Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
Proforma Inv.exe

Overview

General Information

Sample Name:Proforma Inv.exe
Analysis ID:605000
MD5:189ad2733ba3c8baa0d9fb41e4223d92
SHA1:90d2762579dfd97d7b767662566f3a623766dd0a
SHA256:d73763f8b8d4eb91dec386eb7a2ebf9a8a9b40c6b028d57e6144ed74551d460b
Tags:agentteslaexe
Infos:

Detection

AgentTesla
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Multi AV Scanner detection for submitted file
Malicious sample detected (through community Yara rule)
Yara detected AgentTesla
Yara detected AntiVM3
Tries to steal Mail credentials (via file / registry access)
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Machine Learning detection for sample
.NET source code contains potential unpacker
Injects a PE file into a foreign processes
.NET source code contains very large array initializations
.NET source code contains very large strings
Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)
Tries to harvest and steal browser information (history, passwords, etc)
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Uses 32bit PE files
Queries the volume information (name, serial number etc) of a device
Yara signature match
Antivirus or Machine Learning detection for unpacked file
May sleep (evasive loops) to hinder dynamic analysis
Uses code obfuscation techniques (call, push, ret)
Internet Provider seen in connection with other malware
Detected potential crypto function
Found potential string decryption / allocating functions
Yara detected Credential Stealer
Contains long sleeps (>= 3 min)
Enables debug privileges
Creates a DirectInput object (often for capturing keystrokes)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found inlined nop instructions (likely shell or obfuscated code)
Sample file is different than original file name gathered from version info
Detected TCP or UDP traffic on non-standard ports
Uses SMTP (mail sending)
Sigma detected: Suspicious Outbound SMTP Connections
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Creates a process in suspended mode (likely to inject code)
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)

Classification

  • System is w10x64
  • Proforma Inv.exe (PID: 6872 cmdline: "C:\Users\user\Desktop\Proforma Inv.exe" MD5: 189AD2733BA3C8BAA0D9FB41E4223D92)
    • Proforma Inv.exe (PID: 7096 cmdline: {path} MD5: 189AD2733BA3C8BAA0D9FB41E4223D92)
  • cleanup
{"Exfil Mode": "SMTP", "Username": "ipdepartment@safalaw.com.ph", "Password": "#Risel767", "Host": "mail.safalaw.com.ph"}
SourceRuleDescriptionAuthorStrings
00000002.00000002.508474036.0000000000402000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
    00000002.00000002.508474036.0000000000402000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_AgentTesla_2Yara detected AgentTeslaJoe Security
      00000002.00000000.262797800.0000000000402000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
        00000002.00000000.262797800.0000000000402000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_AgentTesla_2Yara detected AgentTeslaJoe Security
          00000002.00000000.263643345.0000000000402000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
            Click to see the 13 entries
            SourceRuleDescriptionAuthorStrings
            0.2.Proforma Inv.exe.3dff630.2.unpackJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
              0.2.Proforma Inv.exe.3dff630.2.unpackJoeSecurity_AgentTesla_2Yara detected AgentTeslaJoe Security
                0.2.Proforma Inv.exe.3dff630.2.unpackMALWARE_Win_AgentTeslaV3AgentTeslaV3 infostealer payloadditekSHen
                • 0x30d32:$s10: logins
                • 0x30799:$s11: credential
                • 0x2cd78:$g1: get_Clipboard
                • 0x2cd86:$g2: get_Keyboard
                • 0x2cd93:$g3: get_Password
                • 0x2e074:$g4: get_CtrlKeyDown
                • 0x2e084:$g5: get_ShiftKeyDown
                • 0x2e095:$g6: get_AltKeyDown
                2.0.Proforma Inv.exe.400000.4.unpackJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
                  2.0.Proforma Inv.exe.400000.4.unpackJoeSecurity_AgentTesla_2Yara detected AgentTeslaJoe Security
                    Click to see the 19 entries

                    There are no malicious signatures, click here to show all signatures.

                    Source: Network ConnectionAuthor: frack113: Data: DestinationIp: 207.148.117.199, DestinationIsIpv6: false, DestinationPort: 587, EventID: 3, Image: C:\Users\user\Desktop\Proforma Inv.exe, Initiated: true, ProcessId: 7096, Protocol: tcp, SourceIp: 192.168.2.3, SourceIsIpv6: false, SourcePort: 49756
                    Source: Process startedAuthor: frack113: Data: Command: {path}, CommandLine: {path}, CommandLine|base64offset|contains: , Image: C:\Users\user\Desktop\Proforma Inv.exe, NewProcessName: C:\Users\user\Desktop\Proforma Inv.exe, OriginalFileName: C:\Users\user\Desktop\Proforma Inv.exe, ParentCommandLine: "C:\Users\user\Desktop\Proforma Inv.exe" , ParentImage: C:\Users\user\Desktop\Proforma Inv.exe, ParentProcessId: 6872, ParentProcessName: Proforma Inv.exe, ProcessCommandLine: {path}, ProcessId: 7096, ProcessName: Proforma Inv.exe
                    No Snort rule has matched

