Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
STAMPED CONTRACT.exe

Overview

General Information

Sample Name:STAMPED CONTRACT.exe
Analysis ID:680576
MD5:38e7f1ea9b24aa0ce2a81f0b8d1211f1
SHA1:ddf48946be08c406807d790f3577f9cfcef3b648
SHA256:828a71aade93b8276b3c751172ef243ab79aeb6713849992ea5bcfe64d745a9f
Tags:agentteslaexe
Infos:

Detection

AgentTesla
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
Malicious sample detected (through community Yara rule)
Yara detected AgentTesla
Yara detected AntiVM3
Snort IDS alert for network traffic
Tries to steal Mail credentials (via file / registry access)
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Machine Learning detection for sample
Injects a PE file into a foreign processes
.NET source code contains method to dynamically call methods (often used by packers)
.NET source code contains very large array initializations
.NET source code contains very large strings
Machine Learning detection for dropped file
Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)
Uses schtasks.exe or at.exe to add and modify task schedules
Tries to harvest and steal browser information (history, passwords, etc)
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Uses 32bit PE files
Queries the volume information (name, serial number etc) of a device
Yara signature match
Antivirus or Machine Learning detection for unpacked file
May sleep (evasive loops) to hinder dynamic analysis
Uses code obfuscation techniques (call, push, ret)
Internet Provider seen in connection with other malware
Detected potential crypto function
Sample execution stops while process was sleeping (likely an evasion)
Yara detected Credential Stealer
IP address seen in connection with other malware
Contains long sleeps (>= 3 min)
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found inlined nop instructions (likely shell or obfuscated code)
Sample file is different than original file name gathered from version info
Drops PE files
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Creates a process in suspended mode (likely to inject code)
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)

Classification

  • System is w10x64
  • STAMPED CONTRACT.exe (PID: 5676 cmdline: "C:\Users\user\Desktop\STAMPED CONTRACT.exe" MD5: 38E7F1EA9B24AA0CE2A81F0B8D1211F1)
    • schtasks.exe (PID: 6132 cmdline: C:\Windows\System32\schtasks.exe" /Create /TN "Updates\UBkncV" /XML "C:\Users\user\AppData\Local\Temp\tmpBA47.tmp MD5: 15FF7D8324231381BAD48A052F85DF04)
      • conhost.exe (PID: 5700 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
  • cleanup
{"Exfil Mode": "SMTP", "Username": "fombbsr@hindusthan.com", "Password": "f1o2m3", "Host": "mail.hindusthan.com"}
SourceRuleDescriptionAuthorStrings
00000000.00000002.277639077.0000000003899000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
    00000000.00000002.277639077.0000000003899000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_AgentTesla_2Yara detected AgentTeslaJoe Security
      00000000.00000002.277639077.0000000003899000.00000004.00000800.00020000.00000000.sdmpWindows_Trojan_AgentTesla_d3ac2b2funknownunknown
      • 0x158c2b:$a13: get_DnsResolver
      • 0x18ce4b:$a13: get_DnsResolver
      • 0x157460:$a20: get_LastAccessed
      • 0x18b680:$a20: get_LastAccessed
      • 0x159588:$a27: set_InternalServerPort
      • 0x18d7a8:$a27: set_InternalServerPort
      • 0x1598b9:$a30: set_GuidMasterKey
      • 0x18dad9:$a30: set_GuidMasterKey
      • 0x157567:$a33: get_Clipboard
      • 0x18b787:$a33: get_Clipboard
      • 0x157575:$a34: get_Keyboard
      • 0x18b795:$a34: get_Keyboard
      • 0x15884f:$a35: get_ShiftKeyDown
      • 0x18ca6f:$a35: get_ShiftKeyDown
      • 0x158860:$a36: get_AltKeyDown
      • 0x18ca80:$a36: get_AltKeyDown
      • 0x157582:$a37: get_Password
      • 0x18b7a2:$a37: get_Password
      • 0x157fff:$a38: get_PasswordHash
      • 0x18c21f:$a38: get_PasswordHash
      • 0x15900a:$a39: get_DefaultCredentials
      00000007.00000000.268833030.0000000000402000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
        00000007.00000000.268833030.0000000000402000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_AgentTesla_2Yara detected AgentTeslaJoe Security
          Click to see the 10 entries
          SourceRuleDescriptionAuthorStrings
          0.2.STAMPED CONTRACT.exe.39c1aa0.1.unpackJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
            0.2.STAMPED CONTRACT.exe.39c1aa0.1.unpackJoeSecurity_AgentTesla_2Yara detected AgentTeslaJoe Security
              0.2.STAMPED CONTRACT.exe.39c1aa0.1.unpackMALWARE_Win_AgentTeslaV3AgentTeslaV3 infostealer payloadditekSHen
              • 0x30c20:$s10: logins
              • 0x3068d:$s11: credential
              • 0x2ccc7:$g1: get_Clipboard
              • 0x2ccd5:$g2: get_Keyboard
              • 0x2cce2:$g3: get_Password
              • 0x2df9f:$g4: get_CtrlKeyDown
              • 0x2dfaf:$g5: get_ShiftKeyDown
              • 0x2dfc0:$g6: get_AltKeyDown
              0.2.STAMPED CONTRACT.exe.39c1aa0.1.unpackWindows_Trojan_AgentTesla_d3ac2b2funknownunknown
              • 0x2e38b:$a13: get_DnsResolver
              • 0x2cbc0:$a20: get_LastAccessed
              • 0x2ece8:$a27: set_InternalServerPort
              • 0x2f019:$a30: set_GuidMasterKey
              • 0x2ccc7:$a33: get_Clipboard
              • 0x2ccd5:$a34: get_Keyboard
              • 0x2dfaf:$a35: get_ShiftKeyDown
              • 0x2dfc0:$a36: get_AltKeyDown
              • 0x2cce2:$a37: get_Password
              • 0x2d75f:$a38: get_PasswordHash
              • 0x2e76a:$a39: get_DefaultCredentials
              7.0.STAMPED CONTRACT.exe.400000.0.unpackJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
                Click to see the 8 entries
                No Sigma rule has matched
                Timestamp:192.168.2.3192.185.46.31497415872030171 08/08/22-20:29:37.983170
                SID:2030171
                Source Port:49741
                Destination Port:587
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.3192.185.46.31497415872839723 08/08/22-20:29:37.983170
                SID:2839723
                Source Port:49741
                Destination Port:587
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.3192.185.46.31497415872851779 08/08/22-20:29:37.983277
                SID:2851779
                Source Port:49741
                Destination Port:587
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.3192.185.46.31497415872840032 08/08/22-20:29:37.983277
                SID:2840032
                Source Port:49741
                Destination Port:587
                Protocol:TCP
                Classtype:A Network Trojan was detected

                Click to jump to signature section

                Show All Signature Results

                AV Detection

                barindex
                Source: STAMPED CONTRACT.exeVirustotal: Detection: 40%Perma Link
                Source: STAMPED CONTRACT.exeJoe Sandbox ML: detected
                Source: C:\Users\user\AppData\Roaming\UBkncV.exeJoe Sandbox ML: detected
                Source: 7.0.STAMPED CONTRACT.exe.400000.0.unpackAvira: Label: TR/Spy.Gen8
                Source: 7.0.STAMPED CONTRACT.exe.400000.0.unpackMalware Configuration Extractor: Agenttesla {"Exfil Mode": "SMTP", "Username": "fombbsr@hindusthan.com", "Password": "f1o2m3", "Host": "mail.hindusthan.com"}
                Source: STAMPED CONTRACT.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                Source: STAMPED CONTRACT.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                Source: C:\Users\user\Desktop\STAMPED CONTRACT.exeCode function: 4x nop then mov dword ptr [ebp-18h], 00000000h
                Source: C:\Users\user\Desktop\STAMPED CONTRACT.exeCode function: 4x nop then mov dword ptr [ebp-18h], 00000000h
                Source: C:\Users\user\Desktop\STAMPED CONTRACT.exeCode function: 4x nop then mov dword ptr [ebp-18h], 00000000h

                Networking

                barindex
                Source: TrafficSnort IDS: 2851779 ETPRO TROJAN Agent Tesla Telegram Exfil 192.168.2.3:49741 -> 192.185.46.31:587
                Source: TrafficSnort IDS: 2840032 ETPRO TROJAN Win32/AgentTesla/OriginLogger Data Exfil via SMTP M2 192.168.2.3:49741 -> 192.185.46.31:587
                Source: TrafficSnort IDS: 2030171 ET TROJAN AgentTesla Exfil Via SMTP 192.168.2.3:49741 -> 192.185.46.31:587
                Source: TrafficSnort IDS: 2839723 ETPRO TROJAN Win32/Agent Tesla SMTP Activity 192.168.2.3:49741 -> 192.185.46.31:587
                Source: Joe Sandbox ViewASN Name: UNIFIEDLAYER-AS-1US UNIFIEDLAYER-AS-1US
                Source: Joe Sandbox ViewIP Address: 192.185.46.31 192.185.46.31
                Source: STAMPED CONTRACT.exe, 00000007.00000002.510347221.00000000030F1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://127.0.0.1:HTTP/1.1
                Source: STAMPED CONTRACT.exe, 00000007.00000002.510347221.00000000030F1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://DynDns.comDynDNSnamejidpasswordPsi/Psi
                Source: STAMPED CONTRACT.exe, 00000000.00000002.283198266.0000000006AF2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://fontfabrik.com
                Source: STAMPED CONTRACT.exe, 00000007.00000002.515912584.0000000003440000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://hindusthan.com
                Source: STAMPED CONTRACT.exe, 00000007.00000002.515912584.0000000003440000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://mail.hindusthan.com
                Source: STAMPED CONTRACT.exe, 00000007.00000002.510347221.00000000030F1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://rHDoBI.com
                Source: STAMPED CONTRACT.exe, 00000000.00000002.272424508.0000000002891000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
                Source: STAMPED CONTRACT.exe, 00000000.00000002.283198266.0000000006AF2000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.241504634.0000000005833000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0
                Source: STAMPED CONTRACT.exe, 00000000.00000003.243020613.0000000005832000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.ascendercorp.com/typedesigners.html;Y
                Source: STAMPED CONTRACT.exe, 00000000.00000003.241837648.00000000057F3000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.carterandcone.come
                Source: STAMPED CONTRACT.exe, 00000000.00000002.283198266.0000000006AF2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.carterandcone.coml
                Source: STAMPED CONTRACT.exe, 00000000.00000003.241837648.00000000057F3000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.carterandcone.comypo
                Source: STAMPED CONTRACT.exe, 00000000.00000003.246095684.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.246244019.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.246138159.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.246778015.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000002.283198266.0000000006AF2000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.246634857.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.246513766.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.244387066.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.244456429.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.246462744.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.244839521.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.244590841.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.244716470.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.244871311.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.246055786.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.246613407.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.245874099.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.244410342.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.246592558.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.245982334.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.244216645.0000000005838000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com
                Source: STAMPED CONTRACT.exe, 00000000.00000002.283198266.0000000006AF2000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000002.272165959.0000000000EB7000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers
                Source: STAMPED CONTRACT.exe, 00000000.00000002.283198266.0000000006AF2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/?
                Source: STAMPED CONTRACT.exe, 00000000.00000003.245653439.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.245629944.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.245692605.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.245601973.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.245408934.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.245566177.0000000005838000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/cabarga.html
                Source: STAMPED CONTRACT.exe, 00000000.00000002.283198266.0000000006AF2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/cabarga.htmlN
                Source: STAMPED CONTRACT.exe, 00000000.00000003.245601973.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.245408934.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.245566177.0000000005838000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/cabarga.htmlx
                Source: STAMPED CONTRACT.exe, 00000000.00000002.283198266.0000000006AF2000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.244871311.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.244898992.0000000005838000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/frere-jones.html
                Source: STAMPED CONTRACT.exe, 00000000.00000003.244871311.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.244898992.0000000005838000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/frere-jones.htmlht
                Source: STAMPED CONTRACT.exe, 00000000.00000002.283198266.0000000006AF2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers8
                Source: STAMPED CONTRACT.exe, 00000000.00000002.283198266.0000000006AF2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers?
                Source: STAMPED CONTRACT.exe, 00000000.00000002.283198266.0000000006AF2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designersG
                Source: STAMPED CONTRACT.exe, 00000000.00000003.245339211.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.245184653.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.245313803.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.244839521.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.244716470.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.244871311.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.244774460.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.244664517.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.244945073.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.244981444.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.244685393.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.245236568.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.245088265.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.244744770.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.244642233.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.244898992.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.245207412.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.244621285.0000000005838000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.comENN
                Source: STAMPED CONTRACT.exe, 00000000.00000003.244216645.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.244246168.0000000005838000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.comF2N
                Source: STAMPED CONTRACT.exe, 00000000.00000003.246095684.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.246244019.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.246138159.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.245733889.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.246055786.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.245653439.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.245874099.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.245982334.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.245629944.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.245915875.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.245692605.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.246184367.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.245601973.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.246309772.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.246278619.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.245804289.0000000005838000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.comFsN
                Source: STAMPED CONTRACT.exe, 00000000.00000003.245408934.0000000005838000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.comNNA
                Source: STAMPED CONTRACT.exe, 00000000.00000003.245487340.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.245339211.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.245184653.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.245733889.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.245373781.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.245313803.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.244839521.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.244590841.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.244716470.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.244871311.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.245653439.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.244774460.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.244503756.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.244664517.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.244945073.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.245629944.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.244981444.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.245692605.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.245601973.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.244685393.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.245408934.0000000005838000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.comaNr
                Source: STAMPED CONTRACT.exe, 00000000.00000003.244160565.0000000005838000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.comcea5
                Source: STAMPED CONTRACT.exe, 00000000.00000003.246095684.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.246244019.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.246138159.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.246462744.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.246055786.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.245874099.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.245982334.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.245915875.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.246366325.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.246184367.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.246406234.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.246309772.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.246278619.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.246493031.0000000005838000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.comcomaNr
                Source: STAMPED CONTRACT.exe, 00000000.00000003.246095684.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.246244019.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.246138159.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.245733889.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.246055786.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.245653439.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.245874099.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.245982334.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.245629944.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.245915875.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.245692605.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.246366325.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.246184367.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.245601973.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.245566177.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.246406234.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.246309772.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.246278619.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.245804289.0000000005838000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.comcomd
                Source: STAMPED CONTRACT.exe, 00000000.00000003.246095684.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.246244019.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.245487340.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.245339211.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.246138159.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.245184653.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.245733889.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.245373781.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.245313803.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.246055786.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.245653439.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.245874099.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.245982334.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.244945073.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.245629944.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.245915875.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.244981444.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.245692605.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.246184367.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.245601973.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.245408934.0000000005838000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.comd
                Source: STAMPED CONTRACT.exe, 00000000.00000003.245339211.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.245184653.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.245373781.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.245313803.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.244839521.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.244590841.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.244716470.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.244871311.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.244774460.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.244664517.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.244945073.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.244981444.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.244685393.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.245408934.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.245236568.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.245088265.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.244744770.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.244642233.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.244898992.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.245207412.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.244621285.0000000005838000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.comd;N
                Source: STAMPED CONTRACT.exe, 00000000.00000003.245184653.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.244839521.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.244590841.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.244716470.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.244871311.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.244774460.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.244503756.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.244664517.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.244945073.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.244981444.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.244685393.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.245088265.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.244744770.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.244642233.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.244898992.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.244621285.0000000005838000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.comdita
                Source: STAMPED CONTRACT.exe, 00000000.00000003.245487340.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.245339211.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.245184653.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.245733889.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.245373781.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.245313803.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.244839521.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.244716470.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.244871311.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.245653439.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.245874099.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.244774460.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.244664517.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.244945073.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.245629944.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.245915875.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.244981444.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.245692605.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.245601973.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.244685393.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.245408934.0000000005838000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.come.com
                Source: STAMPED CONTRACT.exe, 00000000.00000003.244216645.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.244246168.0000000005838000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.comepkof
                Source: STAMPED CONTRACT.exe, 00000000.00000003.246095684.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.246244019.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.245487340.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.246138159.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.245733889.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.246055786.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.245653439.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.245874099.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.245982334.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.245629944.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.245915875.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.245692605.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.246366325.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.246184367.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.245601973.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.245408934.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.245566177.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.246406234.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.246309772.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.245442824.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.246278619.0000000005838000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.comicta
                Source: STAMPED CONTRACT.exe, 00000000.00000003.249422211.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.270951519.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.249326775.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.249155217.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.249119841.0000000005838000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.comicuWN8
                Source: STAMPED CONTRACT.exe, 00000000.00000003.249422211.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.249104494.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.249326775.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.249155217.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.249119841.0000000005838000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.coml1
                Source: STAMPED CONTRACT.exe, 00000000.00000003.246095684.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.246244019.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.246138159.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.246055786.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.245982334.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.246366325.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.246184367.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.246406234.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.246309772.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.246278619.0000000005838000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.comlicF
                Source: STAMPED CONTRACT.exe, 00000000.00000003.246095684.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.249422211.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.246244019.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.246138159.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.249104494.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.249326775.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.246055786.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.249155217.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.249119841.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.245982334.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.246184367.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.246309772.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.246278619.0000000005838000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.comm
                Source: STAMPED CONTRACT.exe, 00000000.00000003.249422211.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.270951519.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.249326775.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.249155217.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.249119841.0000000005838000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.commNNA
                Source: STAMPED CONTRACT.exe, 00000000.00000003.244160565.0000000005838000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.comt
                Source: STAMPED CONTRACT.exe, 00000000.00000003.245184653.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.244871311.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.244945073.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.244981444.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.245236568.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.245088265.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.244898992.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.245207412.0000000005838000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.comtoed
                Source: STAMPED CONTRACT.exe, 00000000.00000003.246095684.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.246244019.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.246138159.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.245733889.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.246055786.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.245653439.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.245874099.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.245982334.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.245629944.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.245915875.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.245692605.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.246184367.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.245601973.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.246309772.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.246278619.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.245804289.0000000005838000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.comue
                Source: STAMPED CONTRACT.exe, 00000000.00000003.245184653.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.244945073.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.244981444.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.245236568.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.245088265.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.244898992.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.245207412.0000000005838000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.comuev
                Source: STAMPED CONTRACT.exe, 00000000.00000002.283198266.0000000006AF2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fonts.com
                Source: STAMPED CONTRACT.exe, 00000000.00000003.240850167.0000000005829000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000002.283198266.0000000006AF2000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.240886828.000000000582A000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.241837648.00000000057F3000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn
                Source: STAMPED CONTRACT.exe, 00000000.00000003.241201459.000000000582F000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.241097857.000000000582F000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.241129494.0000000005830000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.241173320.0000000005829000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn/
                Source: STAMPED CONTRACT.exe, 00000000.00000002.283198266.0000000006AF2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn/bThe
                Source: STAMPED CONTRACT.exe, 00000000.00000002.283198266.0000000006AF2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn/cThe
                Source: STAMPED CONTRACT.exe, 00000000.00000003.247108579.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.247090095.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.247133221.0000000005838000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.galapagosdesign.com/
                Source: STAMPED CONTRACT.exe, 00000000.00000002.283198266.0000000006AF2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.galapagosdesign.com/DPlease
                Source: STAMPED CONTRACT.exe, 00000000.00000003.247090095.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000002.283198266.0000000006AF2000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.247231044.0000000005838000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.galapagosdesign.com/staff/dennis.htm
                Source: STAMPED CONTRACT.exe, 00000000.00000002.283198266.0000000006AF2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.goodfont.co.kr
                Source: STAMPED CONTRACT.exe, 00000000.00000003.242518165.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.243198581.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.243377889.0000000005838000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/
                Source: STAMPED CONTRACT.exe, 00000000.00000003.242604914.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.242555593.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.242747229.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.242518165.0000000005838000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/)N
                Source: STAMPED CONTRACT.exe, 00000000.00000003.242841186.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.242805323.0000000005838000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp//
                Source: STAMPED CONTRACT.exe, 00000000.00000003.242406688.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.242518165.0000000005838000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/2N
                Source: STAMPED CONTRACT.exe, 00000000.00000003.242306926.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.242261048.0000000005837000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.242282296.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.242347916.0000000005838000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/4
                Source: STAMPED CONTRACT.exe, 00000000.00000003.242604914.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.242406688.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.242555593.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.242518165.0000000005838000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/;N
                Source: STAMPED CONTRACT.exe, 00000000.00000003.243120088.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.242841186.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.243270592.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.242805323.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.243028312.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.243074364.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.242747229.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.243296774.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.243244185.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.243198581.0000000005838000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/ENN
                Source: STAMPED CONTRACT.exe, 00000000.00000003.242306926.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.242604914.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.242406688.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.242555593.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.242347916.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.242518165.0000000005838000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/FN
                Source: STAMPED CONTRACT.exe, 00000000.00000003.242841186.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.242604914.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.242805323.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.243028312.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.242747229.0000000005838000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/NNA
                Source: STAMPED CONTRACT.exe, 00000000.00000003.242841186.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.242805323.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.242747229.0000000005838000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/WN8
                Source: STAMPED CONTRACT.exe, 00000000.00000003.242306926.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.242406688.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.242347916.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.242518165.0000000005838000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/Y0
                Source: STAMPED CONTRACT.exe, 00000000.00000003.242406688.0000000005838000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/Y0p
                Source: STAMPED CONTRACT.exe, 00000000.00000003.242406688.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.242555593.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.242347916.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.242518165.0000000005838000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/aNr
                Source: STAMPED CONTRACT.exe, 00000000.00000003.242841186.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.242604914.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.242406688.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.242805323.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.242555593.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.243028312.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.242747229.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.242347916.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.242518165.0000000005838000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/jp/
                Source: STAMPED CONTRACT.exe, 00000000.00000003.243120088.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.242841186.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.243327845.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.243270592.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.242805323.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.243028312.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.243074364.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.243296774.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.243244185.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.243198581.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.243377889.0000000005838000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/jp/)N
                Source: STAMPED CONTRACT.exe, 00000000.00000003.242841186.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.242604914.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.242805323.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.242555593.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.242747229.0000000005838000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/jp/2N
                Source: STAMPED CONTRACT.exe, 00000000.00000003.242841186.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.242805323.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.243028312.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.242747229.0000000005838000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/jp/;N
                Source: STAMPED CONTRACT.exe, 00000000.00000003.242841186.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.242604914.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.242805323.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.242747229.0000000005838000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/jp/aNr
                Source: STAMPED CONTRACT.exe, 00000000.00000003.246953421.0000000005838000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.monotype.
                Source: STAMPED CONTRACT.exe, 00000000.00000003.247769440.000000000581A000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.monotype.)
                Source: STAMPED CONTRACT.exe, 00000000.00000002.283198266.0000000006AF2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sajatypeworks.com
                Source: STAMPED CONTRACT.exe, 00000000.00000002.283198266.0000000006AF2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sakkal.com
                Source: STAMPED CONTRACT.exe, 00000000.00000002.283198266.0000000006AF2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sandoll.co.kr
                Source: STAMPED CONTRACT.exe, 00000000.00000002.283198266.0000000006AF2000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.240398657.000000000580A000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.241192425.000000000582A000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.241173320.0000000005829000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.tiro.com
                Source: STAMPED CONTRACT.exe, 00000000.00000002.283198266.0000000006AF2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.typography.netD
                Source: STAMPED CONTRACT.exe, 00000000.00000002.283198266.0000000006AF2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.urwpp.deDPlease
                Source: STAMPED CONTRACT.exe, 00000000.00000002.283198266.0000000006AF2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.zhongyicts.com.cn
                Source: STAMPED CONTRACT.exe, 00000007.00000002.510347221.00000000030F1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://ckJxF1XAyPwdnwhnXbWu.net
                Source: STAMPED CONTRACT.exe, 00000007.00000002.510347221.00000000030F1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.ziphttps://www
                Source: unknownDNS traffic detected: queries for: mail.hindusthan.com

