Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
Fattura Proforma (C) n 31.exe

Overview

General Information

Sample Name:Fattura Proforma (C) n 31.exe
Analysis ID:632619
MD5:f9f9551391f15378d87182b087a0984e
SHA1:c81a7c0b39cd213adb431813114cecd856190411
SHA256:6c2b7249173f7259dad5915a88a0b571644fed8140cd0268a88395e2308a44e4
Tags:agentteslaexe
Infos:

Detection

AgentTesla
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Multi AV Scanner detection for submitted file
Malicious sample detected (through community Yara rule)
Yara detected AgentTesla
Yara detected AntiVM3
Tries to steal Mail credentials (via file / registry access)
Tries to harvest and steal ftp login credentials
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Machine Learning detection for sample
.NET source code contains potential unpacker
Injects a PE file into a foreign processes
Yara detected Generic Downloader
.NET source code contains very large array initializations
Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)
Tries to harvest and steal browser information (history, passwords, etc)
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Uses 32bit PE files
Queries the volume information (name, serial number etc) of a device
Yara signature match
Antivirus or Machine Learning detection for unpacked file
May sleep (evasive loops) to hinder dynamic analysis
Uses code obfuscation techniques (call, push, ret)
Detected potential crypto function
Yara detected Credential Stealer
Contains long sleeps (>= 3 min)
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Sample file is different than original file name gathered from version info
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Creates a process in suspended mode (likely to inject code)
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)

Classification

  • System is w10x64
  • cleanup
{"Exfil Mode": "SMTP", "Username": "Werner.Wagner@celoric.com", "Password": "LP#qETg8", "Host": "smtp.celoric.com"}
SourceRuleDescriptionAuthorStrings
00000007.00000000.469102375.0000000000402000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
    00000007.00000000.469102375.0000000000402000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_AgentTesla_2Yara detected AgentTeslaJoe Security
      00000007.00000000.469793315.0000000000402000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
        00000007.00000000.469793315.0000000000402000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_AgentTesla_2Yara detected AgentTeslaJoe Security
          00000001.00000002.474516321.0000000003EC1000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
            Click to see the 19 entries
            SourceRuleDescriptionAuthorStrings
            1.2.Fattura Proforma (C) n 31.exe.4038208.3.raw.unpackJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
              1.2.Fattura Proforma (C) n 31.exe.4038208.3.raw.unpackJoeSecurity_AgentTesla_2Yara detected AgentTeslaJoe Security
                1.2.Fattura Proforma (C) n 31.exe.4038208.3.raw.unpackJoeSecurity_GenericDownloader_1Yara detected Generic DownloaderJoe Security
                  1.2.Fattura Proforma (C) n 31.exe.4038208.3.raw.unpackMALWARE_Win_AgentTeslaV3AgentTeslaV3 infostealer payloadditekSHen
                  • 0x30c22:$s1: get_kbok
                  • 0x31565:$s2: get_CHoo
                  • 0x3219f:$s3: set_passwordIsSet
                  • 0x30a26:$s4: get_enableLog
                  • 0x3509a:$s8: torbrowser
                  • 0x33a76:$s10: logins
                  • 0x333ee:$s11: credential
                  • 0x2fe47:$g1: get_Clipboard
                  • 0x2fe55:$g2: get_Keyboard
                  • 0x2fe62:$g3: get_Password
                  • 0x31404:$g4: get_CtrlKeyDown
                  • 0x31414:$g5: get_ShiftKeyDown
                  • 0x31425:$g6: get_AltKeyDown
                  1.2.Fattura Proforma (C) n 31.exe.40023e8.1.unpackJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
                    Click to see the 49 entries
                    No Sigma rule has matched
                    No Snort rule has matched

                    Click to jump to signature section

                    Show All Signature Results

                    AV Detection

                    barindex
                    Source: 1.2.Fattura Proforma (C) n 31.exe.4038208.3.unpackMalware Configuration Extractor: Agenttesla {"Exfil Mode": "SMTP", "Username": "Werner.Wagner@celoric.com", "Password": "LP#qETg8", "Host": "smtp.celoric.com"}
                    Source: Fattura Proforma (C) n 31.exeVirustotal: Detection: 24%Perma Link
                    Source: Fattura Proforma (C) n 31.exeReversingLabs: Detection: 19%
                    Source: Fattura Proforma (C) n 31.exeJoe Sandbox ML: detected
                    Source: 7.0.Fattura Proforma (C) n 31.exe.400000.8.unpackAvira: Label: TR/Spy.Gen8
                    Source: 7.0.Fattura Proforma (C) n 31.exe.400000.6.unpackAvira: Label: TR/Spy.Gen8
                    Source: 7.2.Fattura Proforma (C) n 31.exe.400000.0.unpackAvira: Label: TR/Spy.Gen8
                    Source: 7.0.Fattura Proforma (C) n 31.exe.400000.12.unpackAvira: Label: TR/Spy.Gen8
                    Source: 7.0.Fattura Proforma (C) n 31.exe.400000.10.unpackAvira: Label: TR/Spy.Gen8
                    Source: 7.0.Fattura Proforma (C) n 31.exe.400000.4.unpackAvira: Label: TR/Spy.Gen8
                    Source: Fattura Proforma (C) n 31.exeStatic PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE
                    Source: Fattura Proforma (C) n 31.exeStatic PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT

                    Networking

                    barindex
                    Source: Yara matchFile source: 1.2.Fattura Proforma (C) n 31.exe.4038208.3.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 7.0.Fattura Proforma (C) n 31.exe.400000.6.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 7.0.Fattura Proforma (C) n 31.exe.400000.12.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 7.0.Fattura Proforma (C) n 31.exe.400000.8.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 7.0.Fattura Proforma (C) n 31.exe.400000.4.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 7.2.Fattura Proforma (C) n 31.exe.400000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 7.0.Fattura Proforma (C) n 31.exe.400000.10.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 1.2.Fattura Proforma (C) n 31.exe.40023e8.1.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 1.2.Fattura Proforma (C) n 31.exe.3f893c8.2.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 1.2.Fattura Proforma (C) n 31.exe.41e91b0.5.raw.unpack, type: UNPACKEDPE
                    Source: Fattura Proforma (C) n 31.exe, 00000007.00000002.692745771.00000000027B1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://127.0.0.1:HTTP/1.1
                    Source: Fattura Proforma (C) n 31.exe, 00000007.00000002.692745771.00000000027B1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://DynDns.comDynDNS
                    Source: Fattura Proforma (C) n 31.exe, 00000001.00000002.478450021.0000000007012000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://fontfabrik.com
                    Source: Fattura Proforma (C) n 31.exe, 00000007.00000002.694265183.0000000002B0D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://pjLE02r21MVNC.com
                    Source: Fattura Proforma (C) n 31.exe, 00000007.00000002.692745771.00000000027B1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://rzfHpn.com
                    Source: Fattura Proforma (C) n 31.exe, 00000007.00000002.694282802.0000000002B13000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://smtp.celoric.com
                    Source: Fattura Proforma (C) n 31.exe, 00000007.00000002.694282802.0000000002B13000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://us2.smtp.mailhostbox.com
                    Source: Fattura Proforma (C) n 31.exe, 00000001.00000002.478450021.0000000007012000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0
                    Source: Fattura Proforma (C) n 31.exe, 00000001.00000003.433392009.0000000005E05000.00000004.00000800.00020000.00000000.sdmp, Fattura Proforma (C) n 31.exe, 00000001.00000003.435190604.0000000005E0D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.carterandcone.com
                    Source: Fattura Proforma (C) n 31.exe, 00000001.00000003.433392009.0000000005E05000.00000004.00000800.00020000.00000000.sdmp, Fattura Proforma (C) n 31.exe, 00000001.00000003.435302266.0000000005E0E000.00000004.00000800.00020000.00000000.sdmp, Fattura Proforma (C) n 31.exe, 00000001.00000003.435254801.0000000005E0E000.00000004.00000800.00020000.00000000.sdmp, Fattura Proforma (C) n 31.exe, 00000001.00000003.435190604.0000000005E0D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.carterandcone.comcerE
                    Source: Fattura Proforma (C) n 31.exe, 00000001.00000003.433392009.0000000005E05000.00000004.00000800.00020000.00000000.sdmp, Fattura Proforma (C) n 31.exe, 00000001.00000003.435302266.0000000005E0E000.00000004.00000800.00020000.00000000.sdmp, Fattura Proforma (C) n 31.exe, 00000001.00000003.435254801.0000000005E0E000.00000004.00000800.00020000.00000000.sdmp, Fattura Proforma (C) n 31.exe, 00000001.00000003.435190604.0000000005E0D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.carterandcone.comead_
                    Source: Fattura Proforma (C) n 31.exe, 00000001.00000002.478450021.0000000007012000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.carterandcone.coml
                    Source: Fattura Proforma (C) n 31.exe, 00000001.00000003.433392009.0000000005E05000.00000004.00000800.00020000.00000000.sdmp, Fattura Proforma (C) n 31.exe, 00000001.00000003.435190604.0000000005E0D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.carterandcone.comwity
                    Source: Fattura Proforma (C) n 31.exe, 00000001.00000002.478450021.0000000007012000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com
                    Source: Fattura Proforma (C) n 31.exe, 00000001.00000002.478450021.0000000007012000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers
                    Source: Fattura Proforma (C) n 31.exe, 00000001.00000002.478450021.0000000007012000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/?
                    Source: Fattura Proforma (C) n 31.exe, 00000001.00000002.478450021.0000000007012000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/cabarga.htmlN
                    Source: Fattura Proforma (C) n 31.exe, 00000001.00000002.478450021.0000000007012000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/frere-jones.html
                    Source: Fattura Proforma (C) n 31.exe, 00000001.00000002.478450021.0000000007012000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers8
                    Source: Fattura Proforma (C) n 31.exe, 00000001.00000002.478450021.0000000007012000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers?
                    Source: Fattura Proforma (C) n 31.exe, 00000001.00000002.478450021.0000000007012000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designersG
                    Source: Fattura Proforma (C) n 31.exe, 00000001.00000002.478450021.0000000007012000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fonts.com
                    Source: Fattura Proforma (C) n 31.exe, 00000001.00000002.478450021.0000000007012000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn
                    Source: Fattura Proforma (C) n 31.exe, 00000001.00000002.478450021.0000000007012000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn/bThe
                    Source: Fattura Proforma (C) n 31.exe, 00000001.00000002.478450021.0000000007012000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn/cThe
                    Source: Fattura Proforma (C) n 31.exe, 00000001.00000003.430766280.0000000005E08000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cnT
                    Source: Fattura Proforma (C) n 31.exe, 00000001.00000002.478450021.0000000007012000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.galapagosdesign.com/DPlease
                    Source: Fattura Proforma (C) n 31.exe, 00000001.00000002.478450021.0000000007012000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.galapagosdesign.com/staff/dennis.htm
                    Source: Fattura Proforma (C) n 31.exe, 00000001.00000002.478450021.0000000007012000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.goodfont.co.kr
                    Source: Fattura Proforma (C) n 31.exe, 00000001.00000002.478450021.0000000007012000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/
                    Source: Fattura Proforma (C) n 31.exe, 00000001.00000002.478450021.0000000007012000.00000004.00000800.00020000.00000000.sdmp, Fattura Proforma (C) n 31.exe, 00000001.00000003.427581616.0000000005E1B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sajatypeworks.com
                    Source: Fattura Proforma (C) n 31.exe, 00000001.00000003.427581616.0000000005E1B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sajatypeworks.com2
                    Source: Fattura Proforma (C) n 31.exe, 00000001.00000003.427581616.0000000005E1B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sajatypeworks.coma
                    Source: Fattura Proforma (C) n 31.exe, 00000001.00000002.478450021.0000000007012000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sakkal.com
                    Source: Fattura Proforma (C) n 31.exe, 00000001.00000002.478450021.0000000007012000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sandoll.co.kr
                    Source: Fattura Proforma (C) n 31.exe, 00000001.00000002.478450021.0000000007012000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.tiro.com
                    Source: Fattura Proforma (C) n 31.exe, 00000001.00000003.430955587.0000000005E08000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.tiro.com_
                    Source: Fattura Proforma (C) n 31.exe, 00000001.00000003.430955587.0000000005E08000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.tiro.comf
                    Source: Fattura Proforma (C) n 31.exe, 00000001.00000002.478450021.0000000007012000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.typography.netD
                    Source: Fattura Proforma (C) n 31.exe, 00000001.00000002.478450021.0000000007012000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.urwpp.deDPlease
                    Source: Fattura Proforma (C) n 31.exe, 00000001.00000002.478450021.0000000007012000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.zhongyicts.com.cn
                    Source: Fattura Proforma (C) n 31.exe, 00000007.00000002.692745771.00000000027B1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.ipify.org%$
                    Source: Fattura Proforma (C) n 31.exe, 00000007.00000002.692745771.00000000027B1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.ipify.org%GETMozilla/5.0
                    Source: Fattura Proforma (C) n 31.exe, 00000001.00000002.474516321.0000000003EC1000.00000004.00000800.00020000.00000000.sdmp, Fattura Proforma (C) n 31.exe, 00000007.00000000.469102375.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Fattura Proforma (C) n 31.exe, 00000007.00000000.467636633.0000000000402000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip
                    Source: Fattura Proforma (C) n 31.exe, 00000007.00000002.692745771.00000000027B1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip%tordir%%ha
                    Source: unknownDNS traffic detected: queries for: smtp.celoric.com

