORMA.exe C:\Users\user\Desktop\PROFORMA.exe
                Source: C:\Users\user\Desktop\PROFORMA.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{172BDDF8-CEEA-11D1-8B05-00600806D9B6}\InProcServer32
                Source: C:\Users\user\Desktop\PROFORMA.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dll
                Source: PROFORMA.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
                Source: PROFORMA.exeStatic PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
                Source: C:\Users\user\Desktop\PROFORMA.exeCode function: 4_2_0625C070 push es; ret
                Source: initial sampleStatic PE information: section name: .text entropy: 7.63187397239
                Source: C:\Users\user\Desktop\PROFORMA.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\PROFORMA.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\PROFORMA.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\PROFORMA.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\PROFORMA.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\PROFORMA.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\PROFORMA.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\PROFORMA.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\PROFORMA.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\PROFORMA.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\PROFORMA.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\PROFORMA.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\PROFORMA.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\PROFORMA.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\PROFORMA.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\PROFORMA.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\PROFORMA.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\PROFORMA.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\PROFORMA.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\PROFORMA.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\PROFORMA.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\PROFORMA.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\PROFORMA.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\PROFORMA.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\PROFORMA.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\PROFORMA.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\PROFORMA.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\PROFORMA.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\PROFORMA.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\PROFORMA.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\PROFORMA.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\PROFORMA.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\PROFORMA.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\PROFORMA.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\PROFORMA.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\PROFORMA.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\PROFORMA.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\PROFORMA.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\PROFORMA.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\PROFORMA.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\PROFORMA.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\PROFORMA.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\PROFORMA.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\PROFORMA.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\PROFORMA.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\PROFORMA.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\PROFORMA.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\PROFORMA.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\PROFORMA.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\PROFORMA.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\PROFORMA.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\PROFORMA.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\PROFORMA.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\PROFORMA.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\PROFORMA.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\PROFORMA.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\PROFORMA.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\PROFORMA.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\PROFORMA.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\PROFORMA.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\PROFORMA.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\PROFORMA.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\PROFORMA.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\PROFORMA.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\PROFORMA.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\PROFORMA.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\PROFORMA.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\PROFORMA.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\PROFORMA.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\PROFORMA.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\PROFORMA.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\PROFORMA.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\PROFORMA.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\PROFORMA.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\PROFORMA.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\PROFORMA.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\PROFORMA.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\PROFORMA.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\PROFORMA.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\PROFORMA.exeProcess information set: NOOPENFILEERRORBOX

                Malware Analysis System Evasion:

                barindex
                Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)Show sources
                Source: C:\Users\user\Desktop\PROFORMA.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
                Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)Show sources
                Source: C:\Users\user\Desktop\PROFORMA.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_NetworkAdapterConfiguration
                Source: C:\Users\user\Desktop\PROFORMA.exeThread delayed: delay time: 922337203685477
                Source: C:\Users\user\Desktop\PROFORMA.exeThread delayed: delay time: 922337203685477
                Source: C:\Users\user\Desktop\PROFORMA.exeWindow / User API: threadDelayed 6967
                Source: C:\Users\user\Desktop\PROFORMA.exeWindow / User API: threadDelayed 2858
                Source: C:\Users\user\Desktop\PROFORMA.exe TID: 5740Thread sleep time: -41231s >= -30000s
                Source: C:\Users\user\Desktop\PROFORMA.exe TID: 4140Thread sleep time: -922337203685477s >= -30000s
                Source: C:\Users\user\Desktop\PROFORMA.exe TID: 2692Thread sleep time: -22136092888451448s >= -30000s
                Source: C:\Users\user\Desktop\PROFORMA.exe TID: 2696Thread sleep count: 6967 > 30
                Source: C:\Users\user\Desktop\PROFORMA.exe TID: 2696Thread sleep count: 2858 > 30
                Source: C:\Users\user\Desktop\PROFORMA.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                Source: C:\Users\user\Desktop\PROFORMA.exeThread delayed: delay time: 41231
                Source: C:\Users\user\Desktop\PROFORMA.exeThread delayed: delay time: 922337203685477
                Source: C:\Users\user\Desktop\PROFORMA.exeThread delayed: delay time: 922337203685477
                Source: PROFORMA.exe, 00000004.00000002.605107482.0000000005F60000.00000002.00000001.sdmpBinary or memory string: A Virtual Machine could not be started because Hyper-V is not installed.
                Source: PROFORMA.exeBinary or memory string: DdUXhZQ[fUE6Ws]YTSk6WLInYD73f[o5QsEYYq{nV]8XY[8XVpEzfoQZd5M[]WMZ][<IgogJD}4pfy]3[3Y5]DL[]}Y4[3Y5]D75esU[\moJezE[TiU[]qET]m8Z\3QqeMU[]K<IgogJD|YJg4E[eyQ3[3Y5]DL6e3Q5\xDjfoUZd5<pfTU6\osp\SQ[]mopg|Y5XlY5Y843[wEjfoUZd5<pfTU6\osp\SQ[e|<pU843[wEjfoQ[YDL[]nopgyMKX3QZ
                Source: PROFORMA.exe, 00000004.00000002.605107482.0000000005F60000.00000002.00000001.sdmpBinary or memory string: A communication protocol error has occurred between the Hyper-V Host and Guest Compute Service.
                Source: PROFORMA.exe, 00000004.00000002.605107482.0000000005F60000.00000002.00000001.sdmpBinary or memory string: The communication protocol version between the Hyper-V Host and Guest Compute Services is not supported.
                Source: PROFORMA.exe, 00000004.00000002.605107482.0000000005F60000.00000002.00000001.sdmpBinary or memory string: An unknown internal message was received by the Hyper-V Compute Service.
                Source: C:\Users\user\Desktop\PROFORMA.exeProcess information queried: ProcessInformation
                Source: C:\Users\user\Desktop\PROFORMA.exeProcess token adjusted: Debug
                Source: C:\Users\user\Desktop\PROFORMA.exeProcess token adjusted: Debug
                Source: C:\Users\user\Desktop\PROFORMA.exeMemory allocated: page read and write | page guard