                System Summary

                barindex
                Source: 0.2.STAMPED CONTRACT.exe.39c1aa0.1.unpack, type: UNPACKEDPEMatched rule: AgentTeslaV3 infostealer payload Author: ditekSHen
                Source: 0.2.STAMPED CONTRACT.exe.39c1aa0.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f Author: unknown
                Source: 7.0.STAMPED CONTRACT.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: AgentTeslaV3 infostealer payload Author: ditekSHen
                Source: 7.0.STAMPED CONTRACT.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f Author: unknown
                Source: 0.2.STAMPED CONTRACT.exe.39c1aa0.1.raw.unpack, type: UNPACKEDPEMatched rule: AgentTeslaV3 infostealer payload Author: ditekSHen
                Source: 0.2.STAMPED CONTRACT.exe.39c1aa0.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f Author: unknown
                Source: 0.2.STAMPED CONTRACT.exe.28d639c.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables containing artifcats associated with disabling Widnows Defender Author: ditekSHen
                Source: 00000000.00000002.277639077.0000000003899000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f Author: unknown
                Source: 00000007.00000000.268833030.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f Author: unknown
                Source: Process Memory Space: STAMPED CONTRACT.exe PID: 5676, type: MEMORYSTRMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f Author: unknown
                Source: Process Memory Space: STAMPED CONTRACT.exe PID: 4668, type: MEMORYSTRMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f Author: unknown
                Source: 7.0.STAMPED CONTRACT.exe.400000.0.unpack, u003cPrivateImplementationDetailsu003eu007bE2C672A3u002d33DEu002d4F8Fu002d977Fu002d0F1A993E2B3Fu007d/u0035D793A23u002d021Cu002d42A3u002dBFF3u002dC1942F153833.csLarge array initialization: .cctor: array initializer size 11626
                Source: STAMPED CONTRACT.exe, AddCompanyForm.csLong String: Length: 20037
                Source: UBkncV.exe.0.dr, AddCompanyForm.csLong String: Length: 20037
                Source: 0.0.STAMPED CONTRACT.exe.490000.0.unpack, AddCompanyForm.csLong String: Length: 20037
                Source: STAMPED CONTRACT.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                Source: 0.2.STAMPED CONTRACT.exe.39c1aa0.1.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload
                Source: 0.2.STAMPED CONTRACT.exe.39c1aa0.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f reference_sample = 65463161760af7ab85f5c475a0f7b1581234a1e714a2c5a555783bdd203f85f4, os = windows, severity = x86, creation_date = 2021-03-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.AgentTesla, fingerprint = cbbb56fe6cd7277ae9595a10e05e2ce535a4e6bf205810be0bbce3a883b6f8bc, id = d3ac2b2f-14fc-4851-8a57-41032e386aeb, last_modified = 2022-06-20
                Source: 7.0.STAMPED CONTRACT.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload
                Source: 7.0.STAMPED CONTRACT.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f reference_sample = 65463161760af7ab85f5c475a0f7b1581234a1e714a2c5a555783bdd203f85f4, os = windows, severity = x86, creation_date = 2021-03-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.AgentTesla, fingerprint = cbbb56fe6cd7277ae9595a10e05e2ce535a4e6bf205810be0bbce3a883b6f8bc, id = d3ac2b2f-14fc-4851-8a57-41032e386aeb, last_modified = 2022-06-20
                Source: 0.2.STAMPED CONTRACT.exe.39c1aa0.1.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload
                Source: 0.2.STAMPED CONTRACT.exe.39c1aa0.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f reference_sample = 65463161760af7ab85f5c475a0f7b1581234a1e714a2c5a555783bdd203f85f4, os = windows, severity = x86, creation_date = 2021-03-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.AgentTesla, fingerprint = cbbb56fe6cd7277ae9595a10e05e2ce535a4e6bf205810be0bbce3a883b6f8bc, id = d3ac2b2f-14fc-4851-8a57-41032e386aeb, last_modified = 2022-06-20
                Source: 0.2.STAMPED CONTRACT.exe.28d639c.0.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_DisableWinDefender author = ditekSHen, description = Detects executables containing artifcats associated with disabling Widnows Defender
                Source: 00000000.00000002.277639077.0000000003899000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f reference_sample = 65463161760af7ab85f5c475a0f7b1581234a1e714a2c5a555783bdd203f85f4, os = windows, severity = x86, creation_date = 2021-03-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.AgentTesla, fingerprint = cbbb56fe6cd7277ae9595a10e05e2ce535a4e6bf205810be0bbce3a883b6f8bc, id = d3ac2b2f-14fc-4851-8a57-41032e386aeb, last_modified = 2022-06-20
                Source: 00000007.00000000.268833030.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f reference_sample = 65463161760af7ab85f5c475a0f7b1581234a1e714a2c5a555783bdd203f85f4, os = windows, severity = x86, creation_date = 2021-03-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.AgentTesla, fingerprint = cbbb56fe6cd7277ae9595a10e05e2ce535a4e6bf205810be0bbce3a883b6f8bc, id = d3ac2b2f-14fc-4851-8a57-41032e386aeb, last_modified = 2022-06-20
                Source: Process Memory Space: STAMPED CONTRACT.exe PID: 5676, type: MEMORYSTRMatched rule: SUSP_Reversed_Base64_Encoded_EXE date = 2020-04-06, hash1 = 7e6d9a5d3b26fd1af7d58be68f524c4c55285b78304a65ec43073b139c9407a8, author = Florian Roth, description = Detects an base64 encoded executable with reversed characters, score = file, reference = Internal Research
                Source: Process Memory Space: STAMPED CONTRACT.exe PID: 5676, type: MEMORYSTRMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f reference_sample = 65463161760af7ab85f5c475a0f7b1581234a1e714a2c5a555783bdd203f85f4, os = windows, severity = x86, creation_date = 2021-03-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.AgentTesla, fingerprint = cbbb56fe6cd7277ae9595a10e05e2ce535a4e6bf205810be0bbce3a883b6f8bc, id = d3ac2b2f-14fc-4851-8a57-41032e386aeb, last_modified = 2022-06-20
                Source: Process Memory Space: STAMPED CONTRACT.exe PID: 4668, type: MEMORYSTRMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f reference_sample = 65463161760af7ab85f5c475a0f7b1581234a1e714a2c5a555783bdd203f85f4, os = windows, severity = x86, creation_date = 2021-03-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.AgentTesla, fingerprint = cbbb56fe6cd7277ae9595a10e05e2ce535a4e6bf205810be0bbce3a883b6f8bc, id = d3ac2b2f-14fc-4851-8a57-41032e386aeb, last_modified = 2022-06-20
                Source: C:\Users\user\Desktop\STAMPED CONTRACT.exeCode function: 0_2_026CE820
                Source: C:\Users\user\Desktop\STAMPED CONTRACT.exeCode function: 0_2_026CE810
                Source: C:\Users\user\Desktop\STAMPED CONTRACT.exeCode function: 0_2_026CBF54
                Source: C:\Users\user\Desktop\STAMPED CONTRACT.exeCode function: 0_2_04DA49F0
                Source: C:\Users\user\Desktop\STAMPED CONTRACT.exeCode function: 0_2_073ACE70
                Source: C:\Users\user\Desktop\STAMPED CONTRACT.exeCode function: 0_2_073A3EE0
                Source: C:\Users\user\Desktop\STAMPED CONTRACT.exeCode function: 0_2_073A2D00
                Source: C:\Users\user\Desktop\STAMPED CONTRACT.exeCode function: 0_2_073A5470
                Source: C:\Users\user\Desktop\STAMPED CONTRACT.exeCode function: 0_2_073AD320
                Source: C:\Users\user\Desktop\STAMPED CONTRACT.exeCode function: 0_2_073A6348
                Source: C:\Users\user\Desktop\STAMPED CONTRACT.exeCode function: 0_2_073A3340
                Source: C:\Users\user\Desktop\STAMPED CONTRACT.exeCode function: 0_2_073A4A68
                Source: C:\Users\user\Desktop\STAMPED CONTRACT.exeCode function: 0_2_073A4F18
                Source: C:\Users\user\Desktop\STAMPED CONTRACT.exeCode function: 0_2_073A4F08
                Source: C:\Users\user\Desktop\STAMPED CONTRACT.exeCode function: 0_2_073A97A9
                Source: C:\Users\user\Desktop\STAMPED CONTRACT.exeCode function: 0_2_073A8798
                Source: C:\Users\user\Desktop\STAMPED CONTRACT.exeCode function: 0_2_073A878A
                Source: C:\Users\user\Desktop\STAMPED CONTRACT.exeCode function: 0_2_073A97C8
                Source: C:\Users\user\Desktop\STAMPED CONTRACT.exeCode function: 0_2_073AC610
                Source: C:\Users\user\Desktop\STAMPED CONTRACT.exeCode function: 0_2_073A3E54
                Source: C:\Users\user\Desktop\STAMPED CONTRACT.exeCode function: 0_2_073A7EB9
                Source: C:\Users\user\Desktop\STAMPED CONTRACT.exeCode function: 0_2_073A3EAA
                Source: C:\Users\user\Desktop\STAMPED CONTRACT.exeCode function: 0_2_073A7EC8
                Source: C:\Users\user\Desktop\STAMPED CONTRACT.exeCode function: 0_2_073A8590
                Source: C:\Users\user\Desktop\STAMPED CONTRACT.exeCode function: 0_2_073A8580
                Source: C:\Users\user\Desktop\STAMPED CONTRACT.exeCode function: 0_2_073A5463
                Source: C:\Users\user\Desktop\STAMPED CONTRACT.exeCode function: 0_2_073A5460
                Source: C:\Users\user\Desktop\STAMPED CONTRACT.exeCode function: 0_2_073A3330
                Source: C:\Users\user\Desktop\STAMPED CONTRACT.exeCode function: 0_2_073A630B
                Source: C:\Users\user\Desktop\STAMPED CONTRACT.exeCode function: 0_2_073A8BD8
                Source: C:\Users\user\Desktop\STAMPED CONTRACT.exeCode function: 0_2_073A8BC8
                Source: C:\Users\user\Desktop\STAMPED CONTRACT.exeCode function: 0_2_073A7278
                Source: C:\Users\user\Desktop\STAMPED CONTRACT.exeCode function: 0_2_073A7269
                Source: C:\Users\user\Desktop\STAMPED CONTRACT.exeCode function: 0_2_073A4A58
                Source: C:\Users\user\Desktop\STAMPED CONTRACT.exeCode function: 0_2_073A62B1
                Source: C:\Users\user\Desktop\STAMPED CONTRACT.exeCode function: 0_2_073A81E8
                Source: C:\Users\user\Desktop\STAMPED CONTRACT.exeCode function: 0_2_073A89E0
                Source: C:\Users\user\Desktop\STAMPED CONTRACT.exeCode function: 0_2_073A81D8
                Source: C:\Users\user\Desktop\STAMPED CONTRACT.exeCode function: 0_2_073A89D2
                Source: C:\Users\user\Desktop\STAMPED CONTRACT.exeCode function: 0_2_073AF0F8
                Source: C:\Users\user\Desktop\STAMPED CONTRACT.exeCode function: 0_2_07BC0040
                Source: C:\Users\user\Desktop\STAMPED CONTRACT.exeCode function: 7_2_0156F080
                Source: C:\Users\user\Desktop\STAMPED CONTRACT.exeCode function: 7_2_0156F3C8
                Source: C:\Users\user\Desktop\STAMPED CONTRACT.exeCode function: 7_2_01566120
                Source: C:\Users\user\Desktop\STAMPED CONTRACT.exeCode function: 7_2_0618B730
                Source: C:\Users\user\Desktop\STAMPED CONTRACT.exeCode function: 7_2_0618C480
                Source: C:\Users\user\Desktop\STAMPED CONTRACT.exeCode function: 7_2_06180040
                Source: C:\Users\user\Desktop\STAMPED CONTRACT.exeCode function: 7_2_067B4428
                Source: C:\Users\user\Desktop\STAMPED CONTRACT.exeCode function: 7_2_067B3148
                Source: C:\Users\user\Desktop\STAMPED CONTRACT.exeCode function: 7_2_067B1800
                Source: C:\Users\user\Desktop\STAMPED CONTRACT.exeCode function: 7_2_067B27F8
                Source: C:\Users\user\Desktop\STAMPED CONTRACT.exeCode function: 7_2_067B8223
                Source: C:\Users\user\Desktop\STAMPED CONTRACT.exeCode function: 7_2_067C9051
                Source: STAMPED CONTRACT.exe, 00000000.00000002.284894736.00000000072C0000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameMajorRevision.exe< vs STAMPED CONTRACT.exe
                Source: STAMPED CONTRACT.exe, 00000000.00000002.277639077.0000000003899000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameBltVIPzWHmHvsmsARomBkAMwAUxtmNfObSPLJV.exe4 vs STAMPED CONTRACT.exe
                Source: STAMPED CONTRACT.exe, 00000000.00000002.272424508.0000000002891000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameBunifu.UI.dll4 vs STAMPED CONTRACT.exe
                Source: STAMPED CONTRACT.exe, 00000000.00000002.272424508.0000000002891000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameBltVIPzWHmHvsmsARomBkAMwAUxtmNfObSPLJV.exe4 vs STAMPED CONTRACT.exe
                Source: STAMPED CONTRACT.exe, 00000000.00000003.259882739.0000000002EE8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameMajorRevision.exe< vs STAMPED CONTRACT.exe
                Source: STAMPED CONTRACT.exe, 00000000.00000000.236696502.0000000000558000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameIyBr.exe6 vs STAMPED CONTRACT.exe
                Source: STAMPED CONTRACT.exe, 00000000.00000002.279636796.0000000003A76000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameMajorRevision.exe< vs STAMPED CONTRACT.exe
                Source: STAMPED CONTRACT.exe, 00000000.00000002.279636796.0000000003A76000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameIyBr.exe6 vs STAMPED CONTRACT.exe
                Source: STAMPED CONTRACT.exe, 00000007.00000000.269166822.0000000000436000.00000040.00000400.00020000.00000000.sdmpBinary or memory string: OriginalFilenameBltVIPzWHmHvsmsARomBkAMwAUxtmNfObSPLJV.exe4 vs STAMPED CONTRACT.exe
                Source: STAMPED CONTRACT.exe, 00000007.00000002.504200822.00000000010F8000.00000004.00000010.00020000.00000000.sdmpBinary or memory string: OriginalFilenameUNKNOWN_FILET vs STAMPED CONTRACT.exe
                Source: STAMPED CONTRACT.exeBinary or memory string: OriginalFilenameIyBr.exe6 vs STAMPED CONTRACT.exe
                Source: STAMPED CONTRACT.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                Source: UBkncV.exe.0.drStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                Source: STAMPED CONTRACT.exeVirustotal: Detection: 40%
                Source: C:\Users\user\Desktop\STAMPED CONTRACT.exeFile read: C:\Users\user\Desktop\STAMPED CONTRACT.exeJump to behavior
                Source: STAMPED CONTRACT.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                Source: C:\Users\user\Desktop\STAMPED CONTRACT.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
                Source: unknownProcess created: C:\Users\user\Desktop\STAMPED CONTRACT.exe "C:\Users\user\Desktop\STAMPED CONTRACT.exe"
                Source: C:\Users\user\Desktop\STAMPED CONTRACT.exeProcess created: C:\Windows\SysWOW64\schtasks.exe C:\Windows\System32\schtasks.exe" /Create /TN "Updates\UBkncV" /XML "C:\Users\user\AppData\Local\Temp\tmpBA47.tmp
                Source: C:\Windows\SysWOW64\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                Source: C:\Users\user\Desktop\STAMPED CONTRACT.exeProcess created: C:\Users\user\Desktop\STAMPED CONTRACT.exe {path}
                Source: C:\Users\user\Desktop\STAMPED CONTRACT.exeProcess created: C:\Windows\SysWOW64\schtasks.exe C:\Windows\System32\schtasks.exe" /Create /TN "Updates\UBkncV" /XML "C:\Users\user\AppData\Local\Temp\tmpBA47.tmp
                Source: C:\Users\user\Desktop\STAMPED CONTRACT.exeProcess created: C:\Users\user\Desktop\STAMPED CONTRACT.exe {path}
                Source: C:\Users\user\Desktop\STAMPED CONTRACT.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{95E15D0A-66E6-93D9-C53C-76E6219D3341}\InProcServer32
                Source: C:\Users\user\Desktop\STAMPED CONTRACT.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                Source: C:\Users\user\Desktop\STAMPED CONTRACT.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                Source: C:\Users\user\Desktop\STAMPED CONTRACT.exeFile created: C:\Users\user\AppData\Roaming\UBkncV.exeJump to behavior
                Source: C:\Users\user\Desktop\STAMPED CONTRACT.exeFile created: C:\Users\user\AppData\Local\Temp\tmpBA47.tmpJump to behavior
                Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@6/3@2/1
                Source: C:\Users\user\Desktop\STAMPED CONTRACT.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
                Source: STAMPED CONTRACT.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 49.80%
                Source: C:\Users\user\Desktop\STAMPED CONTRACT.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
                Source: C:\Users\user\Desktop\STAMPED CONTRACT.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
                Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5700:120:WilError_01
                Source: C:\Users\user\Desktop\STAMPED CONTRACT.exeMutant created: \Sessions\1\BaseNamedObjects\ZrHZiSlVTUBUacmn
                Source: STAMPED CONTRACT.exeString found in binary or memory: Address:/AddressToolStripTextBox-AddressToolStripButton'ToolStripSeparator3'PhoneToolStripLabel
                Source: STAMPED CONTRACT.exeString found in binary or memory: Address:/AddressToolStripTextBox-AddressToolStripButton'ToolStripSeparator3'PhoneToolStripLabel
                Source: 7.0.STAMPED CONTRACT.exe.400000.0.unpack, A/F1.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
                Source: 7.0.STAMPED CONTRACT.exe.400000.0.unpack, A/F1.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
                Source: C:\Users\user\Desktop\STAMPED CONTRACT.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                Source: C:\Users\user\Desktop\STAMPED CONTRACT.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                Source: C:\Users\user\Desktop\STAMPED CONTRACT.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                Source: C:\Users\user\Desktop\STAMPED CONTRACT.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dll
                Source: C:\Users\user\Desktop\STAMPED CONTRACT.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676
                Source: STAMPED CONTRACT.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
                Source: STAMPED CONTRACT.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE

                Data Obfuscation

                barindex
                Source: STAMPED CONTRACT.exe, AddCompanyForm.cs.Net Code: NewLateBinding.LateCall(dax, null, "Invoke", stackVariable4, null, null, stackVariable13, true)
                Source: UBkncV.exe.0.dr, AddCompanyForm.cs.Net Code: NewLateBinding.LateCall(dax, null, "Invoke", stackVariable4, null, null, stackVariable13, true)
                Source: 0.0.STAMPED CONTRACT.exe.490000.0.unpack, AddCompanyForm.cs.Net Code: NewLateBinding.LateCall(dax, null, "Invoke", stackVariable4, null, null, stackVariable13, true)
                Source: C:\Users\user\Desktop\STAMPED CONTRACT.exeCode function: 0_2_04DA0428 pushad ; ret
                Source: C:\Users\user\Desktop\STAMPED CONTRACT.exeCode function: 0_2_04DAF5E0 push 00000002h; ret
                Source: C:\Users\user\Desktop\STAMPED CONTRACT.exeCode function: 0_2_073A61EB push ecx; iretd
                Source: C:\Users\user\Desktop\STAMPED CONTRACT.exeCode function: 0_2_07BC4F25 push FFFFFF8Bh; iretd
                Source: C:\Users\user\Desktop\STAMPED CONTRACT.exeCode function: 0_2_07BC4E2A push dword ptr [ebx+ebp-75h]; iretd
                Source: C:\Users\user\Desktop\STAMPED CONTRACT.exeCode function: 7_2_0618B670 push es; ret
                Source: C:\Users\user\Desktop\STAMPED CONTRACT.exeCode function: 7_2_0618A777 push es; retf
                Source: C:\Users\user\Desktop\STAMPED CONTRACT.exeCode function: 7_2_0618313B push es; iretd
                Source: C:\Users\user\Desktop\STAMPED CONTRACT.exeCode function: 7_2_067B7C70 push es; ret
                Source: initial sampleStatic PE information: section name: .text entropy: 7.757505394635879
                Source: initial sampleStatic PE information: section name: .text entropy: 7.757505394635879
                Source: C:\Users\user\Desktop\STAMPED CONTRACT.exeFile created: C:\Users\user\AppData\Roaming\UBkncV.exeJump to dropped file

                Boot Survival

                barindex
                Source: C:\Users\user\Desktop\STAMPED CONTRACT.exeProcess created: C:\Windows\SysWOW64\schtasks.exe C:\Windows\System32\schtasks.exe" /Create /TN "Updates\UBkncV" /XML "C:\Users\user\AppData\Local\Temp\tmpBA47.tmp
                Source: C:\Users\user\Desktop\STAMPED CONTRACT.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\STAMPED CONTRACT.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\STAMPED CONTRACT.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\STAMPED CONTRACT.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\STAMPED CONTRACT.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\STAMPED CONTRACT.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\STAMPED CONTRACT.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\STAMPED CONTRACT.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\STAMPED CONTRACT.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\STAMPED CONTRACT.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\STAMPED CONTRACT.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\STAMPED CONTRACT.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\STAMPED CONTRACT.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\STAMPED CONTRACT.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\STAMPED CONTRACT.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\STAMPED CONTRACT.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\STAMPED CONTRACT.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\STAMPED CONTRACT.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\STAMPED CONTRACT.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\STAMPED CONTRACT.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\STAMPED CONTRACT.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\STAMPED CONTRACT.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\STAMPED CONTRACT.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\STAMPED CONTRACT.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\STAMPED CONTRACT.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\STAMPED CONTRACT.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\STAMPED CONTRACT.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\STAMPED CONTRACT.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\STAMPED CONTRACT.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\STAMPED CONTRACT.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\STAMPED CONTRACT.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\STAMPED CONTRACT.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\STAMPED CONTRACT.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\STAMPED CONTRACT.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\STAMPED CONTRACT.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\STAMPED CONTRACT.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\STAMPED CONTRACT.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\STAMPED CONTRACT.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\STAMPED CONTRACT.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\STAMPED CONTRACT.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\STAMPED CONTRACT.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\STAMPED CONTRACT.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\STAMPED CONTRACT.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\STAMPED CONTRACT.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\STAMPED CONTRACT.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\STAMPED CONTRACT.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\STAMPED CONTRACT.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\STAMPED CONTRACT.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\STAMPED CONTRACT.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\STAMPED CONTRACT.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\STAMPED CONTRACT.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\STAMPED CONTRACT.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\STAMPED CONTRACT.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\STAMPED CONTRACT.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\STAMPED CONTRACT.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\STAMPED CONTRACT.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\STAMPED CONTRACT.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\STAMPED CONTRACT.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\STAMPED CONTRACT.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\STAMPED CONTRACT.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\STAMPED CONTRACT.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\STAMPED CONTRACT.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\STAMPED CONTRACT.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\STAMPED CONTRACT.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\STAMPED CONTRACT.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\STAMPED CONTRACT.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\STAMPED CONTRACT.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\STAMPED CONTRACT.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\STAMPED CONTRACT.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\STAMPED CONTRACT.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\STAMPED CONTRACT.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\STAMPED CONTRACT.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\STAMPED CONTRACT.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\STAMPED CONTRACT.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\STAMPED CONTRACT.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\STAMPED CONTRACT.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\STAMPED CONTRACT.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\STAMPED CONTRACT.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\STAMPED CONTRACT.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\STAMPED CONTRACT.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\STAMPED CONTRACT.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\STAMPED CONTRACT.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\STAMPED CONTRACT.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\STAMPED CONTRACT.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\STAMPED CONTRACT.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\STAMPED CONTRACT.exeProcess information set: NOOPENFILEERRORBOX

                Malware Analysis System Evasion

                barindex
                Source: Yara matchFile source: Process Memory Space: STAMPED CONTRACT.exe PID: 5676, type: MEMORYSTR
                Source: STAMPED CONTRACT.exe, 00000000.00000002.272424508.0000000002891000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000002.276541490.0000000002DCB000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: WINE_GET_UNIX_FILE_NAME
                Source: STAMPED CONTRACT.exe, 00000000.00000002.272424508.0000000002891000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000002.276541490.0000000002DCB000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: SBIEDLL.DLL
                Source: C:\Users\user\Desktop\STAMPED CONTRACT.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_NetworkAdapterConfiguration
                Source: C:\Users\user\Desktop\STAMPED CONTRACT.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
                Source: C:\Users\user\Desktop\STAMPED CONTRACT.exe TID: 5908Thread sleep time: -922337203685477s >= -30000s
                Source: C:\Users\user\Desktop\STAMPED CONTRACT.exe TID: 5252Thread sleep time: -3689348814741908s >= -30000s
                Source: C:\Users\user\Desktop\STAMPED CONTRACT.exe TID: 3672Thread sleep count: 9519 > 30
                Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                Source: C:\Users\user\Desktop\STAMPED CONTRACT.exeThread delayed: delay time: 922337203685477
                Source: C:\Users\user\Desktop\STAMPED CONTRACT.exeThread delayed: delay time: 922337203685477
                Source: C:\Users\user\Desktop\STAMPED CONTRACT.exeWindow / User API: threadDelayed 9519
                Source: C:\Users\user\Desktop\STAMPED CONTRACT.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                Source: C:\Users\user\Desktop\STAMPED CONTRACT.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                Source: C:\Users\user\Desktop\STAMPED CONTRACT.exeProcess information queried: ProcessInformation
                Source: C:\Users\user\Desktop\STAMPED CONTRACT.exeThread delayed: delay time: 922337203685477
                Source: C:\Users\user\Desktop\STAMPED CONTRACT.exeThread delayed: delay time: 922337203685477
                Source: STAMPED CONTRACT.exe, 00000000.00000002.276541490.0000000002DCB000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: VMware SVGA IIOData Source=localhost\sqlexpress;Initial Catalog=dbSMS;Integrated Security=True
                Source: STAMPED CONTRACT.exe, 00000000.00000002.276541490.0000000002DCB000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: vmware
                Source: STAMPED CONTRACT.exe, 00000000.00000002.276541490.0000000002DCB000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: C:\PROGRAM FILES\VMWARE\VMWARE TOOLS\
                Source: STAMPED CONTRACT.exe, 00000000.00000002.276541490.0000000002DCB000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: SOFTWARE\VMware, Inc.\VMware Tools
                Source: STAMPED CONTRACT.exe, 00000000.00000002.276541490.0000000002DCB000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: VMWARE
                Source: STAMPED CONTRACT.exe, 00000000.00000002.276541490.0000000002DCB000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: InstallPath%C:\PROGRAM FILES\VMWARE\VMWARE TOOLS\
                Source: STAMPED CONTRACT.exe, 00000000.00000002.276541490.0000000002DCB000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: VMWARE"SOFTWARE\VMware, Inc.\VMware ToolsLHARDWARE\DEVICEMAP\Scsi\Scsi Port 1\Scsi Bus 0\Target Id 0\Logical Unit Id 0LHARDWARE\DEVICEMAP\Scsi\Scsi Port 2\Scsi Bus 0\Target Id 0\Logical Unit Id 0'SYSTEM\ControlSet001\Services\Disk\Enum
                Source: STAMPED CONTRACT.exe, 00000000.00000002.276541490.0000000002DCB000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: VMware SVGA II
                Source: STAMPED CONTRACT.exe, 00000000.00000002.276541490.0000000002DCB000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: vmwareNSYSTEM\ControlSet001\Control\Class\{4D36E968-E325-11CE-BFC1-08002BE10318}\0000
                Source: C:\Users\user\Desktop\STAMPED CONTRACT.exeProcess token adjusted: Debug
                Source: C:\Users\user\Desktop\STAMPED CONTRACT.exeProcess token adjusted: Debug
                Source: C:\Users\user\Desktop\STAMPED CONTRACT.exeCode function: 7_2_067B2568 LdrInitializeThunk,
                Source: C:\Users\user\Desktop\STAMPED CONTRACT.exeMemory allocated: page read and write | page guard