                    System Summary

                    barindex
                    Source: 1.2.Fattura Proforma (C) n 31.exe.4038208.3.raw.unpack, type: UNPACKEDPEMatched rule: AgentTeslaV3 infostealer payload Author: ditekSHen
                    Source: 1.2.Fattura Proforma (C) n 31.exe.40023e8.1.unpack, type: UNPACKEDPEMatched rule: AgentTeslaV3 infostealer payload Author: ditekSHen
                    Source: 1.2.Fattura Proforma (C) n 31.exe.4038208.3.unpack, type: UNPACKEDPEMatched rule: AgentTeslaV3 infostealer payload Author: ditekSHen
                    Source: 7.0.Fattura Proforma (C) n 31.exe.400000.6.unpack, type: UNPACKEDPEMatched rule: AgentTeslaV3 infostealer payload Author: ditekSHen
                    Source: 7.0.Fattura Proforma (C) n 31.exe.400000.12.unpack, type: UNPACKEDPEMatched rule: AgentTeslaV3 infostealer payload Author: ditekSHen
                    Source: 7.0.Fattura Proforma (C) n 31.exe.400000.8.unpack, type: UNPACKEDPEMatched rule: AgentTeslaV3 infostealer payload Author: ditekSHen
                    Source: 7.0.Fattura Proforma (C) n 31.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: AgentTeslaV3 infostealer payload Author: ditekSHen
                    Source: 7.2.Fattura Proforma (C) n 31.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: AgentTeslaV3 infostealer payload Author: ditekSHen
                    Source: 7.0.Fattura Proforma (C) n 31.exe.400000.10.unpack, type: UNPACKEDPEMatched rule: AgentTeslaV3 infostealer payload Author: ditekSHen
                    Source: 1.2.Fattura Proforma (C) n 31.exe.7b00000.10.unpack, type: UNPACKEDPEMatched rule: Detects zgRAT Author: ditekSHen
                    Source: 1.2.Fattura Proforma (C) n 31.exe.41e91b0.5.unpack, type: UNPACKEDPEMatched rule: Detects zgRAT Author: ditekSHen
                    Source: 1.2.Fattura Proforma (C) n 31.exe.40023e8.1.raw.unpack, type: UNPACKEDPEMatched rule: AgentTeslaV3 infostealer payload Author: ditekSHen
                    Source: 1.2.Fattura Proforma (C) n 31.exe.3f893c8.2.raw.unpack, type: UNPACKEDPEMatched rule: AgentTeslaV3 infostealer payload Author: ditekSHen
                    Source: 1.2.Fattura Proforma (C) n 31.exe.7b00000.10.raw.unpack, type: UNPACKEDPEMatched rule: Detects zgRAT Author: ditekSHen
                    Source: 1.2.Fattura Proforma (C) n 31.exe.40a86f0.4.raw.unpack, type: UNPACKEDPEMatched rule: AgentTeslaV3 infostealer payload Author: ditekSHen
                    Source: 1.2.Fattura Proforma (C) n 31.exe.40a86f0.4.raw.unpack, type: UNPACKEDPEMatched rule: Detects zgRAT Author: ditekSHen
                    Source: 1.2.Fattura Proforma (C) n 31.exe.41e91b0.5.raw.unpack, type: UNPACKEDPEMatched rule: AgentTeslaV3 infostealer payload Author: ditekSHen
                    Source: 1.2.Fattura Proforma (C) n 31.exe.41e91b0.5.raw.unpack, type: UNPACKEDPEMatched rule: Detects zgRAT Author: ditekSHen
                    Source: 00000001.00000002.479896370.0000000007B00000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects zgRAT Author: ditekSHen
                    Source: 00000007.00000002.692745771.00000000027B1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: AgentTeslaV3 infostealer payload Author: ditekSHen
                    Source: Process Memory Space: Fattura Proforma (C) n 31.exe PID: 6268, type: MEMORYSTRMatched rule: AgentTeslaV3 infostealer payload Author: ditekSHen
                    Source: 7.0.Fattura Proforma (C) n 31.exe.400000.8.unpack, u003cPrivateImplementationDetailsu003eu007bCC6CA229u002d787Cu002d4D12u002dA4D5u002d4C8E51A2FB29u007d/u0032BD7D317u002d5A30u002d4872u002d8336u002d62468305F018.csLarge array initialization: .cctor: array initializer size 11954
                    Source: 7.0.Fattura Proforma (C) n 31.exe.400000.6.unpack, u003cPrivateImplementationDetailsu003eu007bCC6CA229u002d787Cu002d4D12u002dA4D5u002d4C8E51A2FB29u007d/u0032BD7D317u002d5A30u002d4872u002d8336u002d62468305F018.csLarge array initialization: .cctor: array initializer size 11954
                    Source: 7.2.Fattura Proforma (C) n 31.exe.400000.0.unpack, u003cPrivateImplementationDetailsu003eu007bCC6CA229u002d787Cu002d4D12u002dA4D5u002d4C8E51A2FB29u007d/u0032BD7D317u002d5A30u002d4872u002d8336u002d62468305F018.csLarge array initialization: .cctor: array initializer size 11954
                    Source: 7.0.Fattura Proforma (C) n 31.exe.400000.12.unpack, u003cPrivateImplementationDetailsu003eu007bCC6CA229u002d787Cu002d4D12u002dA4D5u002d4C8E51A2FB29u007d/u0032BD7D317u002d5A30u002d4872u002d8336u002d62468305F018.csLarge array initialization: .cctor: array initializer size 11954
                    Source: Fattura Proforma (C) n 31.exeStatic PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE
                    Source: 1.2.Fattura Proforma (C) n 31.exe.4038208.3.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload
                    Source: 1.2.Fattura Proforma (C) n 31.exe.40023e8.1.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload
                    Source: 1.2.Fattura Proforma (C) n 31.exe.4038208.3.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload
                    Source: 7.0.Fattura Proforma (C) n 31.exe.400000.6.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload
                    Source: 7.0.Fattura Proforma (C) n 31.exe.400000.12.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload
                    Source: 7.0.Fattura Proforma (C) n 31.exe.400000.8.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload
                    Source: 7.0.Fattura Proforma (C) n 31.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload
                    Source: 7.2.Fattura Proforma (C) n 31.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload
                    Source: 7.0.Fattura Proforma (C) n 31.exe.400000.10.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload
                    Source: 1.2.Fattura Proforma (C) n 31.exe.7b00000.10.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_zgRAT author = ditekSHen, description = Detects zgRAT
                    Source: 1.2.Fattura Proforma (C) n 31.exe.41e91b0.5.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_zgRAT author = ditekSHen, description = Detects zgRAT
                    Source: 1.2.Fattura Proforma (C) n 31.exe.40023e8.1.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload
                    Source: 1.2.Fattura Proforma (C) n 31.exe.3f893c8.2.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload
                    Source: 1.2.Fattura Proforma (C) n 31.exe.7b00000.10.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_zgRAT author = ditekSHen, description = Detects zgRAT
                    Source: 1.2.Fattura Proforma (C) n 31.exe.40a86f0.4.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload
                    Source: 1.2.Fattura Proforma (C) n 31.exe.40a86f0.4.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_zgRAT author = ditekSHen, description = Detects zgRAT
                    Source: 1.2.Fattura Proforma (C) n 31.exe.41e91b0.5.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload
                    Source: 1.2.Fattura Proforma (C) n 31.exe.41e91b0.5.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_zgRAT author = ditekSHen, description = Detects zgRAT
                    Source: 00000001.00000002.479896370.0000000007B00000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_zgRAT author = ditekSHen, description = Detects zgRAT
                    Source: 00000007.00000002.692745771.00000000027B1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload
                    Source: Process Memory Space: Fattura Proforma (C) n 31.exe PID: 6268, type: MEMORYSTRMatched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload
                    Source: C:\Users\user\Desktop\Fattura Proforma (C) n 31.exeCode function: 1_2_053974B81_2_053974B8
                    Source: C:\Users\user\Desktop\Fattura Proforma (C) n 31.exeCode function: 1_2_053974B21_2_053974B2
                    Source: C:\Users\user\Desktop\Fattura Proforma (C) n 31.exeCode function: 1_2_07608C581_2_07608C58
                    Source: C:\Users\user\Desktop\Fattura Proforma (C) n 31.exeCode function: 1_2_076052A81_2_076052A8
                    Source: C:\Users\user\Desktop\Fattura Proforma (C) n 31.exeCode function: 1_2_076000401_2_07600040
                    Source: C:\Users\user\Desktop\Fattura Proforma (C) n 31.exeCode function: 1_2_07608C481_2_07608C48
                    Source: C:\Users\user\Desktop\Fattura Proforma (C) n 31.exeCode function: 7_2_00BDF4987_2_00BDF498
                    Source: C:\Users\user\Desktop\Fattura Proforma (C) n 31.exeCode function: 7_2_00BD2D507_2_00BD2D50
                    Source: C:\Users\user\Desktop\Fattura Proforma (C) n 31.exeCode function: 7_2_00BD26187_2_00BD2618
                    Source: C:\Users\user\Desktop\Fattura Proforma (C) n 31.exeCode function: 7_2_00BD1FE07_2_00BD1FE0
                    Source: C:\Users\user\Desktop\Fattura Proforma (C) n 31.exeCode function: 7_2_00BE38907_2_00BE3890
                    Source: C:\Users\user\Desktop\Fattura Proforma (C) n 31.exeCode function: 7_2_00BE00407_2_00BE0040
                    Source: C:\Users\user\Desktop\Fattura Proforma (C) n 31.exeCode function: 7_2_00BE42FB7_2_00BE42FB
                    Source: C:\Users\user\Desktop\Fattura Proforma (C) n 31.exeCode function: 7_2_00BEE6407_2_00BEE640
                    Source: C:\Users\user\Desktop\Fattura Proforma (C) n 31.exeCode function: 7_2_00BE97907_2_00BE9790
                    Source: C:\Users\user\Desktop\Fattura Proforma (C) n 31.exeCode function: 7_2_00BEA9587_2_00BEA958
                    Source: C:\Users\user\Desktop\Fattura Proforma (C) n 31.exeCode function: 7_2_00C800407_2_00C80040
                    Source: C:\Users\user\Desktop\Fattura Proforma (C) n 31.exeCode function: 7_2_00C830387_2_00C83038
                    Source: C:\Users\user\Desktop\Fattura Proforma (C) n 31.exeCode function: 7_2_00C819D07_2_00C819D0
                    Source: C:\Users\user\Desktop\Fattura Proforma (C) n 31.exeCode function: 7_2_00C83DA67_2_00C83DA6
                    Source: C:\Users\user\Desktop\Fattura Proforma (C) n 31.exeCode function: 7_2_00C871B07_2_00C871B0
                    Source: C:\Users\user\Desktop\Fattura Proforma (C) n 31.exeCode function: 7_2_00C837687_2_00C83768
                    Source: C:\Users\user\Desktop\Fattura Proforma (C) n 31.exeCode function: 7_2_00C800067_2_00C80006
                    Source: C:\Users\user\Desktop\Fattura Proforma (C) n 31.exeCode function: 7_2_00C8B5C87_2_00C8B5C8
                    Source: C:\Users\user\Desktop\Fattura Proforma (C) n 31.exeCode function: 7_2_00C8E9E27_2_00C8E9E2
                    Source: Fattura Proforma (C) n 31.exe, 00000001.00000002.474516321.0000000003EC1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameoaMacbwxvcPdzawhAjgkvqfYYd.exe4 vs Fattura Proforma (C) n 31.exe
                    Source: Fattura Proforma (C) n 31.exe, 00000001.00000002.473781350.0000000002F02000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameoaMacbwxvcPdzawhAjgkvqfYYd.exe4 vs Fattura Proforma (C) n 31.exe
                    Source: Fattura Proforma (C) n 31.exe, 00000001.00000002.479896370.0000000007B00000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameIVectorView.dllN vs Fattura Proforma (C) n 31.exe
                    Source: Fattura Proforma (C) n 31.exe, 00000001.00000000.423750426.0000000000ACE000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameRemotingXmlConfigFileD.exe> vs Fattura Proforma (C) n 31.exe
                    Source: Fattura Proforma (C) n 31.exe, 00000001.00000002.478893788.00000000075F0000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameCerbera.dll" vs Fattura Proforma (C) n 31.exe
                    Source: Fattura Proforma (C) n 31.exe, 00000005.00000000.463493689.000000000050E000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameRemotingXmlConfigFileD.exe> vs Fattura Proforma (C) n 31.exe
                    Source: Fattura Proforma (C) n 31.exe, 00000007.00000000.466657133.000000000056E000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameRemotingXmlConfigFileD.exe> vs Fattura Proforma (C) n 31.exe
                    Source: Fattura Proforma (C) n 31.exe, 00000007.00000000.469102375.0000000000402000.00000040.00000400.00020000.00000000.sdmpBinary or memory string: OriginalFilenameoaMacbwxvcPdzawhAjgkvqfYYd.exe4 vs Fattura Proforma (C) n 31.exe
                    Source: Fattura Proforma (C) n 31.exeBinary or memory string: OriginalFilenameRemotingXmlConfigFileD.exe> vs Fattura Proforma (C) n 31.exe
                    Source: Fattura Proforma (C) n 31.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                    Source: Fattura Proforma (C) n 31.exeVirustotal: Detection: 24%
                    Source: Fattura Proforma (C) n 31.exeReversingLabs: Detection: 19%
                    Source: C:\Users\user\Desktop\Fattura Proforma (C) n 31.exeFile read: C:\Users\user\Desktop\Fattura Proforma (C) n 31.exe:Zone.IdentifierJump to behavior
                    Source: Fattura Proforma (C) n 31.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                    Source: C:\Users\user\Desktop\Fattura Proforma (C) n 31.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                    Source: unknownProcess created: C:\Users\user\Desktop\Fattura Proforma (C) n 31.exe "C:\Users\user\Desktop\Fattura Proforma (C) n 31.exe"
                    Source: C:\Users\user\Desktop\Fattura Proforma (C) n 31.exeProcess created: C:\Users\user\Desktop\Fattura Proforma (C) n 31.exe C:\Users\user\Desktop\Fattura Proforma (C) n 31.exe
                    Source: C:\Users\user\Desktop\Fattura Proforma (C) n 31.exeProcess created: C:\Users\user\Desktop\Fattura Proforma (C) n 31.exe C:\Users\user\Desktop\Fattura Proforma (C) n 31.exe
                    Source: C:\Users\user\Desktop\Fattura Proforma (C) n 31.exeProcess created: C:\Users\user\Desktop\Fattura Proforma (C) n 31.exe C:\Users\user\Desktop\Fattura Proforma (C) n 31.exeJump to behavior
                    Source: C:\Users\user\Desktop\Fattura Proforma (C) n 31.exeProcess created: C:\Users\user\Desktop\Fattura Proforma (C) n 31.exe C:\Users\user\Desktop\Fattura Proforma (C) n 31.exeJump to behavior
                    Source: C:\Users\user\Desktop\Fattura Proforma (C) n 31.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{172BDDF8-CEEA-11D1-8B05-00600806D9B6}\InProcServer32Jump to behavior
                    Source: C:\Users\user\Desktop\Fattura Proforma (C) n 31.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                    Source: C:\Users\user\Desktop\Fattura Proforma (C) n 31.exeFile created: C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\Fattura Proforma (C) n 31.exe.logJump to behavior
                    Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@5/1@2/0
                    Source: Fattura Proforma (C) n 31.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 49.80%
                    Source: C:\Users\user\Desktop\Fattura Proforma (C) n 31.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dllJump to behavior
                    Source: C:\Users\user\Desktop\Fattura Proforma (C) n 31.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dllJump to behavior
                    Source: C:\Users\user\Desktop\Fattura Proforma (C) n 31.exeMutant created: \Sessions\1\BaseNamedObjects\TfRqYHFSAGlCCkuDn
                    Source: 7.0.Fattura Proforma (C) n 31.exe.400000.8.unpack, A/b2.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
                    Source: 7.0.Fattura Proforma (C) n 31.exe.400000.8.unpack, A/b2.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
                    Source: 7.0.Fattura Proforma (C) n 31.exe.400000.6.unpack, A/b2.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
                    Source: 7.0.Fattura Proforma (C) n 31.exe.400000.6.unpack, A/b2.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
                    Source: 7.2.Fattura Proforma (C) n 31.exe.400000.0.unpack, A/b2.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
                    Source: 7.2.Fattura Proforma (C) n 31.exe.400000.0.unpack, A/b2.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
                    Source: C:\Users\user\Desktop\Fattura Proforma (C) n 31.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dllJump to behavior
                    Source: Fattura Proforma (C) n 31.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
                    Source: Fattura Proforma (C) n 31.exeStatic PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT

                    Data Obfuscation

                    barindex
                    Source: Fattura Proforma (C) n 31.exe, Form1.cs.Net Code: BackView System.Reflection.Assembly System.AppDomain::Load(System.Byte[])
                    Source: 1.0.Fattura Proforma (C) n 31.exe.9e0000.0.unpack, Form1.cs.Net Code: BackView System.Reflection.Assembly System.AppDomain::Load(System.Byte[])
                    Source: 1.2.Fattura Proforma (C) n 31.exe.9e0000.0.unpack, Form1.cs.Net Code: BackView System.Reflection.Assembly System.AppDomain::Load(System.Byte[])
                    Source: 5.0.Fattura Proforma (C) n 31.exe.420000.3.unpack, Form1.cs.Net Code: BackView System.Reflection.Assembly System.AppDomain::Load(System.Byte[])
                    Source: 5.2.Fattura Proforma (C) n 31.exe.420000.0.unpack, Form1.cs.Net Code: BackView System.Reflection.Assembly System.AppDomain::Load(System.Byte[])
                    Source: 5.0.Fattura Proforma (C) n 31.exe.420000.2.unpack, Form1.cs.Net Code: BackView System.Reflection.Assembly System.AppDomain::Load(System.Byte[])
                    Source: 5.0.Fattura Proforma (C) n 31.exe.420000.1.unpack, Form1.cs.Net Code: BackView System.Reflection.Assembly System.AppDomain::Load(System.Byte[])
                    Source: 5.0.Fattura Proforma (C) n 31.exe.420000.0.unpack, Form1.cs.Net Code: BackView System.Reflection.Assembly System.AppDomain::Load(System.Byte[])
                    Source: 7.0.Fattura Proforma (C) n 31.exe.480000.7.unpack, Form1.cs.Net Code: BackView System.Reflection.Assembly System.AppDomain::Load(System.Byte[])
                    Source: 7.0.Fattura Proforma (C) n 31.exe.480000.0.unpack, Form1.cs.Net Code: BackView System.Reflection.Assembly System.AppDomain::Load(System.Byte[])
                    Source: 7.0.Fattura Proforma (C) n 31.exe.480000.3.unpack, Form1.cs.Net Code: BackView System.Reflection.Assembly System.AppDomain::Load(System.Byte[])
                    Source: 7.0.Fattura Proforma (C) n 31.exe.480000.9.unpack, Form1.cs.Net Code: BackView System.Reflection.Assembly System.AppDomain::Load(System.Byte[])
                    Source: 7.0.Fattura Proforma (C) n 31.exe.480000.1.unpack, Form1.cs.Net Code: BackView System.Reflection.Assembly System.AppDomain::Load(System.Byte[])
                    Source: C:\Users\user\Desktop\Fattura Proforma (C) n 31.exeCode function: 1_2_0539A1E8 push E801005Eh; retf 1_2_0539A201
                    Source: C:\Users\user\Desktop\Fattura Proforma (C) n 31.exeCode function: 7_2_00BD7A37 push edi; retn 0000h7_2_00BD7A39
                    Source: C:\Users\user\Desktop\Fattura Proforma (C) n 31.exeCode function: 7_2_00D4E28B push eax; ret 7_2_00D4E349
                    Source: C:\Users\user\Desktop\Fattura Proforma (C) n 31.exeCode function: 7_2_00D4D95C push eax; ret 7_2_00D4D95D
                    Source: initial sampleStatic PE information: section name: .text entropy: 7.90435959734
                    Source: C:\Users\user\Desktop\Fattura Proforma (C) n 31.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Fattura Proforma (C) n 31.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Fattura Proforma (C) n 31.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Fattura Proforma (C) n 31.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Fattura Proforma (C) n 31.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Fattura Proforma (C) n 31.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Fattura Proforma (C) n 31.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Fattura Proforma (C) n 31.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Fattura Proforma (C) n 31.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Fattura Proforma (C) n 31.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Fattura Proforma (C) n 31.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Fattura Proforma (C) n 31.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Fattura Proforma (C) n 31.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Fattura Proforma (C) n 31.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Fattura Proforma (C) n 31.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Fattura Proforma (C) n 31.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Fattura Proforma (C) n 31.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Fattura Proforma (C) n 31.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Fattura Proforma (C) n 31.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Fattura Proforma (C) n 31.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Fattura Proforma (C) n 31.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Fattura Proforma (C) n 31.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Fattura Proforma (C) n 31.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Fattura Proforma (C) n 31.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Fattura Proforma (C) n 31.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Fattura Proforma (C) n 31.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Fattura Proforma (C) n 31.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Fattura Proforma (C) n 31.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Fattura Proforma (C) n 31.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Fattura Proforma (C) n 31.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Fattura Proforma (C) n 31.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Fattura Proforma (C) n 31.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Fattura Proforma (C) n 31.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Fattura Proforma (C) n 31.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Fattura Proforma (C) n 31.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Fattura Proforma (C) n 31.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Fattura Proforma (C) n 31.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Fattura Proforma (C) n 31.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Fattura Proforma (C) n 31.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Fattura Proforma (C) n 31.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Fattura Proforma (C) n 31.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Fattura Proforma (C) n 31.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Fattura Proforma (C) n 31.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Fattura Proforma (C) n 31.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Fattura Proforma (C) n 31.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Fattura Proforma (C) n 31.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Fattura Proforma (C) n 31.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Fattura Proforma (C) n 31.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Fattura Proforma (C) n 31.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Fattura Proforma (C) n 31.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Fattura Proforma (C) n 31.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Fattura Proforma (C) n 31.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Fattura Proforma (C) n 31.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Fattura Proforma (C) n 31.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Fattura Proforma (C) n 31.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Fattura Proforma (C) n 31.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Fattura Proforma (C) n 31.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Fattura Proforma (C) n 31.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Fattura Proforma (C) n 31.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Fattura Proforma (C) n 31.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Fattura Proforma (C) n 31.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Fattura Proforma (C) n 31.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Fattura Proforma (C) n 31.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Fattura Proforma (C) n 31.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Fattura Proforma (C) n 31.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Fattura Proforma (C) n 31.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Fattura Proforma (C) n 31.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Fattura Proforma (C) n 31.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Fattura Proforma (C) n 31.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Fattura Proforma (C) n 31.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Fattura Proforma (C) n 31.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Fattura Proforma (C) n 31.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Fattura Proforma (C) n 31.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Fattura Proforma (C) n 31.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Fattura Proforma (C) n 31.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Fattura Proforma (C) n 31.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Fattura Proforma (C) n 31.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Fattura Proforma (C) n 31.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Fattura Proforma (C) n 31.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Fattura Proforma (C) n 31.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Fattura Proforma (C) n 31.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Fattura Proforma (C) n 31.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Fattura Proforma (C) n 31.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Fattura Proforma (C) n 31.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Fattura Proforma (C) n 31.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