                HIPS / PFW / Operating System Protection Evasion:

                barindex
                Injects a PE file into a foreign processesShow sources
                Source: C:\Users\user\Desktop\PROFORMA.exeMemory written: C:\Users\user\Desktop\PROFORMA.exe base: 400000 value starts with: 4D5A
                Source: C:\Users\user\Desktop\PROFORMA.exeProcess created: C:\Users\user\Desktop\PROFORMA.exe C:\Users\user\Desktop\PROFORMA.exe
                Source: PROFORMA.exe, 00000004.00000002.600201661.0000000001800000.00000002.00000001.sdmpBinary or memory string: Shell_TrayWnd
                Source: PROFORMA.exe, 00000004.00000002.600201661.0000000001800000.00000002.00000001.sdmpBinary or memory string: Progman
                Source: PROFORMA.exe, 00000004.00000002.600201661.0000000001800000.00000002.00000001.sdmpBinary or memory string: &Program Manager
                Source: PROFORMA.exe, 00000004.00000002.600201661.0000000001800000.00000002.00000001.sdmpBinary or memory string: Progmanlock
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Users\user\Desktop\PROFORMA.exe VolumeInformation
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Runtime.Remoting\v4.0_4.0.0.0__b77a5c561934e089\System.Runtime.Remoting.dll VolumeInformation
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\arial.ttf VolumeInformation
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\ariali.ttf VolumeInformation
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\arialbd.ttf VolumeInformation
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\arialbi.ttf VolumeInformation
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\ARIALN.TTF VolumeInformation
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\ariblk.ttf VolumeInformation
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\ARIALNI.TTF VolumeInformation
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\ARIALNB.TTF VolumeInformation
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\ARIALNBI.TTF VolumeInformation
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformation
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\calibri.ttf VolumeInformation
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\calibril.ttf VolumeInformation
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\calibrii.ttf VolumeInformation
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\calibrili.ttf VolumeInformation
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\calibrib.ttf VolumeInformation
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\calibriz.ttf VolumeInformation
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\cambria.ttc VolumeInformation
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\cambriai.ttf VolumeInformation
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\cambriab.ttf VolumeInformation
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\cambriaz.ttf VolumeInformation
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\Candara.ttf VolumeInformation
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\Candarai.ttf VolumeInformation
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\Candarab.ttf VolumeInformation
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\Candaraz.ttf VolumeInformation
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\comic.ttf VolumeInformation
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\comici.ttf VolumeInformation
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\comicbd.ttf VolumeInformation
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\comicz.ttf VolumeInformation
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\consola.ttf VolumeInformation
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\consolai.ttf VolumeInformation
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\consolab.ttf VolumeInformation
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\consolaz.ttf VolumeInformation
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\constan.ttf VolumeInformation
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\constani.ttf VolumeInformation
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\constanb.ttf VolumeInformation
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\constanz.ttf VolumeInformation
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\corbel.ttf VolumeInformation
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\corbeli.ttf VolumeInformation
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\corbelb.ttf VolumeInformation
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\corbelz.ttf VolumeInformation
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\cour.ttf VolumeInformation
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\couri.ttf VolumeInformation
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\courbd.ttf VolumeInformation
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\courbi.ttf VolumeInformation
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\ebrima.ttf VolumeInformation
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\ebrimabd.ttf VolumeInformation
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\framd.ttf VolumeInformation
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\FRADM.TTF VolumeInformation
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\framdit.ttf VolumeInformation
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\FRADMIT.TTF VolumeInformation
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\FRAMDCN.TTF VolumeInformation
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\FRADMCN.TTF VolumeInformation
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\FRAHV.TTF VolumeInformation
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\FRAHVIT.TTF VolumeInformation
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\Gabriola.ttf VolumeInformation
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\gadugi.ttf VolumeInformation
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\gadugib.ttf VolumeInformation
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\georgia.ttf VolumeInformation
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\georgiai.ttf VolumeInformation
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\georgiab.ttf VolumeInformation
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\georgiaz.ttf VolumeInformation
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\impact.ttf VolumeInformation
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\Inkfree.ttf VolumeInformation
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\javatext.ttf VolumeInformation
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\LeelawUI.ttf VolumeInformation
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\LeelUIsl.ttf VolumeInformation
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\LeelaUIb.ttf VolumeInformation
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\lucon.ttf VolumeInformation
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\l_10646.ttf VolumeInformation
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\malgun.ttf VolumeInformation
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\malgunsl.ttf VolumeInformation
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\malgunbd.ttf VolumeInformation
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\himalaya.ttf VolumeInformation
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\msjh.ttc VolumeInformation
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\msjhl.ttc VolumeInformation
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\msjhbd.ttc VolumeInformation
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\ntailu.ttf VolumeInformation
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\ntailub.ttf VolumeInformation
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\phagspa.ttf VolumeInformation
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\phagspab.ttf VolumeInformation
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformation
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\taile.ttf VolumeInformation
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\taileb.ttf VolumeInformation
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\msyh.ttc VolumeInformation
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\msyhl.ttc VolumeInformation
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\msyhbd.ttc VolumeInformation
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\msyi.ttf VolumeInformation
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\mingliub.ttc VolumeInformation
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\monbaiti.ttf VolumeInformation
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\msgothic.ttc VolumeInformation
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\mvboli.ttf VolumeInformation
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\mmrtext.ttf VolumeInformation
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\mmrtextb.ttf VolumeInformation
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\Nirmala.ttf VolumeInformation
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\NirmalaS.ttf VolumeInformation
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\NirmalaB.ttf VolumeInformation
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\pala.ttf VolumeInformation
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\palai.ttf VolumeInformation
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\palab.ttf VolumeInformation
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\palabi.ttf VolumeInformation
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\segoepr.ttf VolumeInformation
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\segoeprb.ttf VolumeInformation
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\segoesc.ttf VolumeInformation
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\segoescb.ttf VolumeInformation
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\seguiemj.ttf VolumeInformation
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\seguihis.ttf VolumeInformation
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\seguisym.ttf VolumeInformation
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\simsun.ttc VolumeInformation
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\simsunb.ttf VolumeInformation
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\Sitka.ttc VolumeInformation
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\SitkaI.ttc VolumeInformation
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\SitkaB.ttc VolumeInformation
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\SitkaZ.ttc VolumeInformation
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\sylfaen.ttf VolumeInformation
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\symbol.ttf VolumeInformation
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\tahoma.ttf VolumeInformation
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\tahomabd.ttf VolumeInformation
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\trebuc.ttf VolumeInformation
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\trebucit.ttf VolumeInformation
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\trebucbd.ttf VolumeInformation
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\trebucbi.ttf VolumeInformation
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\verdana.ttf VolumeInformation
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\verdanai.ttf VolumeInformation
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\verdanab.ttf VolumeInformation
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\verdanaz.ttf VolumeInformation
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\webdings.ttf VolumeInformation
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\wingding.ttf VolumeInformation
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\YuGothR.ttc VolumeInformation
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\YuGothM.ttc VolumeInformation
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\YuGothL.ttc VolumeInformation
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\YuGothB.ttc VolumeInformation
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\holomdl2.ttf VolumeInformation
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\CENTURY.TTF VolumeInformation
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\LEELAWAD.TTF VolumeInformation
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\LEELAWDB.TTF VolumeInformation
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\MSUIGHUR.TTF VolumeInformation
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\MSUIGHUB.TTF VolumeInformation
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\WINGDNG2.TTF VolumeInformation
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\WINGDNG3.TTF VolumeInformation
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\TEMPSITC.TTF VolumeInformation
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\PRISTINA.TTF VolumeInformation
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\PAPYRUS.TTF VolumeInformation
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\MISTRAL.TTF VolumeInformation
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\LHANDW.TTF VolumeInformation
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\ITCKRIST.TTF VolumeInformation
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\JUICE___.TTF VolumeInformation
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\FRSCRIPT.TTF VolumeInformation
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\FREESCPT.TTF VolumeInformation
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\BRADHITC.TTF VolumeInformation
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\OUTLOOK.TTF VolumeInformation
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\BKANT.TTF VolumeInformation
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\ANTQUAI.TTF VolumeInformation
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\ANTQUAB.TTF VolumeInformation