                HIPS / PFW / Operating System Protection Evasion

                barindex
                Source: C:\Users\user\Desktop\STAMPED CONTRACT.exeMemory written: C:\Users\user\Desktop\STAMPED CONTRACT.exe base: 400000 value starts with: 4D5A
                Source: C:\Users\user\Desktop\STAMPED CONTRACT.exeProcess created: C:\Windows\SysWOW64\schtasks.exe C:\Windows\System32\schtasks.exe" /Create /TN "Updates\UBkncV" /XML "C:\Users\user\AppData\Local\Temp\tmpBA47.tmp
                Source: C:\Users\user\Desktop\STAMPED CONTRACT.exeProcess created: C:\Users\user\Desktop\STAMPED CONTRACT.exe {path}
                Source: C:\Users\user\Desktop\STAMPED CONTRACT.exeQueries volume information: C:\Users\user\Desktop\STAMPED CONTRACT.exe VolumeInformation
                Source: C:\Users\user\Desktop\STAMPED CONTRACT.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
                Source: C:\Users\user\Desktop\STAMPED CONTRACT.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
                Source: C:\Users\user\Desktop\STAMPED CONTRACT.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
                Source: C:\Users\user\Desktop\STAMPED CONTRACT.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
                Source: C:\Users\user\Desktop\STAMPED CONTRACT.exeQueries volume information: C:\Windows\Fonts\arial.ttf VolumeInformation
                Source: C:\Users\user\Desktop\STAMPED CONTRACT.exeQueries volume information: C:\Windows\Fonts\ariali.ttf VolumeInformation
                Source: C:\Users\user\Desktop\STAMPED CONTRACT.exeQueries volume information: C:\Windows\Fonts\arialbd.ttf VolumeInformation
                Source: C:\Users\user\Desktop\STAMPED CONTRACT.exeQueries volume information: C:\Windows\Fonts\arialbi.ttf VolumeInformation
                Source: C:\Users\user\Desktop\STAMPED CONTRACT.exeQueries volume information: C:\Windows\Fonts\ARIALN.TTF VolumeInformation
                Source: C:\Users\user\Desktop\STAMPED CONTRACT.exeQueries volume information: C:\Windows\Fonts\ariblk.ttf VolumeInformation
                Source: C:\Users\user\Desktop\STAMPED CONTRACT.exeQueries volume information: C:\Windows\Fonts\ARIALNI.TTF VolumeInformation
                Source: C:\Users\user\Desktop\STAMPED CONTRACT.exeQueries volume information: C:\Windows\Fonts\ARIALNB.TTF VolumeInformation
                Source: C:\Users\user\Desktop\STAMPED CONTRACT.exeQueries volume information: C:\Windows\Fonts\ARIALNBI.TTF VolumeInformation
                Source: C:\Users\user\Desktop\STAMPED CONTRACT.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformation
                Source: C:\Users\user\Desktop\STAMPED CONTRACT.exeQueries volume information: C:\Windows\Fonts\calibri.ttf VolumeInformation
                Source: C:\Users\user\Desktop\STAMPED CONTRACT.exeQueries volume information: C:\Windows\Fonts\calibril.ttf VolumeInformation
                Source: C:\Users\user\Desktop\STAMPED CONTRACT.exeQueries volume information: C:\Windows\Fonts\calibrii.ttf VolumeInformation
                Source: C:\Users\user\Desktop\STAMPED CONTRACT.exeQueries volume information: C:\Windows\Fonts\calibrili.ttf VolumeInformation
                Source: C:\Users\user\Desktop\STAMPED CONTRACT.exeQueries volume information: C:\Windows\Fonts\calibrib.ttf VolumeInformation
                Source: C:\Users\user\Desktop\STAMPED CONTRACT.exeQueries volume information: C:\Windows\Fonts\calibriz.ttf VolumeInformation
                Source: C:\Users\user\Desktop\STAMPED CONTRACT.exeQueries volume information: C:\Windows\Fonts\cambria.ttc VolumeInformation
                Source: C:\Users\user\Desktop\STAMPED CONTRACT.exeQueries volume information: C:\Windows\Fonts\cambriai.ttf VolumeInformation
                Source: C:\Users\user\Desktop\STAMPED CONTRACT.exeQueries volume information: C:\Windows\Fonts\cambriab.ttf VolumeInformation
                Source: C:\Users\user\Desktop\STAMPED CONTRACT.exeQueries volume information: C:\Windows\Fonts\cambriaz.ttf VolumeInformation
                Source: C:\Users\user\Desktop\STAMPED CONTRACT.exeQueries volume information: C:\Windows\Fonts\Candara.ttf VolumeInformation
                Source: C:\Users\user\Desktop\STAMPED CONTRACT.exeQueries volume information: C:\Windows\Fonts\Candarai.ttf VolumeInformation
                Source: C:\Users\user\Desktop\STAMPED CONTRACT.exeQueries volume information: C:\Windows\Fonts\Candarab.ttf VolumeInformation
                Source: C:\Users\user\Desktop\STAMPED CONTRACT.exeQueries volume information: C:\Windows\Fonts\Candaraz.ttf VolumeInformation
                Source: C:\Users\user\Desktop\STAMPED CONTRACT.exeQueries volume information: C:\Windows\Fonts\comic.ttf VolumeInformation
                Source: C:\Users\user\Desktop\STAMPED CONTRACT.exeQueries volume information: C:\Windows\Fonts\comici.ttf VolumeInformation
                Source: C:\Users\user\Desktop\STAMPED CONTRACT.exeQueries volume information: C:\Windows\Fonts\comicbd.ttf VolumeInformation
                Source: C:\Users\user\Desktop\STAMPED CONTRACT.exeQueries volume information: C:\Windows\Fonts\comicz.ttf VolumeInformation
                Source: C:\Users\user\Desktop\STAMPED CONTRACT.exeQueries volume information: C:\Windows\Fonts\consola.ttf VolumeInformation
                Source: C:\Users\user\Desktop\STAMPED CONTRACT.exeQueries volume information: C:\Windows\Fonts\consolai.ttf VolumeInformation
                Source: C:\Users\user\Desktop\STAMPED CONTRACT.exeQueries volume information: C:\Windows\Fonts\consolab.ttf VolumeInformation
                Source: C:\Users\user\Desktop\STAMPED CONTRACT.exeQueries volume information: C:\Windows\Fonts\consolaz.ttf VolumeInformation
                Source: C:\Users\user\Desktop\STAMPED CONTRACT.exeQueries volume information: C:\Windows\Fonts\constan.ttf VolumeInformation
                Source: C:\Users\user\Desktop\STAMPED CONTRACT.exeQueries volume information: C:\Windows\Fonts\constani.ttf VolumeInformation
                Source: C:\Users\user\Desktop\STAMPED CONTRACT.exeQueries volume information: C:\Windows\Fonts\constanb.ttf VolumeInformation
                Source: C:\Users\user\Desktop\STAMPED CONTRACT.exeQueries volume information: C:\Windows\Fonts\constanz.ttf VolumeInformation
                Source: C:\Users\user\Desktop\STAMPED CONTRACT.exeQueries volume information: C:\Windows\Fonts\corbel.ttf VolumeInformation
                Source: C:\Users\user\Desktop\STAMPED CONTRACT.exeQueries volume information: C:\Windows\Fonts\corbeli.ttf VolumeInformation
                Source: C:\Users\user\Desktop\STAMPED CONTRACT.exeQueries volume information: C:\Windows\Fonts\corbelb.ttf VolumeInformation
                Source: C:\Users\user\Desktop\STAMPED CONTRACT.exeQueries volume information: C:\Windows\Fonts\corbelz.ttf VolumeInformation
                Source: C:\Users\user\Desktop\STAMPED CONTRACT.exeQueries volume information: C:\Windows\Fonts\cour.ttf VolumeInformation
                Source: C:\Users\user\Desktop\STAMPED CONTRACT.exeQueries volume information: C:\Windows\Fonts\couri.ttf VolumeInformation
                Source: C:\Users\user\Desktop\STAMPED CONTRACT.exeQueries volume information: C:\Windows\Fonts\courbd.ttf VolumeInformation
                Source: C:\Users\user\Desktop\STAMPED CONTRACT.exeQueries volume information: C:\Windows\Fonts\courbi.ttf VolumeInformation
                Source: C:\Users\user\Desktop\STAMPED CONTRACT.exeQueries volume information: C:\Windows\Fonts\ebrima.ttf VolumeInformation
                Source: C:\Users\user\Desktop\STAMPED CONTRACT.exeQueries volume information: C:\Windows\Fonts\ebrimabd.ttf VolumeInformation
                Source: C:\Users\user\Desktop\STAMPED CONTRACT.exeQueries volume information: C:\Windows\Fonts\framd.ttf VolumeInformation
                Source: C:\Users\user\Desktop\STAMPED CONTRACT.exeQueries volume information: C:\Windows\Fonts\FRADM.TTF VolumeInformation
                Source: C:\Users\user\Desktop\STAMPED CONTRACT.exeQueries volume information: C:\Windows\Fonts\framdit.ttf VolumeInformation
                Source: C:\Users\user\Desktop\STAMPED CONTRACT.exeQueries volume information: C:\Windows\Fonts\FRADMIT.TTF VolumeInformation
                Source: C:\Users\user\Desktop\STAMPED CONTRACT.exeQueries volume information: C:\Windows\Fonts\FRAMDCN.TTF VolumeInformation
                Source: C:\Users\user\Desktop\STAMPED CONTRACT.exeQueries volume information: C:\Windows\Fonts\FRADMCN.TTF VolumeInformation
                Source: C:\Users\user\Desktop\STAMPED CONTRACT.exeQueries volume information: C:\Windows\Fonts\FRAHV.TTF VolumeInformation
                Source: C:\Users\user\Desktop\STAMPED CONTRACT.exeQueries volume information: C:\Windows\Fonts\FRAHVIT.TTF VolumeInformation
                Source: C:\Users\user\Desktop\STAMPED CONTRACT.exeQueries volume information: C:\Windows\Fonts\Gabriola.ttf VolumeInformation
                Source: C:\Users\user\Desktop\STAMPED CONTRACT.exeQueries volume information: C:\Windows\Fonts\gadugi.ttf VolumeInformation
                Source: C:\Users\user\Desktop\STAMPED CONTRACT.exeQueries volume information: C:\Windows\Fonts\gadugib.ttf VolumeInformation
                Source: C:\Users\user\Desktop\STAMPED CONTRACT.exeQueries volume information: C:\Windows\Fonts\georgia.ttf VolumeInformation
                Source: C:\Users\user\Desktop\STAMPED CONTRACT.exeQueries volume information: C:\Windows\Fonts\georgiai.ttf VolumeInformation
                Source: C:\Users\user\Desktop\STAMPED CONTRACT.exeQueries volume information: C:\Windows\Fonts\georgiab.ttf VolumeInformation
                Source: C:\Users\user\Desktop\STAMPED CONTRACT.exeQueries volume information: C:\Windows\Fonts\georgiaz.ttf VolumeInformation
                Source: C:\Users\user\Desktop\STAMPED CONTRACT.exeQueries volume information: C:\Windows\Fonts\impact.ttf VolumeInformation
                Source: C:\Users\user\Desktop\STAMPED CONTRACT.exeQueries volume information: C:\Windows\Fonts\Inkfree.ttf VolumeInformation
                Source: C:\Users\user\Desktop\STAMPED CONTRACT.exeQueries volume information: C:\Windows\Fonts\javatext.ttf VolumeInformation
                Source: C:\Users\user\Desktop\STAMPED CONTRACT.exeQueries volume information: C:\Windows\Fonts\LeelawUI.ttf VolumeInformation
                Source: C:\Users\user\Desktop\STAMPED CONTRACT.exeQueries volume information: C:\Windows\Fonts\LeelUIsl.ttf VolumeInformation
                Source: C:\Users\user\Desktop\STAMPED CONTRACT.exeQueries volume information: C:\Windows\Fonts\LeelaUIb.ttf VolumeInformation
                Source: C:\Users\user\Desktop\STAMPED CONTRACT.exeQueries volume information: C:\Windows\Fonts\lucon.ttf VolumeInformation
                Source: C:\Users\user\Desktop\STAMPED CONTRACT.exeQueries volume information: C:\Windows\Fonts\l_10646.ttf VolumeInformation
                Source: C:\Users\user\Desktop\STAMPED CONTRACT.exeQueries volume information: C:\Windows\Fonts\malgun.ttf VolumeInformation
                Source: C:\Users\user\Desktop\STAMPED CONTRACT.exeQueries volume information: C:\Windows\Fonts\malgunsl.ttf VolumeInformation
                Source: C:\Users\user\Desktop\STAMPED CONTRACT.exeQueries volume information: C:\Windows\Fonts\malgunbd.ttf VolumeInformation
                Source: C:\Users\user\Desktop\STAMPED CONTRACT.exeQueries volume information: C:\Windows\Fonts\himalaya.ttf VolumeInformation
                Source: C:\Users\user\Desktop\STAMPED CONTRACT.exeQueries volume information: C:\Windows\Fonts\msjh.ttc VolumeInformation
                Source: C:\Users\user\Desktop\STAMPED CONTRACT.exeQueries volume information: C:\Windows\Fonts\msjhl.ttc VolumeInformation
                Source: C:\Users\user\Desktop\STAMPED CONTRACT.exeQueries volume information: C:\Windows\Fonts\msjhbd.ttc VolumeInformation
                Source: C:\Users\user\Desktop\STAMPED CONTRACT.exeQueries volume information: C:\Windows\Fonts\ntailu.ttf VolumeInformation
                Source: C:\Users\user\Desktop\STAMPED CONTRACT.exeQueries volume information: C:\Windows\Fonts\ntailub.ttf VolumeInformation
                Source: C:\Users\user\Desktop\STAMPED CONTRACT.exeQueries volume information: C:\Windows\Fonts\phagspa.ttf VolumeInformation
                Source: C:\Users\user\Desktop\STAMPED CONTRACT.exeQueries volume information: C:\Windows\Fonts\phagspab.ttf VolumeInformation
                Source: C:\Users\user\Desktop\STAMPED CONTRACT.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformation
                Source: C:\Users\user\Desktop\STAMPED CONTRACT.exeQueries volume information: C:\Windows\Fonts\taile.ttf VolumeInformation
                Source: C:\Users\user\Desktop\STAMPED CONTRACT.exeQueries volume information: C:\Windows\Fonts\taileb.ttf VolumeInformation
                Source: C:\Users\user\Desktop\STAMPED CONTRACT.exeQueries volume information: C:\Windows\Fonts\msyh.ttc VolumeInformation
                Source: C:\Users\user\Desktop\STAMPED CONTRACT.exeQueries volume information: C:\Windows\Fonts\msyhl.ttc VolumeInformation
                Source: C:\Users\user\Desktop\STAMPED CONTRACT.exeQueries volume information: C:\Windows\Fonts\msyhbd.ttc VolumeInformation
                Source: C:\Users\user\Desktop\STAMPED CONTRACT.exeQueries volume information: C:\Windows\Fonts\msyi.ttf VolumeInformation
                Source: C:\Users\user\Desktop\STAMPED CONTRACT.exeQueries volume information: C:\Windows\Fonts\mingliub.ttc VolumeInformation
                Source: C:\Users\user\Desktop\STAMPED CONTRACT.exeQueries volume information: C:\Windows\Fonts\monbaiti.ttf VolumeInformation
                Source: C:\Users\user\Desktop\STAMPED CONTRACT.exeQueries volume information: C:\Windows\Fonts\msgothic.ttc VolumeInformation
                Source: C:\Users\user\Desktop\STAMPED CONTRACT.exeQueries volume information: C:\Windows\Fonts\mvboli.ttf VolumeInformation
                Source: C:\Users\user\Desktop\STAMPED CONTRACT.exeQueries volume information: C:\Windows\Fonts\mmrtext.ttf VolumeInformation
                Source: C:\Users\user\Desktop\STAMPED CONTRACT.exeQueries volume information: C:\Windows\Fonts\mmrtextb.ttf VolumeInformation
                Source: C:\Users\user\Desktop\STAMPED CONTRACT.exeQueries volume information: C:\Windows\Fonts\Nirmala.ttf VolumeInformation
                Source: C:\Users\user\Desktop\STAMPED CONTRACT.exeQueries volume information: C:\Windows\Fonts\NirmalaS.ttf VolumeInformation
                Source: C:\Users\user\Desktop\STAMPED CONTRACT.exeQueries volume information: C:\Windows\Fonts\NirmalaB.ttf VolumeInformation
                Source: C:\Users\user\Desktop\STAMPED CONTRACT.exeQueries volume information: C:\Windows\Fonts\pala.ttf VolumeInformation
                Source: C:\Users\user\Desktop\STAMPED CONTRACT.exeQueries volume information: C:\Windows\Fonts\palai.ttf VolumeInformation
                Source: C:\Users\user\Desktop\STAMPED CONTRACT.exeQueries volume information: C:\Windows\Fonts\palab.ttf VolumeInformation
                Source: C:\Users\user\Desktop\STAMPED CONTRACT.exeQueries volume information: C:\Windows\Fonts\palabi.ttf VolumeInformation
                Source: C:\Users\user\Desktop\STAMPED CONTRACT.exeQueries volume information: C:\Windows\Fonts\segoepr.ttf VolumeInformation
                Source: C:\Users\user\Desktop\STAMPED CONTRACT.exeQueries volume information: C:\Windows\Fonts\segoeprb.ttf VolumeInformation
                Source: C:\Users\user\Desktop\STAMPED CONTRACT.exeQueries volume information: C:\Windows\Fonts\segoesc.ttf VolumeInformation
                Source: C:\Users\user\Desktop\STAMPED CONTRACT.exeQueries volume information: C:\Windows\Fonts\segoescb.ttf VolumeInformation
                Source: C:\Users\user\Desktop\STAMPED CONTRACT.exeQueries volume information: C:\Windows\Fonts\seguisb.ttf VolumeInformation
                Source: C:\Users\user\Desktop\STAMPED CONTRACT.exeQueries volume information: C:\Windows\Fonts\segoeuii.ttf VolumeInformation
                Source: C:\Users\user\Desktop\STAMPED CONTRACT.exeQueries volume information: C:\Windows\Fonts\seguisli.ttf VolumeInformation
                Source: C:\Users\user\Desktop\STAMPED CONTRACT.exeQueries volume information: C:\Windows\Fonts\seguili.ttf VolumeInformation
                Source: C:\Users\user\Desktop\STAMPED CONTRACT.exeQueries volume information: C:\Windows\Fonts\seguisbi.ttf VolumeInformation
                Source: C:\Users\user\Desktop\STAMPED CONTRACT.exeQueries volume information: C:\Windows\Fonts\segoeuiz.ttf VolumeInformation
                Source: C:\Users\user\Desktop\STAMPED CONTRACT.exeQueries volume information: C:\Windows\Fonts\seguibl.ttf VolumeInformation
                Source: C:\Users\user\Desktop\STAMPED CONTRACT.exeQueries volume information: C:\Windows\Fonts\seguibli.ttf VolumeInformation
                Source: C:\Users\user\Desktop\STAMPED CONTRACT.exeQueries volume information: C:\Windows\Fonts\seguiemj.ttf VolumeInformation
                Source: C:\Users\user\Desktop\STAMPED CONTRACT.exeQueries volume information: C:\Windows\Fonts\seguihis.ttf VolumeInformation
                Source: C:\Users\user\Desktop\STAMPED CONTRACT.exeQueries volume information: C:\Windows\Fonts\seguisym.ttf VolumeInformation
                Source: C:\Users\user\Desktop\STAMPED CONTRACT.exeQueries volume information: C:\Windows\Fonts\simsun.ttc VolumeInformation
                Source: C:\Users\user\Desktop\STAMPED CONTRACT.exeQueries volume information: C:\Windows\Fonts\simsunb.ttf VolumeInformation
                Source: C:\Users\user\Desktop\STAMPED CONTRACT.exeQueries volume information: C:\Windows\Fonts\Sitka.ttc VolumeInformation
                Source: C:\Users\user\Desktop\STAMPED CONTRACT.exeQueries volume information: C:\Windows\Fonts\SitkaI.ttc VolumeInformation
                Source: C:\Users\user\Desktop\STAMPED CONTRACT.exeQueries volume information: C:\Windows\Fonts\SitkaB.ttc VolumeInformation
                Source: C:\Users\user\Desktop\STAMPED CONTRACT.exeQueries volume information: C:\Windows\Fonts\SitkaZ.ttc VolumeInformation
                Source: C:\Users\user\Desktop\STAMPED CONTRACT.exeQueries volume information: C:\Windows\Fonts\sylfaen.ttf VolumeInformation
                Source: C:\Users\user\Desktop\STAMPED CONTRACT.exeQueries volume information: C:\Windows\Fonts\symbol.ttf VolumeInformation
                Source: C:\Users\user\Desktop\STAMPED CONTRACT.exeQueries volume information: C:\Windows\Fonts\tahoma.ttf VolumeInformation
                Source: C:\Users\user\Desktop\STAMPED CONTRACT.exeQueries volume information: C:\Windows\Fonts\tahomabd.ttf VolumeInformation
                Source: C:\Users\user\Desktop\STAMPED CONTRACT.exeQueries volume information: C:\Windows\Fonts\timesi.ttf VolumeInformation
                Source: C:\Users\user\Desktop\STAMPED CONTRACT.exeQueries volume information: C:\Windows\Fonts\timesbd.ttf VolumeInformation
                Source: C:\Users\user\Desktop\STAMPED CONTRACT.exeQueries volume information: C:\Windows\Fonts\timesbi.ttf VolumeInformation
                Source: C:\Users\user\Desktop\STAMPED CONTRACT.exeQueries volume information: C:\Windows\Fonts\trebuc.ttf VolumeInformation
                Source: C:\Users\user\Desktop\STAMPED CONTRACT.exeQueries volume information: C:\Windows\Fonts\trebucit.ttf VolumeInformation
                Source: C:\Users\user\Desktop\STAMPED CONTRACT.exeQueries volume information: C:\Windows\Fonts\trebucbd.ttf VolumeInformation
                Source: C:\Users\user\Desktop\STAMPED CONTRACT.exeQueries volume information: C:\Windows\Fonts\trebucbi.ttf VolumeInformation
                Source: C:\Users\user\Desktop\STAMPED CONTRACT.exeQueries volume information: C:\Windows\Fonts\verdana.ttf VolumeInformation
                Source: C:\Users\user\Desktop\STAMPED CONTRACT.exeQueries volume information: C:\Windows\Fonts\verdanai.ttf VolumeInformation
                Source: C:\Users\user\Desktop\STAMPED CONTRACT.exeQueries volume information: C:\Windows\Fonts\verdanab.ttf VolumeInformation
                Source: C:\Users\user\Desktop\STAMPED CONTRACT.exeQueries volume information: C:\Windows\Fonts\verdanaz.ttf VolumeInformation
                Source: C:\Users\user\Desktop\STAMPED CONTRACT.exeQueries volume information: C:\Windows\Fonts\webdings.ttf VolumeInformation
                Source: C:\Users\user\Desktop\STAMPED CONTRACT.exeQueries volume information: C:\Windows\Fonts\wingding.ttf VolumeInformation
                Source: C:\Users\user\Desktop\STAMPED CONTRACT.exeQueries volume information: C:\Windows\Fonts\YuGothR.ttc VolumeInformation
                Source: C:\Users\user\Desktop\STAMPED CONTRACT.exeQueries volume information: C:\Windows\Fonts\YuGothM.ttc VolumeInformation
                Source: C:\Users\user\Desktop\STAMPED CONTRACT.exeQueries volume information: C:\Windows\Fonts\YuGothL.ttc VolumeInformation
                Source: C:\Users\user\Desktop\STAMPED CONTRACT.exeQueries volume information: C:\Windows\Fonts\YuGothB.ttc VolumeInformation
                Source: C:\Users\user\Desktop\STAMPED CONTRACT.exeQueries volume information: C:\Windows\Fonts\holomdl2.ttf VolumeInformation
                Source: C:\Users\user\Desktop\STAMPED CONTRACT.exeQueries volume information: C:\Windows\Fonts\CENTURY.TTF VolumeInformation
                Source: C:\Users\user\Desktop\STAMPED CONTRACT.exeQueries volume information: C:\Windows\Fonts\LEELAWAD.TTF VolumeInformation
                Source: C:\Users\user\Desktop\STAMPED CONTRACT.exeQueries volume information: C:\Windows\Fonts\LEELAWDB.TTF VolumeInformation
                Source: C:\Users\user\Desktop\STAMPED CONTRACT.exeQueries volume information: C:\Windows\Fonts\MSUIGHUR.TTF VolumeInformation
                Source: C:\Users\user\Desktop\STAMPED CONTRACT.exeQueries volume information: C:\Windows\Fonts\MSUIGHUB.TTF VolumeInformation
                Source: C:\Users\user\Desktop\STAMPED CONTRACT.exeQueries volume information: C:\Windows\Fonts\WINGDNG2.TTF VolumeInformation
                Source: C:\Users\user\Desktop\STAMPED CONTRACT.exeQueries volume information: C:\Windows\Fonts\WINGDNG3.TTF VolumeInformation
                Source: C:\Users\user\Desktop\STAMPED CONTRACT.exeQueries volume information: C:\Windows\Fonts\TEMPSITC.TTF VolumeInformation
                Source: C:\Users\user\Desktop\STAMPED CONTRACT.exeQueries volume information: C:\Windows\Fonts\PRISTINA.TTF VolumeInformation
                Source: C:\Users\user\Desktop\STAMPED CONTRACT.exeQueries volume information: C:\Windows\Fonts\PAPYRUS.TTF VolumeInformation
                Source: C:\Users\user\Desktop\STAMPED CONTRACT.exeQueries volume information: C:\Windows\Fonts\MISTRAL.TTF VolumeInformation
                Source: C:\Users\user\Desktop\STAMPED CONTRACT.exeQueries volume information: C:\Windows\Fonts\LHANDW.TTF VolumeInformation
                Source: C:\Users\user\Desktop\STAMPED CONTRACT.exeQueries volume information: C:\Windows\Fonts\ITCKRIST.TTF VolumeInformation
                Source: C:\Users\user\Desktop\STAMPED CONTRACT.exeQueries volume information: C:\Windows\Fonts\JUICE___.TTF VolumeInformation
                Source: C:\Users\user\Desktop\STAMPED CONTRACT.exeQueries volume information: C:\Windows\Fonts\FRSCRIPT.TTF VolumeInformation
                Source: C:\Users\user\Desktop\STAMPED CONTRACT.exeQueries volume information: C:\Windows\Fonts\FREESCPT.TTF VolumeInformation
                Source: C:\Users\user\Desktop\STAMPED CONTRACT.exeQueries volume information: C:\Windows\Fonts\BRADHITC.TTF VolumeInformation
                Source: C:\Users\user\Desktop\STAMPED CONTRACT.exeQueries volume information: C:\Windows\Fonts\OUTLOOK.TTF VolumeInformation
                Source: C:\Users\user\Desktop\STAMPED CONTRACT.exeQueries volume information: C:\Windows\Fonts\BKANT.TTF VolumeInformation