                    Malware Analysis System Evasion

                    barindex
                    Source: Yara matchFile source: 00000001.00000002.473781350.0000000002F02000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: Fattura Proforma (C) n 31.exe PID: 6892, type: MEMORYSTR
                    Source: Fattura Proforma (C) n 31.exe, 00000001.00000002.473781350.0000000002F02000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: SBIEDLL.DLL
                    Source: Fattura Proforma (C) n 31.exe, 00000001.00000002.473781350.0000000002F02000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: KERNEL32.DLL.WINE_GET_UNIX_FILE_NAME
                    Source: C:\Users\user\Desktop\Fattura Proforma (C) n 31.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_NetworkAdapterConfiguration
                    Source: C:\Users\user\Desktop\Fattura Proforma (C) n 31.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
                    Source: C:\Users\user\Desktop\Fattura Proforma (C) n 31.exe TID: 6896Thread sleep time: -43731s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\Fattura Proforma (C) n 31.exe TID: 6972Thread sleep time: -922337203685477s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\Fattura Proforma (C) n 31.exe TID: 6292Thread sleep count: 48 > 30Jump to behavior
                    Source: C:\Users\user\Desktop\Fattura Proforma (C) n 31.exe TID: 6292Thread sleep time: -44272185776902896s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\Fattura Proforma (C) n 31.exe TID: 6492Thread sleep count: 2186 > 30Jump to behavior
                    Source: C:\Users\user\Desktop\Fattura Proforma (C) n 31.exe TID: 6492Thread sleep count: 7647 > 30Jump to behavior
                    Source: C:\Users\user\Desktop\Fattura Proforma (C) n 31.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Users\user\Desktop\Fattura Proforma (C) n 31.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Users\user\Desktop\Fattura Proforma (C) n 31.exeWindow / User API: threadDelayed 2186Jump to behavior
                    Source: C:\Users\user\Desktop\Fattura Proforma (C) n 31.exeWindow / User API: threadDelayed 7647Jump to behavior
                    Source: C:\Users\user\Desktop\Fattura Proforma (C) n 31.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                    Source: C:\Users\user\Desktop\Fattura Proforma (C) n 31.exeProcess information queried: ProcessInformationJump to behavior
                    Source: C:\Users\user\Desktop\Fattura Proforma (C) n 31.exeThread delayed: delay time: 43731Jump to behavior
                    Source: C:\Users\user\Desktop\Fattura Proforma (C) n 31.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Users\user\Desktop\Fattura Proforma (C) n 31.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: Fattura Proforma (C) n 31.exe, 00000001.00000002.473781350.0000000002F02000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: InstallPathJC:\PROGRAM FILES\VMWARE\VMWARE TOOLS\
                    Source: Fattura Proforma (C) n 31.exe, 00000001.00000002.473781350.0000000002F02000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: vmware
                    Source: Fattura Proforma (C) n 31.exe, 00000001.00000002.473781350.0000000002F02000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: VMware SVGA II
                    Source: Fattura Proforma (C) n 31.exe, 00000001.00000002.473781350.0000000002F02000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: VMWAREDSOFTWARE\VMware, Inc.\VMware Tools
                    Source: C:\Users\user\Desktop\Fattura Proforma (C) n 31.exeProcess token adjusted: DebugJump to behavior
                    Source: C:\Users\user\Desktop\Fattura Proforma (C) n 31.exeProcess token adjusted: DebugJump to behavior
                    Source: C:\Users\user\Desktop\Fattura Proforma (C) n 31.exeCode function: 7_2_00BEE640 LdrInitializeThunk,7_2_00BEE640
                    Source: C:\Users\user\Desktop\Fattura Proforma (C) n 31.exeMemory allocated: page read and write | page guardJump to behavior