                    Click to jump to signature section

                    Show All Signature Results

                    AV Detection

                    barindex
                    Source: 0.2.Proforma Inv.exe.3dff630.2.unpackMalware Configuration Extractor: Agenttesla {"Exfil Mode": "SMTP", "Username": "ipdepartment@safalaw.com.ph", "Password": "#Risel767", "Host": "mail.safalaw.com.ph"}
                    Source: Proforma Inv.exeVirustotal: Detection: 33%Perma Link
                    Source: Proforma Inv.exeJoe Sandbox ML: detected
                    Source: 2.0.Proforma Inv.exe.400000.12.unpackAvira: Label: TR/Spy.Gen8
                    Source: 2.0.Proforma Inv.exe.400000.10.unpackAvira: Label: TR/Spy.Gen8
                    Source: 2.0.Proforma Inv.exe.400000.4.unpackAvira: Label: TR/Spy.Gen8
                    Source: 2.0.Proforma Inv.exe.400000.6.unpackAvira: Label: TR/Spy.Gen8
                    Source: 2.0.Proforma Inv.exe.400000.8.unpackAvira: Label: TR/Spy.Gen8
                    Source: 2.2.Proforma Inv.exe.400000.0.unpackAvira: Label: TR/Spy.Gen8
                    Source: Proforma Inv.exeStatic PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE
                    Source: Proforma Inv.exeStatic PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
                    Source: C:\Users\user\Desktop\Proforma Inv.exeCode function: 4x nop then mov dword ptr [ebp-18h], 00000000h
                    Source: Joe Sandbox ViewASN Name: AS-CHOOPAUS AS-CHOOPAUS
                    Source: global trafficTCP traffic: 192.168.2.3:49756 -> 207.148.117.199:587
                    Source: global trafficTCP traffic: 192.168.2.3:49756 -> 207.148.117.199:587
                    Source: Proforma Inv.exe, 00000002.00000002.510096392.0000000002AC1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://127.0.0.1:HTTP/1.1
                    Source: Proforma Inv.exe, 00000002.00000002.510096392.0000000002AC1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://DynDns.comDynDNSnamejidpasswordPsi/Psi
                    Source: Proforma Inv.exe, 00000002.00000002.510096392.0000000002AC1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://WaIJyp.com
                    Source: Proforma Inv.exe, 00000002.00000002.510827489.0000000002E33000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://XudLs2COBNu.org
                    Source: Proforma Inv.exe, 00000002.00000003.279561854.0000000000C84000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://XudLs2COBNu.org1-5-21-3853321935-2125563209-4053062332-1002_Classes
                    Source: Proforma Inv.exe, 00000002.00000002.510735000.0000000002E0F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl.comodoca.com/AAACertificateServices.crl04
                    Source: Proforma Inv.exe, 00000002.00000003.303946652.0000000000E39000.00000004.00000020.00020000.00000000.sdmp, Proforma Inv.exe, 00000002.00000003.303336669.0000000000E42000.00000004.00000020.00020000.00000000.sdmp, Proforma Inv.exe, 00000002.00000003.303909948.0000000000E24000.00000004.00000020.00020000.00000000.sdmp, Proforma Inv.exe, 00000002.00000003.303309343.0000000000E39000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.comodoca.com/AAACertificateServices.crl06
                    Source: Proforma Inv.exe, 00000002.00000002.510735000.0000000002E0F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl.comodoca.com/COMODORSACertificationAuthority.crl0q
                    Source: Proforma Inv.exe, 00000002.00000002.510735000.0000000002E0F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl.comodoca.com/cPanelIncCertificationAuthority.crl0
                    Source: Proforma Inv.exe, 00000000.00000003.242880391.0000000005DB4000.00000004.00000800.00020000.00000000.sdmp, Proforma Inv.exe, 00000000.00000003.242844157.0000000005DAB000.00000004.00000800.00020000.00000000.sdmp, Proforma Inv.exe, 00000000.00000003.242766852.0000000005DAB000.00000004.00000800.00020000.00000000.sdmp, Proforma Inv.exe, 00000000.00000003.242698082.0000000005DAB000.00000004.00000800.00020000.00000000.sdmp, Proforma Inv.exe, 00000000.00000003.242656361.0000000005DAB000.00000004.00000800.00020000.00000000.sdmp, Proforma Inv.exe, 00000000.00000003.242798809.0000000005DAB000.00000004.00000800.00020000.00000000.sdmp, Proforma Inv.exe, 00000000.00000003.242392348.000000000145D000.00000004.00000020.00020000.00000000.sdmp, Proforma Inv.exe, 00000000.00000003.242863799.0000000005DAB000.00000004.00000800.00020000.00000000.sdmp, Proforma Inv.exe, 00000000.00000003.242819494.0000000005DAB000.00000004.00000800.00020000.00000000.sdmp, Proforma Inv.exe, 00000000.00000003.242737289.0000000005DAB000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://en.w
                    Source: Proforma Inv.exe, 00000000.00000002.279381567.0000000006FA2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://fontfabrik.com
                    Source: Proforma Inv.exe, 00000002.00000002.510735000.0000000002E0F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://mail.safalaw.com.ph
                    Source: Proforma Inv.exe, 00000002.00000002.510735000.0000000002E0F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ocsp.comodoca.com0
                    Source: Proforma Inv.exe, 00000000.00000002.279381567.0000000006FA2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0
                    Source: Proforma Inv.exe, 00000000.00000002.279381567.0000000006FA2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.carterandcone.coml
                    Source: Proforma Inv.exe, 00000000.00000002.278940493.0000000005D90000.00000004.00000800.00020000.00000000.sdmp, Proforma Inv.exe, 00000000.00000003.249877134.0000000005D99000.00000004.00000800.00020000.00000000.sdmp, Proforma Inv.exe, 00000000.00000002.279381567.0000000006FA2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com
                    Source: Proforma Inv.exe, 00000000.00000002.279381567.0000000006FA2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers
                    Source: Proforma Inv.exe, 00000000.00000002.279381567.0000000006FA2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/?
                    Source: Proforma Inv.exe, 00000000.00000003.249428709.0000000005DC5000.00000004.00000800.00020000.00000000.sdmp, Proforma Inv.exe, 00000000.00000003.249449455.0000000005DC5000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/cabarga.html
                    Source: Proforma Inv.exe, 00000000.00000002.279381567.0000000006FA2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/cabarga.htmlN
                    Source: Proforma Inv.exe, 00000000.00000002.279381567.0000000006FA2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/frere-jones.html
                    Source: Proforma Inv.exe, 00000000.00000002.279381567.0000000006FA2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers8
                    Source: Proforma Inv.exe, 00000000.00000002.279381567.0000000006FA2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers?
                    Source: Proforma Inv.exe, 00000000.00000002.279381567.0000000006FA2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designersG
                    Source: Proforma Inv.exe, 00000000.00000003.249167454.0000000005D99000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com=
                    Source: Proforma Inv.exe, 00000000.00000003.249167454.0000000005D99000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.comF
                    Source: Proforma Inv.exe, 00000000.00000003.249393177.0000000005D9A000.00000004.00000800.00020000.00000000.sdmp, Proforma Inv.exe, 00000000.00000003.249167454.0000000005D99000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.comL.TTF
                    Source: Proforma Inv.exe, 00000000.00000003.249167454.0000000005D99000.00000004.00000800.00020000.00000000.sdmp, Proforma Inv.exe, 00000000.00000003.248778008.0000000005D98000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.coma
                    Source: Proforma Inv.exe, 00000000.00000003.249167454.0000000005D99000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.comab
                    Source: Proforma Inv.exe, 00000000.00000003.249877134.0000000005D99000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.comalic#
                    Source: Proforma Inv.exe, 00000000.00000003.249877134.0000000005D99000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.comals
                    Source: Proforma Inv.exe, 00000000.00000003.249393177.0000000005D9A000.00000004.00000800.00020000.00000000.sdmp, Proforma Inv.exe, 00000000.00000003.249167454.0000000005D99000.00000004.00000800.00020000.00000000.sdmp, Proforma Inv.exe, 00000000.00000003.248778008.0000000005D98000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.comasvi
                    Source: Proforma Inv.exe, 00000000.00000003.249393177.0000000005D9A000.00000004.00000800.00020000.00000000.sdmp, Proforma Inv.exe, 00000000.00000003.249167454.0000000005D99000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.comcomF
                    Source: Proforma Inv.exe, 00000000.00000003.249167454.0000000005D99000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.comd
                    Source: Proforma Inv.exe, 00000000.00000003.249167454.0000000005D99000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.comion
                    Source: Proforma Inv.exe, 00000000.00000002.278940493.0000000005D90000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.comionFt
                    Source: Proforma Inv.exe, 00000000.00000003.249877134.0000000005D99000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.comitua
                    Source: Proforma Inv.exe, 00000000.00000003.249877134.0000000005D99000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.comt
                    Source: Proforma Inv.exe, 00000000.00000003.242844157.0000000005DAB000.00000004.00000800.00020000.00000000.sdmp, Proforma Inv.exe, 00000000.00000003.242863799.0000000005DAB000.00000004.00000800.00020000.00000000.sdmp, Proforma Inv.exe, 00000000.00000002.279381567.0000000006FA2000.00000004.00000800.00020000.00000000.sdmp, Proforma Inv.exe, 00000000.00000003.242891447.0000000005DAB000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fonts.com
                    Source: Proforma Inv.exe, 00000000.00000003.242844157.0000000005DAB000.00000004.00000800.00020000.00000000.sdmp, Proforma Inv.exe, 00000000.00000003.242863799.0000000005DAB000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fonts.comCH
                    Source: Proforma Inv.exe, 00000000.00000003.242919450.0000000005DAB000.00000004.00000800.00020000.00000000.sdmp, Proforma Inv.exe, 00000000.00000003.242891447.0000000005DAB000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fonts.comic
                    Source: Proforma Inv.exe, 00000000.00000003.242891447.0000000005DAB000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fonts.comn
                    Source: Proforma Inv.exe, 00000000.00000003.242863799.0000000005DAB000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fonts.comoth
                    Source: Proforma Inv.exe, 00000000.00000003.244788585.0000000005D94000.00000004.00000800.00020000.00000000.sdmp, Proforma Inv.exe, 00000000.00000003.246769169.0000000005D9D000.00000004.00000800.00020000.00000000.sdmp, Proforma Inv.exe, 00000000.00000002.279381567.0000000006FA2000.00000004.00000800.00020000.00000000.sdmp, Proforma Inv.exe, 00000000.00000003.244537632.0000000005D94000.00000004.00000800.00020000.00000000.sdmp, Proforma Inv.exe, 00000000.00000003.244899824.0000000005D9B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn
                    Source: Proforma Inv.exe, 00000000.00000002.279381567.0000000006FA2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn/bThe
                    Source: Proforma Inv.exe, 00000000.00000002.279381567.0000000006FA2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn/cThe
                    Source: Proforma Inv.exe, 00000000.00000003.244788585.0000000005D94000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn/e(
                    Source: Proforma Inv.exe, 00000000.00000003.244517298.0000000005DCD000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cnu-ru
                    Source: Proforma Inv.exe, 00000000.00000003.244788585.0000000005D94000.00000004.00000800.00020000.00000000.sdmp, Proforma Inv.exe, 00000000.00000003.244537632.0000000005D94000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cnudi
                    Source: Proforma Inv.exe, 00000000.00000003.244537632.0000000005D94000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cny
                    Source: Proforma Inv.exe, 00000000.00000002.279381567.0000000006FA2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.galapagosdesign.com/DPlease
                    Source: Proforma Inv.exe, 00000000.00000002.279381567.0000000006FA2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.galapagosdesign.com/staff/dennis.htm
                    Source: Proforma Inv.exe, 00000000.00000002.279381567.0000000006FA2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.goodfont.co.kr
                    Source: Proforma Inv.exe, 00000000.00000002.279381567.0000000006FA2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/
                    Source: Proforma Inv.exe, 00000000.00000002.279381567.0000000006FA2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sajatypeworks.com
                    Source: Proforma Inv.exe, 00000000.00000003.242844157.0000000005DAB000.00000004.00000800.00020000.00000000.sdmp, Proforma Inv.exe, 00000000.00000003.242766852.0000000005DAB000.00000004.00000800.00020000.00000000.sdmp, Proforma Inv.exe, 00000000.00000003.242698082.0000000005DAB000.00000004.00000800.00020000.00000000.sdmp, Proforma Inv.exe, 00000000.00000003.242656361.0000000005DAB000.00000004.00000800.00020000.00000000.sdmp, Proforma Inv.exe, 00000000.00000003.242798809.0000000005DAB000.00000004.00000800.00020000.00000000.sdmp, Proforma Inv.exe, 00000000.00000003.242919450.0000000005DAB000.00000004.00000800.00020000.00000000.sdmp, Proforma Inv.exe, 00000000.00000003.242863799.0000000005DAB000.00000004.00000800.00020000.00000000.sdmp, Proforma Inv.exe, 00000000.00000003.242819494.0000000005DAB000.00000004.00000800.00020000.00000000.sdmp, Proforma Inv.exe, 00000000.00000003.242891447.0000000005DAB000.00000004.00000800.00020000.00000000.sdmp, Proforma Inv.exe, 00000000.00000003.242737289.0000000005DAB000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sajatypeworks.comKfC
                    Source: Proforma Inv.exe, 00000000.00000003.242656361.0000000005DAB000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sajatypeworks.comh
                    Source: Proforma Inv.exe, 00000000.00000003.242880391.0000000005DB4000.00000004.00000800.00020000.00000000.sdmp, Proforma Inv.exe, 00000000.00000003.242844157.0000000005DAB000.00000004.00000800.00020000.00000000.sdmp, Proforma Inv.exe, 00000000.00000003.242766852.0000000005DAB000.00000004.00000800.00020000.00000000.sdmp, Proforma Inv.exe, 00000000.00000003.242698082.0000000005DAB000.00000004.00000800.00020000.00000000.sdmp, Proforma Inv.exe, 00000000.00000003.242656361.0000000005DAB000.00000004.00000800.00020000.00000000.sdmp, Proforma Inv.exe, 00000000.00000003.242798809.0000000005DAB000.00000004.00000800.00020000.00000000.sdmp, Proforma Inv.exe, 00000000.00000003.242863799.0000000005DAB000.00000004.00000800.00020000.00000000.sdmp, Proforma Inv.exe, 00000000.00000003.242819494.0000000005DAB000.00000004.00000800.00020000.00000000.sdmp, Proforma Inv.exe, 00000000.00000003.242737289.0000000005DAB000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sajatypeworks.coms
                    Source: Proforma Inv.exe, 00000000.00000002.279381567.0000000006FA2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sakkal.com
                    Source: Proforma Inv.exe, 00000000.00000002.279381567.0000000006FA2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sandoll.co.kr
                    Source: Proforma Inv.exe, 00000000.00000003.243905944.0000000005D96000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sandoll.co.kre
                    Source: Proforma Inv.exe, 00000000.00000003.243905944.0000000005D96000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sandoll.co.krights
                    Source: Proforma Inv.exe, 00000000.00000003.243905944.0000000005D96000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sandoll.co.krnta~
                    Source: Proforma Inv.exe, 00000000.00000002.279381567.0000000006FA2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.tiro.com
                    Source: Proforma Inv.exe, 00000000.00000003.243218227.0000000005DAB000.00000004.00000800.00020000.00000000.sdmp, Proforma Inv.exe, 00000000.00000003.243198712.0000000005DAB000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.tiro.comcom
                    Source: Proforma Inv.exe, 00000000.00000002.279381567.0000000006FA2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.typography.netD
                    Source: Proforma Inv.exe, 00000000.00000003.249877134.0000000005D99000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.urwpp.de
                    Source: Proforma Inv.exe, 00000000.00000002.279381567.0000000006FA2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.urwpp.deDPlease
                    Source: Proforma Inv.exe, 00000000.00000003.249877134.0000000005D99000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.urwpp.deFv
                    Source: Proforma Inv.exe, 00000000.00000002.279381567.0000000006FA2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.zhongyicts.com.cn
                    Source: Proforma Inv.exe, 00000002.00000002.510735000.0000000002E0F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://sectigo.com/CPS0
                    Source: Proforma Inv.exe, 00000002.00000002.510096392.0000000002AC1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.ziphttps://www
                    Source: unknownDNS traffic detected: queries for: mail.safalaw.com.ph
                    Source: Proforma Inv.exe, 00000000.00000002.265427255.0000000000FEA000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: <HOOK MODULE="DDRAW.DLL" FUNCTION="DirectDrawCreateEx"/>