                Source: C:\Users\user\Desktop\STAMPED CONTRACT.exeQueries volume information: C:\Windows\Fonts\ANTQUAI.TTF VolumeInformation
                Source: C:\Users\user\Desktop\STAMPED CONTRACT.exeQueries volume information: C:\Windows\Fonts\ANTQUAB.TTF VolumeInformation
                Source: C:\Users\user\Desktop\STAMPED CONTRACT.exeQueries volume information: C:\Windows\Fonts\ANTQUABI.TTF VolumeInformation
                Source: C:\Users\user\Desktop\STAMPED CONTRACT.exeQueries volume information: C:\Windows\Fonts\GARA.TTF VolumeInformation
                Source: C:\Users\user\Desktop\STAMPED CONTRACT.exeQueries volume information: C:\Windows\Fonts\GARAIT.TTF VolumeInformation
                Source: C:\Users\user\Desktop\STAMPED CONTRACT.exeQueries volume information: C:\Windows\Fonts\GARABD.TTF VolumeInformation
                Source: C:\Users\user\Desktop\STAMPED CONTRACT.exeQueries volume information: C:\Windows\Fonts\MTCORSVA.TTF VolumeInformation
                Source: C:\Users\user\Desktop\STAMPED CONTRACT.exeQueries volume information: C:\Windows\Fonts\GOTHIC.TTF VolumeInformation
                Source: C:\Users\user\Desktop\STAMPED CONTRACT.exeQueries volume information: C:\Windows\Fonts\GOTHICI.TTF VolumeInformation
                Source: C:\Users\user\Desktop\STAMPED CONTRACT.exeQueries volume information: C:\Windows\Fonts\GOTHICB.TTF VolumeInformation
                Source: C:\Users\user\Desktop\STAMPED CONTRACT.exeQueries volume information: C:\Windows\Fonts\GOTHICBI.TTF VolumeInformation
                Source: C:\Users\user\Desktop\STAMPED CONTRACT.exeQueries volume information: C:\Windows\Fonts\ALGER.TTF VolumeInformation
                Source: C:\Users\user\Desktop\STAMPED CONTRACT.exeQueries volume information: C:\Windows\Fonts\BASKVILL.TTF VolumeInformation
                Source: C:\Users\user\Desktop\STAMPED CONTRACT.exeQueries volume information: C:\Windows\Fonts\BAUHS93.TTF VolumeInformation
                Source: C:\Users\user\Desktop\STAMPED CONTRACT.exeQueries volume information: C:\Windows\Fonts\BELL.TTF VolumeInformation
                Source: C:\Users\user\Desktop\STAMPED CONTRACT.exeQueries volume information: C:\Windows\Fonts\BELLI.TTF VolumeInformation
                Source: C:\Users\user\Desktop\STAMPED CONTRACT.exeQueries volume information: C:\Windows\Fonts\BELLB.TTF VolumeInformation
                Source: C:\Users\user\Desktop\STAMPED CONTRACT.exeQueries volume information: C:\Windows\Fonts\BRLNSR.TTF VolumeInformation
                Source: C:\Users\user\Desktop\STAMPED CONTRACT.exeQueries volume information: C:\Windows\Fonts\BRLNSDB.TTF VolumeInformation
                Source: C:\Users\user\Desktop\STAMPED CONTRACT.exeQueries volume information: C:\Windows\Fonts\BRLNSB.TTF VolumeInformation
                Source: C:\Users\user\Desktop\STAMPED CONTRACT.exeQueries volume information: C:\Windows\Fonts\BERNHC.TTF VolumeInformation
                Source: C:\Users\user\Desktop\STAMPED CONTRACT.exeQueries volume information: C:\Windows\Fonts\BOD_PSTC.TTF VolumeInformation
                Source: C:\Users\user\Desktop\STAMPED CONTRACT.exeQueries volume information: C:\Windows\Fonts\BRITANIC.TTF VolumeInformation
                Source: C:\Users\user\Desktop\STAMPED CONTRACT.exeQueries volume information: C:\Windows\Fonts\BROADW.TTF VolumeInformation
                Source: C:\Users\user\Desktop\STAMPED CONTRACT.exeQueries volume information: C:\Windows\Fonts\BRUSHSCI.TTF VolumeInformation
                Source: C:\Users\user\Desktop\STAMPED CONTRACT.exeQueries volume information: C:\Windows\Fonts\CALIFR.TTF VolumeInformation
                Source: C:\Users\user\Desktop\STAMPED CONTRACT.exeQueries volume information: C:\Windows\Fonts\CALIFI.TTF VolumeInformation
                Source: C:\Users\user\Desktop\STAMPED CONTRACT.exeQueries volume information: C:\Windows\Fonts\CALIFB.TTF VolumeInformation
                Source: C:\Users\user\Desktop\STAMPED CONTRACT.exeQueries volume information: C:\Windows\Fonts\CENTAUR.TTF VolumeInformation
                Source: C:\Users\user\Desktop\STAMPED CONTRACT.exeQueries volume information: C:\Windows\Fonts\CHILLER.TTF VolumeInformation
                Source: C:\Users\user\Desktop\STAMPED CONTRACT.exeQueries volume information: C:\Windows\Fonts\COLONNA.TTF VolumeInformation
                Source: C:\Users\user\Desktop\STAMPED CONTRACT.exeQueries volume information: C:\Windows\Fonts\COOPBL.TTF VolumeInformation
                Source: C:\Users\user\Desktop\STAMPED CONTRACT.exeQueries volume information: C:\Windows\Fonts\FTLTLT.TTF VolumeInformation
                Source: C:\Users\user\Desktop\STAMPED CONTRACT.exeQueries volume information: C:\Windows\Fonts\HARLOWSI.TTF VolumeInformation
                Source: C:\Users\user\Desktop\STAMPED CONTRACT.exeQueries volume information: C:\Windows\Fonts\HARNGTON.TTF VolumeInformation
                Source: C:\Users\user\Desktop\STAMPED CONTRACT.exeQueries volume information: C:\Windows\Fonts\HTOWERT.TTF VolumeInformation
                Source: C:\Users\user\Desktop\STAMPED CONTRACT.exeQueries volume information: C:\Windows\Fonts\HTOWERTI.TTF VolumeInformation
                Source: C:\Users\user\Desktop\STAMPED CONTRACT.exeQueries volume information: C:\Windows\Fonts\JOKERMAN.TTF VolumeInformation
                Source: C:\Users\user\Desktop\STAMPED CONTRACT.exeQueries volume information: C:\Windows\Fonts\KUNSTLER.TTF VolumeInformation
                Source: C:\Users\user\Desktop\STAMPED CONTRACT.exeQueries volume information: C:\Windows\Fonts\LBRITE.TTF VolumeInformation
                Source: C:\Users\user\Desktop\STAMPED CONTRACT.exeQueries volume information: C:\Windows\Fonts\LBRITED.TTF VolumeInformation
                Source: C:\Users\user\Desktop\STAMPED CONTRACT.exeQueries volume information: C:\Windows\Fonts\LBRITEI.TTF VolumeInformation
                Source: C:\Users\user\Desktop\STAMPED CONTRACT.exeQueries volume information: C:\Windows\Fonts\LBRITEDI.TTF VolumeInformation
                Source: C:\Users\user\Desktop\STAMPED CONTRACT.exeQueries volume information: C:\Windows\Fonts\LCALLIG.TTF VolumeInformation
                Source: C:\Users\user\Desktop\STAMPED CONTRACT.exeQueries volume information: C:\Windows\Fonts\LFAX.TTF VolumeInformation
                Source: C:\Users\user\Desktop\STAMPED CONTRACT.exeQueries volume information: C:\Windows\Fonts\LFAXD.TTF VolumeInformation
                Source: C:\Users\user\Desktop\STAMPED CONTRACT.exeQueries volume information: C:\Windows\Fonts\LFAXI.TTF VolumeInformation
                Source: C:\Users\user\Desktop\STAMPED CONTRACT.exeQueries volume information: C:\Windows\Fonts\LFAXDI.TTF VolumeInformation
                Source: C:\Users\user\Desktop\STAMPED CONTRACT.exeQueries volume information: C:\Windows\Fonts\MAGNETOB.TTF VolumeInformation
                Source: C:\Users\user\Desktop\STAMPED CONTRACT.exeQueries volume information: C:\Windows\Fonts\MATURASC.TTF VolumeInformation
                Source: C:\Users\user\Desktop\STAMPED CONTRACT.exeQueries volume information: C:\Windows\Fonts\MOD20.TTF VolumeInformation
                Source: C:\Users\user\Desktop\STAMPED CONTRACT.exeQueries volume information: C:\Windows\Fonts\NIAGENG.TTF VolumeInformation
                Source: C:\Users\user\Desktop\STAMPED CONTRACT.exeQueries volume information: C:\Windows\Fonts\NIAGSOL.TTF VolumeInformation
                Source: C:\Users\user\Desktop\STAMPED CONTRACT.exeQueries volume information: C:\Windows\Fonts\OLDENGL.TTF VolumeInformation
                Source: C:\Users\user\Desktop\STAMPED CONTRACT.exeQueries volume information: C:\Windows\Fonts\ONYX.TTF VolumeInformation
                Source: C:\Users\user\Desktop\STAMPED CONTRACT.exeQueries volume information: C:\Windows\Fonts\PARCHM.TTF VolumeInformation
                Source: C:\Users\user\Desktop\STAMPED CONTRACT.exeQueries volume information: C:\Windows\Fonts\PLAYBILL.TTF VolumeInformation
                Source: C:\Users\user\Desktop\STAMPED CONTRACT.exeQueries volume information: C:\Windows\Fonts\POORICH.TTF VolumeInformation
                Source: C:\Users\user\Desktop\STAMPED CONTRACT.exeQueries volume information: C:\Windows\Fonts\RAVIE.TTF VolumeInformation
                Source: C:\Users\user\Desktop\STAMPED CONTRACT.exeQueries volume information: C:\Windows\Fonts\INFROMAN.TTF VolumeInformation
                Source: C:\Users\user\Desktop\STAMPED CONTRACT.exeQueries volume information: C:\Windows\Fonts\SHOWG.TTF VolumeInformation
                Source: C:\Users\user\Desktop\STAMPED CONTRACT.exeQueries volume information: C:\Windows\Fonts\SNAP____.TTF VolumeInformation
                Source: C:\Users\user\Desktop\STAMPED CONTRACT.exeQueries volume information: C:\Windows\Fonts\STENCIL.TTF VolumeInformation
                Source: C:\Users\user\Desktop\STAMPED CONTRACT.exeQueries volume information: C:\Windows\Fonts\VINERITC.TTF VolumeInformation
                Source: C:\Users\user\Desktop\STAMPED CONTRACT.exeQueries volume information: C:\Windows\Fonts\VIVALDII.TTF VolumeInformation
                Source: C:\Users\user\Desktop\STAMPED CONTRACT.exeQueries volume information: C:\Windows\Fonts\VLADIMIR.TTF VolumeInformation
                Source: C:\Users\user\Desktop\STAMPED CONTRACT.exeQueries volume information: C:\Windows\Fonts\LATINWD.TTF VolumeInformation
                Source: C:\Users\user\Desktop\STAMPED CONTRACT.exeQueries volume information: C:\Windows\Fonts\TCM_____.TTF VolumeInformation
                Source: C:\Users\user\Desktop\STAMPED CONTRACT.exeQueries volume information: C:\Windows\Fonts\TCMI____.TTF VolumeInformation
                Source: C:\Users\user\Desktop\STAMPED CONTRACT.exeQueries volume information: C:\Windows\Fonts\TCB_____.TTF VolumeInformation
                Source: C:\Users\user\Desktop\STAMPED CONTRACT.exeQueries volume information: C:\Windows\Fonts\TCBI____.TTF VolumeInformation
                Source: C:\Users\user\Desktop\STAMPED CONTRACT.exeQueries volume information: C:\Windows\Fonts\TCCM____.TTF VolumeInformation
                Source: C:\Users\user\Desktop\STAMPED CONTRACT.exeQueries volume information: C:\Windows\Fonts\TCCB____.TTF VolumeInformation
                Source: C:\Users\user\Desktop\STAMPED CONTRACT.exeQueries volume information: C:\Windows\Fonts\TCCEB.TTF VolumeInformation
                Source: C:\Users\user\Desktop\STAMPED CONTRACT.exeQueries volume information: C:\Windows\Fonts\SCRIPTBL.TTF VolumeInformation
                Source: C:\Users\user\Desktop\STAMPED CONTRACT.exeQueries volume information: C:\Windows\Fonts\ROCK.TTF VolumeInformation
                Source: C:\Users\user\Desktop\STAMPED CONTRACT.exeQueries volume information: C:\Windows\Fonts\ROCKI.TTF VolumeInformation
                Source: C:\Users\user\Desktop\STAMPED CONTRACT.exeQueries volume information: C:\Windows\Fonts\ROCKB.TTF VolumeInformation
                Source: C:\Users\user\Desktop\STAMPED CONTRACT.exeQueries volume information: C:\Windows\Fonts\ROCKEB.TTF VolumeInformation
                Source: C:\Users\user\Desktop\STAMPED CONTRACT.exeQueries volume information: C:\Windows\Fonts\ROCKBI.TTF VolumeInformation
                Source: C:\Users\user\Desktop\STAMPED CONTRACT.exeQueries volume information: C:\Windows\Fonts\ROCC____.TTF VolumeInformation
                Source: C:\Users\user\Desktop\STAMPED CONTRACT.exeQueries volume information: C:\Windows\Fonts\ROCCB___.TTF VolumeInformation
                Source: C:\Users\user\Desktop\STAMPED CONTRACT.exeQueries volume information: C:\Windows\Fonts\RAGE.TTF VolumeInformation
                Source: C:\Users\user\Desktop\STAMPED CONTRACT.exeQueries volume information: C:\Windows\Fonts\PERTILI.TTF VolumeInformation
                Source: C:\Users\user\Desktop\STAMPED CONTRACT.exeQueries volume information: C:\Windows\Fonts\PERTIBD.TTF VolumeInformation
                Source: C:\Users\user\Desktop\STAMPED CONTRACT.exeQueries volume information: C:\Windows\Fonts\PER_____.TTF VolumeInformation
                Source: C:\Users\user\Desktop\STAMPED CONTRACT.exeQueries volume information: C:\Windows\Fonts\PERI____.TTF VolumeInformation
                Source: C:\Users\user\Desktop\STAMPED CONTRACT.exeQueries volume information: C:\Windows\Fonts\PERB____.TTF VolumeInformation
                Source: C:\Users\user\Desktop\STAMPED CONTRACT.exeQueries volume information: C:\Windows\Fonts\PERBI___.TTF VolumeInformation
                Source: C:\Users\user\Desktop\STAMPED CONTRACT.exeQueries volume information: C:\Windows\Fonts\PALSCRI.TTF VolumeInformation
                Source: C:\Users\user\Desktop\STAMPED CONTRACT.exeQueries volume information: C:\Windows\Fonts\OCRAEXT.TTF VolumeInformation
                Source: C:\Users\user\Desktop\STAMPED CONTRACT.exeQueries volume information: C:\Windows\Fonts\MAIAN.TTF VolumeInformation
                Source: C:\Users\user\Desktop\STAMPED CONTRACT.exeQueries volume information: C:\Windows\Fonts\LTYPE.TTF VolumeInformation
                Source: C:\Users\user\Desktop\STAMPED CONTRACT.exeQueries volume information: C:\Windows\Fonts\LTYPEO.TTF VolumeInformation
                Source: C:\Users\user\Desktop\STAMPED CONTRACT.exeQueries volume information: C:\Windows\Fonts\LTYPEB.TTF VolumeInformation
                Source: C:\Users\user\Desktop\STAMPED CONTRACT.exeQueries volume information: C:\Windows\Fonts\LTYPEBO.TTF VolumeInformation
                Source: C:\Users\user\Desktop\STAMPED CONTRACT.exeQueries volume information: C:\Windows\Fonts\LSANS.TTF VolumeInformation
                Source: C:\Users\user\Desktop\STAMPED CONTRACT.exeQueries volume information: C:\Windows\Fonts\LSANSD.TTF VolumeInformation
                Source: C:\Users\user\Desktop\STAMPED CONTRACT.exeQueries volume information: C:\Windows\Fonts\LSANSI.TTF VolumeInformation
                Source: C:\Users\user\Desktop\STAMPED CONTRACT.exeQueries volume information: C:\Windows\Fonts\LSANSDI.TTF VolumeInformation
                Source: C:\Users\user\Desktop\STAMPED CONTRACT.exeQueries volume information: C:\Windows\Fonts\IMPRISHA.TTF VolumeInformation
                Source: C:\Users\user\Desktop\STAMPED CONTRACT.exeQueries volume information: C:\Windows\Fonts\HATTEN.TTF VolumeInformation
                Source: C:\Users\user\Desktop\STAMPED CONTRACT.exeQueries volume information: C:\Windows\Fonts\GOUDYSTO.TTF VolumeInformation
                Source: C:\Users\user\Desktop\STAMPED CONTRACT.exeQueries volume information: C:\Windows\Fonts\GOUDOS.TTF VolumeInformation
                Source: C:\Users\user\Desktop\STAMPED CONTRACT.exeQueries volume information: C:\Windows\Fonts\GOUDOSI.TTF VolumeInformation
                Source: C:\Users\user\Desktop\STAMPED CONTRACT.exeQueries volume information: C:\Windows\Fonts\GOUDOSB.TTF VolumeInformation
                Source: C:\Users\user\Desktop\STAMPED CONTRACT.exeQueries volume information: C:\Windows\Fonts\GLECB.TTF VolumeInformation
                Source: C:\Users\user\Desktop\STAMPED CONTRACT.exeQueries volume information: C:\Windows\Fonts\GIL_____.TTF VolumeInformation
                Source: C:\Users\user\Desktop\STAMPED CONTRACT.exeQueries volume information: C:\Windows\Fonts\GILI____.TTF VolumeInformation
                Source: C:\Users\user\Desktop\STAMPED CONTRACT.exeQueries volume information: C:\Windows\Fonts\GILB____.TTF VolumeInformation
                Source: C:\Users\user\Desktop\STAMPED CONTRACT.exeQueries volume information: C:\Windows\Fonts\GILBI___.TTF VolumeInformation
                Source: C:\Users\user\Desktop\STAMPED CONTRACT.exeQueries volume information: C:\Windows\Fonts\GILC____.TTF VolumeInformation
                Source: C:\Users\user\Desktop\STAMPED CONTRACT.exeQueries volume information: C:\Windows\Fonts\GLSNECB.TTF VolumeInformation
                Source: C:\Users\user\Desktop\STAMPED CONTRACT.exeQueries volume information: C:\Windows\Fonts\GIGI.TTF VolumeInformation
                Source: C:\Users\user\Desktop\STAMPED CONTRACT.exeQueries volume information: C:\Windows\Fonts\FRABK.TTF VolumeInformation
                Source: C:\Users\user\Desktop\STAMPED CONTRACT.exeQueries volume information: C:\Windows\Fonts\FRABKIT.TTF VolumeInformation
                Source: C:\Users\user\Desktop\STAMPED CONTRACT.exeQueries volume information: C:\Windows\Fonts\FORTE.TTF VolumeInformation
                Source: C:\Users\user\Desktop\STAMPED CONTRACT.exeQueries volume information: C:\Windows\Fonts\FELIXTI.TTF VolumeInformation
                Source: C:\Users\user\Desktop\STAMPED CONTRACT.exeQueries volume information: C:\Windows\Fonts\ERASMD.TTF VolumeInformation
                Source: C:\Users\user\Desktop\STAMPED CONTRACT.exeQueries volume information: C:\Windows\Fonts\ERASLGHT.TTF VolumeInformation
                Source: C:\Users\user\Desktop\STAMPED CONTRACT.exeQueries volume information: C:\Windows\Fonts\ERASDEMI.TTF VolumeInformation
                Source: C:\Users\user\Desktop\STAMPED CONTRACT.exeQueries volume information: C:\Windows\Fonts\ERASBD.TTF VolumeInformation
                Source: C:\Users\user\Desktop\STAMPED CONTRACT.exeQueries volume information: C:\Windows\Fonts\ENGR.TTF VolumeInformation
                Source: C:\Users\user\Desktop\STAMPED CONTRACT.exeQueries volume information: C:\Windows\Fonts\ELEPHNT.TTF VolumeInformation
                Source: C:\Users\user\Desktop\STAMPED CONTRACT.exeQueries volume information: C:\Windows\Fonts\ELEPHNTI.TTF VolumeInformation
                Source: C:\Users\user\Desktop\STAMPED CONTRACT.exeQueries volume information: C:\Windows\Fonts\ITCEDSCR.TTF VolumeInformation
                Source: C:\Users\user\Desktop\STAMPED CONTRACT.exeQueries volume information: C:\Windows\Fonts\CURLZ___.TTF VolumeInformation
                Source: C:\Users\user\Desktop\STAMPED CONTRACT.exeQueries volume information: C:\Windows\Fonts\COPRGTL.TTF VolumeInformation
                Source: C:\Users\user\Desktop\STAMPED CONTRACT.exeQueries volume information: C:\Windows\Fonts\COPRGTB.TTF VolumeInformation
                Source: C:\Users\user\Desktop\STAMPED CONTRACT.exeQueries volume information: C:\Windows\Fonts\CENSCBK.TTF VolumeInformation
                Source: C:\Users\user\Desktop\STAMPED CONTRACT.exeQueries volume information: C:\Windows\Fonts\SCHLBKI.TTF VolumeInformation
                Source: C:\Users\user\Desktop\STAMPED CONTRACT.exeQueries volume information: C:\Windows\Fonts\SCHLBKB.TTF VolumeInformation
                Source: C:\Users\user\Desktop\STAMPED CONTRACT.exeQueries volume information: C:\Windows\Fonts\SCHLBKBI.TTF VolumeInformation
                Source: C:\Users\user\Desktop\STAMPED CONTRACT.exeQueries volume information: C:\Windows\Fonts\CASTELAR.TTF VolumeInformation
                Source: C:\Users\user\Desktop\STAMPED CONTRACT.exeQueries volume information: C:\Windows\Fonts\CALIST.TTF VolumeInformation
                Source: C:\Users\user\Desktop\STAMPED CONTRACT.exeQueries volume information: C:\Windows\Fonts\CALISTI.TTF VolumeInformation
                Source: C:\Users\user\Desktop\STAMPED CONTRACT.exeQueries volume information: C:\Windows\Fonts\CALISTB.TTF VolumeInformation
                Source: C:\Users\user\Desktop\STAMPED CONTRACT.exeQueries volume information: C:\Windows\Fonts\CALISTBI.TTF VolumeInformation
                Source: C:\Users\user\Desktop\STAMPED CONTRACT.exeQueries volume information: C:\Windows\Fonts\BOOKOS.TTF VolumeInformation
                Source: C:\Users\user\Desktop\STAMPED CONTRACT.exeQueries volume information: C:\Windows\Fonts\BOOKOSB.TTF VolumeInformation
                Source: C:\Users\user\Desktop\STAMPED CONTRACT.exeQueries volume information: C:\Windows\Fonts\BOOKOSI.TTF VolumeInformation
                Source: C:\Users\user\Desktop\STAMPED CONTRACT.exeQueries volume information: C:\Windows\Fonts\BOOKOSBI.TTF VolumeInformation
                Source: C:\Users\user\Desktop\STAMPED CONTRACT.exeQueries volume information: C:\Windows\Fonts\BOD_R.TTF VolumeInformation
                Source: C:\Users\user\Desktop\STAMPED CONTRACT.exeQueries volume information: C:\Windows\Fonts\BOD_I.TTF VolumeInformation
                Source: C:\Users\user\Desktop\STAMPED CONTRACT.exeQueries volume information: C:\Windows\Fonts\BOD_B.TTF VolumeInformation
                Source: C:\Users\user\Desktop\STAMPED CONTRACT.exeQueries volume information: C:\Windows\Fonts\BOD_BI.TTF VolumeInformation
                Source: C:\Users\user\Desktop\STAMPED CONTRACT.exeQueries volume information: C:\Windows\Fonts\BOD_CR.TTF VolumeInformation
                Source: C:\Users\user\Desktop\STAMPED CONTRACT.exeQueries volume information: C:\Windows\Fonts\BOD_BLAR.TTF VolumeInformation
                Source: C:\Users\user\Desktop\STAMPED CONTRACT.exeQueries volume information: C:\Windows\Fonts\BOD_CI.TTF VolumeInformation
                Source: C:\Users\user\Desktop\STAMPED CONTRACT.exeQueries volume information: C:\Windows\Fonts\BOD_CB.TTF VolumeInformation
                Source: C:\Users\user\Desktop\STAMPED CONTRACT.exeQueries volume information: C:\Windows\Fonts\BOD_BLAI.TTF VolumeInformation
                Source: C:\Users\user\Desktop\STAMPED CONTRACT.exeQueries volume information: C:\Windows\Fonts\BOD_CBI.TTF VolumeInformation
                Source: C:\Users\user\Desktop\STAMPED CONTRACT.exeQueries volume information: C:\Windows\Fonts\ITCBLKAD.TTF VolumeInformation
                Source: C:\Users\user\Desktop\STAMPED CONTRACT.exeQueries volume information: C:\Windows\Fonts\ARLRDBD.TTF VolumeInformation
                Source: C:\Users\user\Desktop\STAMPED CONTRACT.exeQueries volume information: C:\Windows\Fonts\AGENCYR.TTF VolumeInformation
                Source: C:\Users\user\Desktop\STAMPED CONTRACT.exeQueries volume information: C:\Windows\Fonts\AGENCYB.TTF VolumeInformation
                Source: C:\Users\user\Desktop\STAMPED CONTRACT.exeQueries volume information: C:\Windows\Fonts\BSSYM7.TTF VolumeInformation
                Source: C:\Users\user\Desktop\STAMPED CONTRACT.exeQueries volume information: C:\Windows\Fonts\REFSAN.TTF VolumeInformation
                Source: C:\Users\user\Desktop\STAMPED CONTRACT.exeQueries volume information: C:\Windows\Fonts\REFSPCL.TTF VolumeInformation
                Source: C:\Users\user\Desktop\STAMPED CONTRACT.exeQueries volume information: C:\Windows\Fonts\MTEXTRA.TTF VolumeInformation
                Source: C:\Users\user\Desktop\STAMPED CONTRACT.exeQueries volume information: C:\Windows\Fonts\marlett.ttf VolumeInformation
                Source: C:\Users\user\Desktop\STAMPED CONTRACT.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformation
                Source: C:\Users\user\Desktop\STAMPED CONTRACT.exeQueries volume information: C:\Users\user\Desktop\STAMPED CONTRACT.exe VolumeInformation
                Source: C:\Users\user\Desktop\STAMPED CONTRACT.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
                Source: C:\Users\user\Desktop\STAMPED CONTRACT.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
                Source: C:\Users\user\Desktop\STAMPED CONTRACT.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformation
                Source: C:\Users\user\Desktop\STAMPED CONTRACT.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformation
                Source: C:\Users\user\Desktop\STAMPED CONTRACT.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformation
                Source: C:\Users\user\Desktop\STAMPED CONTRACT.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Management.dll VolumeInformation
                Source: C:\Users\user\Desktop\STAMPED CONTRACT.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
                Source: C:\Users\user\Desktop\STAMPED CONTRACT.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
                Source: C:\Users\user\Desktop\STAMPED CONTRACT.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid

                Stealing of Sensitive Information

                barindex
                Source: Yara matchFile source: 0.2.STAMPED CONTRACT.exe.39c1aa0.1.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 7.0.STAMPED CONTRACT.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.STAMPED CONTRACT.exe.39c1aa0.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000000.00000002.277639077.0000000003899000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000007.00000000.268833030.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000007.00000002.510347221.00000000030F1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: STAMPED CONTRACT.exe PID: 5676, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: STAMPED CONTRACT.exe PID: 4668, type: MEMORYSTR
                Source: C:\Users\user\Desktop\STAMPED CONTRACT.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.ini
                Source: C:\Users\user\Desktop\STAMPED CONTRACT.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.ini
                Source: C:\Users\user\Desktop\STAMPED CONTRACT.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676
                Source: C:\Users\user\Desktop\STAMPED CONTRACT.exeKey opened: HKEY_CURRENT_USER\Software\IncrediMail\Identities
                Source: C:\Users\user\Desktop\STAMPED CONTRACT.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Martin Prikryl\WinSCP 2\Sessions
                Source: C:\Users\user\Desktop\STAMPED CONTRACT.exeFile opened: C:\Users\user\AppData\Roaming\SmartFTP\Client 2.0\Favorites\Quick Connect\
                Source: C:\Users\user\Desktop\STAMPED CONTRACT.exeFile opened: C:\Users\user\AppData\Roaming\FileZilla\recentservers.xml
                Source: C:\Users\user\Desktop\STAMPED CONTRACT.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.ini
                Source: C:\Users\user\Desktop\STAMPED CONTRACT.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login Data
                Source: Yara matchFile source: 00000007.00000002.510347221.00000000030F1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: STAMPED CONTRACT.exe PID: 4668, type: MEMORYSTR

                Remote Access Functionality

                barindex
                Source: Yara matchFile source: 0.2.STAMPED CONTRACT.exe.39c1aa0.1.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 7.0.STAMPED CONTRACT.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.STAMPED CONTRACT.exe.39c1aa0.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000000.00000002.277639077.0000000003899000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000007.00000000.268833030.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000007.00000002.510347221.00000000030F1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: STAMPED CONTRACT.exe PID: 5676, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: STAMPED CONTRACT.exe PID: 4668, type: MEMORYSTR
                Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
                Valid Accounts211
                Windows Management Instrumentation
                1
                Scheduled Task/Job
                111
                Process Injection
                1
                Masquerading
                2
                OS Credential Dumping
                211
                Security Software Discovery
                Remote Services1
                Email Collection
                Exfiltration Over Other Network Medium1
                Encrypted Channel
                Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
                Default Accounts2
                Command and Scripting Interpreter
                Boot or Logon Initialization Scripts1
                Scheduled Task/Job
                1
                Disable or Modify Tools
                1
                Credentials in Registry
                1
                Process Discovery
                Remote Desktop Protocol11
                Archive Collected Data
                Exfiltration Over Bluetooth1
                Non-Application Layer Protocol
                Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
                Domain Accounts1
                Scheduled Task/Job
                Logon Script (Windows)Logon Script (Windows)131
                Virtualization/Sandbox Evasion
                Security Account Manager131
                Virtualization/Sandbox Evasion
                SMB/Windows Admin Shares2
                Data from Local System
                Automated Exfiltration1
                Application Layer Protocol
                Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
                Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)111
                Process Injection
                NTDS1
                Application Window Discovery
                Distributed Component Object ModelInput CaptureScheduled TransferProtocol ImpersonationSIM Card SwapCarrier Billing Fraud
                Cloud AccountsCronNetwork Logon ScriptNetwork Logon Script1
                Deobfuscate/Decode Files or Information
                LSA Secrets1
                Remote System Discovery
                SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
                Replication Through Removable MediaLaunchdRc.commonRc.common3
                Obfuscated Files or Information
                Cached Domain Credentials1
                File and Directory Discovery
                VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
                External Remote ServicesScheduled TaskStartup ItemsStartup Items13
                Software Packing
                DCSync114
                System Information Discovery
                Windows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
                Hide Legend

                Legend:

                • Process
                • Signature
                • Created File
                • DNS/IP Info
                • Is Dropped
                • Is Windows Process
                • Number of created Registry Values
                • Number of created Files
                • Visual Basic
                • Delphi
                • Java
                • .Net C# or VB.NET
                • C, C++ or other language
                • Is malicious
                • Internet