                    HIPS / PFW / Operating System Protection Evasion

                    barindex
                    Source: C:\Users\user\Desktop\Fattura Proforma (C) n 31.exeMemory written: C:\Users\user\Desktop\Fattura Proforma (C) n 31.exe base: 400000 value starts with: 4D5AJump to behavior
                    Source: C:\Users\user\Desktop\Fattura Proforma (C) n 31.exeProcess created: C:\Users\user\Desktop\Fattura Proforma (C) n 31.exe C:\Users\user\Desktop\Fattura Proforma (C) n 31.exeJump to behavior
                    Source: C:\Users\user\Desktop\Fattura Proforma (C) n 31.exeProcess created: C:\Users\user\Desktop\Fattura Proforma (C) n 31.exe C:\Users\user\Desktop\Fattura Proforma (C) n 31.exeJump to behavior
                    Source: C:\Users\user\Desktop\Fattura Proforma (C) n 31.exeQueries volume information: C:\Users\user\Desktop\Fattura Proforma (C) n 31.exe VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Fattura Proforma (C) n 31.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Fattura Proforma (C) n 31.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Fattura Proforma (C) n 31.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Fattura Proforma (C) n 31.exeQueries volume information: C:\Windows\Fonts\arial.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Fattura Proforma (C) n 31.exeQueries volume information: C:\Windows\Fonts\ariali.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Fattura Proforma (C) n 31.exeQueries volume information: C:\Windows\Fonts\arialbd.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Fattura Proforma (C) n 31.exeQueries volume information: C:\Windows\Fonts\arialbi.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Fattura Proforma (C) n 31.exeQueries volume information: C:\Windows\Fonts\ARIALN.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Fattura Proforma (C) n 31.exeQueries volume information: C:\Windows\Fonts\ariblk.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Fattura Proforma (C) n 31.exeQueries volume information: C:\Windows\Fonts\ARIALNI.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Fattura Proforma (C) n 31.exeQueries volume information: C:\Windows\Fonts\ARIALNB.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Fattura Proforma (C) n 31.exeQueries volume information: C:\Windows\Fonts\ARIALNBI.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Fattura Proforma (C) n 31.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Fattura Proforma (C) n 31.exeQueries volume information: C:\Windows\Fonts\calibri.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Fattura Proforma (C) n 31.exeQueries volume information: C:\Windows\Fonts\calibril.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Fattura Proforma (C) n 31.exeQueries volume information: C:\Windows\Fonts\calibrii.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Fattura Proforma (C) n 31.exeQueries volume information: C:\Windows\Fonts\calibrili.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Fattura Proforma (C) n 31.exeQueries volume information: C:\Windows\Fonts\calibrib.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Fattura Proforma (C) n 31.exeQueries volume information: C:\Windows\Fonts\calibriz.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Fattura Proforma (C) n 31.exeQueries volume information: C:\Windows\Fonts\cambria.ttc VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Fattura Proforma (C) n 31.exeQueries volume information: C:\Windows\Fonts\cambriai.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Fattura Proforma (C) n 31.exeQueries volume information: C:\Windows\Fonts\cambriab.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Fattura Proforma (C) n 31.exeQueries volume information: C:\Windows\Fonts\cambriaz.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Fattura Proforma (C) n 31.exeQueries volume information: C:\Windows\Fonts\Candara.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Fattura Proforma (C) n 31.exeQueries volume information: C:\Windows\Fonts\Candarai.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Fattura Proforma (C) n 31.exeQueries volume information: C:\Windows\Fonts\Candarab.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Fattura Proforma (C) n 31.exeQueries volume information: C:\Windows\Fonts\Candaraz.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Fattura Proforma (C) n 31.exeQueries volume information: C:\Windows\Fonts\comic.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Fattura Proforma (C) n 31.exeQueries volume information: C:\Windows\Fonts\comici.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Fattura Proforma (C) n 31.exeQueries volume information: C:\Windows\Fonts\comicbd.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Fattura Proforma (C) n 31.exeQueries volume information: C:\Windows\Fonts\comicz.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Fattura Proforma (C) n 31.exeQueries volume information: C:\Windows\Fonts\consola.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Fattura Proforma (C) n 31.exeQueries volume information: C:\Windows\Fonts\consolai.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Fattura Proforma (C) n 31.exeQueries volume information: C:\Windows\Fonts\consolab.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Fattura Proforma (C) n 31.exeQueries volume information: C:\Windows\Fonts\consolaz.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Fattura Proforma (C) n 31.exeQueries volume information: C:\Windows\Fonts\constan.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Fattura Proforma (C) n 31.exeQueries volume information: C:\Windows\Fonts\constani.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Fattura Proforma (C) n 31.exeQueries volume information: C:\Windows\Fonts\constanb.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Fattura Proforma (C) n 31.exeQueries volume information: C:\Windows\Fonts\constanz.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Fattura Proforma (C) n 31.exeQueries volume information: C:\Windows\Fonts\corbel.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Fattura Proforma (C) n 31.exeQueries volume information: C:\Windows\Fonts\corbeli.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Fattura Proforma (C) n 31.exeQueries volume information: C:\Windows\Fonts\corbelb.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Fattura Proforma (C) n 31.exeQueries volume information: C:\Windows\Fonts\corbelz.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Fattura Proforma (C) n 31.exeQueries volume information: C:\Windows\Fonts\cour.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Fattura Proforma (C) n 31.exeQueries volume information: C:\Windows\Fonts\couri.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Fattura Proforma (C) n 31.exeQueries volume information: C:\Windows\Fonts\courbd.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Fattura Proforma (C) n 31.exeQueries volume information: C:\Windows\Fonts\courbi.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Fattura Proforma (C) n 31.exeQueries volume information: C:\Windows\Fonts\ebrima.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Fattura Proforma (C) n 31.exeQueries volume information: C:\Windows\Fonts\ebrimabd.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Fattura Proforma (C) n 31.exeQueries volume information: C:\Windows\Fonts\framd.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Fattura Proforma (C) n 31.exeQueries volume information: C:\Windows\Fonts\FRADM.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Fattura Proforma (C) n 31.exeQueries volume information: C:\Windows\Fonts\framdit.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Fattura Proforma (C) n 31.exeQueries volume information: C:\Windows\Fonts\FRADMIT.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Fattura Proforma (C) n 31.exeQueries volume information: C:\Windows\Fonts\FRAMDCN.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Fattura Proforma (C) n 31.exeQueries volume information: C:\Windows\Fonts\FRADMCN.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Fattura Proforma (C) n 31.exeQueries volume information: C:\Windows\Fonts\FRAHV.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Fattura Proforma (C) n 31.exeQueries volume information: C:\Windows\Fonts\FRAHVIT.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Fattura Proforma (C) n 31.exeQueries volume information: C:\Windows\Fonts\Gabriola.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Fattura Proforma (C) n 31.exeQueries volume information: C:\Windows\Fonts\gadugi.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Fattura Proforma (C) n 31.exeQueries volume information: C:\Windows\Fonts\gadugib.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Fattura Proforma (C) n 31.exeQueries volume information: C:\Windows\Fonts\georgia.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Fattura Proforma (C) n 31.exeQueries volume information: C:\Windows\Fonts\georgiai.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Fattura Proforma (C) n 31.exeQueries volume information: C:\Windows\Fonts\georgiab.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Fattura Proforma (C) n 31.exeQueries volume information: C:\Windows\Fonts\georgiaz.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Fattura Proforma (C) n 31.exeQueries volume information: C:\Windows\Fonts\impact.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Fattura Proforma (C) n 31.exeQueries volume information: C:\Windows\Fonts\Inkfree.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Fattura Proforma (C) n 31.exeQueries volume information: C:\Windows\Fonts\javatext.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Fattura Proforma (C) n 31.exeQueries volume information: C:\Windows\Fonts\LeelawUI.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Fattura Proforma (C) n 31.exeQueries volume information: C:\Windows\Fonts\LeelUIsl.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Fattura Proforma (C) n 31.exeQueries volume information: C:\Windows\Fonts\LeelaUIb.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Fattura Proforma (C) n 31.exeQueries volume information: C:\Windows\Fonts\lucon.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Fattura Proforma (C) n 31.exeQueries volume information: C:\Windows\Fonts\l_10646.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Fattura Proforma (C) n 31.exeQueries volume information: C:\Windows\Fonts\malgun.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Fattura Proforma (C) n 31.exeQueries volume information: C:\Windows\Fonts\malgunsl.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Fattura Proforma (C) n 31.exeQueries volume information: C:\Windows\Fonts\malgunbd.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Fattura Proforma (C) n 31.exeQueries volume information: C:\Windows\Fonts\himalaya.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Fattura Proforma (C) n 31.exeQueries volume information: C:\Windows\Fonts\msjh.ttc VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Fattura Proforma (C) n 31.exeQueries volume information: C:\Windows\Fonts\msjhl.ttc VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Fattura Proforma (C) n 31.exeQueries volume information: C:\Windows\Fonts\msjhbd.ttc VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Fattura Proforma (C) n 31.exeQueries volume information: C:\Windows\Fonts\ntailu.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Fattura Proforma (C) n 31.exeQueries volume information: C:\Windows\Fonts\ntailub.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Fattura Proforma (C) n 31.exeQueries volume information: C:\Windows\Fonts\phagspa.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Fattura Proforma (C) n 31.exeQueries volume information: C:\Windows\Fonts\phagspab.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Fattura Proforma (C) n 31.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Fattura Proforma (C) n 31.exeQueries volume information: C:\Windows\Fonts\taile.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Fattura Proforma (C) n 31.exeQueries volume information: C:\Windows\Fonts\taileb.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Fattura Proforma (C) n 31.exeQueries volume information: C:\Windows\Fonts\msyh.ttc VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Fattura Proforma (C) n 31.exeQueries volume information: C:\Windows\Fonts\msyhl.ttc VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Fattura Proforma (C) n 31.exeQueries volume information: C:\Windows\Fonts\msyhbd.ttc VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Fattura Proforma (C) n 31.exeQueries volume information: C:\Windows\Fonts\msyi.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Fattura Proforma (C) n 31.exeQueries volume information: C:\Windows\Fonts\mingliub.ttc VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Fattura Proforma (C) n 31.exeQueries volume information: C:\Windows\Fonts\monbaiti.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Fattura Proforma (C) n 31.exeQueries volume information: C:\Windows\Fonts\msgothic.ttc VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Fattura Proforma (C) n 31.exeQueries volume information: C:\Windows\Fonts\mvboli.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Fattura Proforma (C) n 31.exeQueries volume information: C:\Windows\Fonts\mmrtext.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Fattura Proforma (C) n 31.exeQueries volume information: C:\Windows\Fonts\mmrtextb.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Fattura Proforma (C) n 31.exeQueries volume information: C:\Windows\Fonts\Nirmala.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Fattura Proforma (C) n 31.exeQueries volume information: C:\Windows\Fonts\NirmalaS.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Fattura Proforma (C) n 31.exeQueries volume information: C:\Windows\Fonts\NirmalaB.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Fattura Proforma (C) n 31.exeQueries volume information: C:\Windows\Fonts\pala.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Fattura Proforma (C) n 31.exeQueries volume information: C:\Windows\Fonts\palai.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Fattura Proforma (C) n 31.exeQueries volume information: C:\Windows\Fonts\palab.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Fattura Proforma (C) n 31.exeQueries volume information: C:\Windows\Fonts\palabi.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Fattura Proforma (C) n 31.exeQueries volume information: C:\Windows\Fonts\segoepr.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Fattura Proforma (C) n 31.exeQueries volume information: C:\Windows\Fonts\segoeprb.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Fattura Proforma (C) n 31.exeQueries volume information: C:\Windows\Fonts\segoesc.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Fattura Proforma (C) n 31.exeQueries volume information: C:\Windows\Fonts\segoescb.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Fattura Proforma (C) n 31.exeQueries volume information: C:\Windows\Fonts\seguisb.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Fattura Proforma (C) n 31.exeQueries volume information: C:\Windows\Fonts\segoeuii.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Fattura Proforma (C) n 31.exeQueries volume information: C:\Windows\Fonts\seguisli.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Fattura Proforma (C) n 31.exeQueries volume information: C:\Windows\Fonts\seguili.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Fattura Proforma (C) n 31.exeQueries volume information: C:\Windows\Fonts\seguisbi.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Fattura Proforma (C) n 31.exeQueries volume information: C:\Windows\Fonts\segoeuiz.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Fattura Proforma (C) n 31.exeQueries volume information: C:\Windows\Fonts\seguibl.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Fattura Proforma (C) n 31.exeQueries volume information: C:\Windows\Fonts\seguibli.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Fattura Proforma (C) n 31.exeQueries volume information: C:\Windows\Fonts\seguiemj.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Fattura Proforma (C) n 31.exeQueries volume information: C:\Windows\Fonts\seguihis.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Fattura Proforma (C) n 31.exeQueries volume information: C:\Windows\Fonts\seguisym.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Fattura Proforma (C) n 31.exeQueries volume information: C:\Windows\Fonts\simsun.ttc VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Fattura Proforma (C) n 31.exeQueries volume information: C:\Windows\Fonts\simsunb.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Fattura Proforma (C) n 31.exeQueries volume information: C:\Windows\Fonts\Sitka.ttc VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Fattura Proforma (C) n 31.exeQueries volume information: C:\Windows\Fonts\SitkaI.ttc VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Fattura Proforma (C) n 31.exeQueries volume information: C:\Windows\Fonts\SitkaB.ttc VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Fattura Proforma (C) n 31.exeQueries volume information: C:\Windows\Fonts\SitkaZ.ttc VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Fattura Proforma (C) n 31.exeQueries volume information: C:\Windows\Fonts\sylfaen.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Fattura Proforma (C) n 31.exeQueries volume information: C:\Windows\Fonts\symbol.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Fattura Proforma (C) n 31.exeQueries volume information: C:\Windows\Fonts\tahoma.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Fattura Proforma (C) n 31.exeQueries volume information: C:\Windows\Fonts\tahomabd.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Fattura Proforma (C) n 31.exeQueries volume information: C:\Windows\Fonts\timesi.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Fattura Proforma (C) n 31.exeQueries volume information: C:\Windows\Fonts\timesbd.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Fattura Proforma (C) n 31.exeQueries volume information: C:\Windows\Fonts\timesbi.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Fattura Proforma (C) n 31.exeQueries volume information: C:\Windows\Fonts\trebuc.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Fattura Proforma (C) n 31.exeQueries volume information: C:\Windows\Fonts\trebucit.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Fattura Proforma (C) n 31.exeQueries volume information: C:\Windows\Fonts\trebucbd.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Fattura Proforma (C) n 31.exeQueries volume information: C:\Windows\Fonts\trebucbi.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Fattura Proforma (C) n 31.exeQueries volume information: C:\Windows\Fonts\verdana.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Fattura Proforma (C) n 31.exeQueries volume information: C:\Windows\Fonts\verdanai.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Fattura Proforma (C) n 31.exeQueries volume information: C:\Windows\Fonts\verdanab.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Fattura Proforma (C) n 31.exeQueries volume information: C:\Windows\Fonts\verdanaz.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Fattura Proforma (C) n 31.exeQueries volume information: C:\Windows\Fonts\webdings.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Fattura Proforma (C) n 31.exeQueries volume information: C:\Windows\Fonts\wingding.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Fattura Proforma (C) n 31.exeQueries volume information: C:\Windows\Fonts\YuGothR.ttc VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Fattura Proforma (C) n 31.exeQueries volume information: C:\Windows\Fonts\YuGothM.ttc VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Fattura Proforma (C) n 31.exeQueries volume information: C:\Windows\Fonts\YuGothL.ttc VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Fattura Proforma (C) n 31.exeQueries volume information: C:\Windows\Fonts\YuGothB.ttc VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Fattura Proforma (C) n 31.exeQueries volume information: C:\Windows\Fonts\holomdl2.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Fattura Proforma (C) n 31.exeQueries volume information: C:\Windows\Fonts\CENTURY.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Fattura Proforma (C) n 31.exeQueries volume information: C:\Windows\Fonts\LEELAWAD.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Fattura Proforma (C) n 31.exeQueries volume information: C:\Windows\Fonts\LEELAWDB.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Fattura Proforma (C) n 31.exeQueries volume information: C:\Windows\Fonts\MSUIGHUR.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Fattura Proforma (C) n 31.exeQueries volume information: C:\Windows\Fonts\MSUIGHUB.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Fattura Proforma (C) n 31.exeQueries volume information: C:\Windows\Fonts\WINGDNG2.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Fattura Proforma (C) n 31.exeQueries volume information: C:\Windows\Fonts\WINGDNG3.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Fattura Proforma (C) n 31.exeQueries volume information: C:\Windows\Fonts\TEMPSITC.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Fattura Proforma (C) n 31.exeQueries volume information: C:\Windows\Fonts\PRISTINA.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Fattura Proforma (C) n 31.exeQueries volume information: C:\Windows\Fonts\PAPYRUS.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Fattura Proforma (C) n 31.exeQueries volume information: C:\Windows\Fonts\MISTRAL.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Fattura Proforma (C) n 31.exeQueries volume information: C:\Windows\Fonts\LHANDW.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Fattura Proforma (C) n 31.exeQueries volume information: C:\Windows\Fonts\ITCKRIST.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Fattura Proforma (C) n 31.exeQueries volume information: C:\Windows\Fonts\JUICE___.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Fattura Proforma (C) n 31.exeQueries volume information: C:\Windows\Fonts\FRSCRIPT.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Fattura Proforma (C) n 31.exeQueries volume information: C:\Windows\Fonts\FREESCPT.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Fattura Proforma (C) n 31.exeQueries volume information: C:\Windows\Fonts\BRADHITC.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Fattura Proforma (C) n 31.exeQueries volume information: C:\Windows\Fonts\OUTLOOK.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Fattura Proforma (C) n 31.exeQueries volume information: C:\Windows\Fonts\BKANT.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Fattura Proforma (C) n 31.exeQueries volume information: C:\Windows\Fonts\ANTQUAI.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Fattura Proforma (C) n 31.exeQueries volume information: C:\Windows\Fonts\ANTQUAB.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Fattura Proforma (C) n 31.exeQueries volume information: C:\Windows\Fonts\ANTQUABI.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Fattura Proforma (C) n 31.exeQueries volume information: C:\Windows\Fonts\GARA.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Fattura Proforma (C) n 31.exeQueries volume information: C:\Windows\Fonts\GARAIT.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Fattura Proforma (C) n 31.exeQueries volume information: C:\Windows\Fonts\GARABD.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Fattura Proforma (C) n 31.exeQueries volume information: C:\Windows\Fonts\MTCORSVA.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Fattura Proforma (C) n 31.exeQueries volume information: C:\Windows\Fonts\GOTHIC.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Fattura Proforma (C) n 31.exeQueries volume information: C:\Windows\Fonts\GOTHICI.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Fattura Proforma (C) n 31.exeQueries volume information: C:\Windows\Fonts\GOTHICB.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Fattura Proforma (C) n 31.exeQueries volume information: C:\Windows\Fonts\GOTHICBI.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Fattura Proforma (C) n 31.exeQueries volume information: C:\Windows\Fonts\ALGER.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Fattura Proforma (C) n 31.exeQueries volume information: C:\Windows\Fonts\BASKVILL.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Fattura Proforma (C) n 31.exeQueries volume information: C:\Windows\Fonts\BAUHS93.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Fattura Proforma (C) n 31.exeQueries volume information: C:\Windows\Fonts\BELL.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Fattura Proforma (C) n 31.exeQueries volume information: C:\Windows\Fonts\BELLI.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Fattura Proforma (C) n 31.exeQueries volume information: C:\Windows\Fonts\BELLB.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Fattura Proforma (C) n 31.exeQueries volume information: C:\Windows\Fonts\BRLNSR.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Fattura Proforma (C) n 31.exeQueries volume information: C:\Windows\Fonts\BRLNSDB.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Fattura Proforma (C) n 31.exeQueries volume information: C:\Windows\Fonts\BRLNSB.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Fattura Proforma (C) n 31.exeQueries volume information: C:\Windows\Fonts\BERNHC.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Fattura Proforma (C) n 31.exeQueries volume information: C:\Windows\Fonts\BOD_PSTC.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Fattura Proforma (C) n 31.exeQueries volume information: C:\Windows\Fonts\BRITANIC.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Fattura Proforma (C) n 31.exeQueries volume information: C:\Windows\Fonts\BROADW.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Fattura Proforma (C) n 31.exeQueries volume information: C:\Windows\Fonts\BRUSHSCI.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Fattura Proforma (C) n 31.exeQueries volume information: C:\Windows\Fonts\CALIFR.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Fattura Proforma (C) n 31.exeQueries volume information: C:\Windows\Fonts\CALIFI.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Fattura Proforma (C) n 31.exeQueries volume information: C:\Windows\Fonts\CALIFB.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Fattura Proforma (C) n 31.exeQueries volume information: C:\Windows\Fonts\CENTAUR.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Fattura Proforma (C) n 31.exeQueries volume information: C:\Windows\Fonts\CHILLER.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Fattura Proforma (C) n 31.exeQueries volume information: C:\Windows\Fonts\COLONNA.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Fattura Proforma (C) n 31.exeQueries volume information: C:\Windows\Fonts\COOPBL.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Fattura Proforma (C) n 31.exeQueries volume information: C:\Windows\Fonts\FTLTLT.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Fattura Proforma (C) n 31.exeQueries volume information: C:\Windows\Fonts\HARLOWSI.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Fattura Proforma (C) n 31.exeQueries volume information: C:\Windows\Fonts\HARNGTON.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Fattura Proforma (C) n 31.exeQueries volume information: C:\Windows\Fonts\HTOWERT.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Fattura Proforma (C) n 31.exeQueries volume information: C:\Windows\Fonts\HTOWERTI.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Fattura Proforma (C) n 31.exeQueries volume information: C:\Windows\Fonts\JOKERMAN.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Fattura Proforma (C) n 31.exeQueries volume information: C:\Windows\Fonts\KUNSTLER.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Fattura Proforma (C) n 31.exeQueries volume information: C:\Windows\Fonts\LBRITE.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Fattura Proforma (C) n 31.exeQueries volume information: C:\Windows\Fonts\LBRITED.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Fattura Proforma (C) n 31.exeQueries volume information: C:\Windows\Fonts\LBRITEI.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Fattura Proforma (C) n 31.exeQueries volume information: C:\Windows\Fonts\LBRITEDI.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Fattura Proforma (C) n 31.exeQueries volume information: C:\Windows\Fonts\LCALLIG.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Fattura Proforma (C) n 31.exeQueries volume information: C:\Windows\Fonts\LFAX.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Fattura Proforma (C) n 31.exeQueries volume information: C:\Windows\Fonts\LFAXD.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Fattura Proforma (C) n 31.exeQueries volume information: C:\Windows\Fonts\LFAXI.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Fattura Proforma (C) n 31.exeQueries volume information: C:\Windows\Fonts\LFAXDI.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Fattura Proforma (C) n 31.exeQueries volume information: C:\Windows\Fonts\MAGNETOB.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Fattura Proforma (C) n 31.exeQueries volume information: C:\Windows\Fonts\MATURASC.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Fattura Proforma (C) n 31.exeQueries volume information: C:\Windows\Fonts\MOD20.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Fattura Proforma (C) n 31.exeQueries volume information: C:\Windows\Fonts\NIAGENG.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Fattura Proforma (C) n 31.exeQueries volume information: C:\Windows\Fonts\NIAGSOL.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Fattura Proforma (C) n 31.exeQueries volume information: C:\Windows\Fonts\OLDENGL.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Fattura Proforma (C) n 31.exeQueries volume information: C:\Windows\Fonts\ONYX.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Fattura Proforma (C) n 31.exeQueries volume information: C:\Windows\Fonts\PARCHM.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Fattura Proforma (C) n 31.exeQueries volume information: C:\Windows\Fonts\PLAYBILL.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Fattura Proforma (C) n 31.exeQueries volume information: C:\Windows\Fonts\POORICH.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Fattura Proforma (C) n 31.exeQueries volume information: C:\Windows\Fonts\RAVIE.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Fattura Proforma (C) n 31.exeQueries volume information: C:\Windows\Fonts\INFROMAN.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Fattura Proforma (C) n 31.exeQueries volume information: C:\Windows\Fonts\SHOWG.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Fattura Proforma (C) n 31.exeQueries volume information: C:\Windows\Fonts\SNAP____.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Fattura Proforma (C) n 31.exeQueries volume information: C:\Windows\Fonts\STENCIL.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Fattura Proforma (C) n 31.exeQueries volume information: C:\Windows\Fonts\VINERITC.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Fattura Proforma (C) n 31.exeQueries volume information: C:\Windows\Fonts\VIVALDII.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Fattura Proforma (C) n 31.exeQueries volume information: C:\Windows\Fonts\VLADIMIR.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Fattura Proforma (C) n 31.exeQueries volume information: C:\Windows\Fonts\LATINWD.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Fattura Proforma (C) n 31.exeQueries volume information: C:\Windows\Fonts\TCM_____.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Fattura Proforma (C) n 31.exeQueries volume information: C:\Windows\Fonts\TCMI____.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Fattura Proforma (C) n 31.exeQueries volume information: C:\Windows\Fonts\TCB_____.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Fattura Proforma (C) n 31.exeQueries volume information: C:\Windows\Fonts\TCBI____.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Fattura Proforma (C) n 31.exeQueries volume information: C:\Windows\Fonts\TCCM____.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Fattura Proforma (C) n 31.exeQueries volume information: C:\Windows\Fonts\TCCB____.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Fattura Proforma (C) n 31.exeQueries volume information: C:\Windows\Fonts\TCCEB.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Fattura Proforma (C) n 31.exeQueries volume information: C:\Windows\Fonts\SCRIPTBL.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Fattura Proforma (C) n 31.exeQueries volume information: C:\Windows\Fonts\ROCK.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Fattura Proforma (C) n 31.exeQueries volume information: C:\Windows\Fonts\ROCKI.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Fattura Proforma (C) n 31.exeQueries volume information: C:\Windows\Fonts\ROCKB.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Fattura Proforma (C) n 31.exeQueries volume information: C:\Windows\Fonts\ROCKEB.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Fattura Proforma (C) n 31.exeQueries volume information: C:\Windows\Fonts\ROCKBI.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Fattura Proforma (C) n 31.exeQueries volume information: C:\Windows\Fonts\ROCC____.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Fattura Proforma (C) n 31.exeQueries volume information: C:\Windows\Fonts\ROCCB___.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Fattura Proforma (C) n 31.exeQueries volume information: C:\Windows\Fonts\RAGE.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Fattura Proforma (C) n 31.exeQueries volume information: C:\Windows\Fonts\PERTILI.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Fattura Proforma (C) n 31.exeQueries volume information: C:\Windows\Fonts\PERTIBD.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Fattura Proforma (C) n 31.exeQueries volume information: C:\Windows\Fonts\PER_____.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Fattura Proforma (C) n 31.exeQueries volume information: C:\Windows\Fonts\PERI____.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Fattura Proforma (C) n 31.exeQueries volume information: C:\Windows\Fonts\PERB____.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Fattura Proforma (C) n 31.exeQueries volume information: C:\Windows\Fonts\PERBI___.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Fattura Proforma (C) n 31.exeQueries volume information: C:\Windows\Fonts\PALSCRI.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Fattura Proforma (C) n 31.exeQueries volume information: C:\Windows\Fonts\OCRAEXT.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Fattura Proforma (C) n 31.exeQueries volume information: C:\Windows\Fonts\MAIAN.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Fattura Proforma (C) n 31.exeQueries volume information: C:\Windows\Fonts\LTYPE.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Fattura Proforma (C) n 31.exeQueries volume information: C:\Windows\Fonts\LTYPEO.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Fattura Proforma (C) n 31.exeQueries volume information: C:\Windows\Fonts\LTYPEB.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Fattura Proforma (C) n 31.exeQueries volume information: C:\Windows\Fonts\LTYPEBO.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Fattura Proforma (C) n 31.exeQueries volume information: C:\Windows\Fonts\LSANS.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Fattura Proforma (C) n 31.exeQueries volume information: C:\Windows\Fonts\LSANSD.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Fattura Proforma (C) n 31.exeQueries volume information: C:\Windows\Fonts\LSANSI.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Fattura Proforma (C) n 31.exeQueries volume information: C:\Windows\Fonts\LSANSDI.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Fattura Proforma (C) n 31.exeQueries volume information: C:\Windows\Fonts\IMPRISHA.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Fattura Proforma (C) n 31.exeQueries volume information: C:\Windows\Fonts\HATTEN.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Fattura Proforma (C) n 31.exeQueries volume information: C:\Windows\Fonts\GOUDYSTO.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Fattura Proforma (C) n 31.exeQueries volume information: C:\Windows\Fonts\GOUDOS.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Fattura Proforma (C) n 31.exeQueries volume information: C:\Windows\Fonts\GOUDOSI.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Fattura Proforma (C) n 31.exeQueries volume information: C:\Windows\Fonts\GOUDOSB.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Fattura Proforma (C) n 31.exeQueries volume information: C:\Windows\Fonts\GLECB.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Fattura Proforma (C) n 31.exeQueries volume information: C:\Windows\Fonts\GIL_____.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Fattura Proforma (C) n 31.exeQueries volume information: C:\Windows\Fonts\GILI____.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Fattura Proforma (C) n 31.exeQueries volume information: C:\Windows\Fonts\GILB____.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Fattura Proforma (C) n 31.exeQueries volume information: C:\Windows\Fonts\GILBI___.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Fattura Proforma (C) n 31.exeQueries volume information: C:\Windows\Fonts\GILC____.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Fattura Proforma (C) n 31.exeQueries volume information: C:\Windows\Fonts\GLSNECB.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Fattura Proforma (C) n 31.exeQueries volume information: C:\Windows\Fonts\GIGI.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Fattura Proforma (C) n 31.exeQueries volume information: C:\Windows\Fonts\FRABK.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Fattura Proforma (C) n 31.exeQueries volume information: C:\Windows\Fonts\FRABKIT.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Fattura Proforma (C) n 31.exeQueries volume information: C:\Windows\Fonts\FORTE.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Fattura Proforma (C) n 31.exeQueries volume information: C:\Windows\Fonts\FELIXTI.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Fattura Proforma (C) n 31.exeQueries volume information: C:\Windows\Fonts\ERASMD.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Fattura Proforma (C) n 31.exeQueries volume information: C:\Windows\Fonts\ERASLGHT.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Fattura Proforma (C) n 31.exeQueries volume information: C:\Windows\Fonts\ERASDEMI.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Fattura Proforma (C) n 31.exeQueries volume information: C:\Windows\Fonts\ERASBD.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Fattura Proforma (C) n 31.exeQueries volume information: C:\Windows\Fonts\ENGR.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Fattura Proforma (C) n 31.exeQueries volume information: C:\Windows\Fonts\ELEPHNT.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Fattura Proforma (C) n 31.exeQueries volume information: C:\Windows\Fonts\ELEPHNTI.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Fattura Proforma (C) n 31.exeQueries volume information: C:\Windows\Fonts\ITCEDSCR.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Fattura Proforma (C) n 31.exeQueries volume information: C:\Windows\Fonts\CURLZ___.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Fattura Proforma (C) n 31.exeQueries volume information: C:\Windows\Fonts\COPRGTL.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Fattura Proforma (C) n 31.exeQueries volume information: C:\Windows\Fonts\COPRGTB.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Fattura Proforma (C) n 31.exeQueries volume information: C:\Windows\Fonts\CENSCBK.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Fattura Proforma (C) n 31.exeQueries volume information: C:\Windows\Fonts\SCHLBKI.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Fattura Proforma (C) n 31.exeQueries volume information: C:\Windows\Fonts\SCHLBKB.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Fattura Proforma (C) n 31.exeQueries volume information: C:\Windows\Fonts\SCHLBKBI.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Fattura Proforma (C) n 31.exeQueries volume information: C:\Windows\Fonts\CASTELAR.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Fattura Proforma (C) n 31.exeQueries volume information: C:\Windows\Fonts\CALIST.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Fattura Proforma (C) n 31.exeQueries volume information: C:\Windows\Fonts\CALISTI.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Fattura Proforma (C) n 31.exeQueries volume information: C:\Windows\Fonts\CALISTB.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Fattura Proforma (C) n 31.exeQueries volume information: C:\Windows\Fonts\CALISTBI.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Fattura Proforma (C) n 31.exeQueries volume information: C:\Windows\Fonts\BOOKOS.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Fattura Proforma (C) n 31.exeQueries volume information: C:\Windows\Fonts\BOOKOSB.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Fattura Proforma (C) n 31.exeQueries volume information: C:\Windows\Fonts\BOOKOSI.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Fattura Proforma (C) n 31.exeQueries volume information: C:\Windows\Fonts\BOOKOSBI.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Fattura Proforma (C) n 31.exeQueries volume information: C:\Windows\Fonts\BOD_R.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Fattura Proforma (C) n 31.exeQueries volume information: C:\Windows\Fonts\BOD_I.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Fattura Proforma (C) n 31.exeQueries volume information: C:\Windows\Fonts\BOD_B.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Fattura Proforma (C) n 31.exeQueries volume information: C:\Windows\Fonts\BOD_BI.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Fattura Proforma (C) n 31.exeQueries volume information: C:\Windows\Fonts\BOD_CR.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Fattura Proforma (C) n 31.exeQueries volume information: C:\Windows\Fonts\BOD_BLAR.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Fattura Proforma (C) n 31.exeQueries volume information: C:\Windows\Fonts\BOD_CI.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Fattura Proforma (C) n 31.exeQueries volume information: C:\Windows\Fonts\BOD_CB.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Fattura Proforma (C) n 31.exeQueries volume information: C:\Windows\Fonts\BOD_BLAI.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Fattura Proforma (C) n 31.exeQueries volume information: C:\Windows\Fonts\BOD_CBI.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Fattura Proforma (C) n 31.exeQueries volume information: C:\Windows\Fonts\ITCBLKAD.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Fattura Proforma (C) n 31.exeQueries volume information: C:\Windows\Fonts\ARLRDBD.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Fattura Proforma (C) n 31.exeQueries volume information: C:\Windows\Fonts\AGENCYR.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Fattura Proforma (C) n 31.exeQueries volume information: C:\Windows\Fonts\AGENCYB.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Fattura Proforma (C) n 31.exeQueries volume information: C:\Windows\Fonts\BSSYM7.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Fattura Proforma (C) n 31.exeQueries volume information: C:\Windows\Fonts\REFSAN.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Fattura Proforma (C) n 31.exeQueries volume information: C:\Windows\Fonts\REFSPCL.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Fattura Proforma (C) n 31.exeQueries volume information: C:\Windows\Fonts\MTEXTRA.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Fattura Proforma (C) n 31.exeQueries volume information: C:\Windows\Fonts\marlett.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Fattura Proforma (C) n 31.exeQueries volume information: C:\Windows\Fonts\segoeuii.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Fattura Proforma (C) n 31.exeQueries volume information: C:\Windows\Fonts\segoeuiz.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Fattura Proforma (C) n 31.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Fattura Proforma (C) n 31.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Fattura Proforma (C) n 31.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Management.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Fattura Proforma (C) n 31.exeQueries volume information: C:\Users\user\Desktop\Fattura Proforma (C) n 31.exe VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Fattura Proforma (C) n 31.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Fattura Proforma (C) n 31.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Fattura Proforma (C) n 31.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Fattura Proforma (C) n 31.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Fattura Proforma (C) n 31.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Fattura Proforma (C) n 31.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Management.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Fattura Proforma (C) n 31.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

