Loading ...

Play interactive tourEdit tour

Analysis Report ORDER.exe

Overview

General Information

Sample Name:ORDER.exe
Analysis ID:321193
MD5:bb942c948639f5c88fb33d5e4b7d7728
SHA1:3cf9d798266aacc9bfdaf1c2d0a5eda2b6d069ea
SHA256:5cfd185a582c4a6811966fb1585769fa8c17d67a969c72e1135f8de537d106d4
Tags:AgentTeslaexe

Most interesting Screenshot:

Detection

AgentTesla
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Found malware configuration
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Sigma detected: Scheduled temp file as task from temp location
Snort IDS alert for network traffic (e.g. based on Emerging Threat rules)
Yara detected AgentTesla
Yara detected AntiVM_3
Hides that the sample has been downloaded from the Internet (zone.identifier)
Initial sample is a PE file and has a suspicious name
Injects a PE file into a foreign processes
Machine Learning detection for dropped file
Machine Learning detection for sample
May check the online IP address of the machine
Modifies the hosts file
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to steal Mail credentials (via file access)
Uses schtasks.exe or at.exe to add and modify task schedules
Antivirus or Machine Learning detection for unpacked file
Contains capabilities to detect virtual machines
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains long sleeps (>= 3 min)
Creates a DirectInput object (often for capturing keystrokes)
Creates a process in suspended mode (likely to inject code)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Drops PE files
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found inlined nop instructions (likely shell or obfuscated code)
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Monitors certain registry keys / values for changes (often done to protect autostart functionality)
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Uses SMTP (mail sending)
Uses code obfuscation techniques (call, push, ret)
Yara detected Credential Stealer

Classification

Startup

  • System is w10x64
  • ORDER.exe (PID: 6128 cmdline: 'C:\Users\user\Desktop\ORDER.exe' MD5: BB942C948639F5C88FB33D5E4B7D7728)
    • schtasks.exe (PID: 6728 cmdline: 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\SpHLicuA' /XML 'C:\Users\user\AppData\Local\Temp\tmpFCB1.tmp' MD5: 15FF7D8324231381BAD48A052F85DF04)
      • conhost.exe (PID: 6840 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
    • ORDER.exe (PID: 6876 cmdline: {path} MD5: BB942C948639F5C88FB33D5E4B7D7728)
  • kprUEGC.exe (PID: 5608 cmdline: 'C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exe' MD5: BB942C948639F5C88FB33D5E4B7D7728)
    • schtasks.exe (PID: 5856 cmdline: 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\SpHLicuA' /XML 'C:\Users\user\AppData\Local\Temp\tmp871F.tmp' MD5: 15FF7D8324231381BAD48A052F85DF04)
      • conhost.exe (PID: 5956 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
    • kprUEGC.exe (PID: 4928 cmdline: {path} MD5: BB942C948639F5C88FB33D5E4B7D7728)
  • kprUEGC.exe (PID: 6300 cmdline: 'C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exe' MD5: BB942C948639F5C88FB33D5E4B7D7728)
    • schtasks.exe (PID: 6816 cmdline: 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\SpHLicuA' /XML 'C:\Users\user\AppData\Local\Temp\tmpAEAC.tmp' MD5: 15FF7D8324231381BAD48A052F85DF04)
      • conhost.exe (PID: 6544 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
    • kprUEGC.exe (PID: 6648 cmdline: {path} MD5: BB942C948639F5C88FB33D5E4B7D7728)
  • cleanup

Malware Configuration

Threatname: Agenttesla

{"Username: ": "v8tgTH", "URL: ": "https://5PX8nQFyXZqeL8oi.com", "To: ": "weavingacc1@vasudeva.in", "ByHost: ": "mail.vasudeva.in:587", "Password: ": "UIewNIwYLjFr", "From: ": "weavingacc1@vasudeva.in"}

Yara Overview

Memory Dumps

SourceRuleDescriptionAuthorStrings
0000000D.00000002.930696018.0000000000402000.00000040.00000001.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
    00000003.00000002.930660789.0000000000402000.00000040.00000001.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
      00000003.00000002.935335032.0000000003724000.00000004.00000001.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
        00000000.00000002.687010442.0000000003C56000.00000004.00000001.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
          0000000A.00000002.765004740.0000000003825000.00000004.00000001.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
            Click to see the 25 entries