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\ANTQUABI.TTF VolumeInformation
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\GARA.TTF VolumeInformation
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\GARAIT.TTF VolumeInformation
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\GARABD.TTF VolumeInformation
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\MTCORSVA.TTF VolumeInformation
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\GOTHIC.TTF VolumeInformation
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\GOTHICI.TTF VolumeInformation
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\GOTHICB.TTF VolumeInformation
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\GOTHICBI.TTF VolumeInformation
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\ALGER.TTF VolumeInformation
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\BASKVILL.TTF VolumeInformation
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\BAUHS93.TTF VolumeInformation
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\BELL.TTF VolumeInformation
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\BELLI.TTF VolumeInformation
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\BELLB.TTF VolumeInformation
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\BRLNSR.TTF VolumeInformation
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\BRLNSDB.TTF VolumeInformation
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\BRLNSB.TTF VolumeInformation
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\BERNHC.TTF VolumeInformation
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\BOD_PSTC.TTF VolumeInformation
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\BRITANIC.TTF VolumeInformation
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\BROADW.TTF VolumeInformation
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\BRUSHSCI.TTF VolumeInformation
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\CALIFR.TTF VolumeInformation
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\CALIFI.TTF VolumeInformation
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\CALIFB.TTF VolumeInformation
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\CENTAUR.TTF VolumeInformation
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\CHILLER.TTF VolumeInformation
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\COLONNA.TTF VolumeInformation
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\COOPBL.TTF VolumeInformation
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\FTLTLT.TTF VolumeInformation
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\HARLOWSI.TTF VolumeInformation
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\HARNGTON.TTF VolumeInformation
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\HTOWERT.TTF VolumeInformation
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\HTOWERTI.TTF VolumeInformation
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\JOKERMAN.TTF VolumeInformation
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\KUNSTLER.TTF VolumeInformation
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\LBRITE.TTF VolumeInformation
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\LBRITED.TTF VolumeInformation
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\LBRITEI.TTF VolumeInformation
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\LBRITEDI.TTF VolumeInformation
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\LCALLIG.TTF VolumeInformation
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\LFAX.TTF VolumeInformation
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\LFAXD.TTF VolumeInformation
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\LFAXI.TTF VolumeInformation
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\LFAXDI.TTF VolumeInformation
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\MAGNETOB.TTF VolumeInformation
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\MATURASC.TTF VolumeInformation
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\MOD20.TTF VolumeInformation
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\NIAGENG.TTF VolumeInformation
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\NIAGSOL.TTF VolumeInformation
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\OLDENGL.TTF VolumeInformation
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\ONYX.TTF VolumeInformation
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\PARCHM.TTF VolumeInformation
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\PLAYBILL.TTF VolumeInformation
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\POORICH.TTF VolumeInformation
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\RAVIE.TTF VolumeInformation
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\INFROMAN.TTF VolumeInformation
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\SHOWG.TTF VolumeInformation
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\SNAP____.TTF VolumeInformation
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\STENCIL.TTF VolumeInformation
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\VINERITC.TTF VolumeInformation
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\VIVALDII.TTF VolumeInformation
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\VLADIMIR.TTF VolumeInformation
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\LATINWD.TTF VolumeInformation
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\TCM_____.TTF VolumeInformation
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\TCMI____.TTF VolumeInformation
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\TCB_____.TTF VolumeInformation
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\TCBI____.TTF VolumeInformation
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\TCCM____.TTF VolumeInformation
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\TCCB____.TTF VolumeInformation
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\TCCEB.TTF VolumeInformation
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\SCRIPTBL.TTF VolumeInformation
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\ROCK.TTF VolumeInformation
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\ROCKI.TTF VolumeInformation
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\ROCKB.TTF VolumeInformation
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\ROCKEB.TTF VolumeInformation
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\ROCKBI.TTF VolumeInformation
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\ROCC____.TTF VolumeInformation
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\ROCCB___.TTF VolumeInformation
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\RAGE.TTF VolumeInformation
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\PERTILI.TTF VolumeInformation
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\PERTIBD.TTF VolumeInformation
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\PER_____.TTF VolumeInformation
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\PERI____.TTF VolumeInformation
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\PERB____.TTF VolumeInformation
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\PERBI___.TTF VolumeInformation
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\PALSCRI.TTF VolumeInformation
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\OCRAEXT.TTF VolumeInformation
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\MAIAN.TTF VolumeInformation
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\LTYPE.TTF VolumeInformation
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\LTYPEO.TTF VolumeInformation
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\LTYPEB.TTF VolumeInformation
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\LTYPEBO.TTF VolumeInformation
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\LSANS.TTF VolumeInformation
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\LSANSD.TTF VolumeInformation
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\LSANSI.TTF VolumeInformation
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\LSANSDI.TTF VolumeInformation
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\IMPRISHA.TTF VolumeInformation
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\HATTEN.TTF VolumeInformation
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\GOUDYSTO.TTF VolumeInformation
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\GOUDOS.TTF VolumeInformation
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\GOUDOSI.TTF VolumeInformation
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\GOUDOSB.TTF VolumeInformation
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\GLECB.TTF VolumeInformation
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\GIL_____.TTF VolumeInformation
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\GILI____.TTF VolumeInformation
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\GILB____.TTF VolumeInformation
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\GILBI___.TTF VolumeInformation
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\GILC____.TTF VolumeInformation
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\GLSNECB.TTF VolumeInformation
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\GIGI.TTF VolumeInformation
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\FRABK.TTF VolumeInformation
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\FRABKIT.TTF VolumeInformation
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\FORTE.TTF VolumeInformation
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\FELIXTI.TTF VolumeInformation
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\ERASMD.TTF VolumeInformation
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\ERASLGHT.TTF VolumeInformation
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\ERASDEMI.TTF VolumeInformation
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\ERASBD.TTF VolumeInformation
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\ENGR.TTF VolumeInformation
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\ELEPHNT.TTF VolumeInformation
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\ELEPHNTI.TTF VolumeInformation
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\ITCEDSCR.TTF VolumeInformation
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\CURLZ___.TTF VolumeInformation
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\COPRGTL.TTF VolumeInformation
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\COPRGTB.TTF VolumeInformation
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\CENSCBK.TTF VolumeInformation
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\SCHLBKI.TTF VolumeInformation
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\SCHLBKB.TTF VolumeInformation
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\SCHLBKBI.TTF VolumeInformation
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\CASTELAR.TTF VolumeInformation
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\CALIST.TTF VolumeInformation
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\CALISTI.TTF VolumeInformation
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\CALISTB.TTF VolumeInformation
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\CALISTBI.TTF VolumeInformation
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\BOOKOS.TTF VolumeInformation
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\BOOKOSB.TTF VolumeInformation
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\BOOKOSI.TTF VolumeInformation
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\BOOKOSBI.TTF VolumeInformation
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\BOD_R.TTF VolumeInformation
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\BOD_I.TTF VolumeInformation
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\BOD_B.TTF VolumeInformation
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\BOD_BI.TTF VolumeInformation
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\BOD_CR.TTF VolumeInformation
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\BOD_BLAR.TTF VolumeInformation
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\BOD_CI.TTF VolumeInformation
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\BOD_CB.TTF VolumeInformation
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\BOD_BLAI.TTF VolumeInformation
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\BOD_CBI.TTF VolumeInformation
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\ITCBLKAD.TTF VolumeInformation
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\ARLRDBD.TTF VolumeInformation
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\AGENCYR.TTF VolumeInformation
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\AGENCYB.TTF VolumeInformation
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\BSSYM7.TTF VolumeInformation
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\REFSAN.TTF VolumeInformation
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\REFSPCL.TTF VolumeInformation
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\MTEXTRA.TTF VolumeInformation
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\marlett.ttf VolumeInformation
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformation
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Users\user\Desktop\PROFORMA.exe VolumeInformation
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformation
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformation
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformation
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Management.dll VolumeInformation
                Source: C:\Users\user\Desktop\PROFORMA.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
                Source: C:\Users\user\Desktop\PROFORMA.exeCode function: 4_2_062554E4 GetUserNameW,
                Source: C:\Users\user\Desktop\PROFORMA.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid

                Stealing of Sensitive Information:

                barindex
                Yara detected AgentTeslaShow sources
                Source: Yara matchFile source: 4.2.PROFORMA.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000004.00000002.598204242.0000000000402000.00000040.00000001.sdmp, type: MEMORY
                Yara detected AgentTeslaShow sources
                Source: Yara matchFile source: 4.2.PROFORMA.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000004.00000002.598204242.0000000000402000.00000040.00000001.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: PROFORMA.exe PID: 5924, type: MEMORY
                Source: Yara matchFile source: 00000004.00000002.600534622.0000000002E11000.00000004.00000001.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: PROFORMA.exe PID: 5924, type: MEMORY

                Remote Access Functionality:

                barindex
                Yara detected AgentTeslaShow sources
                Source: Yara matchFile source: 4.2.PROFORMA.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000004.00000002.598204242.0000000000402000.00000040.00000001.sdmp, type: MEMORY
                Yara detected AgentTeslaShow sources
                Source: Yara matchFile source: 4.2.PROFORMA.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000004.00000002.598204242.0000000000402000.00000040.00000001.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: PROFORMA.exe PID: 5924, type: MEMORY

                Mitre Att&ck Matrix

                Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
                Valid AccountsWindows Management Instrumentation211Path InterceptionProcess Injection112Masquerading1OS Credential DumpingSecurity Software Discovery111Remote ServicesArchive Collected Data11Exfiltration Over Other Network MediumEncrypted Channel1Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
                Default AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization ScriptsDisable or Modify Tools1LSASS MemoryProcess Discovery2Remote Desktop ProtocolClipboard Data1Exfiltration Over BluetoothJunk DataExploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
                Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)Virtualization/Sandbox Evasion131Security Account ManagerVirtualization/Sandbox Evasion131SMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationSteganographyExploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
                Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)Process Injection112NTDSApplication Window Discovery1Distributed Component Object ModelInput CaptureScheduled TransferProtocol ImpersonationSIM Card SwapCarrier Billing Fraud
                Cloud AccountsCronNetwork Logon ScriptNetwork Logon ScriptDeobfuscate/Decode Files or Information1LSA SecretsAccount Discovery1SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
                Replication Through Removable MediaLaunchdRc.commonRc.commonObfuscated Files or Information2Cached Domain CredentialsSystem Owner/User Discovery1VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
                External Remote ServicesScheduled TaskStartup ItemsStartup ItemsSoftware Packing3DCSyncSystem Information Discovery113Windows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact

                Behavior Graph

                Hide Legend

                Legend:

                • Process
                • Signature
                • Created File
                • DNS/IP Info
                • Is Dropped
                • Is Windows Process
                • Number of created Registry Values
                • Number of created Files
                • Visual Basic
                • Delphi
                • Java
                • .Net C# or VB.NET
                • C, C++ or other language
                • Is malicious
                • Internet

                Screenshots

                Thumbnails

                This section contains all screenshots as thumbnails, including those not shown in the slideshow.

                windows-stand

                Antivirus, Machine Learning and Genetic Malware Detection

                Initial Sample

                SourceDetectionScannerLabelLink
                PROFORMA.exe38%VirustotalBrowse
                PROFORMA.exe28%ReversingLabsByteCode-MSIL.Trojan.AgentTesla
                PROFORMA.exe100%Joe Sandbox ML

                Dropped Files

                No Antivirus matches

                Unpacked PE Files

                SourceDetectionScannerLabelLinkDownload
                4.2.PROFORMA.exe.400000.0.unpack100%AviraTR/Spy.Gen8Download File