                    Stealing of Sensitive Information

                    barindex
                    Source: Yara matchFile source: 1.2.Fattura Proforma (C) n 31.exe.4038208.3.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 1.2.Fattura Proforma (C) n 31.exe.40023e8.1.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 1.2.Fattura Proforma (C) n 31.exe.4038208.3.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 7.0.Fattura Proforma (C) n 31.exe.400000.6.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 7.0.Fattura Proforma (C) n 31.exe.400000.12.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 7.0.Fattura Proforma (C) n 31.exe.400000.8.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 7.0.Fattura Proforma (C) n 31.exe.400000.4.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 7.2.Fattura Proforma (C) n 31.exe.400000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 7.0.Fattura Proforma (C) n 31.exe.400000.10.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 1.2.Fattura Proforma (C) n 31.exe.40023e8.1.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 1.2.Fattura Proforma (C) n 31.exe.3f893c8.2.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 1.2.Fattura Proforma (C) n 31.exe.40a86f0.4.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 1.2.Fattura Proforma (C) n 31.exe.41e91b0.5.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 00000007.00000000.469102375.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000007.00000000.469793315.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000001.00000002.474516321.0000000003EC1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000007.00000000.468372244.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000007.00000002.690586626.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000001.00000002.474922718.00000000040A8000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000007.00000000.467636633.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000007.00000002.692745771.00000000027B1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: Fattura Proforma (C) n 31.exe PID: 6892, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: Fattura Proforma (C) n 31.exe PID: 6268, type: MEMORYSTR
                    Source: C:\Users\user\Desktop\Fattura Proforma (C) n 31.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
                    Source: C:\Users\user\Desktop\Fattura Proforma (C) n 31.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
                    Source: C:\Users\user\Desktop\Fattura Proforma (C) n 31.exeKey opened: HKEY_CURRENT_USER\Software\IncrediMail\IdentitiesJump to behavior
                    Source: C:\Users\user\Desktop\Fattura Proforma (C) n 31.exeFile opened: C:\Users\user\AppData\Roaming\FileZilla\recentservers.xmlJump to behavior
                    Source: C:\Users\user\Desktop\Fattura Proforma (C) n 31.exeFile opened: C:\Users\user\AppData\Roaming\SmartFTP\Client 2.0\Favorites\Quick Connect\Jump to behavior
                    Source: C:\Users\user\Desktop\Fattura Proforma (C) n 31.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
                    Source: C:\Users\user\Desktop\Fattura Proforma (C) n 31.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.iniJump to behavior
                    Source: Yara matchFile source: 00000007.00000002.692745771.00000000027B1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: Fattura Proforma (C) n 31.exe PID: 6268, type: MEMORYSTR

                    Remote Access Functionality

                    barindex
                    Source: Yara matchFile source: 1.2.Fattura Proforma (C) n 31.exe.4038208.3.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 1.2.Fattura Proforma (C) n 31.exe.40023e8.1.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 1.2.Fattura Proforma (C) n 31.exe.4038208.3.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 7.0.Fattura Proforma (C) n 31.exe.400000.6.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 7.0.Fattura Proforma (C) n 31.exe.400000.12.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 7.0.Fattura Proforma (C) n 31.exe.400000.8.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 7.0.Fattura Proforma (C) n 31.exe.400000.4.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 7.2.Fattura Proforma (C) n 31.exe.400000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 7.0.Fattura Proforma (C) n 31.exe.400000.10.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 1.2.Fattura Proforma (C) n 31.exe.40023e8.1.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 1.2.Fattura Proforma (C) n 31.exe.3f893c8.2.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 1.2.Fattura Proforma (C) n 31.exe.40a86f0.4.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 1.2.Fattura Proforma (C) n 31.exe.41e91b0.5.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 00000007.00000000.469102375.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000007.00000000.469793315.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000001.00000002.474516321.0000000003EC1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000007.00000000.468372244.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000007.00000002.690586626.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000001.00000002.474922718.00000000040A8000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000007.00000000.467636633.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000007.00000002.692745771.00000000027B1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: Fattura Proforma (C) n 31.exe PID: 6892, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: Fattura Proforma (C) n 31.exe PID: 6268, type: MEMORYSTR
                    Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
                    Valid Accounts211
                    Windows Management Instrumentation
                    Path Interception111
                    Process Injection
                    1
                    Masquerading
                    2
                    OS Credential Dumping
                    211
                    Security Software Discovery
                    Remote Services1
                    Email Collection
                    Exfiltration Over Other Network Medium1
                    Encrypted Channel
                    Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
                    Default AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization Scripts1
                    Disable or Modify Tools
                    LSASS Memory1
                    Process Discovery
                    Remote Desktop Protocol11
                    Archive Collected Data
                    Exfiltration Over Bluetooth1
                    Non-Application Layer Protocol
                    Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
                    Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)131
                    Virtualization/Sandbox Evasion
                    Security Account Manager131
                    Virtualization/Sandbox Evasion
                    SMB/Windows Admin Shares2
                    Data from Local System
                    Automated Exfiltration1
                    Application Layer Protocol
                    Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
                    Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)111
                    Process Injection
                    NTDS1
                    Application Window Discovery
                    Distributed Component Object ModelInput CaptureScheduled TransferProtocol ImpersonationSIM Card SwapCarrier Billing Fraud
                    Cloud AccountsCronNetwork Logon ScriptNetwork Logon Script1
                    Deobfuscate/Decode Files or Information
                    LSA Secrets113
                    System Information Discovery
                    SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
                    Replication Through Removable MediaLaunchdRc.commonRc.common2
                    Obfuscated Files or Information
                    Cached Domain CredentialsSystem Owner/User DiscoveryVNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
                    External Remote ServicesScheduled TaskStartup ItemsStartup Items13
                    Software Packing
                    DCSyncNetwork SniffingWindows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
                    Hide Legend

                    Legend:

                    • Process
                    • Signature
                    • Created File
                    • DNS/IP Info
                    • Is Dropped
                    • Is Windows Process
                    • Number of created Registry Values
                    • Number of created Files
                    • Visual Basic
                    • Delphi
                    • Java
                    • .Net C# or VB.NET
                    • C, C++ or other language
                    • Is malicious
                    • Internet