            Unpacked PEs

            SourceRuleDescriptionAuthorStrings
            3.2.ORDER.exe.400000.0.unpackJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
              17.2.kprUEGC.exe.400000.0.unpackJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
                13.2.kprUEGC.exe.400000.0.unpackJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security

                  Sigma Overview

                  System Summary:

                  barindex
                  Sigma detected: Scheduled temp file as task from temp locationShow sources
                  Source: Process startedAuthor: Joe Security: Data: Command: 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\SpHLicuA' /XML 'C:\Users\user\AppData\Local\Temp\tmpFCB1.tmp', CommandLine: 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\SpHLicuA' /XML 'C:\Users\user\AppData\Local\Temp\tmpFCB1.tmp', CommandLine|base64offset|contains: *j, Image: C:\Windows\SysWOW64\schtasks.exe, NewProcessName: C:\Windows\SysWOW64\schtasks.exe, OriginalFileName: C:\Windows\SysWOW64\schtasks.exe, ParentCommandLine: 'C:\Users\user\Desktop\ORDER.exe' , ParentImage: C:\Users\user\Desktop\ORDER.exe, ParentProcessId: 6128, ProcessCommandLine: 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\SpHLicuA' /XML 'C:\Users\user\AppData\Local\Temp\tmpFCB1.tmp', ProcessId: 6728

                  Signature Overview

                  Click to jump to signature section

                  Show All Signature Results

                  AV Detection:

                  barindex
                  Antivirus / Scanner detection for submitted sampleShow sources
                  Source: ORDER.exeAvira: detected
                  Antivirus detection for dropped fileShow sources
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeAvira: detection malicious, Label: TR/Kryptik.lesvd
                  Source: C:\Users\user\AppData\Roaming\SpHLicuA.exeAvira: detection malicious, Label: TR/Kryptik.lesvd
                  Found malware configurationShow sources
                  Source: ORDER.exe.6876.3.memstrMalware Configuration Extractor: Agenttesla {"Username: ": "v8tgTH", "URL: ": "https://5PX8nQFyXZqeL8oi.com", "To: ": "weavingacc1@vasudeva.in", "ByHost: ": "mail.vasudeva.in:587", "Password: ": "UIewNIwYLjFr", "From: ": "weavingacc1@vasudeva.in"}
                  Multi AV Scanner detection for dropped fileShow sources
                  Source: C:\Users\user\AppData\Roaming\SpHLicuA.exeReversingLabs: Detection: 66%
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeReversingLabs: Detection: 66%
                  Multi AV Scanner detection for submitted fileShow sources
                  Source: ORDER.exeVirustotal: Detection: 65%Perma Link
                  Source: ORDER.exeReversingLabs: Detection: 66%
                  Machine Learning detection for dropped fileShow sources
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeJoe Sandbox ML: detected
                  Source: C:\Users\user\AppData\Roaming\SpHLicuA.exeJoe Sandbox ML: detected
                  Machine Learning detection for sampleShow sources
                  Source: ORDER.exeJoe Sandbox ML: detected
                  Source: 3.2.ORDER.exe.400000.0.unpackAvira: Label: TR/Spy.Gen8
                  Source: 17.2.kprUEGC.exe.400000.0.unpackAvira: Label: TR/Spy.Gen8
                  Source: 13.2.kprUEGC.exe.400000.0.unpackAvira: Label: TR/Spy.Gen8
                  Source: C:\Users\user\Desktop\ORDER.exeCode function: 4x nop then jmp 054F824Dh
                  Source: C:\Users\user\Desktop\ORDER.exeCode function: 4x nop then jmp 054F824Dh
                  Source: C:\Users\user\Desktop\ORDER.exeCode function: 4x nop then jmp 06F0465Fh
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeCode function: 4x nop then jmp 067E465Fh

                  Networking:

                  barindex
                  Snort IDS alert for network traffic (e.g. based on Emerging Threat rules)Show sources
                  Source: TrafficSnort IDS: 2030171 ET TROJAN AgentTesla Exfil Via SMTP 192.168.2.4:49766 -> 68.233.236.158:587
                  May check the online IP address of the machineShow sources
                  Source: unknownDNS query: name: api.ipify.org
                  Source: unknownDNS query: name: api.ipify.org
                  Source: unknownDNS query: name: api.ipify.org
                  Source: unknownDNS query: name: api.ipify.org
                  Source: unknownDNS query: name: api.ipify.org
                  Source: unknownDNS query: name: api.ipify.org
                  Source: global trafficTCP traffic: 192.168.2.4:49766 -> 68.233.236.158:587
                  Source: Joe Sandbox ViewIP Address: 54.235.142.93 54.235.142.93
                  Source: Joe Sandbox ViewIP Address: 54.235.142.93 54.235.142.93
                  Source: Joe Sandbox ViewIP Address: 68.233.236.158 68.233.236.158
                  Source: Joe Sandbox ViewASN Name: HVC-ASUS HVC-ASUS
                  Source: Joe Sandbox ViewJA3 fingerprint: 3b5074b1b5d032e5620f69f9f700ff0e
                  Source: global trafficTCP traffic: 192.168.2.4:49766 -> 68.233.236.158:587
                  Source: unknownDNS traffic detected: queries for: api.ipify.org
                  Source: ORDER.exe, 00000003.00000002.934090598.00000000034D1000.00000004.00000001.sdmp, kprUEGC.exe, 0000000D.00000002.934897870.0000000002D91000.00000004.00000001.sdmp, kprUEGC.exe, 00000011.00000002.933961322.0000000002A81000.00000004.00000001.sdmpString found in binary or memory: http://127.0.0.1:HTTP/1.1
                  Source: kprUEGC.exe, 00000011.00000002.933961322.0000000002A81000.00000004.00000001.sdmpString found in binary or memory: http://DynDns.comDynDNS
                  Source: kprUEGC.exe, 00000011.00000002.933961322.0000000002A81000.00000004.00000001.sdmpString found in binary or memory: http://RKhkfz.com
                  Source: ORDER.exe, 00000003.00000002.934225034.000000000350B000.00000004.00000001.sdmpString found in binary or memory: http://crl.comodoca.com/COMODORSADomainValidationSecureServerCA.crl0
                  Source: ORDER.exe, 00000000.00000002.689402690.0000000005A00000.00000002.00000001.sdmp, kprUEGC.exe, 0000000A.00000002.768443744.0000000005860000.00000002.00000001.sdmp, kprUEGC.exe, 0000000E.00000002.794248791.00000000056E0000.00000002.00000001.sdmpString found in binary or memory: http://fontfabrik.com
                  Source: ORDER.exe, 00000003.00000002.935479787.0000000003788000.00000004.00000001.sdmpString found in binary or memory: http://mail.vasudeva.in
                  Source: ORDER.exe, 00000003.00000002.934225034.000000000350B000.00000004.00000001.sdmpString found in binary or memory: http://ocsp.comodoca.com0
                  Source: ORDER.exe, 00000000.00000002.686353136.0000000002BFC000.00000004.00000001.sdmp, ORDER.exe, 00000003.00000002.934090598.00000000034D1000.00000004.00000001.sdmp, kprUEGC.exe, 0000000A.00000002.762688179.0000000002781000.00000004.00000001.sdmp, kprUEGC.exe, 0000000E.00000002.786151703.000000000277C000.00000004.00000001.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
                  Source: ORDER.exe, 00000003.00000002.935479787.0000000003788000.00000004.00000001.sdmpString found in binary or memory: http://vasudeva.in
                  Source: ORDER.exe, 00000000.00000002.689402690.0000000005A00000.00000002.00000001.sdmp, kprUEGC.exe, 0000000A.00000002.768443744.0000000005860000.00000002.00000001.sdmp, kprUEGC.exe, 0000000E.00000002.794248791.00000000056E0000.00000002.00000001.sdmpString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0
                  Source: ORDER.exe, 00000000.00000002.689402690.0000000005A00000.00000002.00000001.sdmp, kprUEGC.exe, 0000000A.00000002.768443744.0000000005860000.00000002.00000001.sdmp, kprUEGC.exe, 0000000E.00000002.794248791.00000000056E0000.00000002.00000001.sdmpString found in binary or memory: http://www.carterandcone.coml