                    System Summary

                    barindex
                    Source: 0.2.Proforma Inv.exe.3dff630.2.unpack, type: UNPACKEDPEMatched rule: AgentTeslaV3 infostealer payload Author: ditekSHen
                    Source: 2.0.Proforma Inv.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: AgentTeslaV3 infostealer payload Author: ditekSHen
                    Source: 2.0.Proforma Inv.exe.400000.8.unpack, type: UNPACKEDPEMatched rule: AgentTeslaV3 infostealer payload Author: ditekSHen
                    Source: 2.0.Proforma Inv.exe.400000.12.unpack, type: UNPACKEDPEMatched rule: AgentTeslaV3 infostealer payload Author: ditekSHen
                    Source: 2.0.Proforma Inv.exe.400000.10.unpack, type: UNPACKEDPEMatched rule: AgentTeslaV3 infostealer payload Author: ditekSHen
                    Source: 2.0.Proforma Inv.exe.400000.6.unpack, type: UNPACKEDPEMatched rule: AgentTeslaV3 infostealer payload Author: ditekSHen
                    Source: 2.2.Proforma Inv.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: AgentTeslaV3 infostealer payload Author: ditekSHen
                    Source: 0.2.Proforma Inv.exe.3dff630.2.raw.unpack, type: UNPACKEDPEMatched rule: AgentTeslaV3 infostealer payload Author: ditekSHen
                    Source: 2.0.Proforma Inv.exe.400000.12.unpack, u003cPrivateImplementationDetailsu003eu007bA239DB3Au002d643Cu002d4CE8u002dBEC1u002dDF30B6E801BDu007d/u00326037609u002d1026u002d40FDu002d9ECDu002dF6CF19F76457.csLarge array initialization: .cctor: array initializer size 11621
                    Source: 2.0.Proforma Inv.exe.400000.10.unpack, u003cPrivateImplementationDetailsu003eu007bA239DB3Au002d643Cu002d4CE8u002dBEC1u002dDF30B6E801BDu007d/u00326037609u002d1026u002d40FDu002d9ECDu002dF6CF19F76457.csLarge array initialization: .cctor: array initializer size 11621
                    Source: 2.0.Proforma Inv.exe.400000.4.unpack, u003cPrivateImplementationDetailsu003eu007bA239DB3Au002d643Cu002d4CE8u002dBEC1u002dDF30B6E801BDu007d/u00326037609u002d1026u002d40FDu002d9ECDu002dF6CF19F76457.csLarge array initialization: .cctor: array initializer size 11621
                    Source: 2.0.Proforma Inv.exe.400000.6.unpack, u003cPrivateImplementationDetailsu003eu007bA239DB3Au002d643Cu002d4CE8u002dBEC1u002dDF30B6E801BDu007d/u00326037609u002d1026u002d40FDu002d9ECDu002dF6CF19F76457.csLarge array initialization: .cctor: array initializer size 11621
                    Source: 2.0.Proforma Inv.exe.400000.8.unpack, u003cPrivateImplementationDetailsu003eu007bA239DB3Au002d643Cu002d4CE8u002dBEC1u002dDF30B6E801BDu007d/u00326037609u002d1026u002d40FDu002d9ECDu002dF6CF19F76457.csLarge array initialization: .cctor: array initializer size 11621
                    Source: 2.2.Proforma Inv.exe.400000.0.unpack, u003cPrivateImplementationDetailsu003eu007bA239DB3Au002d643Cu002d4CE8u002dBEC1u002dDF30B6E801BDu007d/u00326037609u002d1026u002d40FDu002d9ECDu002dF6CF19F76457.csLarge array initialization: .cctor: array initializer size 11621
                    Source: Proforma Inv.exe, Form1.csLong String: Length: 22528
                    Source: 0.0.Proforma Inv.exe.960000.0.unpack, Form1.csLong String: Length: 22528
                    Source: 0.2.Proforma Inv.exe.960000.0.unpack, Form1.csLong String: Length: 22528
                    Source: 2.2.Proforma Inv.exe.680000.1.unpack, Form1.csLong String: Length: 22528
                    Source: 2.0.Proforma Inv.exe.680000.9.unpack, Form1.csLong String: Length: 22528
                    Source: 2.0.Proforma Inv.exe.680000.13.unpack, Form1.csLong String: Length: 22528
                    Source: 2.0.Proforma Inv.exe.680000.7.unpack, Form1.csLong String: Length: 22528
                    Source: 2.0.Proforma Inv.exe.680000.5.unpack, Form1.csLong String: Length: 22528
                    Source: 2.0.Proforma Inv.exe.680000.11.unpack, Form1.csLong String: Length: 22528
                    Source: 2.0.Proforma Inv.exe.680000.1.unpack, Form1.csLong String: Length: 22528
                    Source: 2.0.Proforma Inv.exe.680000.0.unpack, Form1.csLong String: Length: 22528
                    Source: 2.0.Proforma Inv.exe.680000.2.unpack, Form1.csLong String: Length: 22528
                    Source: 2.0.Proforma Inv.exe.680000.3.unpack, Form1.csLong String: Length: 22528
                    Source: Proforma Inv.exeStatic PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE
                    Source: 0.2.Proforma Inv.exe.3dff630.2.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload
                    Source: 2.0.Proforma Inv.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload
                    Source: 2.0.Proforma Inv.exe.400000.8.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload
                    Source: 2.0.Proforma Inv.exe.400000.12.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload
                    Source: 2.0.Proforma Inv.exe.400000.10.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload
                    Source: 2.0.Proforma Inv.exe.400000.6.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload
                    Source: 2.2.Proforma Inv.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload
                    Source: 0.2.Proforma Inv.exe.3dff630.2.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload
                    Source: C:\Users\user\Desktop\Proforma Inv.exeCode function: 0_2_0121C284
                    Source: C:\Users\user\Desktop\Proforma Inv.exeCode function: 0_2_0121E521
                    Source: C:\Users\user\Desktop\Proforma Inv.exeCode function: 0_2_0121E569
                    Source: C:\Users\user\Desktop\Proforma Inv.exeCode function: 0_2_0121E578
                    Source: C:\Users\user\Desktop\Proforma Inv.exeCode function: 0_2_0CC13C48
                    Source: C:\Users\user\Desktop\Proforma Inv.exeCode function: 0_2_0CC16650
                    Source: C:\Users\user\Desktop\Proforma Inv.exeCode function: 0_2_0CC12858
                    Source: C:\Users\user\Desktop\Proforma Inv.exeCode function: 0_2_0CC1462A
                    Source: C:\Users\user\Desktop\Proforma Inv.exeCode function: 0_2_0CC168A0
                    Source: C:\Users\user\Desktop\Proforma Inv.exeCode function: 0_2_0CC168B0
                    Source: C:\Users\user\Desktop\Proforma Inv.exeCode function: 0_2_0CC10040
                    Source: C:\Users\user\Desktop\Proforma Inv.exeCode function: 0_2_0CC12848
                    Source: C:\Users\user\Desktop\Proforma Inv.exeCode function: 0_2_0CC10007
                    Source: C:\Users\user\Desktop\Proforma Inv.exeCode function: 0_2_0CC16AB3
                    Source: C:\Users\user\Desktop\Proforma Inv.exeCode function: 0_2_0CC16B58
                    Source: C:\Users\user\Desktop\Proforma Inv.exeCode function: 0_2_0CC16310
                    Source: C:\Users\user\Desktop\Proforma Inv.exeCode function: 0_2_0CC16B21
                    Source: C:\Users\user\Desktop\Proforma Inv.exeCode function: 2_2_00F9F080
                    Source: C:\Users\user\Desktop\Proforma Inv.exeCode function: 2_2_00F96120
                    Source: C:\Users\user\Desktop\Proforma Inv.exeCode function: 2_2_00F9F3C8
                    Source: C:\Users\user\Desktop\Proforma Inv.exeCode function: 2_2_0613C200
                    Source: C:\Users\user\Desktop\Proforma Inv.exeCode function: 2_2_0613EC08
                    Source: C:\Users\user\Desktop\Proforma Inv.exeCode function: 2_2_0613D938
                    Source: C:\Users\user\Desktop\Proforma Inv.exeCode function: 2_2_06133330
                    Source: C:\Users\user\Desktop\Proforma Inv.exeCode function: 2_2_0613CCD0
                    Source: C:\Users\user\Desktop\Proforma Inv.exeCode function: 2_2_06359451
                    Source: C:\Users\user\Desktop\Proforma Inv.exeCode function: 2_2_0635E5B9
                    Source: C:\Users\user\Desktop\Proforma Inv.exeCode function: 2_2_06352DC0
                    Source: C:\Users\user\Desktop\Proforma Inv.exeCode function: 2_2_063503D8
                    Source: C:\Users\user\Desktop\Proforma Inv.exeCode function: 2_2_06355868
                    Source: C:\Users\user\Desktop\Proforma Inv.exeCode function: 2_2_0635CAA8
                    Source: C:\Users\user\Desktop\Proforma Inv.exeCode function: 2_2_06350374
                    Source: C:\Users\user\Desktop\Proforma Inv.exeCode function: 2_2_06357BD8
                    Source: C:\Users\user\Desktop\Proforma Inv.exeCode function: String function: 06135E80 appears 35 times
                    Source: Proforma Inv.exeBinary or memory string: OriginalFilename vs Proforma Inv.exe
                    Source: Proforma Inv.exe, 00000000.00000002.272478585.0000000003D09000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameAxbFHqPWsbnQfPnkTjlnkheXJwv.exe4 vs Proforma Inv.exe
                    Source: Proforma Inv.exe, 00000000.00000002.279897380.0000000007620000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameMajorRevision.exe< vs Proforma Inv.exe
                    Source: Proforma Inv.exe, 00000000.00000002.266264478.0000000002D01000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameBunifu.UI.dll4 vs Proforma Inv.exe
                    Source: Proforma Inv.exe, 00000000.00000002.266264478.0000000002D01000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameAxbFHqPWsbnQfPnkTjlnkheXJwv.exe4 vs Proforma Inv.exe
                    Source: Proforma Inv.exe, 00000000.00000002.270800937.00000000031C0000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameMajorRevision.exe< vs Proforma Inv.exe
                    Source: Proforma Inv.exe, 00000000.00000002.265427255.0000000000FEA000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameclr.dllT vs Proforma Inv.exe
                    Source: Proforma Inv.exe, 00000000.00000002.277363748.000000000419A000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameMajorRevision.exe< vs Proforma Inv.exe
                    Source: Proforma Inv.exeBinary or memory string: OriginalFilename vs Proforma Inv.exe
                    Source: Proforma Inv.exe, 00000002.00000002.508474036.0000000000402000.00000040.00000400.00020000.00000000.sdmpBinary or memory string: OriginalFilenameAxbFHqPWsbnQfPnkTjlnkheXJwv.exe4 vs Proforma Inv.exe
                    Source: Proforma Inv.exe, 00000002.00000002.508977073.0000000000AF8000.00000004.00000010.00020000.00000000.sdmpBinary or memory string: OriginalFilenameUNKNOWN_FILET vs Proforma Inv.exe
                    Source: Proforma Inv.exeBinary or memory string: OriginalFilenameHEhUz.exe8 vs Proforma Inv.exe
                    Source: Proforma Inv.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                    Source: Proforma Inv.exeVirustotal: Detection: 33%
                    Source: Proforma Inv.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                    Source: C:\Users\user\Desktop\Proforma Inv.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
                    Source: unknownProcess created: C:\Users\user\Desktop\Proforma Inv.exe "C:\Users\user\Desktop\Proforma Inv.exe"
                    Source: C:\Users\user\Desktop\Proforma Inv.exeProcess created: C:\Users\user\Desktop\Proforma Inv.exe {path}
                    Source: C:\Users\user\Desktop\Proforma Inv.exeProcess created: C:\Users\user\Desktop\Proforma Inv.exe {path}
                    Source: C:\Users\user\Desktop\Proforma Inv.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{172BDDF8-CEEA-11D1-8B05-00600806D9B6}\InProcServer32
                    Source: C:\Users\user\Desktop\Proforma Inv.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                    Source: C:\Users\user\Desktop\Proforma Inv.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Users\user\Desktop\Proforma Inv.exeFile created: C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\Proforma Inv.exe.logJump to behavior
                    Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@3/1@1/1
                    Source: C:\Users\user\Desktop\Proforma Inv.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
                    Source: C:\Users\user\Desktop\Proforma Inv.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
                    Source: 2.0.Proforma Inv.exe.400000.12.unpack, A/F1.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
                    Source: 2.0.Proforma Inv.exe.400000.12.unpack, A/F1.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
                    Source: 2.0.Proforma Inv.exe.400000.10.unpack, A/F1.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
                    Source: 2.0.Proforma Inv.exe.400000.10.unpack, A/F1.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
                    Source: 2.0.Proforma Inv.exe.400000.4.unpack, A/F1.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
                    Source: 2.0.Proforma Inv.exe.400000.4.unpack, A/F1.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
                    Source: C:\Users\user\Desktop\Proforma Inv.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                    Source: C:\Users\user\Desktop\Proforma Inv.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                    Source: C:\Users\user\Desktop\Proforma Inv.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dll
                    Source: C:\Users\user\Desktop\Proforma Inv.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676
                    Source: Proforma Inv.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
                    Source: Proforma Inv.exeStatic PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT

                    Data Obfuscation

                    barindex
                    Source: Proforma Inv.exe, Form1.cs.Net Code: PrivateSetup System.Reflection.Assembly System.AppDomain::Load(System.Byte[])
                    Source: 0.0.Proforma Inv.exe.960000.0.unpack, Form1.cs.Net Code: PrivateSetup System.Reflection.Assembly System.AppDomain::Load(System.Byte[])
                    Source: 0.2.Proforma Inv.exe.960000.0.unpack, Form1.cs.Net Code: PrivateSetup System.Reflection.Assembly System.AppDomain::Load(System.Byte[])
                    Source: 2.2.Proforma Inv.exe.680000.1.unpack, Form1.cs.Net Code: PrivateSetup System.Reflection.Assembly System.AppDomain::Load(System.Byte[])
                    Source: 2.0.Proforma Inv.exe.680000.9.unpack, Form1.cs.Net Code: PrivateSetup System.Reflection.Assembly System.AppDomain::Load(System.Byte[])
                    Source: 2.0.Proforma Inv.exe.680000.13.unpack, Form1.cs.Net Code: PrivateSetup System.Reflection.Assembly System.AppDomain::Load(System.Byte[])
                    Source: 2.0.Proforma Inv.exe.680000.7.unpack, Form1.cs.Net Code: PrivateSetup System.Reflection.Assembly System.AppDomain::Load(System.Byte[])
                    Source: 2.0.Proforma Inv.exe.680000.5.unpack, Form1.cs.Net Code: PrivateSetup System.Reflection.Assembly System.AppDomain::Load(System.Byte[])
                    Source: 2.0.Proforma Inv.exe.680000.11.unpack, Form1.cs.Net Code: PrivateSetup System.Reflection.Assembly System.AppDomain::Load(System.Byte[])
                    Source: 2.0.Proforma Inv.exe.680000.1.unpack, Form1.cs.Net Code: PrivateSetup System.Reflection.Assembly System.AppDomain::Load(System.Byte[])
                    Source: 2.0.Proforma Inv.exe.680000.0.unpack, Form1.cs.Net Code: PrivateSetup System.Reflection.Assembly System.AppDomain::Load(System.Byte[])
                    Source: 2.0.Proforma Inv.exe.680000.2.unpack, Form1.cs.Net Code: PrivateSetup System.Reflection.Assembly System.AppDomain::Load(System.Byte[])
                    Source: 2.0.Proforma Inv.exe.680000.3.unpack, Form1.cs.Net Code: PrivateSetup System.Reflection.Assembly System.AppDomain::Load(System.Byte[])
                    Source: C:\Users\user\Desktop\Proforma Inv.exeCode function: 0_2_00966A95 push es; retf
                    Source: C:\Users\user\Desktop\Proforma Inv.exeCode function: 0_2_00966A5E push es; retf
                    Source: C:\Users\user\Desktop\Proforma Inv.exeCode function: 0_2_00966A4D push es; retf
                    Source: C:\Users\user\Desktop\Proforma Inv.exeCode function: 0_2_00966A70 push es; retf
                    Source: C:\Users\user\Desktop\Proforma Inv.exeCode function: 0_2_0CC174E9 push eax; ret
                    Source: C:\Users\user\Desktop\Proforma Inv.exeCode function: 0_2_0CC15E39 pushfd ; iretd
                    Source: C:\Users\user\Desktop\Proforma Inv.exeCode function: 0_2_0CC11AE0 push esi; ret
                    Source: C:\Users\user\Desktop\Proforma Inv.exeCode function: 2_2_00686A70 push es; retf
                    Source: C:\Users\user\Desktop\Proforma Inv.exeCode function: 2_2_00686A4D push es; retf
                    Source: C:\Users\user\Desktop\Proforma Inv.exeCode function: 2_2_00686A5E push es; retf
                    Source: C:\Users\user\Desktop\Proforma Inv.exeCode function: 2_2_00686A95 push es; retf
                    Source: C:\Users\user\Desktop\Proforma Inv.exeCode function: 2_2_0613165E push es; ret
                    Source: C:\Users\user\Desktop\Proforma Inv.exeCode function: 2_2_06131662 push es; ret
                    Source: C:\Users\user\Desktop\Proforma Inv.exeCode function: 2_2_0613166A push es; ret
                    Source: C:\Users\user\Desktop\Proforma Inv.exeCode function: 2_2_0613169A push es; ret
                    Source: C:\Users\user\Desktop\Proforma Inv.exeCode function: 2_2_0613169E push es; ret
                    Source: C:\Users\user\Desktop\Proforma Inv.exeCode function: 2_2_061316B2 push es; ret
                    Source: C:\Users\user\Desktop\Proforma Inv.exeCode function: 2_2_061316B6 push es; ret
                    Source: C:\Users\user\Desktop\Proforma Inv.exeCode function: 2_2_061316BA push es; ret
                    Source: C:\Users\user\Desktop\Proforma Inv.exeCode function: 2_2_061316BE push es; ret
                    Source: C:\Users\user\Desktop\Proforma Inv.exeCode function: 2_2_061316A6 push es; ret
                    Source: C:\Users\user\Desktop\Proforma Inv.exeCode function: 2_2_061316AA push es; ret
                    Source: C:\Users\user\Desktop\Proforma Inv.exeCode function: 2_2_061316AE push es; ret
                    Source: C:\Users\user\Desktop\Proforma Inv.exeCode function: 2_2_061316D2 push es; ret
                    Source: C:\Users\user\Desktop\Proforma Inv.exeCode function: 2_2_061316D6 push es; ret
                    Source: C:\Users\user\Desktop\Proforma Inv.exeCode function: 2_2_061316DA push es; ret
                    Source: C:\Users\user\Desktop\Proforma Inv.exeCode function: 2_2_061316DE push es; ret
                    Source: C:\Users\user\Desktop\Proforma Inv.exeCode function: 2_2_061316C2 push es; ret
                    Source: C:\Users\user\Desktop\Proforma Inv.exeCode function: 2_2_061316C6 push es; ret
                    Source: C:\Users\user\Desktop\Proforma Inv.exeCode function: 2_2_061316CA push es; ret
                    Source: C:\Users\user\Desktop\Proforma Inv.exeCode function: 2_2_061316CE push es; ret
                    Source: initial sampleStatic PE information: section name: .text entropy: 7.86044321518
                    Source: C:\Users\user\Desktop\Proforma Inv.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\Proforma Inv.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\Proforma Inv.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\Proforma Inv.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\Proforma Inv.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\Proforma Inv.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\Proforma Inv.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\Proforma Inv.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\Proforma Inv.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\Proforma Inv.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\Proforma Inv.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\Proforma Inv.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\Proforma Inv.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\Proforma Inv.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\Proforma Inv.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\Proforma Inv.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\Proforma Inv.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\Proforma Inv.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\Proforma Inv.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\Proforma Inv.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\Proforma Inv.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\Proforma Inv.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\Proforma Inv.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\Proforma Inv.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\Proforma Inv.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\Proforma Inv.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\Proforma Inv.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\Proforma Inv.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\Proforma Inv.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\Proforma Inv.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\Proforma Inv.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\Proforma Inv.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\Proforma Inv.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\Proforma Inv.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\Proforma Inv.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\Proforma Inv.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\Proforma Inv.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\Proforma Inv.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\Proforma Inv.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\Proforma Inv.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\Proforma Inv.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\Proforma Inv.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\Proforma Inv.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\Proforma Inv.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\Proforma Inv.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\Proforma Inv.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\Proforma Inv.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\Proforma Inv.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\Proforma Inv.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\Proforma Inv.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\Proforma Inv.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\Proforma Inv.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\Proforma Inv.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\Proforma Inv.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\Proforma Inv.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\Proforma Inv.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\Proforma Inv.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\Proforma Inv.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\Proforma Inv.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\Proforma Inv.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\Proforma Inv.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\Proforma Inv.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\Proforma Inv.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\Proforma Inv.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\Proforma Inv.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\Proforma Inv.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\Proforma Inv.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\Proforma Inv.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\Proforma Inv.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\Proforma Inv.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\Proforma Inv.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\Proforma Inv.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\Proforma Inv.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\Proforma Inv.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\Proforma Inv.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\Proforma Inv.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\Proforma Inv.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\Proforma Inv.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\Proforma Inv.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\Proforma Inv.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\Proforma Inv.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\Proforma Inv.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\Proforma Inv.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\Proforma Inv.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\Proforma Inv.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\Proforma Inv.exeProcess information set: NOOPENFILEERRORBOX

                    Malware Analysis System Evasion

                    barindex
                    Source: Yara matchFile source: Process Memory Space: Proforma Inv.exe PID: 6872, type: MEMORYSTR
                    Source: Proforma Inv.exe, 00000000.00000002.269280530.0000000003037000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: WINE_GET_UNIX_FILE_NAME
                    Source: Proforma Inv.exe, 00000000.00000002.269280530.0000000003037000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: SBIEDLL.DLL
                    Source: C:\Users\user\Desktop\Proforma Inv.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_NetworkAdapterConfiguration
                    Source: C:\Users\user\Desktop\Proforma Inv.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
                    Source: C:\Users\user\Desktop\Proforma Inv.exe TID: 6912Thread sleep time: -922337203685477s >= -30000s
                    Source: C:\Users\user\Desktop\Proforma Inv.exe TID: 6232Thread sleep time: -18446744073709540s >= -30000s
                    Source: C:\Users\user\Desktop\Proforma Inv.exe TID: 6212Thread sleep count: 4984 > 30
                    Source: C:\Users\user\Desktop\Proforma Inv.exe TID: 6212Thread sleep count: 3588 > 30
                    Source: C:\Users\user\Desktop\Proforma Inv.exeThread delayed: delay time: 922337203685477
                    Source: C:\Users\user\Desktop\Proforma Inv.exeThread delayed: delay time: 922337203685477
                    Source: C:\Users\user\Desktop\Proforma Inv.exeWindow / User API: threadDelayed 4984
                    Source: C:\Users\user\Desktop\Proforma Inv.exeWindow / User API: threadDelayed 3588
                    Source: C:\Users\user\Desktop\Proforma Inv.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                    Source: C:\Users\user\Desktop\Proforma Inv.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Users\user\Desktop\Proforma Inv.exeProcess information queried: ProcessInformation
                    Source: C:\Users\user\Desktop\Proforma Inv.exeThread delayed: delay time: 922337203685477
                    Source: C:\Users\user\Desktop\Proforma Inv.exeThread delayed: delay time: 922337203685477
                    Source: Proforma Inv.exe, 00000000.00000002.269280530.0000000003037000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: VMware SVGA IIOData Source=localhost\sqlexpress;Initial Catalog=dbSMS;Integrated Security=True
                    Source: Proforma Inv.exe, 00000000.00000002.269280530.0000000003037000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: vmware
                    Source: Proforma Inv.exe, 00000000.00000002.269280530.0000000003037000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: C:\PROGRAM FILES\VMWARE\VMWARE TOOLS\
                    Source: Proforma Inv.exe, 00000000.00000002.269280530.0000000003037000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: SOFTWARE\VMware, Inc.\VMware Tools
                    Source: Proforma Inv.exe, 00000000.00000002.269280530.0000000003037000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: VMWARE
                    Source: Proforma Inv.exe, 00000000.00000002.269280530.0000000003037000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: InstallPath%C:\PROGRAM FILES\VMWARE\VMWARE TOOLS\
                    Source: Proforma Inv.exe, 00000000.00000002.269280530.0000000003037000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: VMWARE"SOFTWARE\VMware, Inc.\VMware ToolsLHARDWARE\DEVICEMAP\Scsi\Scsi Port 1\Scsi Bus 0\Target Id 0\Logical Unit Id 0LHARDWARE\DEVICEMAP\Scsi\Scsi Port 2\Scsi Bus 0\Target Id 0\Logical Unit Id 0'SYSTEM\ControlSet001\Services\Disk\Enum
                    Source: Proforma Inv.exe, 00000000.00000002.269280530.0000000003037000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: VMware SVGA II
                    Source: Proforma Inv.exe, 00000000.00000002.269280530.0000000003037000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: vmwareNSYSTEM\ControlSet001\Control\Class\{4D36E968-E325-11CE-BFC1-08002BE10318}\0000
                    Source: C:\Users\user\Desktop\Proforma Inv.exeProcess token adjusted: Debug
                    Source: C:\Users\user\Desktop\Proforma Inv.exeCode function: 2_2_0613BAE0 LdrInitializeThunk,
                    Source: C:\Users\user\Desktop\Proforma Inv.exeMemory allocated: page read and write | page guard

                    HIPS / PFW / Operating System Protection Evasion

                    barindex
                    Source: C:\Users\user\Desktop\Proforma Inv.exeMemory written: C:\Users\user\Desktop\Proforma Inv.exe base: 400000 value starts with: 4D5A
                    Source: C:\Users\user\Desktop\Proforma Inv.exeProcess created: C:\Users\user\Desktop\Proforma Inv.exe {path}
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Users\user\Desktop\Proforma Inv.exe VolumeInformation
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\arial.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\ariali.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\arialbd.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\arialbi.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\ARIALN.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\ariblk.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\ARIALNI.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\ARIALNB.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\ARIALNBI.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\calibri.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\calibril.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\calibrii.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\calibrili.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\calibrib.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\calibriz.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\cambria.ttc VolumeInformation
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\cambriai.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\cambriab.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\cambriaz.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\Candara.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\Candarai.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\Candarab.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\Candaraz.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\comic.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\comici.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\comicbd.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\comicz.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\consola.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\consolai.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\consolab.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\consolaz.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\constan.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\constani.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\constanb.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\constanz.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\corbel.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\corbeli.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\corbelb.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\corbelz.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\cour.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\couri.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\courbd.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\courbi.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\ebrima.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\ebrimabd.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\framd.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\FRADM.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\framdit.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\FRADMIT.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\FRAMDCN.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\FRADMCN.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\FRAHV.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\FRAHVIT.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\Gabriola.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\gadugi.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\gadugib.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\georgia.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\georgiai.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\georgiab.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\georgiaz.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\impact.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\Inkfree.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\javatext.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\LeelawUI.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\LeelUIsl.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\LeelaUIb.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\lucon.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\l_10646.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\malgun.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\malgunsl.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\malgunbd.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\himalaya.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\msjh.ttc VolumeInformation
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\msjhl.ttc VolumeInformation
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\msjhbd.ttc VolumeInformation
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\ntailu.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\ntailub.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\phagspa.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\phagspab.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\taile.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\taileb.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\msyh.ttc VolumeInformation
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\msyhl.ttc VolumeInformation
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\msyhbd.ttc VolumeInformation
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\msyi.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\mingliub.ttc VolumeInformation
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\monbaiti.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\msgothic.ttc VolumeInformation
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\mvboli.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\mmrtext.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\mmrtextb.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\Nirmala.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\NirmalaS.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\NirmalaB.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\pala.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\palai.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\palab.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\palabi.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\segoepr.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\segoeprb.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\segoesc.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\segoescb.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\seguisb.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\segoeuii.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\seguisli.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\seguili.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\seguisbi.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\segoeuiz.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\seguibl.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\seguibli.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\seguiemj.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\seguihis.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\seguisym.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\simsun.ttc VolumeInformation
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\simsunb.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\Sitka.ttc VolumeInformation
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\SitkaI.ttc VolumeInformation
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\SitkaB.ttc VolumeInformation
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\SitkaZ.ttc VolumeInformation
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\sylfaen.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\symbol.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\tahoma.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\tahomabd.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\timesi.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\timesbd.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\timesbi.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\trebuc.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\trebucit.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\trebucbd.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\trebucbi.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\verdana.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\verdanai.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\verdanab.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\verdanaz.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\webdings.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\wingding.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\YuGothR.ttc VolumeInformation
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\YuGothM.ttc VolumeInformation
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\YuGothL.ttc VolumeInformation
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\YuGothB.ttc VolumeInformation
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\holomdl2.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\CENTURY.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\LEELAWAD.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\LEELAWDB.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\MSUIGHUR.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\MSUIGHUB.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\WINGDNG2.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\WINGDNG3.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\TEMPSITC.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\PRISTINA.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\PAPYRUS.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\MISTRAL.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\LHANDW.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\ITCKRIST.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\JUICE___.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\FRSCRIPT.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\FREESCPT.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\BRADHITC.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\OUTLOOK.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\BKANT.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\ANTQUAI.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\ANTQUAB.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\ANTQUABI.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\GARA.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\GARAIT.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\GARABD.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\MTCORSVA.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\GOTHIC.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\GOTHICI.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\GOTHICB.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\GOTHICBI.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\ALGER.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\BASKVILL.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\BAUHS93.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\BELL.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\BELLI.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\BELLB.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\BRLNSR.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\BRLNSDB.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\BRLNSB.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\BERNHC.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\BOD_PSTC.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\BRITANIC.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\BROADW.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\BRUSHSCI.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\CALIFR.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\CALIFI.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\CALIFB.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\CENTAUR.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\CHILLER.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\COLONNA.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\COOPBL.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\FTLTLT.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\HARLOWSI.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\HARNGTON.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\HTOWERT.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\HTOWERTI.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\JOKERMAN.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\KUNSTLER.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\LBRITE.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\LBRITED.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\LBRITEI.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\LBRITEDI.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\LCALLIG.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\LFAX.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\LFAXD.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\LFAXI.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\LFAXDI.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\MAGNETOB.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\MATURASC.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\MOD20.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\NIAGENG.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\NIAGSOL.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\OLDENGL.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\ONYX.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\PARCHM.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\PLAYBILL.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\POORICH.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\RAVIE.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\INFROMAN.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\SHOWG.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\SNAP____.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\STENCIL.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\VINERITC.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\VIVALDII.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\VLADIMIR.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\LATINWD.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\TCM_____.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\TCMI____.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\TCB_____.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\TCBI____.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\TCCM____.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\TCCB____.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\TCCEB.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\SCRIPTBL.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\ROCK.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\ROCKI.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\ROCKB.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\ROCKEB.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\ROCKBI.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\ROCC____.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\ROCCB___.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\RAGE.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\PERTILI.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\PERTIBD.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\PER_____.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\PERI____.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\PERB____.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\PERBI___.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\PALSCRI.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\OCRAEXT.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\MAIAN.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\LTYPE.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\LTYPEO.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\LTYPEB.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\LTYPEBO.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\LSANS.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\LSANSD.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\LSANSI.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\LSANSDI.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\IMPRISHA.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\HATTEN.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\GOUDYSTO.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\GOUDOS.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\GOUDOSI.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\GOUDOSB.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\GLECB.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\GIL_____.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\GILI____.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\GILB____.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\GILBI___.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\GILC____.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\GLSNECB.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\GIGI.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\FRABK.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\FRABKIT.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\FORTE.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\FELIXTI.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\ERASMD.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\ERASLGHT.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\ERASDEMI.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\ERASBD.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\ENGR.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\ELEPHNT.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\ELEPHNTI.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\ITCEDSCR.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\CURLZ___.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\COPRGTL.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\COPRGTB.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\CENSCBK.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\SCHLBKI.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\SCHLBKB.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\SCHLBKBI.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\CASTELAR.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\CALIST.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\CALISTI.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\CALISTB.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\CALISTBI.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\BOOKOS.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\BOOKOSB.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\BOOKOSI.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\BOOKOSBI.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\BOD_R.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\BOD_I.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\BOD_B.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\BOD_BI.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\BOD_CR.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\BOD_BLAR.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\BOD_CI.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\BOD_CB.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\BOD_BLAI.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\BOD_CBI.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\ITCBLKAD.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\ARLRDBD.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\AGENCYR.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\AGENCYB.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\BSSYM7.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\REFSAN.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\REFSPCL.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\MTEXTRA.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\marlett.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Users\user\Desktop\Proforma Inv.exe VolumeInformation
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformation
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformation
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformation
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Management.dll VolumeInformation
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
                    Source: C:\Users\user\Desktop\Proforma Inv.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid

                    Stealing of Sensitive Information

                    barindex
                    Source: Yara matchFile source: 0.2.Proforma Inv.exe.3dff630.2.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 2.0.Proforma Inv.exe.400000.4.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 2.0.Proforma Inv.exe.400000.8.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 2.0.Proforma Inv.exe.400000.12.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 2.0.Proforma Inv.exe.400000.10.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 2.0.Proforma Inv.exe.400000.6.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 2.2.Proforma Inv.exe.400000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.Proforma Inv.exe.3dff630.2.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 00000002.00000002.508474036.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000002.00000000.262797800.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000002.00000000.263643345.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000002.00000000.262428568.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000002.00000000.263201971.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000000.00000002.272478585.0000000003D09000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000002.00000002.510096392.0000000002AC1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: Proforma Inv.exe PID: 6872, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: Proforma Inv.exe PID: 7096, type: MEMORYSTR
                    Source: C:\Users\user\Desktop\Proforma Inv.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.ini
                    Source: C:\Users\user\Desktop\Proforma Inv.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.ini
                    Source: C:\Users\user\Desktop\Proforma Inv.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676
                    Source: C:\Users\user\Desktop\Proforma Inv.exeKey opened: HKEY_CURRENT_USER\Software\IncrediMail\Identities
                    Source: C:\Users\user\Desktop\Proforma Inv.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Martin Prikryl\WinSCP 2\Sessions
                    Source: C:\Users\user\Desktop\Proforma Inv.exeFile opened: C:\Users\user\AppData\Roaming\SmartFTP\Client 2.0\Favorites\Quick Connect\
                    Source: C:\Users\user\Desktop\Proforma Inv.exeFile opened: C:\Users\user\AppData\Roaming\FileZilla\recentservers.xml
                    Source: C:\Users\user\Desktop\Proforma Inv.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.ini
                    Source: C:\Users\user\Desktop\Proforma Inv.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login Data
                    Source: Yara matchFile source: 00000002.00000002.510096392.0000000002AC1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: Proforma Inv.exe PID: 7096, type: MEMORYSTR

                    Remote Access Functionality

                    barindex
                    Source: Yara matchFile source: 0.2.Proforma Inv.exe.3dff630.2.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 2.0.Proforma Inv.exe.400000.4.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 2.0.Proforma Inv.exe.400000.8.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 2.0.Proforma Inv.exe.400000.12.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 2.0.Proforma Inv.exe.400000.10.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 2.0.Proforma Inv.exe.400000.6.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 2.2.Proforma Inv.exe.400000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.Proforma Inv.exe.3dff630.2.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 00000002.00000002.508474036.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000002.00000000.262797800.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000002.00000000.263643345.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000002.00000000.262428568.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000002.00000000.263201971.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000000.00000002.272478585.0000000003D09000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000002.00000002.510096392.0000000002AC1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: Proforma Inv.exe PID: 6872, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: Proforma Inv.exe PID: 7096, type: MEMORYSTR
                    Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
                    Valid Accounts211
                    Windows Management Instrumentation
                    Path Interception111
                    Process Injection
                    1
                    Masquerading
                    2
                    OS Credential Dumping
                    211
                    Security Software Discovery
                    Remote Services1
                    Email Collection
                    Exfiltration Over Other Network Medium1
                    Encrypted Channel
                    Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
                    Default AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization Scripts1
                    Disable or Modify Tools
                    1
                    Input Capture
                    1
                    Process Discovery
                    Remote Desktop Protocol1
                    Input Capture
                    Exfiltration Over Bluetooth1
                    Non-Standard Port
                    Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
                    Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)131
                    Virtualization/Sandbox Evasion
                    1
                    Credentials in Registry
                    131
                    Virtualization/Sandbox Evasion
                    SMB/Windows Admin Shares11
                    Archive Collected Data
                    Automated Exfiltration1
                    Non-Application Layer Protocol
                    Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
                    Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)111
                    Process Injection
                    NTDS1
                    Application Window Discovery
                    Distributed Component Object Model2
                    Data from Local System
                    Scheduled Transfer11
                    Application Layer Protocol
                    SIM Card SwapCarrier Billing Fraud
                    Cloud AccountsCronNetwork Logon ScriptNetwork Logon Script11
                    Deobfuscate/Decode Files or Information
                    LSA Secrets1
                    Remote System Discovery
                    SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
                    Replication Through Removable MediaLaunchdRc.commonRc.common4
                    Obfuscated Files or Information
                    Cached Domain Credentials114
                    System Information Discovery
                    VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
                    External Remote ServicesScheduled TaskStartup ItemsStartup Items13
                    Software Packing
                    DCSyncNetwork SniffingWindows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
                    Hide Legend

                    Legend:

                    • Process
                    • Signature
                    • Created File
                    • DNS/IP Info
                    • Is Dropped
                    • Is Windows Process
                    • Number of created Registry Values
                    • Number of created Files
                    • Visual Basic
                    • Delphi
                    • Java
                    • .Net C# or VB.NET
                    • C, C++ or other language
                    • Is malicious
                    • Internet