                This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                windows-stand
                SourceDetectionScannerLabelLink
                STAMPED CONTRACT.exe41%VirustotalBrowse
                STAMPED CONTRACT.exe100%Joe Sandbox ML
                SourceDetectionScannerLabelLink
                C:\Users\user\AppData\Roaming\UBkncV.exe100%Joe Sandbox ML
                SourceDetectionScannerLabelLinkDownload
                7.0.STAMPED CONTRACT.exe.400000.0.unpack100%AviraTR/Spy.Gen8Download File
                SourceDetectionScannerLabelLink
                hindusthan.com0%VirustotalBrowse
                mail.hindusthan.com0%VirustotalBrowse
                SourceDetectionScannerLabelLink
                http://127.0.0.1:HTTP/1.10%Avira URL Cloudsafe
                http://hindusthan.com0%VirustotalBrowse
                http://hindusthan.com0%Avira URL Cloudsafe
                http://www.fontbureau.comd;N0%Avira URL Cloudsafe
                http://www.founder.com.cn/cn/bThe0%URL Reputationsafe
                http://www.fontbureau.comcomaNr0%Avira URL Cloudsafe
                http://www.tiro.com0%URL Reputationsafe
                https://ckJxF1XAyPwdnwhnXbWu.net0%Avira URL Cloudsafe
                http://www.fontbureau.comENN0%Avira URL Cloudsafe
                http://www.fontbureau.comtoed0%Avira URL Cloudsafe
                http://www.goodfont.co.kr0%URL Reputationsafe
                http://www.fontbureau.comcea50%Avira URL Cloudsafe
                http://www.jiyu-kobo.co.jp/jp/;N0%Avira URL Cloudsafe
                http://www.fontbureau.coml10%URL Reputationsafe
                http://www.carterandcone.comypo0%URL Reputationsafe
                http://www.sajatypeworks.com0%URL Reputationsafe
                http://www.typography.netD0%URL Reputationsafe
                http://www.founder.com.cn/cn/cThe0%URL Reputationsafe
                http://www.galapagosdesign.com/staff/dennis.htm0%URL Reputationsafe
                http://fontfabrik.com0%URL Reputationsafe
                http://www.jiyu-kobo.co.jp/40%URL Reputationsafe
                http://www.jiyu-kobo.co.jp//0%URL Reputationsafe
                http://www.fontbureau.comFsN0%Avira URL Cloudsafe
                http://www.fontbureau.comNNA0%Avira URL Cloudsafe
                http://www.jiyu-kobo.co.jp/Y0p0%Avira URL Cloudsafe
                http://www.jiyu-kobo.co.jp/;N0%Avira URL Cloudsafe
                http://DynDns.comDynDNSnamejidpasswordPsi/Psi0%URL Reputationsafe
                http://www.galapagosdesign.com/DPlease0%URL Reputationsafe
                http://www.jiyu-kobo.co.jp/Y00%URL Reputationsafe
                http://www.jiyu-kobo.co.jp/jp/2N0%Avira URL Cloudsafe
                http://www.jiyu-kobo.co.jp/WN80%Avira URL Cloudsafe
                http://www.sandoll.co.kr0%URL Reputationsafe
                http://www.urwpp.deDPlease0%URL Reputationsafe
                http://www.fontbureau.comdita0%URL Reputationsafe
                http://www.jiyu-kobo.co.jp/jp/aNr0%Avira URL Cloudsafe
                http://www.zhongyicts.com.cn0%URL Reputationsafe
                http://www.fontbureau.comuev0%Avira URL Cloudsafe
                http://www.sakkal.com0%URL Reputationsafe
                http://www.fontbureau.comepkof0%Avira URL Cloudsafe
                http://www.jiyu-kobo.co.jp/ENN0%Avira URL Cloudsafe
                http://www.fontbureau.comlicF0%URL Reputationsafe
                http://www.jiyu-kobo.co.jp/FN0%Avira URL Cloudsafe
                http://www.galapagosdesign.com/0%URL Reputationsafe
                http://www.jiyu-kobo.co.jp/)N0%Avira URL Cloudsafe
                http://www.fontbureau.comue0%URL Reputationsafe
                http://www.carterandcone.come0%URL Reputationsafe
                http://rHDoBI.com0%Avira URL Cloudsafe
                http://www.fontbureau.comcomd0%URL Reputationsafe
                http://www.jiyu-kobo.co.jp/jp/)N0%Avira URL Cloudsafe
                http://www.fontbureau.comF2N0%Avira URL Cloudsafe
                http://www.fontbureau.comicta0%URL Reputationsafe
                https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.ziphttps://www0%URL Reputationsafe
                http://www.jiyu-kobo.co.jp/2N0%Avira URL Cloudsafe
                http://www.fontbureau.comaNr0%Avira URL Cloudsafe
                http://www.jiyu-kobo.co.jp/jp/0%URL Reputationsafe
                http://www.fontbureau.comd0%URL Reputationsafe
                http://www.fontbureau.come.com0%URL Reputationsafe
                http://www.carterandcone.coml0%URL Reputationsafe
                http://www.founder.com.cn/cn/0%URL Reputationsafe
                http://mail.hindusthan.com0%Avira URL Cloudsafe
                http://www.founder.com.cn/cn0%URL Reputationsafe
                http://www.monotype.0%URL Reputationsafe
                http://www.fontbureau.comt0%URL Reputationsafe
                http://www.fontbureau.comm0%URL Reputationsafe
                http://www.jiyu-kobo.co.jp/0%URL Reputationsafe
                http://www.monotype.)0%Avira URL Cloudsafe
                http://www.fontbureau.comicuWN80%Avira URL Cloudsafe
                http://www.jiyu-kobo.co.jp/NNA0%Avira URL Cloudsafe
                http://www.jiyu-kobo.co.jp/aNr0%Avira URL Cloudsafe
                http://www.ascendercorp.com/typedesigners.html;Y0%Avira URL Cloudsafe
                http://www.fontbureau.commNNA0%Avira URL Cloudsafe
                NameIPActiveMaliciousAntivirus DetectionReputation
                hindusthan.com
                192.185.46.31
                truetrueunknown
                mail.hindusthan.com
                unknown
                unknowntrueunknown
                NameSourceMaliciousAntivirus DetectionReputation
                http://127.0.0.1:HTTP/1.1STAMPED CONTRACT.exe, 00000007.00000002.510347221.00000000030F1000.00000004.00000800.00020000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                low
                http://www.fontbureau.com/designersGSTAMPED CONTRACT.exe, 00000000.00000002.283198266.0000000006AF2000.00000004.00000800.00020000.00000000.sdmpfalse
                  high
                  http://hindusthan.comSTAMPED CONTRACT.exe, 00000007.00000002.515912584.0000000003440000.00000004.00000800.00020000.00000000.sdmpfalse
                  • 0%, Virustotal, Browse
                  • Avira URL Cloud: safe
                  unknown
                  http://www.fontbureau.com/designers/?STAMPED CONTRACT.exe, 00000000.00000002.283198266.0000000006AF2000.00000004.00000800.00020000.00000000.sdmpfalse
                    high
                    http://www.fontbureau.comd;NSTAMPED CONTRACT.exe, 00000000.00000003.245339211.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.245184653.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.245373781.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.245313803.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.244839521.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.244590841.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.244716470.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.244871311.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.244774460.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.244664517.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.244945073.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.244981444.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.244685393.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.245408934.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.245236568.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.245088265.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.244744770.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.244642233.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.244898992.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.245207412.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.244621285.0000000005838000.00000004.00000800.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: safe
                    low
                    http://www.founder.com.cn/cn/bTheSTAMPED CONTRACT.exe, 00000000.00000002.283198266.0000000006AF2000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://www.fontbureau.com/designers?STAMPED CONTRACT.exe, 00000000.00000002.283198266.0000000006AF2000.00000004.00000800.00020000.00000000.sdmpfalse
                      high
                      http://www.fontbureau.comcomaNrSTAMPED CONTRACT.exe, 00000000.00000003.246095684.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.246244019.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.246138159.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.246462744.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.246055786.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.245874099.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.245982334.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.245915875.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.246366325.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.246184367.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.246406234.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.246309772.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.246278619.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.246493031.0000000005838000.00000004.00000800.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      http://www.tiro.comSTAMPED CONTRACT.exe, 00000000.00000002.283198266.0000000006AF2000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.240398657.000000000580A000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.241192425.000000000582A000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.241173320.0000000005829000.00000004.00000800.00020000.00000000.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      http://www.fontbureau.com/designersSTAMPED CONTRACT.exe, 00000000.00000002.283198266.0000000006AF2000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000002.272165959.0000000000EB7000.00000004.00000020.00020000.00000000.sdmpfalse
                        high
                        https://ckJxF1XAyPwdnwhnXbWu.netSTAMPED CONTRACT.exe, 00000007.00000002.510347221.00000000030F1000.00000004.00000800.00020000.00000000.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        http://www.fontbureau.comENNSTAMPED CONTRACT.exe, 00000000.00000003.245339211.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.245184653.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.245313803.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.244839521.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.244716470.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.244871311.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.244774460.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.244664517.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.244945073.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.244981444.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.244685393.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.245236568.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.245088265.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.244744770.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.244642233.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.244898992.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.245207412.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.244621285.0000000005838000.00000004.00000800.00020000.00000000.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        http://www.fontbureau.comtoedSTAMPED CONTRACT.exe, 00000000.00000003.245184653.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.244871311.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.244945073.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.244981444.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.245236568.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.245088265.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.244898992.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.245207412.0000000005838000.00000004.00000800.00020000.00000000.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        http://www.goodfont.co.krSTAMPED CONTRACT.exe, 00000000.00000002.283198266.0000000006AF2000.00000004.00000800.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        http://www.fontbureau.comcea5STAMPED CONTRACT.exe, 00000000.00000003.244160565.0000000005838000.00000004.00000800.00020000.00000000.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        http://www.jiyu-kobo.co.jp/jp/;NSTAMPED CONTRACT.exe, 00000000.00000003.242841186.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.242805323.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.243028312.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.242747229.0000000005838000.00000004.00000800.00020000.00000000.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        http://www.fontbureau.coml1STAMPED CONTRACT.exe, 00000000.00000003.249422211.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.249104494.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.249326775.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.249155217.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.249119841.0000000005838000.00000004.00000800.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        http://www.carterandcone.comypoSTAMPED CONTRACT.exe, 00000000.00000003.241837648.00000000057F3000.00000004.00000800.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        http://www.sajatypeworks.comSTAMPED CONTRACT.exe, 00000000.00000002.283198266.0000000006AF2000.00000004.00000800.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        http://www.typography.netDSTAMPED CONTRACT.exe, 00000000.00000002.283198266.0000000006AF2000.00000004.00000800.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        http://www.founder.com.cn/cn/cTheSTAMPED CONTRACT.exe, 00000000.00000002.283198266.0000000006AF2000.00000004.00000800.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        http://www.galapagosdesign.com/staff/dennis.htmSTAMPED CONTRACT.exe, 00000000.00000003.247090095.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000002.283198266.0000000006AF2000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.247231044.0000000005838000.00000004.00000800.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        http://fontfabrik.comSTAMPED CONTRACT.exe, 00000000.00000002.283198266.0000000006AF2000.00000004.00000800.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        http://www.jiyu-kobo.co.jp/4STAMPED CONTRACT.exe, 00000000.00000003.242306926.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.242261048.0000000005837000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.242282296.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.242347916.0000000005838000.00000004.00000800.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        http://www.jiyu-kobo.co.jp//STAMPED CONTRACT.exe, 00000000.00000003.242841186.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.242805323.0000000005838000.00000004.00000800.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        http://www.fontbureau.comFsNSTAMPED CONTRACT.exe, 00000000.00000003.246095684.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.246244019.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.246138159.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.245733889.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.246055786.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.245653439.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.245874099.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.245982334.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.245629944.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.245915875.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.245692605.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.246184367.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.245601973.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.246309772.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.246278619.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.245804289.0000000005838000.00000004.00000800.00020000.00000000.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        http://www.fontbureau.comNNASTAMPED CONTRACT.exe, 00000000.00000003.245408934.0000000005838000.00000004.00000800.00020000.00000000.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        http://www.jiyu-kobo.co.jp/Y0pSTAMPED CONTRACT.exe, 00000000.00000003.242406688.0000000005838000.00000004.00000800.00020000.00000000.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        http://www.jiyu-kobo.co.jp/;NSTAMPED CONTRACT.exe, 00000000.00000003.242604914.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.242406688.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.242555593.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.242518165.0000000005838000.00000004.00000800.00020000.00000000.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        http://DynDns.comDynDNSnamejidpasswordPsi/PsiSTAMPED CONTRACT.exe, 00000007.00000002.510347221.00000000030F1000.00000004.00000800.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        http://www.galapagosdesign.com/DPleaseSTAMPED CONTRACT.exe, 00000000.00000002.283198266.0000000006AF2000.00000004.00000800.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        http://www.jiyu-kobo.co.jp/Y0STAMPED CONTRACT.exe, 00000000.00000003.242306926.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.242406688.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.242347916.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.242518165.0000000005838000.00000004.00000800.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        http://www.jiyu-kobo.co.jp/jp/2NSTAMPED CONTRACT.exe, 00000000.00000003.242841186.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.242604914.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.242805323.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.242555593.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.242747229.0000000005838000.00000004.00000800.00020000.00000000.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        http://www.jiyu-kobo.co.jp/WN8STAMPED CONTRACT.exe, 00000000.00000003.242841186.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.242805323.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.242747229.0000000005838000.00000004.00000800.00020000.00000000.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        http://www.fonts.comSTAMPED CONTRACT.exe, 00000000.00000002.283198266.0000000006AF2000.00000004.00000800.00020000.00000000.sdmpfalse
                          high
                          http://www.sandoll.co.krSTAMPED CONTRACT.exe, 00000000.00000002.283198266.0000000006AF2000.00000004.00000800.00020000.00000000.sdmpfalse
                          • URL Reputation: safe
                          unknown
                          http://www.urwpp.deDPleaseSTAMPED CONTRACT.exe, 00000000.00000002.283198266.0000000006AF2000.00000004.00000800.00020000.00000000.sdmpfalse
                          • URL Reputation: safe
                          unknown
                          http://www.fontbureau.comditaSTAMPED CONTRACT.exe, 00000000.00000003.245184653.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.244839521.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.244590841.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.244716470.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.244871311.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.244774460.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.244503756.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.244664517.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.244945073.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.244981444.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.244685393.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.245088265.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.244744770.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.244642233.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.244898992.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.244621285.0000000005838000.00000004.00000800.00020000.00000000.sdmpfalse
                          • URL Reputation: safe
                          unknown
                          http://www.jiyu-kobo.co.jp/jp/aNrSTAMPED CONTRACT.exe, 00000000.00000003.242841186.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.242604914.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.242805323.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.242747229.0000000005838000.00000004.00000800.00020000.00000000.sdmpfalse
                          • Avira URL Cloud: safe
                          unknown
                          http://www.zhongyicts.com.cnSTAMPED CONTRACT.exe, 00000000.00000002.283198266.0000000006AF2000.00000004.00000800.00020000.00000000.sdmpfalse
                          • URL Reputation: safe
                          unknown
                          http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameSTAMPED CONTRACT.exe, 00000000.00000002.272424508.0000000002891000.00000004.00000800.00020000.00000000.sdmpfalse
                            high
                            http://www.fontbureau.comuevSTAMPED CONTRACT.exe, 00000000.00000003.245184653.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.244945073.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.244981444.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.245236568.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.245088265.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.244898992.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.245207412.0000000005838000.00000004.00000800.00020000.00000000.sdmpfalse
                            • Avira URL Cloud: safe
                            unknown
                            http://www.sakkal.comSTAMPED CONTRACT.exe, 00000000.00000002.283198266.0000000006AF2000.00000004.00000800.00020000.00000000.sdmpfalse
                            • URL Reputation: safe
                            unknown
                            http://www.fontbureau.comepkofSTAMPED CONTRACT.exe, 00000000.00000003.244216645.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.244246168.0000000005838000.00000004.00000800.00020000.00000000.sdmpfalse
                            • Avira URL Cloud: safe
                            unknown
                            http://www.jiyu-kobo.co.jp/ENNSTAMPED CONTRACT.exe, 00000000.00000003.243120088.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.242841186.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.243270592.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.242805323.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.243028312.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.243074364.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.242747229.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.243296774.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.243244185.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.243198581.0000000005838000.00000004.00000800.00020000.00000000.sdmpfalse
                            • Avira URL Cloud: safe
                            unknown
                            http://www.fontbureau.comlicFSTAMPED CONTRACT.exe, 00000000.00000003.246095684.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.246244019.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.246138159.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.246055786.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.245982334.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.246366325.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.246184367.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.246406234.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.246309772.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.246278619.0000000005838000.00000004.00000800.00020000.00000000.sdmpfalse
                            • URL Reputation: safe
                            unknown
                            http://www.jiyu-kobo.co.jp/FNSTAMPED CONTRACT.exe, 00000000.00000003.242306926.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.242604914.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.242406688.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.242555593.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.242347916.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.242518165.0000000005838000.00000004.00000800.00020000.00000000.sdmpfalse
                            • Avira URL Cloud: safe
                            unknown
                            http://www.apache.org/licenses/LICENSE-2.0STAMPED CONTRACT.exe, 00000000.00000002.283198266.0000000006AF2000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.241504634.0000000005833000.00000004.00000800.00020000.00000000.sdmpfalse
                              high
                              http://www.fontbureau.comSTAMPED CONTRACT.exe, 00000000.00000003.246095684.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.246244019.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.246138159.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.246778015.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000002.283198266.0000000006AF2000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.246634857.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.246513766.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.244387066.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.244456429.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.246462744.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.244839521.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.244590841.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.244716470.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.244871311.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.246055786.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.246613407.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.245874099.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.244410342.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.246592558.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.245982334.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.244216645.0000000005838000.00000004.00000800.00020000.00000000.sdmpfalse
                                high
                                http://www.galapagosdesign.com/STAMPED CONTRACT.exe, 00000000.00000003.247108579.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.247090095.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.247133221.0000000005838000.00000004.00000800.00020000.00000000.sdmpfalse
                                • URL Reputation: safe
                                unknown
                                http://www.jiyu-kobo.co.jp/)NSTAMPED CONTRACT.exe, 00000000.00000003.242604914.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.242555593.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.242747229.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.242518165.0000000005838000.00000004.00000800.00020000.00000000.sdmpfalse
                                • Avira URL Cloud: safe
                                unknown
                                http://www.fontbureau.comueSTAMPED CONTRACT.exe, 00000000.00000003.246095684.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.246244019.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.246138159.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.245733889.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.246055786.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.245653439.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.245874099.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.245982334.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.245629944.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.245915875.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.245692605.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.246184367.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.245601973.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.246309772.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.246278619.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.245804289.0000000005838000.00000004.00000800.00020000.00000000.sdmpfalse
                                • URL Reputation: safe
                                unknown
                                http://www.carterandcone.comeSTAMPED CONTRACT.exe, 00000000.00000003.241837648.00000000057F3000.00000004.00000800.00020000.00000000.sdmpfalse
                                • URL Reputation: safe
                                unknown
                                http://rHDoBI.comSTAMPED CONTRACT.exe, 00000007.00000002.510347221.00000000030F1000.00000004.00000800.00020000.00000000.sdmpfalse
                                • Avira URL Cloud: safe
                                unknown
                                http://www.fontbureau.comcomdSTAMPED CONTRACT.exe, 00000000.00000003.246095684.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.246244019.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.246138159.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.245733889.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.246055786.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.245653439.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.245874099.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.245982334.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.245629944.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.245915875.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.245692605.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.246366325.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.246184367.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.245601973.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.245566177.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.246406234.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.246309772.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.246278619.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.245804289.0000000005838000.00000004.00000800.00020000.00000000.sdmpfalse
                                • URL Reputation: safe
                                unknown
                                http://www.jiyu-kobo.co.jp/jp/)NSTAMPED CONTRACT.exe, 00000000.00000003.243120088.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.242841186.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.243327845.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.243270592.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.242805323.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.243028312.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.243074364.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.243296774.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.243244185.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.243198581.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.243377889.0000000005838000.00000004.00000800.00020000.00000000.sdmpfalse
                                • Avira URL Cloud: safe
                                unknown
                                http://www.fontbureau.comF2NSTAMPED CONTRACT.exe, 00000000.00000003.244216645.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.244246168.0000000005838000.00000004.00000800.00020000.00000000.sdmpfalse
                                • Avira URL Cloud: safe
                                unknown
                                http://www.fontbureau.comictaSTAMPED CONTRACT.exe, 00000000.00000003.246095684.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.246244019.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.245487340.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.246138159.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.245733889.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.246055786.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.245653439.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.245874099.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.245982334.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.245629944.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.245915875.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.245692605.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.246366325.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.246184367.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.245601973.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.245408934.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.245566177.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.246406234.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.246309772.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.245442824.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.246278619.0000000005838000.00000004.00000800.00020000.00000000.sdmpfalse
                                • URL Reputation: safe
                                unknown
                                https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.ziphttps://wwwSTAMPED CONTRACT.exe, 00000007.00000002.510347221.00000000030F1000.00000004.00000800.00020000.00000000.sdmpfalse
                                • URL Reputation: safe
                                unknown
                                http://www.fontbureau.com/designers/cabarga.htmlxSTAMPED CONTRACT.exe, 00000000.00000003.245601973.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.245408934.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.245566177.0000000005838000.00000004.00000800.00020000.00000000.sdmpfalse
                                  high
                                  http://www.jiyu-kobo.co.jp/2NSTAMPED CONTRACT.exe, 00000000.00000003.242406688.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.242518165.0000000005838000.00000004.00000800.00020000.00000000.sdmpfalse
                                  • Avira URL Cloud: safe
                                  unknown
                                  http://www.fontbureau.comaNrSTAMPED CONTRACT.exe, 00000000.00000003.245487340.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.245339211.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.245184653.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.245733889.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.245373781.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.245313803.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.244839521.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.244590841.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.244716470.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.244871311.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.245653439.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.244774460.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.244503756.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.244664517.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.244945073.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.245629944.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.244981444.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.245692605.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.245601973.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.244685393.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.245408934.0000000005838000.00000004.00000800.00020000.00000000.sdmpfalse
                                  • Avira URL Cloud: safe
                                  unknown
                                  http://www.jiyu-kobo.co.jp/jp/STAMPED CONTRACT.exe, 00000000.00000003.242841186.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.242604914.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.242406688.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.242805323.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.242555593.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.243028312.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.242747229.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.242347916.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.242518165.0000000005838000.00000004.00000800.00020000.00000000.sdmpfalse
                                  • URL Reputation: safe
                                  unknown
                                  http://www.fontbureau.comdSTAMPED CONTRACT.exe, 00000000.00000003.246095684.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.246244019.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.245487340.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.245339211.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.246138159.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.245184653.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.245733889.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.245373781.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.245313803.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.246055786.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.245653439.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.245874099.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.245982334.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.244945073.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.245629944.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.245915875.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.244981444.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.245692605.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.246184367.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.245601973.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.245408934.0000000005838000.00000004.00000800.00020000.00000000.sdmpfalse
                                  • URL Reputation: safe
                                  unknown
                                  http://www.fontbureau.come.comSTAMPED CONTRACT.exe, 00000000.00000003.245487340.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.245339211.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.245184653.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.245733889.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.245373781.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.245313803.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.244839521.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.244716470.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.244871311.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.245653439.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.245874099.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.244774460.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.244664517.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.244945073.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.245629944.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.245915875.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.244981444.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.245692605.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.245601973.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.244685393.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.245408934.0000000005838000.00000004.00000800.00020000.00000000.sdmpfalse
                                  • URL Reputation: safe
                                  unknown
                                  http://www.carterandcone.comlSTAMPED CONTRACT.exe, 00000000.00000002.283198266.0000000006AF2000.00000004.00000800.00020000.00000000.sdmpfalse
                                  • URL Reputation: safe
                                  unknown
                                  http://www.founder.com.cn/cn/STAMPED CONTRACT.exe, 00000000.00000003.241201459.000000000582F000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.241097857.000000000582F000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.241129494.0000000005830000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.241173320.0000000005829000.00000004.00000800.00020000.00000000.sdmpfalse
                                  • URL Reputation: safe
                                  unknown
                                  http://www.fontbureau.com/designers/cabarga.htmlNSTAMPED CONTRACT.exe, 00000000.00000002.283198266.0000000006AF2000.00000004.00000800.00020000.00000000.sdmpfalse
                                    high
                                    http://mail.hindusthan.comSTAMPED CONTRACT.exe, 00000007.00000002.515912584.0000000003440000.00000004.00000800.00020000.00000000.sdmpfalse
                                    • Avira URL Cloud: safe
                                    unknown
                                    http://www.founder.com.cn/cnSTAMPED CONTRACT.exe, 00000000.00000003.240850167.0000000005829000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000002.283198266.0000000006AF2000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.240886828.000000000582A000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.241837648.00000000057F3000.00000004.00000800.00020000.00000000.sdmpfalse
                                    • URL Reputation: safe
                                    unknown
                                    http://www.fontbureau.com/designers/frere-jones.htmlSTAMPED CONTRACT.exe, 00000000.00000002.283198266.0000000006AF2000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.244871311.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.244898992.0000000005838000.00000004.00000800.00020000.00000000.sdmpfalse
                                      high
                                      http://www.fontbureau.com/designers/cabarga.htmlSTAMPED CONTRACT.exe, 00000000.00000003.245653439.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.245629944.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.245692605.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.245601973.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.245408934.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.245566177.0000000005838000.00000004.00000800.00020000.00000000.sdmpfalse
                                        high
                                        http://www.monotype.STAMPED CONTRACT.exe, 00000000.00000003.246953421.0000000005838000.00000004.00000800.00020000.00000000.sdmpfalse
                                        • URL Reputation: safe
                                        unknown
                                        http://www.fontbureau.comtSTAMPED CONTRACT.exe, 00000000.00000003.244160565.0000000005838000.00000004.00000800.00020000.00000000.sdmpfalse
                                        • URL Reputation: safe
                                        unknown
                                        http://www.fontbureau.commSTAMPED CONTRACT.exe, 00000000.00000003.246095684.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.249422211.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.246244019.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.246138159.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.249104494.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.249326775.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.246055786.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.249155217.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.249119841.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.245982334.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.246184367.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.246309772.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.246278619.0000000005838000.00000004.00000800.00020000.00000000.sdmpfalse
                                        • URL Reputation: safe
                                        unknown
                                        http://www.jiyu-kobo.co.jp/STAMPED CONTRACT.exe, 00000000.00000003.242518165.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.243198581.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.243377889.0000000005838000.00000004.00000800.00020000.00000000.sdmpfalse
                                        • URL Reputation: safe
                                        unknown
                                        http://www.monotype.)STAMPED CONTRACT.exe, 00000000.00000003.247769440.000000000581A000.00000004.00000800.00020000.00000000.sdmpfalse
                                        • Avira URL Cloud: safe
                                        low
                                        http://www.fontbureau.comicuWN8STAMPED CONTRACT.exe, 00000000.00000003.249422211.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.270951519.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.249326775.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.249155217.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.249119841.0000000005838000.00000004.00000800.00020000.00000000.sdmpfalse
                                        • Avira URL Cloud: safe
                                        unknown
                                        http://www.fontbureau.com/designers8STAMPED CONTRACT.exe, 00000000.00000002.283198266.0000000006AF2000.00000004.00000800.00020000.00000000.sdmpfalse
                                          high
                                          http://www.jiyu-kobo.co.jp/NNASTAMPED CONTRACT.exe, 00000000.00000003.242841186.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.242604914.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.242805323.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.243028312.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.242747229.0000000005838000.00000004.00000800.00020000.00000000.sdmpfalse
                                          • Avira URL Cloud: safe
                                          unknown
                                          http://www.fontbureau.com/designers/frere-jones.htmlhtSTAMPED CONTRACT.exe, 00000000.00000003.244871311.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.244898992.0000000005838000.00000004.00000800.00020000.00000000.sdmpfalse
                                            high
                                            http://www.jiyu-kobo.co.jp/aNrSTAMPED CONTRACT.exe, 00000000.00000003.242406688.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.242555593.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.242347916.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.242518165.0000000005838000.00000004.00000800.00020000.00000000.sdmpfalse
                                            • Avira URL Cloud: safe
                                            unknown
                                            http://www.ascendercorp.com/typedesigners.html;YSTAMPED CONTRACT.exe, 00000000.00000003.243020613.0000000005832000.00000004.00000800.00020000.00000000.sdmpfalse
                                            • Avira URL Cloud: safe
                                            unknown
                                            http://www.fontbureau.commNNASTAMPED CONTRACT.exe, 00000000.00000003.249422211.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.270951519.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.249326775.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.249155217.0000000005838000.00000004.00000800.00020000.00000000.sdmp, STAMPED CONTRACT.exe, 00000000.00000003.249119841.0000000005838000.00000004.00000800.00020000.00000000.sdmpfalse
                                            • Avira URL Cloud: safe
                                            unknown
                                            • No. of IPs < 25%
                                            • 25% < No. of IPs < 50%
                                            • 50% < No. of IPs < 75%
                                            • 75% < No. of IPs
                                            IPDomainCountryFlagASNASN NameMalicious
                                            192.185.46.31
                                            hindusthan.comUnited States
                                            46606UNIFIEDLAYER-AS-1UStrue
                                            Joe Sandbox Version:35.0.0 Citrine
                                            Analysis ID:680576
                                            Start date and time: 08/08/202220:28:072022-08-08 20:28:07 +02:00
                                            Joe Sandbox Product:CloudBasic
                                            Overall analysis duration:0h 7m 55s
                                            Hypervisor based Inspection enabled:false
                                            Report type:light
                                            Sample file name:STAMPED CONTRACT.exe
                                            Cookbook file name:default.jbs
                                            Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
                                            Number of analysed new started processes analysed:29
                                            Number of new started drivers analysed:0
                                            Number of existing processes analysed:0
                                            Number of existing drivers analysed:0
                                            Number of injected processes analysed:0
                                            Technologies:
                                            • HCA enabled
                                            • EGA enabled
                                            • HDC enabled
                                            • AMSI enabled
                                            Analysis Mode:default
                                            Analysis stop reason:Timeout
                                            Detection:MAL
                                            Classification:mal100.troj.spyw.evad.winEXE@6/3@2/1
                                            EGA Information:
                                            • Successful, ratio: 100%
                                            HDC Information:Failed
                                            HCA Information:
                                            • Successful, ratio: 98%
                                            • Number of executed functions: 0
                                            • Number of non-executed functions: 0
                                            Cookbook Comments:
                                            • Found application associated with file extension: .exe
                                            • Adjust boot time
                                            • Enable AMSI
                                            • Exclude process from analysis (whitelisted): MpCmdRun.exe, BackgroundTransferHost.exe, backgroundTaskHost.exe, SgrmBroker.exe, conhost.exe, svchost.exe, wuapihost.exe
                                            • Excluded IPs from analysis (whitelisted): 23.211.6.115
                                            • Excluded domains from analysis (whitelisted): www.bing.com, client.wns.windows.com, fs.microsoft.com, ctldl.windowsupdate.com, store-images.s-microsoft.com-c.edgekey.net, arc.msn.com, ris.api.iris.microsoft.com, e12564.dspb.akamaiedge.net, login.live.com, store-images.s-microsoft.com, sls.update.microsoft.com, displaycatalog.mp.microsoft.com, img-prod-cms-rt-microsoft-com.akamaized.net
                                            • Not all processes where analyzed, report is missing behavior information
                                            • Report creation exceeded maximum time and may have missing disassembly code information.
                                            • Report size getting too big, too many NtAllocateVirtualMemory calls found.
                                            • Report size getting too big, too many NtOpenKeyEx calls found.
                                            • Report size getting too big, too many NtProtectVirtualMemory calls found.
                                            • Report size getting too big, too many NtQueryValueKey calls found.
                                            TimeTypeDescription
                                            20:29:13API Interceptor740x Sleep call for process: STAMPED CONTRACT.exe modified
                                            No context
                                            No context
                                            No context
                                            No context
                                            No context
                                            Process:C:\Users\user\Desktop\STAMPED CONTRACT.exe
                                            File Type:ASCII text, with CRLF line terminators
                                            Category:dropped
                                            Size (bytes):1216
                                            Entropy (8bit):5.355304211458859
                                            Encrypted:false
                                            SSDEEP:24:MLUE4K5E4Ks2E1qE4x84qXKDE4KhK3VZ9pKhPKIE4oKFKHKoZAE4Kzr7FE4j:MIHK5HKXE1qHxviYHKhQnoPtHoxHhAHY
                                            MD5:69206D3AF7D6EFD08F4B4726998856D3
                                            SHA1:E778D4BF781F7712163CF5E2F5E7C15953E484CF
                                            SHA-256:A937AD22F9C3E667A062BA0E116672960CD93522F6997C77C00370755929BA87
                                            SHA-512:CD270C3DF75E548C9B0727F13F44F45262BD474336E89AAEBE56FABFE8076CD4638F88D3C0837B67C2EB3C54055679B07E4212FB3FEDBF88C015EB5DBBCD7FF8
                                            Malicious:true
                                            Reputation:high, very likely benign file
                                            Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\4f0a7eefa3cd3e0ba98b5ebddbbc72e6\System.ni.dll",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..2,"Microsoft.VisualBasic, Version=10.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\f1d8480152e0da9a60ad49c6d16a3b6d\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\8d67d92724ba494b6c7fd089d6f25b48\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a
                                            Process:C:\Users\user\Desktop\STAMPED CONTRACT.exe
                                            File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                            Category:dropped
                                            Size (bytes):1639
                                            Entropy (8bit):5.18780958477553
                                            Encrypted:false
                                            SSDEEP:24:2dH4+SEqC/Q7hxlNMFp1/rlMhEMjnGpwjpIgUYODOLD9RJh7h8gKB10tn:cbh47TlNQ//rydbz9I3YODOLNdq3jy
                                            MD5:B3AAA20E3DF1E8897CB867C71FF59101
                                            SHA1:0C0E2A4B6B04FB663BE6C923DF3F18B97A2AF8BE
                                            SHA-256:01237CDE4DA114C10A65D06D4516A1C1CE67639E4E9CB1BE45E4CEAD10C52260
                                            SHA-512:8F0B68825F7CB0F70344943791681A45397AC523E56C9C6C69CADA72C1F15A5F058951464546864893683183377B90CBF307CAC21349F6B8BD66F10B2319F4AB
                                            Malicious:true
                                            Reputation:low
                                            Preview:<?xml version="1.0" encoding="UTF-16"?>..<Task version="1.2" xmlns="http://schemas.microsoft.com/windows/2004/02/mit/task">.. <RegistrationInfo>.. <Date>2014-10-25T14:27:44.8929027</Date>.. <Author>computer\user</Author>.. </RegistrationInfo>.. <Triggers>.. <LogonTrigger>.. <Enabled>true</Enabled>.. <UserId>computer\user</UserId>.. </LogonTrigger>.. <RegistrationTrigger>.. <Enabled>false</Enabled>.. </RegistrationTrigger>.. </Triggers>.. <Principals>.. <Principal id="Author">.. <UserId>computer\user</UserId>.. <LogonType>InteractiveToken</LogonType>.. <RunLevel>LeastPrivilege</RunLevel>.. </Principal>.. </Principals>.. <Settings>.. <MultipleInstancesPolicy>StopExisting</MultipleInstancesPolicy>.. <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>.. <StopIfGoingOnBatteries>true</StopIfGoingOnBatteries>.. <AllowHardTerminate>false</AllowHardTerminate>.. <StartWhenAvailable>true
                                            Process:C:\Users\user\Desktop\STAMPED CONTRACT.exe
                                            File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                            Category:dropped
                                            Size (bytes):806400
                                            Entropy (8bit):7.750102155833153
                                            Encrypted:false
                                            SSDEEP:12288:9lEPsuZ02iN2bIT/uHj/O9I5jHIKrK7afZaX6v4U1VDiNRUh5xPB3o/:QPc18bCouI5TLW7eaY7jGNRUnxg
                                            MD5:38E7F1EA9B24AA0CE2A81F0B8D1211F1
                                            SHA1:DDF48946BE08C406807D790F3577F9CFCEF3B648
                                            SHA-256:828A71AADE93B8276B3C751172EF243AB79AEB6713849992EA5BCFE64D745A9F
                                            SHA-512:220EFE37B3010D0182352CD67767525CF306046BBD6CEE8BF3653ADC4515F6E8B68DC2126D7C04CC0037AF056AB13280493C2CD7580E611D73538BB5B9B35F8C
                                            Malicious:true
                                            Antivirus:
                                            • Antivirus: Joe Sandbox ML, Detection: 100%
                                            Reputation:low
                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...H!.b..............P..D..........:c... ........@.. ....................................@..................................b..O.................................................................................... ............... ..H............text...@C... ...D.................. ..`.rsrc................F..............@..@.reloc...............L..............@..B.................c......H.......8~..XH..............X.............................................( ...*&..(!....*.s"........s#........s$........s%........s&........*...0...........~....o'....+..*.0...........~....o(....+..*.0...........~....o)....+..*.0...........~....o*....+..*.0...........~....o+....+..*.0..<........~.....(,.....,!r...p.....(-...o....s/............~.....+..*.0...........~.....+..*".......*.0..&........(....r5..p~....o0...(1.....t$....+..*...0..&........(....rC..p~....o0...(1.....
                                            File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                            Entropy (8bit):7.750102155833153
                                            TrID:
                                            • Win32 Executable (generic) Net Framework (10011505/4) 49.80%
                                            • Win32 Executable (generic) a (10002005/4) 49.75%
                                            • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                                            • Windows Screen Saver (13104/52) 0.07%
                                            • Generic Win/DOS Executable (2004/3) 0.01%
                                            File name:STAMPED CONTRACT.exe
                                            File size:806400
                                            MD5:38e7f1ea9b24aa0ce2a81f0b8d1211f1
                                            SHA1:ddf48946be08c406807d790f3577f9cfcef3b648
                                            SHA256:828a71aade93b8276b3c751172ef243ab79aeb6713849992ea5bcfe64d745a9f
                                            SHA512:220efe37b3010d0182352cd67767525cf306046bbd6cee8bf3653adc4515f6e8b68dc2126d7c04cc0037af056ab13280493c2cd7580e611d73538bb5b9b35f8c
                                            SSDEEP:12288:9lEPsuZ02iN2bIT/uHj/O9I5jHIKrK7afZaX6v4U1VDiNRUh5xPB3o/:QPc18bCouI5TLW7eaY7jGNRUnxg
                                            TLSH:4005E0F05AF5B928F035637637D0A0387BE2E90BD909D23D9D67930D9366EC142E1A27
                                            File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...H!.b..............P..D..........:c... ........@.. ....................................@................................
                                            Icon Hash:00828e8e8686b000
                                            Entrypoint:0x4c633a
                                            Entrypoint Section:.text
                                            Digitally signed:false
                                            Imagebase:0x400000
                                            Subsystem:windows gui
                                            Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                                            DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                                            Time Stamp:0x62F12148 [Mon Aug 8 14:44:24 2022 UTC]
                                            TLS Callbacks:
                                            CLR (.Net) Version:
                                            OS Version Major:4
                                            OS Version Minor:0
                                            File Version Major:4
                                            File Version Minor:0
                                            Subsystem Version Major:4
                                            Subsystem Version Minor:0
                                            Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
                                            Instruction
                                            jmp dword ptr [00402000h]
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            NameVirtual AddressVirtual Size Is in Section
                                            IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                            IMAGE_DIRECTORY_ENTRY_IMPORT0xc62e80x4f.text
                                            IMAGE_DIRECTORY_ENTRY_RESOURCE0xc80000x5b4.rsrc
                                            IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                            IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                            IMAGE_DIRECTORY_ENTRY_BASERELOC0xca0000xc.reloc
                                            IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                            IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                            IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                            IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                            IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                            IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                            IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                                            IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                            IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                                            IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                            NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                            .text0x20000xc43400xc4400False0.8558705712579617data7.757505394635879IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                            .rsrc0xc80000x5b40x600False0.427734375data4.096493971527891IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                            .reloc0xca0000xc0x200False0.044921875data0.09800417566270775IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                            NameRVASizeTypeLanguageCountry
                                            RT_VERSION0xc80900x324data
                                            RT_MANIFEST0xc83c40x1eaXML 1.0 document, UTF-8 Unicode (with BOM) text, with CRLF line terminators
                                            DLLImport
                                            mscoree.dll_CorExeMain
                                            TimestampProtocolSIDMessageSource PortDest PortSource IPDest IP
                                            192.168.2.3192.185.46.31497415872030171 08/08/22-20:29:37.983170TCP2030171ET TROJAN AgentTesla Exfil Via SMTP49741587192.168.2.3192.185.46.31
                                            192.168.2.3192.185.46.31497415872839723 08/08/22-20:29:37.983170TCP2839723ETPRO TROJAN Win32/Agent Tesla SMTP Activity49741587192.168.2.3192.185.46.31
                                            192.168.2.3192.185.46.31497415872851779 08/08/22-20:29:37.983277TCP2851779ETPRO TROJAN Agent Tesla Telegram Exfil49741587192.168.2.3192.185.46.31
                                            192.168.2.3192.185.46.31497415872840032 08/08/22-20:29:37.983277TCP2840032ETPRO TROJAN Win32/AgentTesla/OriginLogger Data Exfil via SMTP M249741587192.168.2.3192.185.46.31
                                            TimestampSource PortDest PortSource IPDest IP
                                            Aug 8, 2022 20:29:35.801079035 CEST49741587192.168.2.3192.185.46.31
                                            Aug 8, 2022 20:29:35.964299917 CEST58749741192.185.46.31192.168.2.3
                                            Aug 8, 2022 20:29:35.964421988 CEST49741587192.168.2.3192.185.46.31
                                            Aug 8, 2022 20:29:36.410248995 CEST58749741192.185.46.31192.168.2.3
                                            Aug 8, 2022 20:29:36.542304039 CEST49741587192.168.2.3192.185.46.31
                                            Aug 8, 2022 20:29:36.844746113 CEST49741587192.168.2.3192.185.46.31
                                            Aug 8, 2022 20:29:37.008429050 CEST58749741192.185.46.31192.168.2.3
                                            Aug 8, 2022 20:29:37.010241032 CEST49741587192.168.2.3192.185.46.31
                                            Aug 8, 2022 20:29:37.175887108 CEST58749741192.185.46.31192.168.2.3
                                            Aug 8, 2022 20:29:37.176346064 CEST49741587192.168.2.3192.185.46.31
                                            Aug 8, 2022 20:29:37.379833937 CEST58749741192.185.46.31192.168.2.3
                                            Aug 8, 2022 20:29:37.392318964 CEST58749741192.185.46.31192.168.2.3
                                            Aug 8, 2022 20:29:37.393366098 CEST49741587192.168.2.3192.185.46.31
                                            Aug 8, 2022 20:29:37.556529045 CEST58749741192.185.46.31192.168.2.3
                                            Aug 8, 2022 20:29:37.556591034 CEST58749741192.185.46.31192.168.2.3
                                            Aug 8, 2022 20:29:37.556893110 CEST49741587192.168.2.3192.185.46.31
                                            Aug 8, 2022 20:29:37.760840893 CEST58749741192.185.46.31192.168.2.3
                                            Aug 8, 2022 20:29:37.817421913 CEST58749741192.185.46.31192.168.2.3
                                            Aug 8, 2022 20:29:37.817667961 CEST49741587192.168.2.3192.185.46.31
                                            Aug 8, 2022 20:29:37.981009007 CEST58749741192.185.46.31192.168.2.3
                                            Aug 8, 2022 20:29:37.982357979 CEST58749741192.185.46.31192.168.2.3
                                            Aug 8, 2022 20:29:37.983170033 CEST49741587192.168.2.3192.185.46.31
                                            Aug 8, 2022 20:29:37.983277082 CEST49741587192.168.2.3192.185.46.31
                                            Aug 8, 2022 20:29:37.984299898 CEST49741587192.168.2.3192.185.46.31
                                            Aug 8, 2022 20:29:37.984365940 CEST49741587192.168.2.3192.185.46.31
                                            Aug 8, 2022 20:29:38.146271944 CEST58749741192.185.46.31192.168.2.3
                                            Aug 8, 2022 20:29:38.147339106 CEST58749741192.185.46.31192.168.2.3
                                            Aug 8, 2022 20:29:38.148009062 CEST58749741192.185.46.31192.168.2.3
                                            Aug 8, 2022 20:29:38.245511055 CEST49741587192.168.2.3192.185.46.31
                                            Aug 8, 2022 20:31:14.800889969 CEST49741587192.168.2.3192.185.46.31
                                            Aug 8, 2022 20:31:15.004992008 CEST58749741192.185.46.31192.168.2.3
                                            Aug 8, 2022 20:31:15.165323973 CEST58749741192.185.46.31192.168.2.3
                                            Aug 8, 2022 20:31:15.165491104 CEST49741587192.168.2.3192.185.46.31
                                            Aug 8, 2022 20:31:15.165546894 CEST49741587192.168.2.3192.185.46.31
                                            Aug 8, 2022 20:31:15.328815937 CEST58749741192.185.46.31192.168.2.3
                                            TimestampSource PortDest PortSource IPDest IP
                                            Aug 8, 2022 20:29:34.903517008 CEST4931653192.168.2.38.8.8.8
                                            Aug 8, 2022 20:29:35.076064110 CEST53493168.8.8.8192.168.2.3
                                            Aug 8, 2022 20:29:35.571957111 CEST5641753192.168.2.38.8.8.8
                                            Aug 8, 2022 20:29:35.740561008 CEST53564178.8.8.8192.168.2.3
                                            TimestampSource IPDest IPTrans IDOP CodeNameTypeClass
                                            Aug 8, 2022 20:29:34.903517008 CEST192.168.2.38.8.8.80xf942Standard query (0)mail.hindusthan.comA (IP address)IN (0x0001)
                                            Aug 8, 2022 20:29:35.571957111 CEST192.168.2.38.8.8.80xc934Standard query (0)mail.hindusthan.comA (IP address)IN (0x0001)
                                            TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClass
                                            Aug 8, 2022 20:29:35.076064110 CEST8.8.8.8192.168.2.30xf942No error (0)mail.hindusthan.comhindusthan.comCNAME (Canonical name)IN (0x0001)
                                            Aug 8, 2022 20:29:35.076064110 CEST8.8.8.8192.168.2.30xf942No error (0)hindusthan.com192.185.46.31A (IP address)IN (0x0001)
                                            Aug 8, 2022 20:29:35.740561008 CEST8.8.8.8192.168.2.30xc934No error (0)mail.hindusthan.comhindusthan.comCNAME (Canonical name)IN (0x0001)
                                            Aug 8, 2022 20:29:35.740561008 CEST8.8.8.8192.168.2.30xc934No error (0)hindusthan.com192.185.46.31A (IP address)IN (0x0001)
                                            TimestampSource PortDest PortSource IPDest IPCommands
                                            Aug 8, 2022 20:29:36.410248995 CEST58749741192.185.46.31192.168.2.3220-gator4116.hostgator.com ESMTP Exim 4.95 #2 Mon, 08 Aug 2022 13:29:31 -0500
                                            220-We do not authorize the use of this system to transport unsolicited,
                                            220 and/or bulk e-mail.
                                            Aug 8, 2022 20:29:36.844746113 CEST49741587192.168.2.3192.185.46.31EHLO 818225
                                            Aug 8, 2022 20:29:37.008429050 CEST58749741192.185.46.31192.168.2.3250-gator4116.hostgator.com Hello 818225 [102.129.143.3]
                                            250-SIZE 52428800
                                            250-8BITMIME
                                            250-PIPELINING
                                            250-PIPE_CONNECT
                                            250-AUTH PLAIN LOGIN
                                            250-STARTTLS
                                            250 HELP
                                            Aug 8, 2022 20:29:37.010241032 CEST49741587192.168.2.3192.185.46.31AUTH login Zm9tYmJzckBoaW5kdXN0aGFuLmNvbQ==
                                            Aug 8, 2022 20:29:37.175887108 CEST58749741192.185.46.31192.168.2.3334 UGFzc3dvcmQ6
                                            Aug 8, 2022 20:29:37.392318964 CEST58749741192.185.46.31192.168.2.3235 Authentication succeeded
                                            Aug 8, 2022 20:29:37.393366098 CEST49741587192.168.2.3192.185.46.31MAIL FROM:<fombbsr@hindusthan.com>
                                            Aug 8, 2022 20:29:37.556591034 CEST58749741192.185.46.31192.168.2.3250 OK
                                            Aug 8, 2022 20:29:37.556893110 CEST49741587192.168.2.3192.185.46.31RCPT TO:<sundus.saharbmacapital@gmail.com>
                                            Aug 8, 2022 20:29:37.817421913 CEST58749741192.185.46.31192.168.2.3250 Accepted
                                            Aug 8, 2022 20:29:37.817667961 CEST49741587192.168.2.3192.185.46.31DATA
                                            Aug 8, 2022 20:29:37.982357979 CEST58749741192.185.46.31192.168.2.3354 Enter message, ending with "." on a line by itself
                                            Aug 8, 2022 20:29:37.984365940 CEST49741587192.168.2.3192.185.46.31.
                                            Aug 8, 2022 20:29:38.148009062 CEST58749741192.185.46.31192.168.2.3250 OK id=1oL7VN-001Ipm-36
                                            Aug 8, 2022 20:31:14.800889969 CEST49741587192.168.2.3192.185.46.31QUIT
                                            Aug 8, 2022 20:31:15.165323973 CEST58749741192.185.46.31192.168.2.3221 gator4116.hostgator.com closing connection