                  Source: ORDER.exe, 00000000.00000002.685971628.00000000010E7000.00000004.00000040.sdmp, kprUEGC.exe, 0000000A.00000002.768443744.0000000005860000.00000002.00000001.sdmp, kprUEGC.exe, 0000000E.00000002.794248791.00000000056E0000.00000002.00000001.sdmpString found in binary or memory: http://www.fontbureau.com
                  Source: kprUEGC.exe, 0000000E.00000002.794248791.00000000056E0000.00000002.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers
                  Source: ORDER.exe, 00000000.00000002.689402690.0000000005A00000.00000002.00000001.sdmp, kprUEGC.exe, 0000000A.00000002.768443744.0000000005860000.00000002.00000001.sdmp, kprUEGC.exe, 0000000E.00000002.794248791.00000000056E0000.00000002.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers/?
                  Source: ORDER.exe, 00000000.00000002.689402690.0000000005A00000.00000002.00000001.sdmp, kprUEGC.exe, 0000000A.00000002.768443744.0000000005860000.00000002.00000001.sdmp, kprUEGC.exe, 0000000E.00000002.794248791.00000000056E0000.00000002.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers/cabarga.htmlN
                  Source: ORDER.exe, 00000000.00000002.689402690.0000000005A00000.00000002.00000001.sdmp, kprUEGC.exe, 0000000A.00000002.768443744.0000000005860000.00000002.00000001.sdmp, kprUEGC.exe, 0000000E.00000002.794248791.00000000056E0000.00000002.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers/frere-user.html
                  Source: ORDER.exe, 00000000.00000002.689402690.0000000005A00000.00000002.00000001.sdmp, kprUEGC.exe, 0000000A.00000002.768443744.0000000005860000.00000002.00000001.sdmp, kprUEGC.exe, 0000000E.00000002.794248791.00000000056E0000.00000002.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers8
                  Source: ORDER.exe, 00000000.00000002.689402690.0000000005A00000.00000002.00000001.sdmp, kprUEGC.exe, 0000000A.00000002.768443744.0000000005860000.00000002.00000001.sdmp, kprUEGC.exe, 0000000E.00000002.794248791.00000000056E0000.00000002.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers?
                  Source: ORDER.exe, 00000000.00000002.689402690.0000000005A00000.00000002.00000001.sdmp, kprUEGC.exe, 0000000A.00000002.768443744.0000000005860000.00000002.00000001.sdmp, kprUEGC.exe, 0000000E.00000002.794248791.00000000056E0000.00000002.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designersG
                  Source: ORDER.exe, 00000000.00000002.685971628.00000000010E7000.00000004.00000040.sdmpString found in binary or memory: http://www.fontbureau.comiona
                  Source: ORDER.exe, 00000000.00000002.689402690.0000000005A00000.00000002.00000001.sdmp, kprUEGC.exe, 0000000A.00000002.768443744.0000000005860000.00000002.00000001.sdmp, kprUEGC.exe, 0000000E.00000002.794248791.00000000056E0000.00000002.00000001.sdmpString found in binary or memory: http://www.fonts.com
                  Source: ORDER.exe, 00000000.00000002.689402690.0000000005A00000.00000002.00000001.sdmp, kprUEGC.exe, 0000000A.00000002.768443744.0000000005860000.00000002.00000001.sdmp, kprUEGC.exe, 0000000E.00000002.794248791.00000000056E0000.00000002.00000001.sdmpString found in binary or memory: http://www.founder.com.cn/cn
                  Source: ORDER.exe, 00000000.00000002.689402690.0000000005A00000.00000002.00000001.sdmp, kprUEGC.exe, 0000000A.00000002.768443744.0000000005860000.00000002.00000001.sdmp, kprUEGC.exe, 0000000E.00000002.794248791.00000000056E0000.00000002.00000001.sdmpString found in binary or memory: http://www.founder.com.cn/cn/bThe
                  Source: ORDER.exe, 00000000.00000002.689402690.0000000005A00000.00000002.00000001.sdmp, kprUEGC.exe, 0000000A.00000002.768443744.0000000005860000.00000002.00000001.sdmp, kprUEGC.exe, 0000000E.00000002.794248791.00000000056E0000.00000002.00000001.sdmpString found in binary or memory: http://www.founder.com.cn/cn/cThe
                  Source: ORDER.exe, 00000000.00000002.689402690.0000000005A00000.00000002.00000001.sdmp, kprUEGC.exe, 0000000A.00000002.768443744.0000000005860000.00000002.00000001.sdmp, kprUEGC.exe, 0000000E.00000002.794248791.00000000056E0000.00000002.00000001.sdmpString found in binary or memory: http://www.galapagosdesign.com/DPlease