                    This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                    windows-stand
                    SourceDetectionScannerLabelLink
                    Proforma Inv.exe33%VirustotalBrowse
                    Proforma Inv.exe100%Joe Sandbox ML
                    No Antivirus matches
                    SourceDetectionScannerLabelLinkDownload
                    2.0.Proforma Inv.exe.400000.12.unpack100%AviraTR/Spy.Gen8Download File
                    2.0.Proforma Inv.exe.400000.10.unpack100%AviraTR/Spy.Gen8Download File
                    2.0.Proforma Inv.exe.400000.4.unpack100%AviraTR/Spy.Gen8Download File
                    2.0.Proforma Inv.exe.400000.6.unpack100%AviraTR/Spy.Gen8Download File
                    2.0.Proforma Inv.exe.400000.8.unpack100%AviraTR/Spy.Gen8Download File
                    2.2.Proforma Inv.exe.400000.0.unpack100%AviraTR/Spy.Gen8Download File
                    No Antivirus matches
                    SourceDetectionScannerLabelLink
                    http://127.0.0.1:HTTP/1.10%Avira URL Cloudsafe
                    http://www.founder.com.cn/cn/bThe0%URL Reputationsafe
                    http://XudLs2COBNu.org1-5-21-3853321935-2125563209-4053062332-1002_Classes0%Avira URL Cloudsafe
                    http://XudLs2COBNu.org0%Avira URL Cloudsafe
                    http://www.fonts.comoth0%Avira URL Cloudsafe
                    http://www.urwpp.deFv0%Avira URL Cloudsafe
                    http://www.tiro.com0%URL Reputationsafe
                    http://www.goodfont.co.kr0%URL Reputationsafe
                    http://www.sandoll.co.krights0%Avira URL Cloudsafe
                    http://www.sajatypeworks.com0%URL Reputationsafe
                    http://www.typography.netD0%URL Reputationsafe
                    http://www.founder.com.cn/cn/cThe0%URL Reputationsafe
                    http://www.galapagosdesign.com/staff/dennis.htm0%URL Reputationsafe
                    http://fontfabrik.com0%URL Reputationsafe
                    http://www.fonts.comic0%URL Reputationsafe
                    http://www.founder.com.cn/cny0%URL Reputationsafe
                    http://DynDns.comDynDNSnamejidpasswordPsi/Psi0%URL Reputationsafe
                    http://www.founder.com.cn/cnudi0%Avira URL Cloudsafe
                    http://www.fontbureau.comab0%Avira URL Cloudsafe
                    http://www.fonts.comn0%URL Reputationsafe
                    http://www.galapagosdesign.com/DPlease0%URL Reputationsafe
                    http://www.fontbureau.comalic#0%Avira URL Cloudsafe
                    http://www.sandoll.co.kr0%URL Reputationsafe
                    http://www.founder.com.cn/cn/e(0%Avira URL Cloudsafe
                    http://www.urwpp.deDPlease0%URL Reputationsafe
                    http://www.urwpp.de0%URL Reputationsafe
                    http://www.zhongyicts.com.cn0%URL Reputationsafe
                    http://www.sakkal.com0%URL Reputationsafe
                    http://www.sandoll.co.krnta~0%Avira URL Cloudsafe
                    http://www.sajatypeworks.comh0%Avira URL Cloudsafe
                    http://WaIJyp.com0%Avira URL Cloudsafe
                    http://www.fontbureau.com=0%Avira URL Cloudsafe
                    http://www.fontbureau.comF0%URL Reputationsafe
                    https://sectigo.com/CPS00%URL Reputationsafe
                    http://www.sajatypeworks.coms0%URL Reputationsafe
                    https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.ziphttps://www0%URL Reputationsafe
                    http://www.founder.com.cn/cnu-ru0%Avira URL Cloudsafe
                    http://www.fontbureau.comion0%URL Reputationsafe
                    http://mail.safalaw.com.ph0%Avira URL Cloudsafe
                    http://www.fontbureau.comasvi0%Avira URL Cloudsafe
                    http://www.fontbureau.comL.TTF0%URL Reputationsafe
                    http://www.sandoll.co.kre0%URL Reputationsafe
                    http://www.fontbureau.coma0%URL Reputationsafe
                    http://www.fontbureau.comd0%URL Reputationsafe
                    http://en.w0%URL Reputationsafe
                    http://www.carterandcone.coml0%URL Reputationsafe
                    http://www.sajatypeworks.comKfC0%Avira URL Cloudsafe
                    http://www.tiro.comcom0%URL Reputationsafe
                    http://www.founder.com.cn/cn0%URL Reputationsafe
                    http://www.fontbureau.comcomF0%URL Reputationsafe
                    http://www.fontbureau.comt0%URL Reputationsafe
                    http://www.jiyu-kobo.co.jp/0%URL Reputationsafe
                    http://www.fontbureau.comionFt0%Avira URL Cloudsafe
                    http://www.fontbureau.comals0%URL Reputationsafe
                    http://www.fontbureau.comitua0%Avira URL Cloudsafe
                    http://www.fonts.comCH0%Avira URL Cloudsafe
                    NameIPActiveMaliciousAntivirus DetectionReputation
                    mail.safalaw.com.ph
                    207.148.117.199
                    truetrue
                      unknown
                      NameSourceMaliciousAntivirus DetectionReputation
                      http://127.0.0.1:HTTP/1.1Proforma Inv.exe, 00000002.00000002.510096392.0000000002AC1000.00000004.00000800.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: safe
                      low
                      http://www.fontbureau.com/designersGProforma Inv.exe, 00000000.00000002.279381567.0000000006FA2000.00000004.00000800.00020000.00000000.sdmpfalse
                        high
                        http://www.fontbureau.com/designers/?Proforma Inv.exe, 00000000.00000002.279381567.0000000006FA2000.00000004.00000800.00020000.00000000.sdmpfalse
                          high
                          http://www.founder.com.cn/cn/bTheProforma Inv.exe, 00000000.00000002.279381567.0000000006FA2000.00000004.00000800.00020000.00000000.sdmpfalse
                          • URL Reputation: safe
                          unknown
                          http://www.fontbureau.com/designers?Proforma Inv.exe, 00000000.00000002.279381567.0000000006FA2000.00000004.00000800.00020000.00000000.sdmpfalse
                            high
                            http://XudLs2COBNu.org1-5-21-3853321935-2125563209-4053062332-1002_ClassesProforma Inv.exe, 00000002.00000003.279561854.0000000000C84000.00000004.00000020.00020000.00000000.sdmpfalse
                            • Avira URL Cloud: safe
                            low
                            http://XudLs2COBNu.orgProforma Inv.exe, 00000002.00000002.510827489.0000000002E33000.00000004.00000800.00020000.00000000.sdmpfalse
                            • Avira URL Cloud: safe
                            unknown
                            http://www.fonts.comothProforma Inv.exe, 00000000.00000003.242863799.0000000005DAB000.00000004.00000800.00020000.00000000.sdmpfalse
                            • Avira URL Cloud: safe
                            unknown
                            http://www.urwpp.deFvProforma Inv.exe, 00000000.00000003.249877134.0000000005D99000.00000004.00000800.00020000.00000000.sdmpfalse
                            • Avira URL Cloud: safe
                            unknown
                            http://www.tiro.comProforma Inv.exe, 00000000.00000002.279381567.0000000006FA2000.00000004.00000800.00020000.00000000.sdmpfalse
                            • URL Reputation: safe
                            unknown
                            http://www.fontbureau.com/designersProforma Inv.exe, 00000000.00000002.279381567.0000000006FA2000.00000004.00000800.00020000.00000000.sdmpfalse
                              high
                              http://www.goodfont.co.krProforma Inv.exe, 00000000.00000002.279381567.0000000006FA2000.00000004.00000800.00020000.00000000.sdmpfalse
                              • URL Reputation: safe
                              unknown
                              http://www.sandoll.co.krightsProforma Inv.exe, 00000000.00000003.243905944.0000000005D96000.00000004.00000800.00020000.00000000.sdmpfalse
                              • Avira URL Cloud: safe
                              unknown
                              http://www.sajatypeworks.comProforma Inv.exe, 00000000.00000002.279381567.0000000006FA2000.00000004.00000800.00020000.00000000.sdmpfalse
                              • URL Reputation: safe
                              unknown
                              http://www.typography.netDProforma Inv.exe, 00000000.00000002.279381567.0000000006FA2000.00000004.00000800.00020000.00000000.sdmpfalse
                              • URL Reputation: safe
                              unknown
                              http://www.founder.com.cn/cn/cTheProforma Inv.exe, 00000000.00000002.279381567.0000000006FA2000.00000004.00000800.00020000.00000000.sdmpfalse
                              • URL Reputation: safe
                              unknown
                              http://www.galapagosdesign.com/staff/dennis.htmProforma Inv.exe, 00000000.00000002.279381567.0000000006FA2000.00000004.00000800.00020000.00000000.sdmpfalse
                              • URL Reputation: safe
                              unknown
                              http://fontfabrik.comProforma Inv.exe, 00000000.00000002.279381567.0000000006FA2000.00000004.00000800.00020000.00000000.sdmpfalse
                              • URL Reputation: safe
                              unknown
                              http://www.fonts.comicProforma Inv.exe, 00000000.00000003.242919450.0000000005DAB000.00000004.00000800.00020000.00000000.sdmp, Proforma Inv.exe, 00000000.00000003.242891447.0000000005DAB000.00000004.00000800.00020000.00000000.sdmpfalse
                              • URL Reputation: safe
                              unknown
                              http://www.founder.com.cn/cnyProforma Inv.exe, 00000000.00000003.244537632.0000000005D94000.00000004.00000800.00020000.00000000.sdmpfalse
                              • URL Reputation: safe
                              unknown
                              http://DynDns.comDynDNSnamejidpasswordPsi/PsiProforma Inv.exe, 00000002.00000002.510096392.0000000002AC1000.00000004.00000800.00020000.00000000.sdmpfalse
                              • URL Reputation: safe
                              unknown
                              http://www.founder.com.cn/cnudiProforma Inv.exe, 00000000.00000003.244788585.0000000005D94000.00000004.00000800.00020000.00000000.sdmp, Proforma Inv.exe, 00000000.00000003.244537632.0000000005D94000.00000004.00000800.00020000.00000000.sdmpfalse
                              • Avira URL Cloud: safe
                              unknown
                              http://www.fontbureau.comabProforma Inv.exe, 00000000.00000003.249167454.0000000005D99000.00000004.00000800.00020000.00000000.sdmpfalse
                              • Avira URL Cloud: safe
                              unknown
                              http://www.fonts.comnProforma Inv.exe, 00000000.00000003.242891447.0000000005DAB000.00000004.00000800.00020000.00000000.sdmpfalse
                              • URL Reputation: safe
                              unknown
                              http://www.galapagosdesign.com/DPleaseProforma Inv.exe, 00000000.00000002.279381567.0000000006FA2000.00000004.00000800.00020000.00000000.sdmpfalse
                              • URL Reputation: safe
                              unknown
                              http://www.fontbureau.comalic#Proforma Inv.exe, 00000000.00000003.249877134.0000000005D99000.00000004.00000800.00020000.00000000.sdmpfalse
                              • Avira URL Cloud: safe
                              unknown
                              http://www.fonts.comProforma Inv.exe, 00000000.00000003.242844157.0000000005DAB000.00000004.00000800.00020000.00000000.sdmp, Proforma Inv.exe, 00000000.00000003.242863799.0000000005DAB000.00000004.00000800.00020000.00000000.sdmp, Proforma Inv.exe, 00000000.00000002.279381567.0000000006FA2000.00000004.00000800.00020000.00000000.sdmp, Proforma Inv.exe, 00000000.00000003.242891447.0000000005DAB000.00000004.00000800.00020000.00000000.sdmpfalse
                                high
                                http://www.sandoll.co.krProforma Inv.exe, 00000000.00000002.279381567.0000000006FA2000.00000004.00000800.00020000.00000000.sdmpfalse
                                • URL Reputation: safe
                                unknown
                                http://www.founder.com.cn/cn/e(Proforma Inv.exe, 00000000.00000003.244788585.0000000005D94000.00000004.00000800.00020000.00000000.sdmpfalse
                                • Avira URL Cloud: safe
                                unknown
                                http://www.urwpp.deDPleaseProforma Inv.exe, 00000000.00000002.279381567.0000000006FA2000.00000004.00000800.00020000.00000000.sdmpfalse
                                • URL Reputation: safe
                                unknown
                                http://www.urwpp.deProforma Inv.exe, 00000000.00000003.249877134.0000000005D99000.00000004.00000800.00020000.00000000.sdmpfalse
                                • URL Reputation: safe
                                unknown
                                http://www.zhongyicts.com.cnProforma Inv.exe, 00000000.00000002.279381567.0000000006FA2000.00000004.00000800.00020000.00000000.sdmpfalse
                                • URL Reputation: safe
                                unknown
                                http://www.sakkal.comProforma Inv.exe, 00000000.00000002.279381567.0000000006FA2000.00000004.00000800.00020000.00000000.sdmpfalse
                                • URL Reputation: safe
                                unknown
                                http://www.sandoll.co.krnta~Proforma Inv.exe, 00000000.00000003.243905944.0000000005D96000.00000004.00000800.00020000.00000000.sdmpfalse
                                • Avira URL Cloud: safe
                                low
                                http://www.sajatypeworks.comhProforma Inv.exe, 00000000.00000003.242656361.0000000005DAB000.00000004.00000800.00020000.00000000.sdmpfalse
                                • Avira URL Cloud: safe
                                unknown
                                http://WaIJyp.comProforma Inv.exe, 00000002.00000002.510096392.0000000002AC1000.00000004.00000800.00020000.00000000.sdmpfalse
                                • Avira URL Cloud: safe
                                unknown
                                http://www.fontbureau.com=Proforma Inv.exe, 00000000.00000003.249167454.0000000005D99000.00000004.00000800.00020000.00000000.sdmpfalse
                                • Avira URL Cloud: safe
                                low
                                http://www.apache.org/licenses/LICENSE-2.0Proforma Inv.exe, 00000000.00000002.279381567.0000000006FA2000.00000004.00000800.00020000.00000000.sdmpfalse
                                  high
                                  http://www.fontbureau.comProforma Inv.exe, 00000000.00000002.278940493.0000000005D90000.00000004.00000800.00020000.00000000.sdmp, Proforma Inv.exe, 00000000.00000003.249877134.0000000005D99000.00000004.00000800.00020000.00000000.sdmp, Proforma Inv.exe, 00000000.00000002.279381567.0000000006FA2000.00000004.00000800.00020000.00000000.sdmpfalse
                                    high
                                    http://www.fontbureau.comFProforma Inv.exe, 00000000.00000003.249167454.0000000005D99000.00000004.00000800.00020000.00000000.sdmpfalse
                                    • URL Reputation: safe
                                    unknown
                                    https://sectigo.com/CPS0Proforma Inv.exe, 00000002.00000002.510735000.0000000002E0F000.00000004.00000800.00020000.00000000.sdmpfalse
                                    • URL Reputation: safe
                                    unknown
                                    http://www.sajatypeworks.comsProforma Inv.exe, 00000000.00000003.242880391.0000000005DB4000.00000004.00000800.00020000.00000000.sdmp, Proforma Inv.exe, 00000000.00000003.242844157.0000000005DAB000.00000004.00000800.00020000.00000000.sdmp, Proforma Inv.exe, 00000000.00000003.242766852.0000000005DAB000.00000004.00000800.00020000.00000000.sdmp, Proforma Inv.exe, 00000000.00000003.242698082.0000000005DAB000.00000004.00000800.00020000.00000000.sdmp, Proforma Inv.exe, 00000000.00000003.242656361.0000000005DAB000.00000004.00000800.00020000.00000000.sdmp, Proforma Inv.exe, 00000000.00000003.242798809.0000000005DAB000.00000004.00000800.00020000.00000000.sdmp, Proforma Inv.exe, 00000000.00000003.242863799.0000000005DAB000.00000004.00000800.00020000.00000000.sdmp, Proforma Inv.exe, 00000000.00000003.242819494.0000000005DAB000.00000004.00000800.00020000.00000000.sdmp, Proforma Inv.exe, 00000000.00000003.242737289.0000000005DAB000.00000004.00000800.00020000.00000000.sdmpfalse
                                    • URL Reputation: safe
                                    unknown
                                    https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.ziphttps://wwwProforma Inv.exe, 00000002.00000002.510096392.0000000002AC1000.00000004.00000800.00020000.00000000.sdmpfalse
                                    • URL Reputation: safe
                                    unknown
                                    http://www.founder.com.cn/cnu-ruProforma Inv.exe, 00000000.00000003.244517298.0000000005DCD000.00000004.00000800.00020000.00000000.sdmpfalse
                                    • Avira URL Cloud: safe
                                    unknown
                                    http://www.fontbureau.comionProforma Inv.exe, 00000000.00000003.249167454.0000000005D99000.00000004.00000800.00020000.00000000.sdmpfalse
                                    • URL Reputation: safe
                                    unknown
                                    http://mail.safalaw.com.phProforma Inv.exe, 00000002.00000002.510735000.0000000002E0F000.00000004.00000800.00020000.00000000.sdmpfalse
                                    • Avira URL Cloud: safe
                                    unknown
                                    http://www.fontbureau.comasviProforma Inv.exe, 00000000.00000003.249393177.0000000005D9A000.00000004.00000800.00020000.00000000.sdmp, Proforma Inv.exe, 00000000.00000003.249167454.0000000005D99000.00000004.00000800.00020000.00000000.sdmp, Proforma Inv.exe, 00000000.00000003.248778008.0000000005D98000.00000004.00000800.00020000.00000000.sdmpfalse
                                    • Avira URL Cloud: safe
                                    unknown
                                    http://www.fontbureau.comL.TTFProforma Inv.exe, 00000000.00000003.249393177.0000000005D9A000.00000004.00000800.00020000.00000000.sdmp, Proforma Inv.exe, 00000000.00000003.249167454.0000000005D99000.00000004.00000800.00020000.00000000.sdmpfalse
                                    • URL Reputation: safe
                                    unknown
                                    http://www.sandoll.co.kreProforma Inv.exe, 00000000.00000003.243905944.0000000005D96000.00000004.00000800.00020000.00000000.sdmpfalse
                                    • URL Reputation: safe
                                    unknown
                                    http://www.fontbureau.comaProforma Inv.exe, 00000000.00000003.249167454.0000000005D99000.00000004.00000800.00020000.00000000.sdmp, Proforma Inv.exe, 00000000.00000003.248778008.0000000005D98000.00000004.00000800.00020000.00000000.sdmpfalse
                                    • URL Reputation: safe
                                    unknown
                                    http://www.fontbureau.comdProforma Inv.exe, 00000000.00000003.249167454.0000000005D99000.00000004.00000800.00020000.00000000.sdmpfalse
                                    • URL Reputation: safe
                                    unknown
                                    http://en.wProforma Inv.exe, 00000000.00000003.242880391.0000000005DB4000.00000004.00000800.00020000.00000000.sdmp, Proforma Inv.exe, 00000000.00000003.242844157.0000000005DAB000.00000004.00000800.00020000.00000000.sdmp, Proforma Inv.exe, 00000000.00000003.242766852.0000000005DAB000.00000004.00000800.00020000.00000000.sdmp, Proforma Inv.exe, 00000000.00000003.242698082.0000000005DAB000.00000004.00000800.00020000.00000000.sdmp, Proforma Inv.exe, 00000000.00000003.242656361.0000000005DAB000.00000004.00000800.00020000.00000000.sdmp, Proforma Inv.exe, 00000000.00000003.242798809.0000000005DAB000.00000004.00000800.00020000.00000000.sdmp, Proforma Inv.exe, 00000000.00000003.242392348.000000000145D000.00000004.00000020.00020000.00000000.sdmp, Proforma Inv.exe, 00000000.00000003.242863799.0000000005DAB000.00000004.00000800.00020000.00000000.sdmp, Proforma Inv.exe, 00000000.00000003.242819494.0000000005DAB000.00000004.00000800.00020000.00000000.sdmp, Proforma Inv.exe, 00000000.00000003.242737289.0000000005DAB000.00000004.00000800.00020000.00000000.sdmpfalse
                                    • URL Reputation: safe
                                    unknown
                                    http://www.carterandcone.comlProforma Inv.exe, 00000000.00000002.279381567.0000000006FA2000.00000004.00000800.00020000.00000000.sdmpfalse
                                    • URL Reputation: safe
                                    unknown
                                    http://www.sajatypeworks.comKfCProforma Inv.exe, 00000000.00000003.242844157.0000000005DAB000.00000004.00000800.00020000.00000000.sdmp, Proforma Inv.exe, 00000000.00000003.242766852.0000000005DAB000.00000004.00000800.00020000.00000000.sdmp, Proforma Inv.exe, 00000000.00000003.242698082.0000000005DAB000.00000004.00000800.00020000.00000000.sdmp, Proforma Inv.exe, 00000000.00000003.242656361.0000000005DAB000.00000004.00000800.00020000.00000000.sdmp, Proforma Inv.exe, 00000000.00000003.242798809.0000000005DAB000.00000004.00000800.00020000.00000000.sdmp, Proforma Inv.exe, 00000000.00000003.242919450.0000000005DAB000.00000004.00000800.00020000.00000000.sdmp, Proforma Inv.exe, 00000000.00000003.242863799.0000000005DAB000.00000004.00000800.00020000.00000000.sdmp, Proforma Inv.exe, 00000000.00000003.242819494.0000000005DAB000.00000004.00000800.00020000.00000000.sdmp, Proforma Inv.exe, 00000000.00000003.242891447.0000000005DAB000.00000004.00000800.00020000.00000000.sdmp, Proforma Inv.exe, 00000000.00000003.242737289.0000000005DAB000.00000004.00000800.00020000.00000000.sdmpfalse
                                    • Avira URL Cloud: safe
                                    unknown
                                    http://www.tiro.comcomProforma Inv.exe, 00000000.00000003.243218227.0000000005DAB000.00000004.00000800.00020000.00000000.sdmp, Proforma Inv.exe, 00000000.00000003.243198712.0000000005DAB000.00000004.00000800.00020000.00000000.sdmpfalse
                                    • URL Reputation: safe
                                    unknown
                                    http://www.fontbureau.com/designers/cabarga.htmlNProforma Inv.exe, 00000000.00000002.279381567.0000000006FA2000.00000004.00000800.00020000.00000000.sdmpfalse
                                      high