                Domains

                No Antivirus matches

                URLs

                SourceDetectionScannerLabelLink
                http://127.0.0.1:HTTP/1.10%Avira URL Cloudsafe
                http://fontfabrik.comX0%Avira URL Cloudsafe
                http://www.tiro.com0%URL Reputationsafe
                http://www.tiro.com0%URL Reputationsafe
                http://www.tiro.com0%URL Reputationsafe
                http://www.tiro.com0%URL Reputationsafe
                http://www.founder.com.cn/cnn-uv0%Avira URL Cloudsafe
                http://www.founder.com.cn/cnI0%Avira URL Cloudsafe
                http://www.sajatypeworks.com0%URL Reputationsafe
                http://www.sajatypeworks.com0%URL Reputationsafe
                http://www.sajatypeworks.com0%URL Reputationsafe
                http://www.jiyu-kobo.co.jp/90%URL Reputationsafe
                http://www.jiyu-kobo.co.jp/90%URL Reputationsafe
                http://www.jiyu-kobo.co.jp/90%URL Reputationsafe
                http://www.jiyu-kobo.co.jp//typ0%Avira URL Cloudsafe
                http://www.urwpp.deFa0%Avira URL Cloudsafe
                http://www.fontbureau.com.TTFv0%Avira URL Cloudsafe
                http://www.founder.com.cn/cny0%URL Reputationsafe
                http://www.founder.com.cn/cny0%URL Reputationsafe
                http://www.founder.com.cn/cny0%URL Reputationsafe
                http://www.jiyu-kobo.co.jp//0%URL Reputationsafe
                http://www.jiyu-kobo.co.jp//0%URL Reputationsafe
                http://www.jiyu-kobo.co.jp//0%URL Reputationsafe
                http://www.jiyu-kobo.co.jp/.0%URL Reputationsafe
                http://www.jiyu-kobo.co.jp/.0%URL Reputationsafe
                http://www.jiyu-kobo.co.jp/.0%URL Reputationsafe
                http://www.jiyu-kobo.co.jp/Y00%URL Reputationsafe
                http://www.jiyu-kobo.co.jp/Y00%URL Reputationsafe
                http://www.jiyu-kobo.co.jp/Y00%URL Reputationsafe
                http://www.jiyu-kobo.co.jp/jp/R0%Avira URL Cloudsafe
                http://www.urwpp.delar0%Avira URL Cloudsafe
                http://www.urwpp.de0%URL Reputationsafe
                http://www.urwpp.de0%URL Reputationsafe
                http://www.urwpp.de0%URL Reputationsafe
                http://www.zhongyicts.com.cn0%URL Reputationsafe
                http://www.zhongyicts.com.cn0%URL Reputationsafe
                http://www.zhongyicts.com.cn0%URL Reputationsafe
                http://1bkLydyXy3tVVGSqiSW.org0%Avira URL Cloudsafe
                https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip0%URL Reputationsafe
                https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip0%URL Reputationsafe
                https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip0%URL Reputationsafe
                http://www.jiyu-kobo.co.jp/es-eK0%Avira URL Cloudsafe
                http://DynDns.comDynDNS0%URL Reputationsafe
                http://DynDns.comDynDNS0%URL Reputationsafe
                http://DynDns.comDynDNS0%URL Reputationsafe
                http://www.tiro.comslnt0%URL Reputationsafe
                http://www.tiro.comslnt0%URL Reputationsafe
                http://www.tiro.comslnt0%URL Reputationsafe
                http://www.fontbureau.comR0%Avira URL Cloudsafe
                https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip%tordir%%ha0%URL Reputationsafe
                https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip%tordir%%ha0%URL Reputationsafe
                https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip%tordir%%ha0%URL Reputationsafe
                http://www.jiyu-kobo.co.jp/R0%URL Reputationsafe
                http://www.jiyu-kobo.co.jp/R0%URL Reputationsafe
                http://www.jiyu-kobo.co.jp/R0%URL Reputationsafe
                http://www.sajatypeworks.com-n0%Avira URL Cloudsafe
                http://www.jiyu-kobo.co.jp/jp/0%URL Reputationsafe
                http://www.jiyu-kobo.co.jp/jp/0%URL Reputationsafe
                http://www.jiyu-kobo.co.jp/jp/0%URL Reputationsafe
                http://www.jiyu-kobo.co.jp/jp/v0%Avira URL Cloudsafe
                http://www.founder.com.cn/cn0%URL Reputationsafe
                http://www.founder.com.cn/cn0%URL Reputationsafe
                http://www.founder.com.cn/cn0%URL Reputationsafe
                http://www.jiyu-kobo.co.jp/v0%URL Reputationsafe
                http://www.jiyu-kobo.co.jp/v0%URL Reputationsafe
                http://www.jiyu-kobo.co.jp/v0%URL Reputationsafe
                http://www.tiro.comX0%Avira URL Cloudsafe
                http://www.fontbureau.comcomF0%URL Reputationsafe
                http://www.fontbureau.comcomF0%URL Reputationsafe
                http://www.fontbureau.comcomF0%URL Reputationsafe
                http://www.jiyu-kobo.co.jp/o0%URL Reputationsafe
                http://www.jiyu-kobo.co.jp/o0%URL Reputationsafe
                http://www.jiyu-kobo.co.jp/o0%URL Reputationsafe
                http://www.fontbureau.comalicK0%Avira URL Cloudsafe
                http://www.urwpp.det0%Avira URL Cloudsafe
                http://www.founder.com.cn/cne-d0%Avira URL Cloudsafe
                http://www.jiyu-kobo.co.jp/0%URL Reputationsafe
                http://www.jiyu-kobo.co.jp/0%URL Reputationsafe
                http://www.jiyu-kobo.co.jp/0%URL Reputationsafe
                http://www.jiyu-kobo.co.jp/n0%URL Reputationsafe
                http://www.jiyu-kobo.co.jp/n0%URL Reputationsafe
                http://www.jiyu-kobo.co.jp/n0%URL Reputationsafe
                http://www.founder.com.cn/cn50%Avira URL Cloudsafe
                http://jWLkXH.com0%Avira URL Cloudsafe
                http://www.urwpp.dei0%Avira URL Cloudsafe
                http://www.jiyu-kobo.co.jp/g0%URL Reputationsafe
                http://www.jiyu-kobo.co.jp/g0%URL Reputationsafe
                http://www.jiyu-kobo.co.jp/g0%URL Reputationsafe
                http://www.fontbureau.comalic0%URL Reputationsafe
                http://www.fontbureau.comalic0%URL Reputationsafe
                http://www.fontbureau.comalic0%URL Reputationsafe
                http://1bkLydyXy3tVVGSqiSW.org00%Avira URL Cloudsafe
                http://www.jiyu-kobo.co.jp/d0%URL Reputationsafe
                http://www.jiyu-kobo.co.jp/d0%URL Reputationsafe
                http://www.jiyu-kobo.co.jp/d0%URL Reputationsafe
                http://www.founder.com.cn/cn/40%Avira URL Cloudsafe