                    This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                    windows-stand
                    SourceDetectionScannerLabelLink
                    Fattura Proforma (C) n 31.exe25%VirustotalBrowse
                    Fattura Proforma (C) n 31.exe20%ReversingLabsByteCode-MSIL.Trojan.AgentTesla
                    Fattura Proforma (C) n 31.exe100%Joe Sandbox ML
                    No Antivirus matches
                    SourceDetectionScannerLabelLinkDownload
                    7.0.Fattura Proforma (C) n 31.exe.400000.8.unpack100%AviraTR/Spy.Gen8Download File
                    7.0.Fattura Proforma (C) n 31.exe.400000.6.unpack100%AviraTR/Spy.Gen8Download File
                    7.2.Fattura Proforma (C) n 31.exe.400000.0.unpack100%AviraTR/Spy.Gen8Download File
                    7.0.Fattura Proforma (C) n 31.exe.400000.12.unpack100%AviraTR/Spy.Gen8Download File
                    7.0.Fattura Proforma (C) n 31.exe.400000.10.unpack100%AviraTR/Spy.Gen8Download File
                    7.0.Fattura Proforma (C) n 31.exe.400000.4.unpack100%AviraTR/Spy.Gen8Download File
                    SourceDetectionScannerLabelLink
                    smtp.celoric.com1%VirustotalBrowse
                    SourceDetectionScannerLabelLink
                    http://pjLE02r21MVNC.com0%Avira URL Cloudsafe
                    http://127.0.0.1:HTTP/1.10%Avira URL Cloudsafe
                    http://DynDns.comDynDNS0%URL Reputationsafe
                    http://www.sajatypeworks.com20%URL Reputationsafe
                    http://www.founder.com.cn/cn/bThe0%URL Reputationsafe
                    https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip%tordir%%ha0%URL Reputationsafe
                    http://www.carterandcone.comwity0%Avira URL Cloudsafe
                    http://www.founder.com.cn/cnT0%URL Reputationsafe
                    http://www.tiro.com0%URL Reputationsafe
                    http://smtp.celoric.com0%Avira URL Cloudsafe
                    http://www.carterandcone.comcerE0%Avira URL Cloudsafe
                    http://www.goodfont.co.kr0%URL Reputationsafe
                    http://www.carterandcone.com0%URL Reputationsafe
                    https://api.ipify.org%$0%Avira URL Cloudsafe
                    http://www.carterandcone.coml0%URL Reputationsafe
                    http://www.sajatypeworks.com0%URL Reputationsafe
                    http://www.typography.netD0%URL Reputationsafe
                    http://www.founder.com.cn/cn/cThe0%URL Reputationsafe
                    http://www.galapagosdesign.com/staff/dennis.htm0%URL Reputationsafe
                    http://fontfabrik.com0%URL Reputationsafe
                    http://www.founder.com.cn/cn0%URL Reputationsafe
                    http://rzfHpn.com0%Avira URL Cloudsafe
                    http://www.jiyu-kobo.co.jp/0%URL Reputationsafe
                    http://www.galapagosdesign.com/DPlease0%URL Reputationsafe
                    https://api.ipify.org%GETMozilla/5.00%URL Reputationsafe
                    http://www.sandoll.co.kr0%URL Reputationsafe
                    http://www.carterandcone.comead_0%Avira URL Cloudsafe
                    http://www.sajatypeworks.coma0%URL Reputationsafe
                    http://www.tiro.comf0%Avira URL Cloudsafe
                    http://www.urwpp.deDPlease0%URL Reputationsafe
                    http://www.zhongyicts.com.cn0%URL Reputationsafe
                    http://www.sakkal.com0%URL Reputationsafe
                    https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip0%URL Reputationsafe
                    http://www.tiro.com_0%Avira URL Cloudsafe
                    NameIPActiveMaliciousAntivirus DetectionReputation
                    us2.smtp.mailhostbox.com
                    162.222.225.29
                    truefalse
                      high
                      smtp.celoric.com
                      unknown
                      unknowntrueunknown
                      NameSourceMaliciousAntivirus DetectionReputation
                      http://pjLE02r21MVNC.comFattura Proforma (C) n 31.exe, 00000007.00000002.694265183.0000000002B0D000.00000004.00000800.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      http://127.0.0.1:HTTP/1.1Fattura Proforma (C) n 31.exe, 00000007.00000002.692745771.00000000027B1000.00000004.00000800.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: safe
                      low
                      http://www.apache.org/licenses/LICENSE-2.0Fattura Proforma (C) n 31.exe, 00000001.00000002.478450021.0000000007012000.00000004.00000800.00020000.00000000.sdmpfalse
                        high
                        http://www.fontbureau.comFattura Proforma (C) n 31.exe, 00000001.00000002.478450021.0000000007012000.00000004.00000800.00020000.00000000.sdmpfalse
                          high
                          http://www.fontbureau.com/designersGFattura Proforma (C) n 31.exe, 00000001.00000002.478450021.0000000007012000.00000004.00000800.00020000.00000000.sdmpfalse
                            high
                            http://DynDns.comDynDNSFattura Proforma (C) n 31.exe, 00000007.00000002.692745771.00000000027B1000.00000004.00000800.00020000.00000000.sdmpfalse
                            • URL Reputation: safe
                            unknown
                            http://www.sajatypeworks.com2Fattura Proforma (C) n 31.exe, 00000001.00000003.427581616.0000000005E1B000.00000004.00000800.00020000.00000000.sdmpfalse
                            • URL Reputation: safe
                            unknown
                            http://www.fontbureau.com/designers/?Fattura Proforma (C) n 31.exe, 00000001.00000002.478450021.0000000007012000.00000004.00000800.00020000.00000000.sdmpfalse
                              high
                              http://www.founder.com.cn/cn/bTheFattura Proforma (C) n 31.exe, 00000001.00000002.478450021.0000000007012000.00000004.00000800.00020000.00000000.sdmpfalse
                              • URL Reputation: safe
                              unknown
                              http://us2.smtp.mailhostbox.comFattura Proforma (C) n 31.exe, 00000007.00000002.694282802.0000000002B13000.00000004.00000800.00020000.00000000.sdmpfalse
                                high
                                https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip%tordir%%haFattura Proforma (C) n 31.exe, 00000007.00000002.692745771.00000000027B1000.00000004.00000800.00020000.00000000.sdmpfalse
                                • URL Reputation: safe
                                unknown
                                http://www.fontbureau.com/designers?Fattura Proforma (C) n 31.exe, 00000001.00000002.478450021.0000000007012000.00000004.00000800.00020000.00000000.sdmpfalse
                                  high
                                  http://www.carterandcone.comwityFattura Proforma (C) n 31.exe, 00000001.00000003.433392009.0000000005E05000.00000004.00000800.00020000.00000000.sdmp, Fattura Proforma (C) n 31.exe, 00000001.00000003.435190604.0000000005E0D000.00000004.00000800.00020000.00000000.sdmpfalse
                                  • Avira URL Cloud: safe
                                  unknown
                                  http://www.founder.com.cn/cnTFattura Proforma (C) n 31.exe, 00000001.00000003.430766280.0000000005E08000.00000004.00000800.00020000.00000000.sdmpfalse
                                  • URL Reputation: safe
                                  unknown
                                  http://www.tiro.comFattura Proforma (C) n 31.exe, 00000001.00000002.478450021.0000000007012000.00000004.00000800.00020000.00000000.sdmpfalse
                                  • URL Reputation: safe
                                  unknown
                                  http://smtp.celoric.comFattura Proforma (C) n 31.exe, 00000007.00000002.694282802.0000000002B13000.00000004.00000800.00020000.00000000.sdmpfalse
                                  • Avira URL Cloud: safe
                                  unknown
                                  http://www.fontbureau.com/designersFattura Proforma (C) n 31.exe, 00000001.00000002.478450021.0000000007012000.00000004.00000800.00020000.00000000.sdmpfalse
                                    high
                                    http://www.carterandcone.comcerEFattura Proforma (C) n 31.exe, 00000001.00000003.433392009.0000000005E05000.00000004.00000800.00020000.00000000.sdmp, Fattura Proforma (C) n 31.exe, 00000001.00000003.435302266.0000000005E0E000.00000004.00000800.00020000.00000000.sdmp, Fattura Proforma (C) n 31.exe, 00000001.00000003.435254801.0000000005E0E000.00000004.00000800.00020000.00000000.sdmp, Fattura Proforma (C) n 31.exe, 00000001.00000003.435190604.0000000005E0D000.00000004.00000800.00020000.00000000.sdmpfalse
                                    • Avira URL Cloud: safe
                                    unknown
                                    http://www.goodfont.co.krFattura Proforma (C) n 31.exe, 00000001.00000002.478450021.0000000007012000.00000004.00000800.00020000.00000000.sdmpfalse
                                    • URL Reputation: safe
                                    unknown
                                    http://www.carterandcone.comFattura Proforma (C) n 31.exe, 00000001.00000003.433392009.0000000005E05000.00000004.00000800.00020000.00000000.sdmp, Fattura Proforma (C) n 31.exe, 00000001.00000003.435190604.0000000005E0D000.00000004.00000800.00020000.00000000.sdmpfalse
                                    • URL Reputation: safe
                                    unknown
                                    https://api.ipify.org%$Fattura Proforma (C) n 31.exe, 00000007.00000002.692745771.00000000027B1000.00000004.00000800.00020000.00000000.sdmpfalse
                                    • Avira URL Cloud: safe
                                    low
                                    http://www.carterandcone.comlFattura Proforma (C) n 31.exe, 00000001.00000002.478450021.0000000007012000.00000004.00000800.00020000.00000000.sdmpfalse
                                    • URL Reputation: safe
                                    unknown
                                    http://www.sajatypeworks.comFattura Proforma (C) n 31.exe, 00000001.00000002.478450021.0000000007012000.00000004.00000800.00020000.00000000.sdmp, Fattura Proforma (C) n 31.exe, 00000001.00000003.427581616.0000000005E1B000.00000004.00000800.00020000.00000000.sdmpfalse
                                    • URL Reputation: safe
                                    unknown
                                    http://www.typography.netDFattura Proforma (C) n 31.exe, 00000001.00000002.478450021.0000000007012000.00000004.00000800.00020000.00000000.sdmpfalse
                                    • URL Reputation: safe
                                    unknown
                                    http://www.fontbureau.com/designers/cabarga.htmlNFattura Proforma (C) n 31.exe, 00000001.00000002.478450021.0000000007012000.00000004.00000800.00020000.00000000.sdmpfalse
                                      high
                                      http://www.founder.com.cn/cn/cTheFattura Proforma (C) n 31.exe, 00000001.00000002.478450021.0000000007012000.00000004.00000800.00020000.00000000.sdmpfalse
                                      • URL Reputation: safe
                                      unknown
                                      http://www.galapagosdesign.com/staff/dennis.htmFattura Proforma (C) n 31.exe, 00000001.00000002.478450021.0000000007012000.00000004.00000800.00020000.00000000.sdmpfalse
                                      • URL Reputation: safe
                                      unknown
                                      http://fontfabrik.comFattura Proforma (C) n 31.exe, 00000001.00000002.478450021.0000000007012000.00000004.00000800.00020000.00000000.sdmpfalse
                                      • URL Reputation: safe
                                      unknown
                                      http://www.founder.com.cn/cnFattura Proforma (C) n 31.exe, 00000001.00000002.478450021.0000000007012000.00000004.00000800.00020000.00000000.sdmpfalse
                                      • URL Reputation: safe
                                      unknown
                                      http://www.fontbureau.com/designers/frere-jones.htmlFattura Proforma (C) n 31.exe, 00000001.00000002.478450021.0000000007012000.00000004.00000800.00020000.00000000.sdmpfalse
                                        high
                                        http://rzfHpn.comFattura Proforma (C) n 31.exe, 00000007.00000002.692745771.00000000027B1000.00000004.00000800.00020000.00000000.sdmpfalse
                                        • Avira URL Cloud: safe
                                        unknown
                                        http://www.jiyu-kobo.co.jp/Fattura Proforma (C) n 31.exe, 00000001.00000002.478450021.0000000007012000.00000004.00000800.00020000.00000000.sdmpfalse
                                        • URL Reputation: safe
                                        unknown
                                        http://www.galapagosdesign.com/DPleaseFattura Proforma (C) n 31.exe, 00000001.00000002.478450021.0000000007012000.00000004.00000800.00020000.00000000.sdmpfalse
                                        • URL Reputation: safe
                                        unknown
                                        http://www.fontbureau.com/designers8Fattura Proforma (C) n 31.exe, 00000001.00000002.478450021.0000000007012000.00000004.00000800.00020000.00000000.sdmpfalse
                                          high
                                          https://api.ipify.org%GETMozilla/5.0Fattura Proforma (C) n 31.exe, 00000007.00000002.692745771.00000000027B1000.00000004.00000800.00020000.00000000.sdmpfalse
                                          • URL Reputation: safe
                                          low
                                          http://www.fonts.comFattura Proforma (C) n 31.exe, 00000001.00000002.478450021.0000000007012000.00000004.00000800.00020000.00000000.sdmpfalse
                                            high
                                            http://www.sandoll.co.krFattura Proforma (C) n 31.exe, 00000001.00000002.478450021.0000000007012000.00000004.00000800.00020000.00000000.sdmpfalse
                                            • URL Reputation: safe
                                            unknown
                                            http://www.carterandcone.comead_Fattura Proforma (C) n 31.exe, 00000001.00000003.433392009.0000000005E05000.00000004.00000800.00020000.00000000.sdmp, Fattura Proforma (C) n 31.exe, 00000001.00000003.435302266.0000000005E0E000.00000004.00000800.00020000.00000000.sdmp, Fattura Proforma (C) n 31.exe, 00000001.00000003.435254801.0000000005E0E000.00000004.00000800.00020000.00000000.sdmp, Fattura Proforma (C) n 31.exe, 00000001.00000003.435190604.0000000005E0D000.00000004.00000800.00020000.00000000.sdmpfalse
                                            • Avira URL Cloud: safe
                                            low
                                            http://www.sajatypeworks.comaFattura Proforma (C) n 31.exe, 00000001.00000003.427581616.0000000005E1B000.00000004.00000800.00020000.00000000.sdmpfalse
                                            • URL Reputation: safe
                                            unknown
                                            http://www.tiro.comfFattura Proforma (C) n 31.exe, 00000001.00000003.430955587.0000000005E08000.00000004.00000800.00020000.00000000.sdmpfalse
                                            • Avira URL Cloud: safe
                                            unknown
                                            http://www.urwpp.deDPleaseFattura Proforma (C) n 31.exe, 00000001.00000002.478450021.0000000007012000.00000004.00000800.00020000.00000000.sdmpfalse
                                            • URL Reputation: safe
                                            unknown
                                            http://www.zhongyicts.com.cnFattura Proforma (C) n 31.exe, 00000001.00000002.478450021.0000000007012000.00000004.00000800.00020000.00000000.sdmpfalse
                                            • URL Reputation: safe
                                            unknown
                                            http://www.sakkal.comFattura Proforma (C) n 31.exe, 00000001.00000002.478450021.0000000007012000.00000004.00000800.00020000.00000000.sdmpfalse
                                            • URL Reputation: safe
                                            unknown
                                            https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zipFattura Proforma (C) n 31.exe, 00000001.00000002.474516321.0000000003EC1000.00000004.00000800.00020000.00000000.sdmp, Fattura Proforma (C) n 31.exe, 00000007.00000000.469102375.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Fattura Proforma (C) n 31.exe, 00000007.00000000.467636633.0000000000402000.00000040.00000400.00020000.00000000.sdmpfalse
                                            • URL Reputation: safe
                                            unknown
                                            http://www.tiro.com_Fattura Proforma (C) n 31.exe, 00000001.00000003.430955587.0000000005E08000.00000004.00000800.00020000.00000000.sdmpfalse
                                            • Avira URL Cloud: safe
                                            low
                                            No contacted IP infos
                                            Joe Sandbox Version:34.0.0 Boulder Opal
                                            Analysis ID:632619
                                            Start date and time: 23/05/202220:34:502022-05-23 20:34:50 +02:00
                                            Joe Sandbox Product:CloudBasic
                                            Overall analysis duration:0h 10m 47s
                                            Hypervisor based Inspection enabled:false
                                            Report type:full
                                            Sample file name:Fattura Proforma (C) n 31.exe
                                            Cookbook file name:default.jbs
                                            Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
                                            Number of analysed new started processes analysed:23
                                            Number of new started drivers analysed:0
                                            Number of existing processes analysed:0
                                            Number of existing drivers analysed:0
                                            Number of injected processes analysed:0
                                            Technologies:
                                            • HCA enabled
                                            • EGA enabled
                                            • HDC enabled
                                            • AMSI enabled
                                            Analysis Mode:default
                                            Analysis stop reason:Timeout
                                            Detection:MAL
                                            Classification:mal100.troj.spyw.evad.winEXE@5/1@2/0
                                            EGA Information:
                                            • Successful, ratio: 66.7%
                                            HDC Information:Failed
                                            HCA Information:
                                            • Successful, ratio: 100%
                                            • Number of executed functions: 17
                                            • Number of non-executed functions: 2
                                            Cookbook Comments:
                                            • Found application associated with file extension: .exe
                                            • Adjust boot time
                                            • Enable AMSI
                                            • Exclude process from analysis (whitelisted): MpCmdRun.exe, audiodg.exe, BackgroundTransferHost.exe, WMIADAP.exe, conhost.exe, backgroundTaskHost.exe, svchost.exe, wuapihost.exe
                                            • Excluded domains from analysis (whitelisted): www.bing.com, ris.api.iris.microsoft.com, client.wns.windows.com, fs.microsoft.com, store-images.s-microsoft.com, login.live.com, sls.update.microsoft.com, ctldl.windowsupdate.com, displaycatalog.mp.microsoft.com, img-prod-cms-rt-microsoft-com.akamaized.net, arc.msn.com
                                            • Execution Graph export aborted for target Fattura Proforma (C) n 31.exe, PID 4984 because there are no executed function
                                            • Not all processes where analyzed, report is missing behavior information
                                            • Report size getting too big, too many NtAllocateVirtualMemory calls found.
                                            • Report size getting too big, too many NtOpenKeyEx calls found.
                                            TimeTypeDescription
                                            20:36:12API Interceptor601x Sleep call for process: Fattura Proforma (C) n 31.exe modified
                                            No context
                                            MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                            us2.smtp.mailhostbox.comNEW ORDER.exeGet hashmaliciousBrowse
                                            • 162.222.225.16
                                            wan6j8rMwQpe4SB.exeGet hashmaliciousBrowse
                                            • 208.91.198.38
                                            lUuRVnvmvP.exeGet hashmaliciousBrowse
                                            • 208.91.198.46
                                            400.xlsxGet hashmaliciousBrowse
                                            • 162.222.225.16
                                            Factura Proforma (C) n 31.exeGet hashmaliciousBrowse
                                            • 208.91.198.46
                                            SecuriteInfo.com.W32.AIDetectNet.01.8644.exeGet hashmaliciousBrowse
                                            • 208.91.198.46
                                            SWIFT COPY.exeGet hashmaliciousBrowse
                                            • 208.91.198.38
                                            DHL AWB - INVOICE AND SHIPPING DOCUMENTS.exeGet hashmaliciousBrowse
                                            • 208.91.198.38
                                            PO 18-3081.PDF.exeGet hashmaliciousBrowse
                                            • 208.91.198.46
                                            Factura Proforma (C) n 31.exeGet hashmaliciousBrowse
                                            • 162.222.225.16
                                            Factura Proforma (C) n 31.exeGet hashmaliciousBrowse
                                            • 162.222.225.16
                                            PT.xlsxGet hashmaliciousBrowse
                                            • 208.91.198.46
                                            Factura Proforma (C) n 31.exeGet hashmaliciousBrowse
                                            • 162.222.225.16
                                            MV SUNNY FAITHPORT & PDA INQUIRY.exeGet hashmaliciousBrowse
                                            • 208.91.198.46
                                            Draft BL.rar.exeGet hashmaliciousBrowse
                                            • 162.222.225.29
                                            MV. PACIFIC ENDEAVOR V2202 PARTICULARS I.docx.exeGet hashmaliciousBrowse
                                            • 162.222.225.16
                                            MV. BRAVE SAILOR (V.1801) - AGENT NOMINATION(Bunkering Only).exeGet hashmaliciousBrowse
                                            • 208.91.198.46
                                            PDA Query - 180397-05-16-22 Port Agency Appointment.exeGet hashmaliciousBrowse
                                            • 162.222.225.16
                                            MV SUNNY FAITHPORT & PDA INQUIRY.exeGet hashmaliciousBrowse
                                            • 162.222.225.29
                                            MV. BAOSHAN SUCCESS V.MS220512_AGENT APPOINTMENT .docx.exeGet hashmaliciousBrowse
                                            • 208.91.198.38
                                            No context
                                            No context
                                            No context
                                            Process:C:\Users\user\Desktop\Fattura Proforma (C) n 31.exe
                                            File Type:ASCII text, with CRLF line terminators
                                            Category:dropped
                                            Size (bytes):1308
                                            Entropy (8bit):5.345811588615766
                                            Encrypted:false
                                            SSDEEP:24:MLUE4K5E4Ks2E1qE4qXKDE4KhK3VZ9pKhPKIE4oKFKHKoZAE4Kzr7FE4x84FsXE8:MIHK5HKXE1qHiYHKhQnoPtHoxHhAHKzu
                                            MD5:2E016B886BDB8389D2DD0867BE55F87B
                                            SHA1:25D28EF2ACBB41764571E06E11BF4C05DD0E2F8B
                                            SHA-256:1D037CF00A8849E6866603297F85D3DABE09535E72EDD2636FB7D0F6C7DA3427
                                            SHA-512:C100729153954328AA2A77EECB2A3CBD03CB7E8E23D736000F890B17AAA50BA87745E30FB9E2B0D61E16DCA45694C79B4CE09B9F4475220BEB38CAEA546CFC2A
                                            Malicious:true
                                            Reputation:high, very likely benign file
                                            Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\4f0a7eefa3cd3e0ba98b5ebddbbc72e6\System.ni.dll",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\f1d8480152e0da9a60ad49c6d16a3b6d\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\8d67d92724ba494b6c7fd089d6f25b48\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Xml\b219d4630d26b88041b59c21
                                            File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                            Entropy (8bit):7.897680685593599
                                            TrID:
                                            • Win32 Executable (generic) Net Framework (10011505/4) 49.80%
                                            • Win32 Executable (generic) a (10002005/4) 49.75%
                                            • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                                            • Windows Screen Saver (13104/52) 0.07%
                                            • Generic Win/DOS Executable (2004/3) 0.01%
                                            File name:Fattura Proforma (C) n 31.exe
                                            File size:962560
                                            MD5:f9f9551391f15378d87182b087a0984e
                                            SHA1:c81a7c0b39cd213adb431813114cecd856190411
                                            SHA256:6c2b7249173f7259dad5915a88a0b571644fed8140cd0268a88395e2308a44e4
                                            SHA512:fb1319234b9a521e229247481fd7d9679802173f88391ac09be690467f243bd99e92dfe5b78f1eea01ceea247646c25cd3547fa879d98ccda2ff422104625a10
                                            SSDEEP:12288:02iN4d+uMWLHMHdhmePHbo6P5HajTUM5TdwG1VgUbN4FmJEirtm:01diCPhTnHwcGcgE
                                            TLSH:1F250221B2E58B49E9BE8BF4893052902776BD1AB5B0E61F4CD234CD3931B06DB51F63
                                            File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...n..b..............0.............6.... ........@.. ....................... ............@................................
                                            Icon Hash:00828e8e8686b000
                                            Entrypoint:0x4ec236
                                            Entrypoint Section:.text
                                            Digitally signed:false
                                            Imagebase:0x400000
                                            Subsystem:windows gui
                                            Image File Characteristics:32BIT_MACHINE, EXECUTABLE_IMAGE
                                            DLL Characteristics:NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
                                            Time Stamp:0x628B966E [Mon May 23 14:13:02 2022 UTC]
                                            TLS Callbacks:
                                            CLR (.Net) Version:v4.0.30319
                                            OS Version Major:4
                                            OS Version Minor:0
                                            File Version Major:4
                                            File Version Minor:0
                                            Subsystem Version Major:4
                                            Subsystem Version Minor:0
                                            Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
                                            Instruction
                                            jmp dword ptr [00402000h]
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            NameVirtual AddressVirtual Size Is in Section
                                            IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                            IMAGE_DIRECTORY_ENTRY_IMPORT0xec1e40x4f.text
                                            IMAGE_DIRECTORY_ENTRY_RESOURCE0xee0000x68c.rsrc
                                            IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                            IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                            IMAGE_DIRECTORY_ENTRY_BASERELOC0xf00000xc.reloc
                                            IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                            IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                            IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                            IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                            IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                            IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                            IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                                            IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                            IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                                            IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                            NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                            .text0x20000xea23c0xea400False0.91296608191data7.90435959734IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                                            .rsrc0xee0000x68c0x800False0.34521484375data3.60282141071IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                            .reloc0xf00000xc0x200False0.044921875data0.101910425663IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                            NameRVASizeTypeLanguageCountry
                                            RT_VERSION0xee0900x3fcdata
                                            RT_MANIFEST0xee49c0x1eaXML 1.0 document, UTF-8 Unicode (with BOM) text, with CRLF line terminators
                                            DLLImport
                                            mscoree.dll_CorExeMain
                                            DescriptionData
                                            Translation0x0000 0x04b0
                                            LegalCopyrightCopyright Delaware Technical Community College 2016
                                            Assembly Version1.0.0.0
                                            InternalNameRemotingXmlConfigFileD.exe
                                            FileVersion1.0.0.0
                                            CompanyNameDelaware Technical Community College
                                            LegalTrademarks
                                            Comments
                                            ProductNameCensus Project
                                            ProductVersion1.0.0.0
                                            FileDescriptionCensus Project
                                            OriginalFilenameRemotingXmlConfigFileD.exe
                                            TimestampSource PortDest PortSource IPDest IP
                                            May 23, 2022 20:38:04.784327984 CEST5652353192.168.2.58.8.8.8
                                            May 23, 2022 20:38:04.984673977 CEST53565238.8.8.8192.168.2.5
                                            May 23, 2022 20:38:04.988503933 CEST5890453192.168.2.58.8.8.8
                                            May 23, 2022 20:38:05.020514011 CEST53589048.8.8.8192.168.2.5
                                            TimestampSource IPDest IPTrans IDOP CodeNameTypeClass
                                            May 23, 2022 20:38:04.784327984 CEST192.168.2.58.8.8.80x215dStandard query (0)smtp.celoric.comA (IP address)IN (0x0001)
                                            May 23, 2022 20:38:04.988503933 CEST192.168.2.58.8.8.80x8e83Standard query (0)smtp.celoric.comA (IP address)IN (0x0001)
                                            TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClass
                                            May 23, 2022 20:38:04.984673977 CEST8.8.8.8192.168.2.50x215dNo error (0)smtp.celoric.comus2.smtp.mailhostbox.comCNAME (Canonical name)IN (0x0001)
                                            May 23, 2022 20:38:04.984673977 CEST8.8.8.8192.168.2.50x215dNo error (0)us2.smtp.mailhostbox.com162.222.225.29A (IP address)IN (0x0001)
                                            May 23, 2022 20:38:04.984673977 CEST8.8.8.8192.168.2.50x215dNo error (0)us2.smtp.mailhostbox.com208.91.198.46A (IP address)IN (0x0001)
                                            May 23, 2022 20:38:04.984673977 CEST8.8.8.8192.168.2.50x215dNo error (0)us2.smtp.mailhostbox.com162.222.225.16A (IP address)IN (0x0001)
                                            May 23, 2022 20:38:04.984673977 CEST8.8.8.8192.168.2.50x215dNo error (0)us2.smtp.mailhostbox.com208.91.198.38A (IP address)IN (0x0001)
                                            May 23, 2022 20:38:05.020514011 CEST8.8.8.8192.168.2.50x8e83No error (0)smtp.celoric.comus2.smtp.mailhostbox.comCNAME (Canonical name)IN (0x0001)
                                            May 23, 2022 20:38:05.020514011 CEST8.8.8.8192.168.2.50x8e83No error (0)us2.smtp.mailhostbox.com208.91.198.38A (IP address)IN (0x0001)
                                            May 23, 2022 20:38:05.020514011 CEST8.8.8.8192.168.2.50x8e83No error (0)us2.smtp.mailhostbox.com162.222.225.29A (IP address)IN (0x0001)
                                            May 23, 2022 20:38:05.020514011 CEST8.8.8.8192.168.2.50x8e83No error (0)us2.smtp.mailhostbox.com162.222.225.16A (IP address)IN (0x0001)
                                            May 23, 2022 20:38:05.020514011 CEST8.8.8.8192.168.2.50x8e83No error (0)us2.smtp.mailhostbox.com208.91.198.46A (IP address)IN (0x0001)