                                      http://www.founder.com.cn/cnProforma Inv.exe, 00000000.00000003.244788585.0000000005D94000.00000004.00000800.00020000.00000000.sdmp, Proforma Inv.exe, 00000000.00000003.246769169.0000000005D9D000.00000004.00000800.00020000.00000000.sdmp, Proforma Inv.exe, 00000000.00000002.279381567.0000000006FA2000.00000004.00000800.00020000.00000000.sdmp, Proforma Inv.exe, 00000000.00000003.244537632.0000000005D94000.00000004.00000800.00020000.00000000.sdmp, Proforma Inv.exe, 00000000.00000003.244899824.0000000005D9B000.00000004.00000800.00020000.00000000.sdmpfalse
                                      • URL Reputation: safe
                                      unknown
                                      http://www.fontbureau.com/designers/frere-jones.htmlProforma Inv.exe, 00000000.00000002.279381567.0000000006FA2000.00000004.00000800.00020000.00000000.sdmpfalse
                                        high
                                        http://www.fontbureau.com/designers/cabarga.htmlProforma Inv.exe, 00000000.00000003.249428709.0000000005DC5000.00000004.00000800.00020000.00000000.sdmp, Proforma Inv.exe, 00000000.00000003.249449455.0000000005DC5000.00000004.00000800.00020000.00000000.sdmpfalse
                                          high
                                          http://www.fontbureau.comcomFProforma Inv.exe, 00000000.00000003.249393177.0000000005D9A000.00000004.00000800.00020000.00000000.sdmp, Proforma Inv.exe, 00000000.00000003.249167454.0000000005D99000.00000004.00000800.00020000.00000000.sdmpfalse
                                          • URL Reputation: safe
                                          unknown
                                          http://www.fontbureau.comtProforma Inv.exe, 00000000.00000003.249877134.0000000005D99000.00000004.00000800.00020000.00000000.sdmpfalse
                                          • URL Reputation: safe
                                          unknown
                                          http://www.jiyu-kobo.co.jp/Proforma Inv.exe, 00000000.00000002.279381567.0000000006FA2000.00000004.00000800.00020000.00000000.sdmpfalse
                                          • URL Reputation: safe
                                          unknown
                                          http://www.fontbureau.com/designers8Proforma Inv.exe, 00000000.00000002.279381567.0000000006FA2000.00000004.00000800.00020000.00000000.sdmpfalse
                                            high
                                            http://www.fontbureau.comionFtProforma Inv.exe, 00000000.00000002.278940493.0000000005D90000.00000004.00000800.00020000.00000000.sdmpfalse
                                            • Avira URL Cloud: safe
                                            unknown
                                            http://www.fontbureau.comalsProforma Inv.exe, 00000000.00000003.249877134.0000000005D99000.00000004.00000800.00020000.00000000.sdmpfalse
                                            • URL Reputation: safe
                                            unknown
                                            http://www.fontbureau.comituaProforma Inv.exe, 00000000.00000003.249877134.0000000005D99000.00000004.00000800.00020000.00000000.sdmpfalse
                                            • Avira URL Cloud: safe
                                            unknown
                                            http://www.fonts.comCHProforma Inv.exe, 00000000.00000003.242844157.0000000005DAB000.00000004.00000800.00020000.00000000.sdmp, Proforma Inv.exe, 00000000.00000003.242863799.0000000005DAB000.00000004.00000800.00020000.00000000.sdmpfalse
                                            • Avira URL Cloud: safe
                                            unknown
                                            • No. of IPs < 25%
                                            • 25% < No. of IPs < 50%
                                            • 50% < No. of IPs < 75%
                                            • 75% < No. of IPs
                                            IPDomainCountryFlagASNASN NameMalicious
                                            207.148.117.199
                                            mail.safalaw.com.phUnited States
                                            20473AS-CHOOPAUStrue
                                            Joe Sandbox Version:34.0.0 Boulder Opal
                                            Analysis ID:605000
                                            Start date and time:2022-04-07 15:20:10 +02:00
                                            Joe Sandbox Product:CloudBasic
                                            Overall analysis duration:0h 9m 18s
                                            Hypervisor based Inspection enabled:false
                                            Report type:light
                                            Sample file name:Proforma Inv.exe
                                            Cookbook file name:default.jbs
                                            Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
                                            Number of analysed new started processes analysed:21
                                            Number of new started drivers analysed:0
                                            Number of existing processes analysed:0
                                            Number of existing drivers analysed:0
                                            Number of injected processes analysed:0
                                            Technologies:
                                            • HCA enabled
                                            • EGA enabled
                                            • HDC enabled
                                            • AMSI enabled
                                            Analysis Mode:default
                                            Analysis stop reason:Timeout
                                            Detection:MAL
                                            Classification:mal100.troj.spyw.evad.winEXE@3/1@1/1
                                            EGA Information:
                                            • Successful, ratio: 100%
                                            HDC Information:Failed
                                            HCA Information:
                                            • Successful, ratio: 100%
                                            • Number of executed functions: 0
                                            • Number of non-executed functions: 0
                                            Cookbook Comments:
                                            • Found application associated with file extension: .exe
                                            • Adjust boot time
                                            • Enable AMSI
                                            • Exclude process from analysis (whitelisted): MpCmdRun.exe, BackgroundTransferHost.exe, backgroundTaskHost.exe, SgrmBroker.exe, conhost.exe, svchost.exe, wuapihost.exe
                                            • Excluded domains from analysis (whitelisted): ris.api.iris.microsoft.com, client.wns.windows.com, fs.microsoft.com, sls.update.microsoft.com, displaycatalog.mp.microsoft.com, img-prod-cms-rt-microsoft-com.akamaized.net, cdn.onenote.net, arc.msn.com
                                            • Not all processes where analyzed, report is missing behavior information
                                            • Report size getting too big, too many NtAllocateVirtualMemory calls found.
                                            • Report size getting too big, too many NtOpenKeyEx calls found.
                                            • Report size getting too big, too many NtProtectVirtualMemory calls found.
                                            • Report size getting too big, too many NtQueryValueKey calls found.
                                            TimeTypeDescription
                                            17:21:17API Interceptor790x Sleep call for process: Proforma Inv.exe modified
                                            No context
                                            No context
                                            No context
                                            No context
                                            No context
                                            Process:C:\Users\user\Desktop\Proforma Inv.exe
                                            File Type:ASCII text, with CRLF line terminators
                                            Category:dropped
                                            Size (bytes):1216
                                            Entropy (8bit):5.355304211458859
                                            Encrypted:false
                                            SSDEEP:24:MLUE4K5E4Ks2E1qE4x84qXKDE4KhK3VZ9pKhPKIE4oKFKHKoZAE4Kzr7FE4j:MIHK5HKXE1qHxviYHKhQnoPtHoxHhAHY
                                            MD5:69206D3AF7D6EFD08F4B4726998856D3
                                            SHA1:E778D4BF781F7712163CF5E2F5E7C15953E484CF
                                            SHA-256:A937AD22F9C3E667A062BA0E116672960CD93522F6997C77C00370755929BA87
                                            SHA-512:CD270C3DF75E548C9B0727F13F44F45262BD474336E89AAEBE56FABFE8076CD4638F88D3C0837B67C2EB3C54055679B07E4212FB3FEDBF88C015EB5DBBCD7FF8
                                            Malicious:true
                                            Reputation:high, very likely benign file
                                            Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\4f0a7eefa3cd3e0ba98b5ebddbbc72e6\System.ni.dll",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..2,"Microsoft.VisualBasic, Version=10.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\f1d8480152e0da9a60ad49c6d16a3b6d\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\8d67d92724ba494b6c7fd089d6f25b48\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a
                                            File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                            Entropy (8bit):7.85181290405052
                                            TrID:
                                            • Win32 Executable (generic) Net Framework (10011505/4) 49.83%
                                            • Win32 Executable (generic) a (10002005/4) 49.78%
                                            • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                                            • Generic Win/DOS Executable (2004/3) 0.01%
                                            • DOS Executable Generic (2002/1) 0.01%
                                            File name:Proforma Inv.exe
                                            File size:444928
                                            MD5:189ad2733ba3c8baa0d9fb41e4223d92
                                            SHA1:90d2762579dfd97d7b767662566f3a623766dd0a
                                            SHA256:d73763f8b8d4eb91dec386eb7a2ebf9a8a9b40c6b028d57e6144ed74551d460b
                                            SHA512:a255eb116180e54ca4966b6596adccffb56deac442f64ed570814f2205811b3e5d2263ce4f0f2183851530b962f754fe3fe3561dda93dd3e20f6ac46dc6f0901
                                            SSDEEP:12288:wJrxvRItNiL65tIekTAEr4xwWEL9KHHvxosMKnd:8fsiL65t7kT1rjhKHH5os
                                            TLSH:2694DFA05A162183D2906F72C0E3CCB03AE5B1DA9259F7DEBC84DB543FE5198C644BBD
                                            File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L.....Nb..............P.............v.... ........@.. ....................... ............@................................
                                            Icon Hash:00828e8e8686b000
                                            Entrypoint:0x46de76
                                            Entrypoint Section:.text
                                            Digitally signed:false
                                            Imagebase:0x400000
                                            Subsystem:windows gui
                                            Image File Characteristics:32BIT_MACHINE, EXECUTABLE_IMAGE
                                            DLL Characteristics:NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
                                            Time Stamp:0x624ECABA [Thu Apr 7 11:27:54 2022 UTC]
                                            TLS Callbacks:
                                            CLR (.Net) Version:v4.0.30319
                                            OS Version Major:4
                                            OS Version Minor:0
                                            File Version Major:4
                                            File Version Minor:0
                                            Subsystem Version Major:4
                                            Subsystem Version Minor:0
                                            Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
                                            Instruction
                                            jmp dword ptr [00402000h]
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            NameVirtual AddressVirtual Size Is in Section
                                            IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                            IMAGE_DIRECTORY_ENTRY_IMPORT0x6de240x4f.text
                                            IMAGE_DIRECTORY_ENTRY_RESOURCE0x6e0000x5b4.rsrc
                                            IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                            IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                            IMAGE_DIRECTORY_ENTRY_BASERELOC0x700000xc.reloc
                                            IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                            IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                            IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                            IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                            IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                            IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                            IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                                            IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                            IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                                            IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                            NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                            .text0x20000x6be7c0x6c000False0.901538990162data7.86044321518IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                                            .rsrc0x6e0000x5b40x600False0.427734375data4.12184998186IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                            .reloc0x700000xc0x200False0.044921875data0.101910425663IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                            NameRVASizeTypeLanguageCountry
                                            RT_VERSION0x6e0900x324data
                                            RT_MANIFEST0x6e3c40x1eaXML 1.0 document, UTF-8 Unicode (with BOM) text, with CRLF line terminators
                                            DLLImport
                                            mscoree.dll_CorExeMain
                                            DescriptionData
                                            Translation0x0000 0x04b0
                                            LegalCopyrightCopyright 2016
                                            Assembly Version1.0.0.0
                                            InternalNameHEhUz.exe
                                            FileVersion1.0.0.0
                                            CompanyNameMicrosoft
                                            LegalTrademarks
                                            Comments
                                            ProductNameDaily Notes
                                            ProductVersion1.0.0.0
                                            FileDescriptionDaily Notes
                                            OriginalFilenameHEhUz.exe
                                            TimestampSource PortDest PortSource IPDest IP
                                            Apr 7, 2022 17:21:35.132299900 CEST49756587192.168.2.3207.148.117.199
                                            Apr 7, 2022 17:21:35.378325939 CEST58749756207.148.117.199192.168.2.3
                                            Apr 7, 2022 17:21:35.378420115 CEST49756587192.168.2.3207.148.117.199
                                            Apr 7, 2022 17:21:35.700582981 CEST58749756207.148.117.199192.168.2.3
                                            Apr 7, 2022 17:21:35.700885057 CEST49756587192.168.2.3207.148.117.199
                                            Apr 7, 2022 17:21:35.946814060 CEST58749756207.148.117.199192.168.2.3
                                            Apr 7, 2022 17:21:35.952491999 CEST49756587192.168.2.3207.148.117.199
                                            Apr 7, 2022 17:21:36.198868990 CEST58749756207.148.117.199192.168.2.3
                                            Apr 7, 2022 17:21:36.275157928 CEST49756587192.168.2.3207.148.117.199
                                            Apr 7, 2022 17:21:36.525212049 CEST58749756207.148.117.199192.168.2.3
                                            Apr 7, 2022 17:21:36.525239944 CEST58749756207.148.117.199192.168.2.3
                                            Apr 7, 2022 17:21:36.525254965 CEST58749756207.148.117.199192.168.2.3
                                            Apr 7, 2022 17:21:36.525265932 CEST58749756207.148.117.199192.168.2.3
                                            Apr 7, 2022 17:21:36.525348902 CEST49756587192.168.2.3207.148.117.199
                                            Apr 7, 2022 17:21:36.525912046 CEST58749756207.148.117.199192.168.2.3
                                            Apr 7, 2022 17:21:36.570353985 CEST49756587192.168.2.3207.148.117.199
                                            Apr 7, 2022 17:21:36.816478014 CEST58749756207.148.117.199192.168.2.3
                                            Apr 7, 2022 17:21:36.903961897 CEST49756587192.168.2.3207.148.117.199
                                            Apr 7, 2022 17:21:37.083776951 CEST49756587192.168.2.3207.148.117.199
                                            Apr 7, 2022 17:21:37.329756975 CEST58749756207.148.117.199192.168.2.3
                                            Apr 7, 2022 17:21:37.330904961 CEST49756587192.168.2.3207.148.117.199
                                            Apr 7, 2022 17:21:37.577114105 CEST58749756207.148.117.199192.168.2.3
                                            Apr 7, 2022 17:21:37.577652931 CEST49756587192.168.2.3207.148.117.199
                                            Apr 7, 2022 17:21:37.831244946 CEST58749756207.148.117.199192.168.2.3
                                            Apr 7, 2022 17:21:37.832106113 CEST49756587192.168.2.3207.148.117.199
                                            Apr 7, 2022 17:21:38.077944040 CEST58749756207.148.117.199192.168.2.3
                                            Apr 7, 2022 17:21:38.078320026 CEST49756587192.168.2.3207.148.117.199
                                            Apr 7, 2022 17:21:38.325915098 CEST58749756207.148.117.199192.168.2.3
                                            Apr 7, 2022 17:21:38.326359034 CEST49756587192.168.2.3207.148.117.199
                                            Apr 7, 2022 17:21:38.572231054 CEST58749756207.148.117.199192.168.2.3
                                            Apr 7, 2022 17:21:38.573324919 CEST49756587192.168.2.3207.148.117.199
                                            Apr 7, 2022 17:21:38.573427916 CEST49756587192.168.2.3207.148.117.199
                                            Apr 7, 2022 17:21:38.574114084 CEST49756587192.168.2.3207.148.117.199
                                            Apr 7, 2022 17:21:38.574244022 CEST49756587192.168.2.3207.148.117.199
                                            Apr 7, 2022 17:21:38.819161892 CEST58749756207.148.117.199192.168.2.3
                                            Apr 7, 2022 17:21:38.819189072 CEST58749756207.148.117.199192.168.2.3
                                            Apr 7, 2022 17:21:38.819694042 CEST58749756207.148.117.199192.168.2.3
                                            Apr 7, 2022 17:21:38.819741011 CEST58749756207.148.117.199192.168.2.3
                                            Apr 7, 2022 17:21:39.898117065 CEST58749756207.148.117.199192.168.2.3
                                            Apr 7, 2022 17:21:40.113773108 CEST49756587192.168.2.3207.148.117.199
                                            Apr 7, 2022 17:23:14.007035017 CEST49756587192.168.2.3207.148.117.199
                                            Apr 7, 2022 17:23:14.293694973 CEST58749756207.148.117.199192.168.2.3
                                            Apr 7, 2022 17:23:14.816061020 CEST58749756207.148.117.199192.168.2.3
                                            Apr 7, 2022 17:23:14.881441116 CEST49756587192.168.2.3207.148.117.199
                                            Apr 7, 2022 17:23:14.908955097 CEST49756587192.168.2.3207.148.117.199
                                            TimestampSource PortDest PortSource IPDest IP
                                            Apr 7, 2022 17:21:34.419188976 CEST4932753192.168.2.38.8.8.8
                                            Apr 7, 2022 17:21:35.039096117 CEST53493278.8.8.8192.168.2.3
                                            TimestampSource IPDest IPTrans IDOP CodeNameTypeClass
                                            Apr 7, 2022 17:21:34.419188976 CEST192.168.2.38.8.8.80xbb23Standard query (0)mail.safalaw.com.phA (IP address)IN (0x0001)
                                            TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClass
                                            Apr 7, 2022 17:21:35.039096117 CEST8.8.8.8192.168.2.30xbb23No error (0)mail.safalaw.com.ph207.148.117.199A (IP address)IN (0x0001)
                                            TimestampSource PortDest PortSource IPDest IPCommands
                                            Apr 7, 2022 17:21:35.700582981 CEST58749756207.148.117.199192.168.2.3220-s482.sgp9.mysecurecloudhost.com ESMTP Exim 4.95 #2 Thu, 07 Apr 2022 15:21:35 +0000
                                            220-We do not authorize the use of this system to transport unsolicited,
                                            220 and/or bulk e-mail.
                                            Apr 7, 2022 17:21:35.700885057 CEST49756587192.168.2.3207.148.117.199EHLO 688098
                                            Apr 7, 2022 17:21:35.946814060 CEST58749756207.148.117.199192.168.2.3250-s482.sgp9.mysecurecloudhost.com Hello 688098 [84.17.52.18]
                                            250-SIZE 52428800
                                            250-8BITMIME
                                            250-PIPELINING
                                            250-PIPE_CONNECT
                                            250-STARTTLS
                                            250 HELP
                                            Apr 7, 2022 17:21:35.952491999 CEST49756587192.168.2.3207.148.117.199STARTTLS
                                            Apr 7, 2022 17:21:36.198868990 CEST58749756207.148.117.199192.168.2.3220 TLS go ahead