                Domains and IPs

                Contacted Domains

                No contacted domains info

                URLs from Memory and Binaries

                NameSourceMaliciousAntivirus DetectionReputation
                http://127.0.0.1:HTTP/1.1PROFORMA.exe, 00000004.00000002.600534622.0000000002E11000.00000004.00000001.sdmpfalse
                • Avira URL Cloud: safe
                low
                http://fontfabrik.comXPROFORMA.exe, 00000001.00000003.334190170.0000000005BFD000.00000004.00000001.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                http://api.twitter.com/1/direct_messages.xml?since_id=PROFORMA.exefalse
                  high
                  http://www.tiro.comPROFORMA.exe, 00000001.00000003.336204158.0000000005BCC000.00000004.00000001.sdmpfalse
                  • URL Reputation: safe
                  • URL Reputation: safe
                  • URL Reputation: safe
                  • URL Reputation: safe
                  unknown
                  http://twitter.com/statuses/user_timeline.xml?screen_name=PROFORMA.exefalse
                    high
                    http://www.founder.com.cn/cnn-uvPROFORMA.exe, 00000001.00000003.335484225.0000000005BC3000.00000004.00000001.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    http://www.founder.com.cn/cnIPROFORMA.exe, 00000001.00000003.335622841.0000000005BD1000.00000004.00000001.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    http://www.sajatypeworks.comPROFORMA.exe, 00000001.00000003.333660030.0000000000F3D000.00000004.00000001.sdmpfalse
                    • URL Reputation: safe
                    • URL Reputation: safe
                    • URL Reputation: safe
                    unknown
                    http://www.jiyu-kobo.co.jp/9PROFORMA.exe, 00000001.00000003.337940429.0000000005BC6000.00000004.00000001.sdmpfalse
                    • URL Reputation: safe
                    • URL Reputation: safe
                    • URL Reputation: safe
                    unknown
                    http://www.jiyu-kobo.co.jp//typPROFORMA.exe, 00000001.00000003.337940429.0000000005BC6000.00000004.00000001.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    http://www.urwpp.deFaPROFORMA.exe, 00000001.00000003.339862573.0000000005BDF000.00000004.00000001.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    http://www.fontbureau.com.TTFvPROFORMA.exe, 00000001.00000003.342109457.0000000005BC6000.00000004.00000001.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    http://www.founder.com.cn/cnyPROFORMA.exe, 00000001.00000003.335484225.0000000005BC3000.00000004.00000001.sdmpfalse
                    • URL Reputation: safe
                    • URL Reputation: safe
                    • URL Reputation: safe
                    unknown
                    http://www.jiyu-kobo.co.jp//PROFORMA.exe, 00000001.00000003.337773505.0000000005BC6000.00000004.00000001.sdmpfalse
                    • URL Reputation: safe
                    • URL Reputation: safe
                    • URL Reputation: safe
                    unknown
                    http://www.fontbureau.com.PROFORMA.exe, 00000001.00000003.342109457.0000000005BC6000.00000004.00000001.sdmpfalse
                      high
                      http://www.jiyu-kobo.co.jp/.PROFORMA.exe, 00000001.00000003.337773505.0000000005BC6000.00000004.00000001.sdmpfalse
                      • URL Reputation: safe
                      • URL Reputation: safe
                      • URL Reputation: safe
                      unknown
                      http://www.jiyu-kobo.co.jp/Y0PROFORMA.exe, 00000001.00000003.337773505.0000000005BC6000.00000004.00000001.sdmpfalse
                      • URL Reputation: safe
                      • URL Reputation: safe
                      • URL Reputation: safe
                      unknown
                      http://www.fonts.comPROFORMA.exe, 00000001.00000003.333884707.0000000005BFD000.00000004.00000001.sdmpfalse
                        high
                        http://www.jiyu-kobo.co.jp/jp/RPROFORMA.exe, 00000001.00000003.337940429.0000000005BC6000.00000004.00000001.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        http://www.urwpp.delarPROFORMA.exe, 00000001.00000003.342210139.0000000005BDF000.00000004.00000001.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        http://www.urwpp.dePROFORMA.exe, 00000001.00000003.342210139.0000000005BDF000.00000004.00000001.sdmpfalse
                        • URL Reputation: safe
                        • URL Reputation: safe
                        • URL Reputation: safe
                        unknown
                        http://www.zhongyicts.com.cnPROFORMA.exe, 00000001.00000003.336532127.0000000005BCE000.00000004.00000001.sdmpfalse
                        • URL Reputation: safe
                        • URL Reputation: safe
                        • URL Reputation: safe
                        unknown
                        http://1bkLydyXy3tVVGSqiSW.orgPROFORMA.exe, 00000004.00000002.600534622.0000000002E11000.00000004.00000001.sdmp, PROFORMA.exe, 00000004.00000002.602649512.000000000315B000.00000004.00000001.sdmp, PROFORMA.exe, 00000004.00000002.602488728.0000000003119000.00000004.00000001.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zipPROFORMA.exe, 00000004.00000002.598204242.0000000000402000.00000040.00000001.sdmpfalse
                        • URL Reputation: safe
                        • URL Reputation: safe
                        • URL Reputation: safe
                        unknown
                        http://www.fontbureau.com/designerssPROFORMA.exe, 00000001.00000003.342109457.0000000005BC6000.00000004.00000001.sdmpfalse
                          high
                          http://www.jiyu-kobo.co.jp/es-eKPROFORMA.exe, 00000001.00000003.337773505.0000000005BC6000.00000004.00000001.sdmpfalse
                          • Avira URL Cloud: safe
                          unknown
                          http://www.fontbureau.comPROFORMA.exe, 00000001.00000003.342109457.0000000005BC6000.00000004.00000001.sdmpfalse
                            high
                            http://DynDns.comDynDNSPROFORMA.exe, 00000004.00000002.600534622.0000000002E11000.00000004.00000001.sdmpfalse
                            • URL Reputation: safe
                            • URL Reputation: safe
                            • URL Reputation: safe
                            unknown
                            http://www.tiro.comslntPROFORMA.exe, 00000001.00000003.337080083.0000000005BDB000.00000004.00000001.sdmpfalse
                            • URL Reputation: safe
                            • URL Reputation: safe
                            • URL Reputation: safe
                            unknown
                            http://www.fontbureau.comRPROFORMA.exe, 00000001.00000003.342109457.0000000005BC6000.00000004.00000001.sdmpfalse
                            • Avira URL Cloud: safe
                            unknown
                            https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip%tordir%%haPROFORMA.exe, 00000004.00000002.600534622.0000000002E11000.00000004.00000001.sdmpfalse
                            • URL Reputation: safe
                            • URL Reputation: safe
                            • URL Reputation: safe
                            unknown
                            http://www.jiyu-kobo.co.jp/RPROFORMA.exe, 00000001.00000003.337773505.0000000005BC6000.00000004.00000001.sdmpfalse
                            • URL Reputation: safe
                            • URL Reputation: safe
                            • URL Reputation: safe
                            unknown
                            http://www.sajatypeworks.com-nPROFORMA.exe, 00000001.00000003.333660030.0000000000F3D000.00000004.00000001.sdmpfalse
                            • Avira URL Cloud: safe
                            unknown
                            http://www.jiyu-kobo.co.jp/jp/PROFORMA.exe, 00000001.00000003.337773505.0000000005BC6000.00000004.00000001.sdmpfalse
                            • URL Reputation: safe
                            • URL Reputation: safe
                            • URL Reputation: safe
                            unknown
                            http://www.jiyu-kobo.co.jp/jp/vPROFORMA.exe, 00000001.00000003.337773505.0000000005BC6000.00000004.00000001.sdmpfalse
                            • Avira URL Cloud: safe
                            unknown
                            http://www.founder.com.cn/cnPROFORMA.exe, 00000001.00000003.335552996.0000000005BCE000.00000004.00000001.sdmp, PROFORMA.exe, 00000001.00000003.335484225.0000000005BC3000.00000004.00000001.sdmpfalse
                            • URL Reputation: safe
                            • URL Reputation: safe
                            • URL Reputation: safe
                            unknown
                            http://www.jiyu-kobo.co.jp/vPROFORMA.exe, 00000001.00000003.337679569.0000000005BC6000.00000004.00000001.sdmpfalse
                            • URL Reputation: safe
                            • URL Reputation: safe
                            • URL Reputation: safe
                            unknown
                            http://www.tiro.comXPROFORMA.exe, 00000001.00000003.337121220.0000000005BDB000.00000004.00000001.sdmpfalse
                            • Avira URL Cloud: safe
                            unknown
                            http://www.fontbureau.comcomFPROFORMA.exe, 00000001.00000003.342109457.0000000005BC6000.00000004.00000001.sdmpfalse
                            • URL Reputation: safe
                            • URL Reputation: safe
                            • URL Reputation: safe
                            unknown
                            http://www.jiyu-kobo.co.jp/oPROFORMA.exe, 00000001.00000003.337773505.0000000005BC6000.00000004.00000001.sdmpfalse
                            • URL Reputation: safe
                            • URL Reputation: safe
                            • URL Reputation: safe
                            unknown
                            http://www.fontbureau.comalicKPROFORMA.exe, 00000001.00000003.342109457.0000000005BC6000.00000004.00000001.sdmpfalse
                            • Avira URL Cloud: safe
                            unknown
                            http://www.urwpp.detPROFORMA.exe, 00000001.00000003.342389996.0000000005BDF000.00000004.00000001.sdmpfalse
                            • Avira URL Cloud: safe
                            unknown
                            http://www.founder.com.cn/cne-dPROFORMA.exe, 00000001.00000003.335484225.0000000005BC3000.00000004.00000001.sdmpfalse
                            • Avira URL Cloud: safe
                            unknown
                            http://www.jiyu-kobo.co.jp/PROFORMA.exe, 00000001.00000003.337773505.0000000005BC6000.00000004.00000001.sdmp, PROFORMA.exe, 00000001.00000003.337940429.0000000005BC6000.00000004.00000001.sdmpfalse
                            • URL Reputation: safe
                            • URL Reputation: safe
                            • URL Reputation: safe
                            unknown
                            http://www.jiyu-kobo.co.jp/nPROFORMA.exe, 00000001.00000003.337679569.0000000005BC6000.00000004.00000001.sdmpfalse
                            • URL Reputation: safe
                            • URL Reputation: safe
                            • URL Reputation: safe
                            unknown
                            http://www.founder.com.cn/cn5PROFORMA.exe, 00000001.00000003.335484225.0000000005BC3000.00000004.00000001.sdmpfalse
                            • Avira URL Cloud: safe
                            unknown
                            http://jWLkXH.comPROFORMA.exe, 00000004.00000002.600534622.0000000002E11000.00000004.00000001.sdmpfalse
                            • Avira URL Cloud: safe
                            unknown
                            http://www.urwpp.deiPROFORMA.exe, 00000001.00000003.339862573.0000000005BDF000.00000004.00000001.sdmpfalse
                            • Avira URL Cloud: safe
                            unknown
                            http://www.jiyu-kobo.co.jp/gPROFORMA.exe, 00000001.00000003.337421061.0000000005BC6000.00000004.00000001.sdmpfalse
                            • URL Reputation: safe
                            • URL Reputation: safe
                            • URL Reputation: safe
                            unknown
                            http://www.fontbureau.comalicPROFORMA.exe, 00000001.00000003.342109457.0000000005BC6000.00000004.00000001.sdmpfalse
                            • URL Reputation: safe
                            • URL Reputation: safe
                            • URL Reputation: safe
                            unknown
                            http://1bkLydyXy3tVVGSqiSW.org0PROFORMA.exe, 00000004.00000002.600534622.0000000002E11000.00000004.00000001.sdmpfalse
                            • Avira URL Cloud: safe
                            unknown
                            http://www.jiyu-kobo.co.jp/dPROFORMA.exe, 00000001.00000003.337940429.0000000005BC6000.00000004.00000001.sdmpfalse
                            • URL Reputation: safe
                            • URL Reputation: safe
                            • URL Reputation: safe
                            unknown
                            http://www.founder.com.cn/cn/4PROFORMA.exe, 00000001.00000003.336195214.0000000005BC6000.00000004.00000001.sdmpfalse
                            • Avira URL Cloud: safe
                            unknown
                            http://www.fontbureau.com/designers/PROFORMA.exe, 00000001.00000003.340025859.0000000005BDF000.00000004.00000001.sdmpfalse
                              high