                                            Click to jump to process

                                            Click to jump to process

                                            Click to dive into process behavior distribution

                                            Click to jump to process

                                            Target ID:1
                                            Start time:20:36:00
                                            Start date:23/05/2022
                                            Path:C:\Users\user\Desktop\Fattura Proforma (C) n 31.exe
                                            Wow64 process (32bit):true
                                            Commandline:"C:\Users\user\Desktop\Fattura Proforma (C) n 31.exe"
                                            Imagebase:0x9e0000
                                            File size:962560 bytes
                                            MD5 hash:F9F9551391F15378D87182B087A0984E
                                            Has elevated privileges:true
                                            Has administrator privileges:true
                                            Programmed in:.Net C# or VB.NET
                                            Yara matches:
                                            • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000001.00000002.474516321.0000000003EC1000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                            • Rule: JoeSecurity_AgentTesla_2, Description: Yara detected AgentTesla, Source: 00000001.00000002.474516321.0000000003EC1000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                            • Rule: JoeSecurity_AntiVM_3, Description: Yara detected AntiVM_3, Source: 00000001.00000002.473781350.0000000002F02000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                            • Rule: MALWARE_Win_zgRAT, Description: Detects zgRAT, Source: 00000001.00000002.479896370.0000000007B00000.00000004.08000000.00040000.00000000.sdmp, Author: ditekSHen
                                            • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000001.00000002.474922718.00000000040A8000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                            • Rule: JoeSecurity_AgentTesla_2, Description: Yara detected AgentTesla, Source: 00000001.00000002.474922718.00000000040A8000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                            Reputation:low

                                            Target ID:5
                                            Start time:20:36:18
                                            Start date:23/05/2022
                                            Path:C:\Users\user\Desktop\Fattura Proforma (C) n 31.exe
                                            Wow64 process (32bit):false
                                            Commandline:C:\Users\user\Desktop\Fattura Proforma (C) n 31.exe
                                            Imagebase:0x420000
                                            File size:962560 bytes
                                            MD5 hash:F9F9551391F15378D87182B087A0984E
                                            Has elevated privileges:true
                                            Has administrator privileges:true
                                            Programmed in:C, C++ or other language
                                            Reputation:low

                                            Target ID:7
                                            Start time:20:36:19
                                            Start date:23/05/2022
                                            Path:C:\Users\user\Desktop\Fattura Proforma (C) n 31.exe
                                            Wow64 process (32bit):true
                                            Commandline:C:\Users\user\Desktop\Fattura Proforma (C) n 31.exe
                                            Imagebase:0x480000
                                            File size:962560 bytes
                                            MD5 hash:F9F9551391F15378D87182B087A0984E
                                            Has elevated privileges:true
                                            Has administrator privileges:true
                                            Programmed in:.Net C# or VB.NET
                                            Yara matches:
                                            • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000007.00000000.469102375.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                            • Rule: JoeSecurity_AgentTesla_2, Description: Yara detected AgentTesla, Source: 00000007.00000000.469102375.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                            • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000007.00000000.469793315.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                            • Rule: JoeSecurity_AgentTesla_2, Description: Yara detected AgentTesla, Source: 00000007.00000000.469793315.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                            • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000007.00000000.468372244.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                            • Rule: JoeSecurity_AgentTesla_2, Description: Yara detected AgentTesla, Source: 00000007.00000000.468372244.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                            • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000007.00000002.690586626.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                            • Rule: JoeSecurity_AgentTesla_2, Description: Yara detected AgentTesla, Source: 00000007.00000002.690586626.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                            • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000007.00000000.467636633.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                            • Rule: JoeSecurity_AgentTesla_2, Description: Yara detected AgentTesla, Source: 00000007.00000000.467636633.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                            • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000007.00000002.692745771.00000000027B1000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                            • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000007.00000002.692745771.00000000027B1000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                            • Rule: MALWARE_Win_AgentTeslaV3, Description: AgentTeslaV3 infostealer payload, Source: 00000007.00000002.692745771.00000000027B1000.00000004.00000800.00020000.00000000.sdmp, Author: ditekSHen
                                            Reputation:low

                                            Reset < >

                                              Execution Graph

                                              Execution Coverage:9.1%
                                              Dynamic/Decrypted Code Coverage:100%
                                              Signature Coverage:0%
                                              Total number of Nodes:10
                                              Total number of Limit Nodes:0
                                              execution_graph 26751 5392410 26755 5392430 26751->26755 26759 5392440 26751->26759 26752 539242a 26756 5392440 26755->26756 26757 53924da CallWindowProcW 26756->26757 26758 5392489 26756->26758 26757->26758 26758->26752 26760 5392482 26759->26760 26762 5392489 26759->26762 26761 53924da CallWindowProcW 26760->26761 26760->26762 26761->26762 26762->26752

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 192 53974b8-53974e3 193 53974ea-5397d76 call 5396e34 call 5396e44 * 2 call 5396e54 call 5396e64 call 53970a8 call 5396e54 call 5396e44 * 2 call 5396e54 call 5396e44 * 3 call 53970b8 call 53970c8 call 53970d8 call 53970e8 call 53970f8 call 5397108 call 5397118 call 5397128 call 5397138 call 5397148 call 5397158 call 5397168 call 5397178 call 5397188 192->193 194 53974e5 192->194 326 5397d78-5397d84 193->326 327 5397da0 193->327 194->193 329 5397d8e-5397d94 326->329 330 5397d86-5397d8c 326->330 328 5397da6-5397e9b call 5397198 call 53971a8 327->328 342 5397e9d-5397ea9 328->342 343 5397ec5 328->343 331 5397d9e 329->331 330->331 331->328 344 5397eab-5397eb1 342->344 345 5397eb3-5397eb9 342->345 346 5397ecb-53981e6 call 5397198 call 53971a8 call 5397198 call 53971b8 call 53971c8 call 5397198 call 53971d8 call 5397198 call 53971d8 call 5397198 343->346 347 5397ec3 344->347 345->347 384 53981e8-53981f4 346->384 385 5398210 346->385 347->346 387 53981fe-5398204 384->387 388 53981f6-53981fc 384->388 386 5398216-5398314 call 5397198 call 53971a8 385->386 400 539833e 386->400 401 5398316-5398322 386->401 389 539820e 387->389 388->389 389->386 404 5398344-53984a5 call 5397198 call 53971a8 call 5397198 400->404 402 539832c-5398332 401->402 403 5398324-539832a 401->403 405 539833c 402->405 403->405 420 53984cf 404->420 421 53984a7-53984b3 404->421 405->404 424 53984d5-53985dc call 5397198 call 53971a8 420->424 422 53984bd-53984c3 421->422 423 53984b5-53984bb 421->423 425 53984cd 422->425 423->425 436 53985de-53985ea 424->436 437 5398606 424->437 425->424 438 53985ec-53985f2 436->438 439 53985f4-53985fa 436->439 440 539860c-539872a call 5397198 call 53971a8 437->440 441 5398604 438->441 439->441 453 539872c-5398738 440->453 454 5398754 440->454 441->440 455 539873a-5398740 453->455 456 5398742-5398748 453->456 457 539875a-5398a50 call 5397198 call 53971e8 call 53971f8 call 5397208 call 5397218 call 5397108 call 5397158 call 5397178 call 5397188 454->457 458 5398752 455->458 456->458 539 5398a52 call 7609f20 457->539 540 5398a52 call 7609f11 457->540 458->457 493 5398a58-5398ccc call 5397228 call 5397238 call 760a890 call 5397248 call 5397258 544 5398ccf call 760bdb0 493->544 545 5398ccf call 760bda2 493->545 520 5398cd2-5398cf8 call 5397258 546 5398cfb call 760bdb0 520->546 547 5398cfb call 760bda2 520->547 523 5398cfe-5398d6c call 5397158 call 5397268 537 5398d6e call 539c60f 523->537 538 5398d6e call 539c630 523->538 531 5398d73-5398d8e call 5397278 541 5398d90 call 539c60f 531->541 542 5398d90 call 539c630 531->542 534 5398d95-5398d9c call 5397278 536 5398da1-5398da9 534->536 537->531 538->531 539->493 540->493 541->534 542->534 544->520 545->520 546->523 547->523
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000001.00000002.477767801.0000000005390000.00000040.00000800.00020000.00000000.sdmp, Offset: 05390000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_1_2_5390000_Fattura Proforma (C) n 31.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID: $%#m
                                              • API String ID: 0-3174566394
                                              • Opcode ID: 078c7a370fb7fbf09ac8d7e3c38582d398c203782ac8a83d302d0da1ba12d460
                                              • Instruction ID: 2d5d543fb5af6b7d8f68e5c52f57a4637a1da1e7eee85f15095f4d15a104c4ad
                                              • Opcode Fuzzy Hash: 078c7a370fb7fbf09ac8d7e3c38582d398c203782ac8a83d302d0da1ba12d460
                                              • Instruction Fuzzy Hash: 55F2A334A10218CFDB24DB64C894ED9B7B2FF8A300F5185E9E9096B365DB71AE81CF51
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 548 53974b2-53974e3 550 53974ea-5397569 548->550 551 53974e5 548->551 559 5397573-539758b call 5396e34 550->559 551->550 561 5397590-53975a7 559->561 563 53975b1-53975bd call 5396e44 561->563 565 53975c2-539760b call 5396e44 563->565 571 5397615-5397621 call 5396e54 565->571 573 5397626-539763d 571->573 575 5397647-5397653 call 5396e64 573->575 577 5397658-53977ff call 53970a8 call 5396e54 call 5396e44 * 2 call 5396e54 call 5396e44 * 3 575->577 611 5397809-5397815 call 53970b8 577->611 613 539781a-5397831 611->613 615 539783b-5397841 613->615 616 539784d-5397b9b call 53970c8 call 53970d8 call 53970e8 call 53970f8 615->616 658 5397ba5-5397bae 616->658 659 5397bb6-5397c51 call 5397108 call 5397118 call 5397128 call 5397138 658->659 668 5397c56-5397c71 call 5397148 659->668 670 5397c76-5397c8b call 5397158 668->670 672 5397c90-5397cab call 5397168 670->672 674 5397cb0-5397cd2 672->674 675 5397cdc-5397cf3 call 5397178 674->675 677 5397cf8-5397d76 call 5397188 675->677 683 5397d78-5397d84 677->683 684 5397da0 677->684 686 5397d8e-5397d94 683->686 687 5397d86-5397d8c 683->687 685 5397da6-5397dba 684->685 689 5397dbf-5397e9b call 5397198 call 53971a8 685->689 688 5397d9e 686->688 687->688 688->685 699 5397e9d-5397ea9 689->699 700 5397ec5 689->700 701 5397eab-5397eb1 699->701 702 5397eb3-5397eb9 699->702 703 5397ecb-5398047 call 5397198 call 53971a8 call 5397198 call 53971b8 call 53971c8 call 5397198 700->703 704 5397ec3 701->704 702->704 723 5398051-5398068 703->723 704->703 724 539806e-53981e6 call 53971d8 call 5397198 call 53971d8 call 5397198 723->724 741 53981e8-53981f4 724->741 742 5398210 724->742 744 53981fe-5398204 741->744 745 53981f6-53981fc 741->745 743 5398216-5398314 call 5397198 call 53971a8 742->743 757 539833e 743->757 758 5398316-5398322 743->758 746 539820e 744->746 745->746 746->743 761 5398344-53984a5 call 5397198 call 53971a8 call 5397198 757->761 759 539832c-5398332 758->759 760 5398324-539832a 758->760 762 539833c 759->762 760->762 777 53984cf 761->777 778 53984a7-53984b3 761->778 762->761 781 53984d5-53985dc call 5397198 call 53971a8 777->781 779 53984bd-53984c3 778->779 780 53984b5-53984bb 778->780 782 53984cd 779->782 780->782 793 53985de-53985ea 781->793 794 5398606 781->794 782->781 795 53985ec-53985f2 793->795 796 53985f4-53985fa 793->796 797 539860c-539872a call 5397198 call 53971a8 794->797 798 5398604 795->798 796->798 810 539872c-5398738 797->810 811 5398754 797->811 798->797 812 539873a-5398740 810->812 813 5398742-5398748 810->813 814 539875a-539880b call 5397198 call 53971e8 811->814 815 5398752 812->815 813->815 823 5398810-5398824 call 53971f8 814->823 815->814 825 5398829-53988f3 call 5397208 823->825 834 53988fd-539890b 825->834 835 5398911-5398959 call 5397218 834->835 838 5398961-539897b call 5397108 835->838 840 5398980-53989c5 call 5397158 838->840 843 53989cf-53989e9 call 5397178 840->843 845 53989ee-5398a35 call 5397188 843->845 849 5398a3d-5398a50 845->849 896 5398a52 call 7609f20 849->896 897 5398a52 call 7609f11 849->897 850 5398a58-5398c48 call 5397228 call 5397238 870 5398c4d-5398c5a call 760a890 850->870 871 5398c60-5398cad call 5397248 call 5397258 870->871 876 5398cb2-5398ccc 871->876 901 5398ccf call 760bdb0 876->901 902 5398ccf call 760bda2 876->902 877 5398cd2-5398cd9 call 5397258 879 5398cde-5398cf8 877->879 903 5398cfb call 760bdb0 879->903 904 5398cfb call 760bda2 879->904 880 5398cfe-5398d58 call 5397158 call 5397268 887 5398d5d-5398d6c 880->887 894 5398d6e call 539c60f 887->894 895 5398d6e call 539c630 887->895 888 5398d73-5398d8e call 5397278 898 5398d90 call 539c60f 888->898 899 5398d90 call 539c630 888->899 891 5398d95-5398d9c call 5397278 893 5398da1-5398da9 891->893 894->888 895->888 896->850 897->850 898->891 899->891 901->877 902->877 903->880 904->880
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000001.00000002.477767801.0000000005390000.00000040.00000800.00020000.00000000.sdmp, Offset: 05390000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_1_2_5390000_Fattura Proforma (C) n 31.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID: $%#m
                                              • API String ID: 0-3174566394
                                              • Opcode ID: b5cd2dea6772482e0e1de781ae0715a18c033d7a03f50c9964968d51ca64133a
                                              • Instruction ID: 31ebe3d4c0d3629d5553c1021f62941901e00b451d787b99da94c26bcb154c18
                                              • Opcode Fuzzy Hash: b5cd2dea6772482e0e1de781ae0715a18c033d7a03f50c9964968d51ca64133a
                                              • Instruction Fuzzy Hash: 02F2A334A10218CFDB14DB64C894ED9B7B2FF8A300F5185E9E909AB365DB71AE81CF51
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              Memory Dump Source
                                              • Source File: 00000001.00000002.478905765.0000000007600000.00000040.00000800.00020000.00000000.sdmp, Offset: 07600000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_1_2_7600000_Fattura Proforma (C) n 31.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 5b4eca4c57007ffcdbfc5fc175015d1a54cc06bcfe8470fca1602edd98dc290d
                                              • Instruction ID: ea71db8de41c7e2033fea82a804404cc1109f59af60fe1919d2e59620c6a91c8
                                              • Opcode Fuzzy Hash: 5b4eca4c57007ffcdbfc5fc175015d1a54cc06bcfe8470fca1602edd98dc290d
                                              • Instruction Fuzzy Hash: 3412D571D1071ACFCB15DF68C884AD9F7B1BF99300F0486AAD959A7251EB70AAC5CF80
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              Memory Dump Source
                                              • Source File: 00000001.00000002.478905765.0000000007600000.00000040.00000800.00020000.00000000.sdmp, Offset: 07600000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_1_2_7600000_Fattura Proforma (C) n 31.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 1afe158b8c83879409c5c87a0b16bd39e9cb2bf5d1f328a15253eb1309aafccb
                                              • Instruction ID: 09c9a3abca26520d6c5342ec7027338f187945c82a901235657aba0b9e86086e
                                              • Opcode Fuzzy Hash: 1afe158b8c83879409c5c87a0b16bd39e9cb2bf5d1f328a15253eb1309aafccb
                                              • Instruction Fuzzy Hash: FA12E671D1071ACFCB15DF68C884AD9F7B1BF99300F0486AAD859A7251EB70AAC5CF80
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 950 5392440-539247c 951 539252c-539254c 950->951 952 5392482-5392487 950->952 958 539254f-539255c 951->958 953 5392489-53924c0 952->953 954 53924da-5392512 CallWindowProcW 952->954 961 53924c9-53924d8 953->961 962 53924c2-53924c8 953->962 955 539251b-539252a 954->955 956 5392514-539251a 954->956 955->958 956->955 961->958 962->961
                                              APIs
                                              • CallWindowProcW.USER32(?,?,?,?,?), ref: 05392501
                                              Memory Dump Source
                                              • Source File: 00000001.00000002.477767801.0000000005390000.00000040.00000800.00020000.00000000.sdmp, Offset: 05390000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_1_2_5390000_Fattura Proforma (C) n 31.jbxd
                                              Similarity
                                              • API ID: CallProcWindow
                                              • String ID:
                                              • API String ID: 2714655100-0
                                              • Opcode ID: 98c014540668df9eb65efc5ac1c428e95660390c993e3e9d64682caa29892e1d
                                              • Instruction ID: 1be96212d1a46d93aa976c6aba9f62d20cca387376cb6edeef4173aa75662a72
                                              • Opcode Fuzzy Hash: 98c014540668df9eb65efc5ac1c428e95660390c993e3e9d64682caa29892e1d
                                              • Instruction Fuzzy Hash: 94411AB8A006459FCB14CF99C488AABFBF6FF88314F158459E419AB321D374A945CFA0
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              Memory Dump Source
                                              • Source File: 00000001.00000002.478905765.0000000007600000.00000040.00000800.00020000.00000000.sdmp, Offset: 07600000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_1_2_7600000_Fattura Proforma (C) n 31.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 014ed4ab17ee7172ea128dbd28467d422c18bac9e596c09cbe745072ae66edf4
                                              • Instruction ID: 219fe76a8eb579a6cabe5c0332acbd8ce81a76781a57c59bac15b24eab2c455b
                                              • Opcode Fuzzy Hash: 014ed4ab17ee7172ea128dbd28467d422c18bac9e596c09cbe745072ae66edf4
                                              • Instruction Fuzzy Hash: 7D52E1757001158FCB189BB8C855AAF77A7AF89314F148979E107DB3A6DF34DC028BA2
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              Memory Dump Source
                                              • Source File: 00000001.00000002.478905765.0000000007600000.00000040.00000800.00020000.00000000.sdmp, Offset: 07600000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_1_2_7600000_Fattura Proforma (C) n 31.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 73b4d20d226f14b4d6e3b66e502af4f5d25bbd6cf87cdcfa9468313522f7dbe2
                                              • Instruction ID: 44f3bf06cb33b1f13508c45f62b319061441ca9d14e1d28fcc157a4707b48179
                                              • Opcode Fuzzy Hash: 73b4d20d226f14b4d6e3b66e502af4f5d25bbd6cf87cdcfa9468313522f7dbe2
                                              • Instruction Fuzzy Hash: B3A19275B041085FDB69A7B888157BF77ABAFC8208F148C3D910AD7389DF799C428792
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              Execution Graph