                                            Click to jump to process

                                            Target ID:0
                                            Start time:17:21:09
                                            Start date:07/04/2022
                                            Path:C:\Users\user\Desktop\Proforma Inv.exe
                                            Wow64 process (32bit):true
                                            Commandline:"C:\Users\user\Desktop\Proforma Inv.exe"
                                            Imagebase:0x960000
                                            File size:444928 bytes
                                            MD5 hash:189AD2733BA3C8BAA0D9FB41E4223D92
                                            Has elevated privileges:true
                                            Has administrator privileges:true
                                            Programmed in:.Net C# or VB.NET
                                            Yara matches:
                                            • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000000.00000002.272478585.0000000003D09000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                            • Rule: JoeSecurity_AgentTesla_2, Description: Yara detected AgentTesla, Source: 00000000.00000002.272478585.0000000003D09000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                            Reputation:low

                                            Target ID:2
                                            Start time:17:21:19
                                            Start date:07/04/2022
                                            Path:C:\Users\user\Desktop\Proforma Inv.exe
                                            Wow64 process (32bit):true
                                            Commandline:{path}
                                            Imagebase:0x680000
                                            File size:444928 bytes
                                            MD5 hash:189AD2733BA3C8BAA0D9FB41E4223D92
                                            Has elevated privileges:true
                                            Has administrator privileges:true
                                            Programmed in:.Net C# or VB.NET
                                            Yara matches:
                                            • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000002.00000002.508474036.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                            • Rule: JoeSecurity_AgentTesla_2, Description: Yara detected AgentTesla, Source: 00000002.00000002.508474036.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                            • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000002.00000000.262797800.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                            • Rule: JoeSecurity_AgentTesla_2, Description: Yara detected AgentTesla, Source: 00000002.00000000.262797800.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                            • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000002.00000000.263643345.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                            • Rule: JoeSecurity_AgentTesla_2, Description: Yara detected AgentTesla, Source: 00000002.00000000.263643345.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                            • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000002.00000000.262428568.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                            • Rule: JoeSecurity_AgentTesla_2, Description: Yara detected AgentTesla, Source: 00000002.00000000.262428568.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                            • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000002.00000000.263201971.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                            • Rule: JoeSecurity_AgentTesla_2, Description: Yara detected AgentTesla, Source: 00000002.00000000.263201971.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                            • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000002.00000002.510096392.0000000002AC1000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                            • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000002.00000002.510096392.0000000002AC1000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                            Reputation:low

                                            No disassembly