                              Contacted IPs

                              No contacted IP infos

                              General Information

                              Joe Sandbox Version:33.0.0 White Diamond
                              Analysis ID:452728
                              Start date:22.07.2021
                              Start time:19:05:12
                              Joe Sandbox Product:CloudBasic
                              Overall analysis duration:0h 7m 2s
                              Hypervisor based Inspection enabled:false
                              Report type:light
                              Sample file name:PROFORMA.exe
                              Cookbook file name:default.jbs
                              Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
                              Number of analysed new started processes analysed:20
                              Number of new started drivers analysed:0
                              Number of existing processes analysed:0
                              Number of existing drivers analysed:0
                              Number of injected processes analysed:0
                              Technologies:
                              • HCA enabled
                              • EGA enabled
                              • HDC enabled
                              • AMSI enabled
                              Analysis Mode:default
                              Analysis stop reason:Timeout
                              Detection:MAL
                              Classification:mal92.troj.evad.winEXE@3/1@0/0
                              EGA Information:Failed
                              HDC Information:
                              • Successful, ratio: 0.8% (good quality ratio 0.7%)
                              • Quality average: 59.4%
                              • Quality standard deviation: 28.3%
                              HCA Information:
                              • Successful, ratio: 99%
                              • Number of executed functions: 0
                              • Number of non-executed functions: 0
                              Cookbook Comments:
                              • Adjust boot time
                              • Enable AMSI
                              • Found application associated with file extension: .exe
                              Warnings:
                              Show All
                              • Exclude process from analysis (whitelisted): MpCmdRun.exe, audiodg.exe, BackgroundTransferHost.exe, WMIADAP.exe, backgroundTaskHost.exe, conhost.exe, svchost.exe, wuapihost.exe
                              • Not all processes where analyzed, report is missing behavior information
                              • Report size getting too big, too many NtAllocateVirtualMemory calls found.
                              • Report size getting too big, too many NtOpenKeyEx calls found.