                                              Execution Coverage:11.7%
                                              Dynamic/Decrypted Code Coverage:100%
                                              Signature Coverage:16%
                                              Total number of Nodes:25
                                              Total number of Limit Nodes:4
                                              execution_graph 38597 bdf498 38599 bdf4b3 38597->38599 38600 bdf884 38599->38600 38601 bdee88 RegQueryValueExW 38599->38601 38601->38599 38611 bde908 38615 bde927 38611->38615 38612 bdeb91 38614 bda87c RegQueryValueExW 38614->38615 38615->38612 38615->38614 38616 bda870 38615->38616 38617 bdec20 RegOpenKeyExW 38616->38617 38619 bdece6 38617->38619 38619->38619 38593 c81740 38594 c8175f LdrInitializeThunk 38593->38594 38596 c817b0 38594->38596 38602 c816e1 38608 c8177e 38602->38608 38604 c81701 38606 c81793 LdrInitializeThunk 38607 c817b0 38606->38607 38609 c81793 LdrInitializeThunk 38608->38609 38610 c816e6 38609->38610 38610->38604 38610->38606 38620 bee640 38621 bee665 38620->38621 38622 bee7df 38621->38622 38623 beedc4 LdrInitializeThunk 38621->38623 38623->38621

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 3319 bee640-bee746 3336 bee79d-bee7a7 3319->3336 3337 bee748-bee789 3319->3337 3340 bee7ad-bee7dd call be2e14 3336->3340 3337->3336 3342 bee78b-bee79b 3337->3342 3348 bee7df-bee7e8 3340->3348 3349 bee7ed-beeb9a 3340->3349 3342->3340 3350 bef1b8-bef1c5 3348->3350 3388 bef185-bef1a8 3349->3388 3389 beeba0-beebad 3349->3389 3390 bef1ad-bef1b7 3388->3390 3389->3390 3391 beebb3-beec1e 3389->3391 3390->3350 3391->3388 3402 beec24-beec59 3391->3402 3405 beec5b-beec80 3402->3405 3406 beec82-beec8a 3402->3406 3409 beec8d-beecd6 call be2e20 3405->3409 3406->3409 3415 bef16c-bef172 3409->3415 3416 beecdc-beed34 call be2e2c 3409->3416 3415->3388 3417 bef174-bef17d 3415->3417 3416->3415 3424 beed3a-beed44 3416->3424 3417->3391 3418 bef183 3417->3418 3418->3390 3424->3415 3425 beed4a-beed5d 3424->3425 3425->3415 3426 beed63-beed8a 3425->3426 3430 bef12d-bef150 3426->3430 3431 beed90-beed93 3426->3431 3439 bef155-bef15b 3430->3439 3431->3430 3432 beed99-beedd3 LdrInitializeThunk 3431->3432 3442 beedd9-beee28 3432->3442 3439->3388 3441 bef15d-bef166 3439->3441 3441->3415 3441->3426 3450 beee2e-beee67 3442->3450 3451 beef6d-beef73 3442->3451 3455 beef89-beef8f 3450->3455 3467 beee6d-beeea3 3450->3467 3452 beef75-beef77 3451->3452 3453 beef81 3451->3453 3452->3453 3453->3455 3456 beef9d-beefa0 3455->3456 3457 beef91-beef93 3455->3457 3459 beefab-beefb1 3456->3459 3457->3456 3461 beefbf-beefc2 3459->3461 3462 beefb3-beefb5 3459->3462 3464 beef11-beef41 call be2e38 3461->3464 3462->3461 3470 beef43-beef62 3464->3470 3474 beeea9-beeecc 3467->3474 3475 beefc7-beeff5 call be2e44 3467->3475 3477 beeffa-bef04c 3470->3477 3478 beef68 3470->3478 3474->3475 3485 beeed2-beef05 3474->3485 3475->3470 3498 bef04e-bef054 3477->3498 3499 bef056-bef05c 3477->3499 3478->3439 3485->3459 3497 beef0b 3485->3497 3497->3464 3500 bef06d-bef08b 3498->3500 3501 bef05e-bef060 3499->3501 3502 bef06a 3499->3502 3506 bef0af-bef12b 3500->3506 3507 bef08d-bef09d 3500->3507 3501->3502 3502->3500 3506->3439 3507->3506 3510 bef09f-bef0a8 3507->3510 3510->3506
                                              APIs
                                              Memory Dump Source
                                              • Source File: 00000007.00000002.691839596.0000000000BE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00BE0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_7_2_be0000_Fattura Proforma (C) n 31.jbxd
                                              Similarity
                                              • API ID: InitializeThunk
                                              • String ID:
                                              • API String ID: 2994545307-0
                                              • Opcode ID: f886c12399f93ea29c04e6a4fd37b8dd86670c3fbfedbc476f54b8ab29ad25ad
                                              • Instruction ID: c71cd06f242547f003419a05affda5ea1da697545f7eeefc5d4c8af1445170ce
                                              • Opcode Fuzzy Hash: f886c12399f93ea29c04e6a4fd37b8dd86670c3fbfedbc476f54b8ab29ad25ad
                                              • Instruction Fuzzy Hash: 00623B30E007598FCB24EF79C85469EB7F2AF89304F1185A9D54AAB354EF309E85CB91
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 4136 c816e1-c816ff call c8177e 4139 c81701-c8170b 4136->4139 4140 c81724-c817aa LdrInitializeThunk 4136->4140 4141 c8170d-c8171e 4139->4141 4142 c81720-c81723 4139->4142 4154 c817b0-c817ca 4140->4154 4155 c818f3-c81910 4140->4155 4141->4142 4154->4155 4158 c817d0-c817ea 4154->4158 4167 c81915-c8191e 4155->4167 4162 c817ec-c817ee 4158->4162 4163 c817f0 4158->4163 4164 c817f3-c8184e 4162->4164 4163->4164 4173 c81850-c81852 4164->4173 4174 c81854 4164->4174 4175 c81857-c818f1 4173->4175 4174->4175 4175->4167
                                              Memory Dump Source
                                              • Source File: 00000007.00000002.691886326.0000000000C80000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C80000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_7_2_c80000_Fattura Proforma (C) n 31.jbxd
                                              Similarity
                                              • API ID: InitializeThunk
                                              • String ID:
                                              • API String ID: 2994545307-0
                                              • Opcode ID: 9504f91ae764499da870a07f40498823ac81af1e6aab40ea540dc27c62661a44
                                              • Instruction ID: eddad3f3ea792078f99491eb4be2417012078da1ee13763604c0896200f52de7
                                              • Opcode Fuzzy Hash: 9504f91ae764499da870a07f40498823ac81af1e6aab40ea540dc27c62661a44
                                              • Instruction Fuzzy Hash: D451D330A043459FCB04EFB4C855AAE77F6AF85304F15896AE502DB395EF70AD05CBA0
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 4192 c81740-c817aa LdrInitializeThunk 4200 c817b0-c817ca 4192->4200 4201 c818f3-c81910 4192->4201 4200->4201 4204 c817d0-c817ea 4200->4204 4213 c81915-c8191e 4201->4213 4208 c817ec-c817ee 4204->4208 4209 c817f0 4204->4209 4210 c817f3-c8184e 4208->4210 4209->4210 4219 c81850-c81852 4210->4219 4220 c81854 4210->4220 4221 c81857-c818f1 4219->4221 4220->4221 4221->4213
                                              APIs
                                              Memory Dump Source
                                              • Source File: 00000007.00000002.691886326.0000000000C80000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C80000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_7_2_c80000_Fattura Proforma (C) n 31.jbxd
                                              Similarity
                                              • API ID: InitializeThunk
                                              • String ID:
                                              • API String ID: 2994545307-0
                                              • Opcode ID: 64714cfa694d0fff8292b615b4363bf2367936543002b4be50091a7c64f567ba
                                              • Instruction ID: a60eade4136238277608488162f79ef96663327277de8c3c1252ddf3ace41f8d
                                              • Opcode Fuzzy Hash: 64714cfa694d0fff8292b615b4363bf2367936543002b4be50091a7c64f567ba
                                              • Instruction Fuzzy Hash: ED51C634A042459BCB04EFB4C845AAEB7FAFF85304F158969E5069B395DF70ED05C7A0
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 4238 bdebc1-bdebdf 4239 bdec04-bdec70 4238->4239 4240 bdebe1-bdebeb 4238->4240 4245 bdec78 4239->4245 4246 bdec72-bdec75 4239->4246 4241 bdebed-bdebfe 4240->4241 4242 bdec00-bdec03 4240->4242 4241->4242 4247 bdec82-bdece4 RegOpenKeyExW 4245->4247 4246->4245 4248 bdeced-bded25 4247->4248 4249 bdece6-bdecec 4247->4249 4253 bded38 4248->4253 4254 bded27-bded30 4248->4254 4249->4248 4255 bded39 4253->4255 4254->4253 4255->4255
                                              APIs
                                              • RegOpenKeyExW.KERNELBASE(80000001,00000000,?,00000001,?), ref: 00BDECD4
                                              Memory Dump Source
                                              • Source File: 00000007.00000002.691810474.0000000000BD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00BD0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_7_2_bd0000_Fattura Proforma (C) n 31.jbxd
                                              Similarity
                                              • API ID: Open
                                              • String ID:
                                              • API String ID: 71445658-0
                                              • Opcode ID: 8c2280206aa9eb6f250476dcebb002c331649eb4560a25ce48e39142b5a1b0ce
                                              • Instruction ID: 43599723ef1b69ed81f0ae489ad24f10e8af04aeb0c3675d9933cbdd3402f2d0
                                              • Opcode Fuzzy Hash: 8c2280206aa9eb6f250476dcebb002c331649eb4560a25ce48e39142b5a1b0ce
                                              • Instruction Fuzzy Hash: 684148B0E042498FDB10CFA8C588A9EFFF6AF49304F28C5AAD409AB341D7799845CB51
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 4256 c8177e-c817aa LdrInitializeThunk 4258 c817b0-c817ca 4256->4258 4259 c818f3-c81910 4256->4259 4258->4259 4262 c817d0-c817ea 4258->4262 4271 c81915-c8191e 4259->4271 4266 c817ec-c817ee 4262->4266 4267 c817f0 4262->4267 4268 c817f3-c8184e 4266->4268 4267->4268 4277 c81850-c81852 4268->4277 4278 c81854 4268->4278 4279 c81857-c818f1 4277->4279 4278->4279 4279->4271
                                              APIs
                                              Memory Dump Source
                                              • Source File: 00000007.00000002.691886326.0000000000C80000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C80000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_7_2_c80000_Fattura Proforma (C) n 31.jbxd
                                              Similarity
                                              • API ID: InitializeThunk
                                              • String ID:
                                              • API String ID: 2994545307-0
                                              • Opcode ID: 206264db9dc34d0a481e3c3f4bf26fc5764c5010505a3bb6d5974565e13315f2
                                              • Instruction ID: 58151c4da31fe526c78f8bc2afa201e9baa507b90f65874664d509bded859614
                                              • Opcode Fuzzy Hash: 206264db9dc34d0a481e3c3f4bf26fc5764c5010505a3bb6d5974565e13315f2
                                              • Instruction Fuzzy Hash: 8C419630A042499FCB04EFB4C845AEEB7F6BF49304F148969E5119B355DF70A905CB61
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 4296 bdee88-bdee97 4297 bdeebc-bdef41 4296->4297 4298 bdee99-bdeea3 4296->4298 4304 bdef49-bdef53 4297->4304 4305 bdef43-bdef46 4297->4305 4299 bdeeb8-bdeebb 4298->4299 4300 bdeea5-bdeeb6 4298->4300 4300->4299 4306 bdef5f-bdefa1 RegQueryValueExW 4304->4306 4307 bdef55-bdef5d 4304->4307 4305->4304 4308 bdefaa-bdefe4 4306->4308 4309 bdefa3-bdefa9 4306->4309 4307->4306 4313 bdefee 4308->4313 4314 bdefe6 4308->4314 4309->4308 4315 bdefef 4313->4315 4314->4313 4315->4315
                                              APIs
                                              • RegQueryValueExW.KERNELBASE(00000000,00000000,?,?,00000000,?), ref: 00BDEF91
                                              Memory Dump Source
                                              • Source File: 00000007.00000002.691810474.0000000000BD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00BD0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_7_2_bd0000_Fattura Proforma (C) n 31.jbxd
                                              Similarity
                                              • API ID: QueryValue
                                              • String ID:
                                              • API String ID: 3660427363-0
                                              • Opcode ID: 22fe14a90be0241fe503bb78772379c874d55148d10738bd493e39219b47e61b
                                              • Instruction ID: aa74d2ea2ed0484fba0b9ccba592aaddb3337a03363c9d25bce85da197bc54d2
                                              • Opcode Fuzzy Hash: 22fe14a90be0241fe503bb78772379c874d55148d10738bd493e39219b47e61b
                                              • Instruction Fuzzy Hash: AC4124B1E04259DFDB10DFA9C884ADEFBF5AF48300F15846AE819AB354E7749845CF90
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 4416 bda87c-bdef41 4419 bdef49-bdef53 4416->4419 4420 bdef43-bdef46 4416->4420 4421 bdef5f-bdefa1 RegQueryValueExW 4419->4421 4422 bdef55-bdef5d 4419->4422 4420->4419 4423 bdefaa-bdefe4 4421->4423 4424 bdefa3-bdefa9 4421->4424 4422->4421 4428 bdefee 4423->4428 4429 bdefe6 4423->4429 4424->4423 4430 bdefef 4428->4430 4429->4428 4430->4430
                                              APIs
                                              • RegQueryValueExW.KERNELBASE(00000000,00000000,?,?,00000000,?), ref: 00BDEF91
                                              Memory Dump Source
                                              • Source File: 00000007.00000002.691810474.0000000000BD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00BD0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_7_2_bd0000_Fattura Proforma (C) n 31.jbxd
                                              Similarity
                                              • API ID: QueryValue
                                              • String ID:
                                              • API String ID: 3660427363-0
                                              • Opcode ID: 9bf0057e684ac387f683c26e1a0ca5f87717d7549e1b7f450e9953575605f956
                                              • Instruction ID: 4f51b9a5c14bb47a163bd1f8475a816a8192882380889393b3c5103241b3fe4f
                                              • Opcode Fuzzy Hash: 9bf0057e684ac387f683c26e1a0ca5f87717d7549e1b7f450e9953575605f956
                                              • Instruction Fuzzy Hash: E331EFB1D042589FDB20DF9AD884ADEFBF5BF48310F14806AE829AB354D7749905CFA0
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 4431 bda870-bdec70 4433 bdec78-bdece4 RegOpenKeyExW 4431->4433 4434 bdec72-bdec75 4431->4434 4436 bdeced-bded25 4433->4436 4437 bdece6-bdecec 4433->4437 4434->4433 4441 bded38 4436->4441 4442 bded27-bded30 4436->4442 4437->4436 4443 bded39 4441->4443 4442->4441 4443->4443
                                              APIs
                                              • RegOpenKeyExW.KERNELBASE(80000001,00000000,?,00000001,?), ref: 00BDECD4
                                              Memory Dump Source
                                              • Source File: 00000007.00000002.691810474.0000000000BD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00BD0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_7_2_bd0000_Fattura Proforma (C) n 31.jbxd
                                              Similarity
                                              • API ID: Open
                                              • String ID:
                                              • API String ID: 71445658-0
                                              • Opcode ID: c7dd737bb33c44a2c416e2100b942eccc04011d71a1d2c6a09ca2a6d39f42455
                                              • Instruction ID: dc9fca116b7ff8dfd07cfa1f410fcfaca898933b46a2ec4adb50f4e1b873fb91
                                              • Opcode Fuzzy Hash: c7dd737bb33c44a2c416e2100b942eccc04011d71a1d2c6a09ca2a6d39f42455
                                              • Instruction Fuzzy Hash: E831E0B5D002489FDB10DF99C584ACEFBF6BF48304F28856AE419AB341D7759945CB90
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              Memory Dump Source
                                              • Source File: 00000007.00000002.692003250.0000000000CED000.00000040.00000800.00020000.00000000.sdmp, Offset: 00CED000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_7_2_ced000_Fattura Proforma (C) n 31.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 5545929978245bb35c4389635a443e6a402a07192fe59007bab226ba39954df1
                                              • Instruction ID: 6b750ec8457bc92b3d725866abf075807c8579f0c2e6c050f495a82e9c77c140
                                              • Opcode Fuzzy Hash: 5545929978245bb35c4389635a443e6a402a07192fe59007bab226ba39954df1
                                              • Instruction Fuzzy Hash: 352125B1504284DFDB01DF11D9C0F67BBA5FB98324F24C569E9070B286C336E955CBA1
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              Memory Dump Source
                                              • Source File: 00000007.00000002.692159530.0000000000D4D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D4D000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_7_2_d4d000_Fattura Proforma (C) n 31.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: bcaa209582c3e1b1f58192fea295a7307f2203f8304f35317c0e75c5a55ce60e
                                              • Instruction ID: a06792885f80591de18a7612179c5bcd49bf1ed1e022af5819095a46a7ae9479
                                              • Opcode Fuzzy Hash: bcaa209582c3e1b1f58192fea295a7307f2203f8304f35317c0e75c5a55ce60e
                                              • Instruction Fuzzy Hash: 3C210475504244DFCB14CF64D8C4B26BBA6FB88314F24C9ADE84A4B386C33AD847CAB1
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              Memory Dump Source
                                              • Source File: 00000007.00000002.692159530.0000000000D4D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D4D000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_7_2_d4d000_Fattura Proforma (C) n 31.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 265667ac784919907d3211caa92a70b3dae1957ed86031fdc50327e5e1d7151e
                                              • Instruction ID: 23cb1f5c273fa701390d162627823a6692b8669c851def4c95cb85d0f0645f32
                                              • Opcode Fuzzy Hash: 265667ac784919907d3211caa92a70b3dae1957ed86031fdc50327e5e1d7151e
                                              • Instruction Fuzzy Hash: 272150755093C08FCB12CF24D994715BF71EB46314F29C5EAD8498B697C33AD84ACB62
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              Memory Dump Source
                                              • Source File: 00000007.00000002.692003250.0000000000CED000.00000040.00000800.00020000.00000000.sdmp, Offset: 00CED000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_7_2_ced000_Fattura Proforma (C) n 31.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 390b78be373823664b856b947e0ab6fe327ba9a5f57044a4625d1841f0462698
                                              • Instruction ID: a15282fbc970f099dc9011ccc1bf59fc5f0a45df5b684b2e8d19c62ef2889af1
                                              • Opcode Fuzzy Hash: 390b78be373823664b856b947e0ab6fe327ba9a5f57044a4625d1841f0462698
                                              • Instruction Fuzzy Hash: 8511D3B6404280CFCF12CF14D5C4B16BF71FB94324F24C6A9D8060B656C336D95ACBA2
                                              Uniqueness

                                              Uniqueness Score: -1.00%