                                            Click to jump to process

                                            Target ID:0
                                            Start time:20:29:04
                                            Start date:08/08/2022
                                            Path:C:\Users\user\Desktop\STAMPED CONTRACT.exe
                                            Wow64 process (32bit):true
                                            Commandline:"C:\Users\user\Desktop\STAMPED CONTRACT.exe"
                                            Imagebase:0x490000
                                            File size:806400 bytes
                                            MD5 hash:38E7F1EA9B24AA0CE2A81F0B8D1211F1
                                            Has elevated privileges:true
                                            Has administrator privileges:true
                                            Programmed in:.Net C# or VB.NET
                                            Yara matches:
                                            • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000000.00000002.277639077.0000000003899000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                            • Rule: JoeSecurity_AgentTesla_2, Description: Yara detected AgentTesla, Source: 00000000.00000002.277639077.0000000003899000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                            • Rule: Windows_Trojan_AgentTesla_d3ac2b2f, Description: unknown, Source: 00000000.00000002.277639077.0000000003899000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                                            Reputation:low

                                            Target ID:4
                                            Start time:20:29:17
                                            Start date:08/08/2022
                                            Path:C:\Windows\SysWOW64\schtasks.exe
                                            Wow64 process (32bit):true
                                            Commandline:C:\Windows\System32\schtasks.exe" /Create /TN "Updates\UBkncV" /XML "C:\Users\user\AppData\Local\Temp\tmpBA47.tmp
                                            Imagebase:0x930000
                                            File size:185856 bytes
                                            MD5 hash:15FF7D8324231381BAD48A052F85DF04
                                            Has elevated privileges:true
                                            Has administrator privileges:true
                                            Programmed in:C, C++ or other language
                                            Reputation:high

                                            Target ID:5
                                            Start time:20:29:18
                                            Start date:08/08/2022
                                            Path:C:\Windows\System32\conhost.exe
                                            Wow64 process (32bit):false
                                            Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                            Imagebase:0x7ff7c9170000
                                            File size:625664 bytes
                                            MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                            Has elevated privileges:true
                                            Has administrator privileges:true
                                            Programmed in:C, C++ or other language
                                            Reputation:high

                                            Target ID:7
                                            Start time:20:29:19
                                            Start date:08/08/2022
                                            Path:C:\Users\user\Desktop\STAMPED CONTRACT.exe
                                            Wow64 process (32bit):true
                                            Commandline:{path}
                                            Imagebase:0xc30000
                                            File size:806400 bytes
                                            MD5 hash:38E7F1EA9B24AA0CE2A81F0B8D1211F1
                                            Has elevated privileges:true
                                            Has administrator privileges:true
                                            Programmed in:.Net C# or VB.NET
                                            Yara matches:
                                            • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000007.00000000.268833030.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                            • Rule: JoeSecurity_AgentTesla_2, Description: Yara detected AgentTesla, Source: 00000007.00000000.268833030.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                            • Rule: Windows_Trojan_AgentTesla_d3ac2b2f, Description: unknown, Source: 00000007.00000000.268833030.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: unknown
                                            • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000007.00000002.510347221.00000000030F1000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                            • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000007.00000002.510347221.00000000030F1000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                            Reputation:low

                                            No disassembly