                              Simulations

                              Behavior and APIs

                              TimeTypeDescription
                              19:06:33API Interceptor601x Sleep call for process: PROFORMA.exe modified

                              Joe Sandbox View / Context

                              IPs

                              No context

                              Domains

                              No context

                              ASN

                              No context

                              JA3 Fingerprints

                              No context

                              Dropped Files

                              No context

                              Created / dropped Files

                              C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\PROFORMA.exe.log
                              Process:C:\Users\user\Desktop\PROFORMA.exe
                              File Type:ASCII text, with CRLF line terminators
                              Category:dropped
                              Size (bytes):1314
                              Entropy (8bit):5.350128552078965
                              Encrypted:false
                              SSDEEP:24:MLU84jE4K5E4Ks2E1qE4qXKDE4KhK3VZ9pKhPKIE4oKFKHKoZAE4Kzr7FE4sAmEw:MgvjHK5HKXE1qHiYHKhQnoPtHoxHhAHR
                              MD5:1DC1A2DCC9EFAA84EABF4F6D6066565B
                              SHA1:B7FCF805B6DD8DE815EA9BC089BD99F1E617F4E9
                              SHA-256:28D63442C17BF19558655C88A635CB3C3FF1BAD1CCD9784090B9749A7E71FCEF
                              SHA-512:95DD7E2AB0884A3EFD9E26033B337D1F97DDF9A8E9E9C4C32187DCD40622D8B1AC8CCDBA12A70A6B9075DF5E7F68DF2F8FBA4AB33DB4576BE9806B8E191802B7
                              Malicious:true
                              Reputation:high, very likely benign file
                              Preview: 1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"Microsoft.VisualBasic, Version=10.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\4f0a7eefa3cd3e0ba98b5ebddbbc72e6\System.ni.dll",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\f1d8480152e0da9a60ad49c6d16a3b6d\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\8d67d92724ba494b6c7fd089d6f25b48\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a

                              Static File Info

                              General

                              File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                              Entropy (8bit):7.623330273746814
                              TrID:
                              • Win32 Executable (generic) Net Framework (10011505/4) 49.80%
                              • Win32 Executable (generic) a (10002005/4) 49.75%
                              • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                              • Windows Screen Saver (13104/52) 0.07%
                              • Generic Win/DOS Executable (2004/3) 0.01%
                              File name:PROFORMA.exe
                              File size:778240
                              MD5:e5b234b445e81c5a55f21bc75eb40e5e
                              SHA1:f01fbe23b71016e967f30700c3b547bbf9ba1ef3
                              SHA256:a76a64fda4a0e041ff234597f21fd66cf2ef66b2d3f56fea86316c997bb0e5bb
                              SHA512:a8c0dce7d564ea6d2d01acb15cd300683fdd6c0bb5a699e14584d02e5f0aab1998e512257985dc8fb80f3b589d643f6cad3616d4d80b6de11ae72a0221a7c4a4
                              SSDEEP:12288:XS+lyzDi60EZRXFqsWe35M6Y35rFoD7jTxiMmJlsasyaUVKnp:XS+6DBdhdWe35MjprQ9eljzahp
                              File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L......`..............P.............>.... ........@.. .......................@............@................................

                              File Icon

                              Icon Hash:00828e8e8686b000

                              Static PE Info

                              General

                              Entrypoint:0x4bf23e
                              Entrypoint Section:.text
                              Digitally signed:false
                              Imagebase:0x400000
                              Subsystem:windows gui
                              Image File Characteristics:32BIT_MACHINE, EXECUTABLE_IMAGE
                              DLL Characteristics:NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
                              Time Stamp:0x60F8C1BB [Thu Jul 22 00:54:19 2021 UTC]
                              TLS Callbacks:
                              CLR (.Net) Version:v4.0.30319
                              OS Version Major:4
                              OS Version Minor:0
                              File Version Major:4
                              File Version Minor:0
                              Subsystem Version Major:4
                              Subsystem Version Minor:0
                              Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744

                              Entrypoint Preview

                              Instruction
                              jmp dword ptr [00402000h]
                              int3
                              jnc 00007F0F8C9D36BDh
                              test al, EAh
                              pushfd
                              inc esi
                              add eax, 35C2CDF9h
                              adc ebp, dword ptr [edi+0Fh]
                              stc
                              int C2h
                              xor eax, 0F6F132Eh
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al

                              Data Directories

                              NameVirtual AddressVirtual Size Is in Section
                              IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                              IMAGE_DIRECTORY_ENTRY_IMPORT0xbf1ec0x4f.text
                              IMAGE_DIRECTORY_ENTRY_RESOURCE0xc00000x618.rsrc
                              IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                              IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                              IMAGE_DIRECTORY_ENTRY_BASERELOC0xc20000xc.reloc
                              IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                              IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                              IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                              IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                              IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                              IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                              IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                              IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                              IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                              IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0

                              Sections

                              NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                              .text0x20000xbd25c0xbd400False0.794932195343data7.63187397239IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                              .rsrc0xc00000x6180x800False0.33251953125data3.47371010242IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                              .reloc0xc20000xc0x200False0.044921875data0.101910425663IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ

                              Resources

                              NameRVASizeTypeLanguageCountry
                              RT_VERSION0xc00900x386data
                              RT_MANIFEST0xc04280x1eaXML 1.0 document, UTF-8 Unicode (with BOM) text, with CRLF line terminators

                              Imports

                              DLLImport
                              mscoree.dll_CorExeMain

                              Version Infos

                              DescriptionData
                              Translation0x0000 0x04b0
                              LegalCopyright(c) 2019 Riot Games, Inc.
                              Assembly Version2.0.26.9
                              InternalNameAccessControlSectio.exe
                              FileVersion2.0.26.9
                              CompanyNameRiot Games, Inc.
                              LegalTrademarks
                              Comments
                              ProductNameRiot Client
                              ProductVersion2.0.26.9
                              FileDescriptionRiot Client
                              OriginalFilenameAccessControlSectio.exe

                              Network Behavior

                              No network behavior found

                              Code Manipulations

                              Statistics

                              Behavior

                              Click to jump to process

                              System Behavior

                              General

                              Start time:19:06:04
                              Start date:22/07/2021
                              Path:C:\Users\user\Desktop\PROFORMA.exe
                              Wow64 process (32bit):true
                              Commandline:'C:\Users\user\Desktop\PROFORMA.exe'
                              Imagebase:0x730000
                              File size:778240 bytes
                              MD5 hash:E5B234B445E81C5A55F21BC75EB40E5E
                              Has elevated privileges:true
                              Has administrator privileges:true
                              Programmed in:.Net C# or VB.NET
                              Reputation:low

                              General

                              Start time:19:06:33
                              Start date:22/07/2021
                              Path:C:\Users\user\Desktop\PROFORMA.exe
                              Wow64 process (32bit):true
                              Commandline:C:\Users\user\Desktop\PROFORMA.exe
                              Imagebase:0xac0000
                              File size:778240 bytes
                              MD5 hash:E5B234B445E81C5A55F21BC75EB40E5E
                              Has elevated privileges:true
                              Has administrator privileges:true
                              Programmed in:.Net C# or VB.NET
                              Yara matches:
                              • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000004.00000002.598204242.0000000000402000.00000040.00000001.sdmp, Author: Joe Security
                              • Rule: JoeSecurity_AgentTesla_2, Description: Yara detected AgentTesla, Source: 00000004.00000002.598204242.0000000000402000.00000040.00000001.sdmp, Author: Joe Security
                              • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000004.00000002.600534622.0000000002E11000.00000004.00000001.sdmp, Author: Joe Security
                              Reputation:low

                              Disassembly

                              Code Analysis

                              Reset < >