                  Source: ORDER.exe, 00000000.00000002.689402690.0000000005A00000.00000002.00000001.sdmp, kprUEGC.exe, 0000000A.00000002.768443744.0000000005860000.00000002.00000001.sdmp, kprUEGC.exe, 0000000E.00000002.794248791.00000000056E0000.00000002.00000001.sdmpString found in binary or memory: http://www.galapagosdesign.com/staff/dennis.htm
                  Source: ORDER.exe, 00000000.00000002.689402690.0000000005A00000.00000002.00000001.sdmp, kprUEGC.exe, 0000000A.00000002.768443744.0000000005860000.00000002.00000001.sdmp, kprUEGC.exe, 0000000E.00000002.794248791.00000000056E0000.00000002.00000001.sdmpString found in binary or memory: http://www.goodfont.co.kr
                  Source: ORDER.exe, 00000000.00000002.689402690.0000000005A00000.00000002.00000001.sdmp, kprUEGC.exe, 0000000A.00000002.768443744.0000000005860000.00000002.00000001.sdmp, kprUEGC.exe, 0000000E.00000002.794248791.00000000056E0000.00000002.00000001.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/
                  Source: ORDER.exe, 00000000.00000002.689402690.0000000005A00000.00000002.00000001.sdmp, kprUEGC.exe, 0000000A.00000002.768443744.0000000005860000.00000002.00000001.sdmp, kprUEGC.exe, 0000000E.00000002.794248791.00000000056E0000.00000002.00000001.sdmpString found in binary or memory: http://www.sajatypeworks.com
                  Source: ORDER.exe, 00000000.00000002.689402690.0000000005A00000.00000002.00000001.sdmp, kprUEGC.exe, 0000000A.00000002.768443744.0000000005860000.00000002.00000001.sdmp, kprUEGC.exe, 0000000E.00000002.794248791.00000000056E0000.00000002.00000001.sdmpString found in binary or memory: http://www.sakkal.com
                  Source: ORDER.exe, 00000000.00000002.689402690.0000000005A00000.00000002.00000001.sdmp, kprUEGC.exe, 0000000A.00000002.768443744.0000000005860000.00000002.00000001.sdmp, kprUEGC.exe, 0000000E.00000002.794248791.00000000056E0000.00000002.00000001.sdmpString found in binary or memory: http://www.sandoll.co.kr
                  Source: kprUEGC.exe, 0000000E.00000002.794248791.00000000056E0000.00000002.00000001.sdmpString found in binary or memory: http://www.tiro.com
                  Source: ORDER.exe, 00000000.00000002.689402690.0000000005A00000.00000002.00000001.sdmp, kprUEGC.exe, 0000000A.00000002.768443744.0000000005860000.00000002.00000001.sdmp, kprUEGC.exe, 0000000E.00000002.794248791.00000000056E0000.00000002.00000001.sdmpString found in binary or memory: http://www.typography.netD
                  Source: ORDER.exe, 00000000.00000002.689402690.0000000005A00000.00000002.00000001.sdmp, kprUEGC.exe, 0000000A.00000002.768443744.0000000005860000.00000002.00000001.sdmp, kprUEGC.exe, 0000000E.00000002.794248791.00000000056E0000.00000002.00000001.sdmpString found in binary or memory: http://www.urwpp.deDPlease
                  Source: ORDER.exe, 00000000.00000002.689402690.0000000005A00000.00000002.00000001.sdmp, kprUEGC.exe, 0000000A.00000002.768443744.0000000005860000.00000002.00000001.sdmp, kprUEGC.exe, 0000000E.00000002.794248791.00000000056E0000.00000002.00000001.sdmpString found in binary or memory: http://www.zhongyicts.com.cn
                  Source: ORDER.exe, 00000003.00000002.934322832.0000000003526000.00000004.00000001.sdmpString found in binary or memory: https://5PX8nQFyXZqeL8oi.com
                  Source: ORDER.exe, 00000003.00000002.934322832.0000000003526000.00000004.00000001.sdmpString found in binary or memory: https://5PX8nQFyXZqeL8oi.com4
                  Source: ORDER.exe, 00000003.00000003.899825885.00000000015B4000.00000004.00000001.sdmpString found in binary or memory: https://5PX8nQFyXZqeL8oi.com853321935-2125563209-4053062332-1002_Classes
                  Source: ORDER.exe, 00000003.00000002.934090598.00000000034D1000.00000004.00000001.sdmpString found in binary or memory: https://api.ipify.org
                  Source: ORDER.exe, 00000003.00000002.934090598.00000000034D1000.00000004.00000001.sdmpString found in binary or memory: https://api.ipify.org/
                  Source: kprUEGC.exe, 00000011.00000002.933961322.0000000002A81000.00000004.00000001.sdmpString found in binary or memory: https://api.ipify.orgGETMozilla/5.0
                  Source: ORDER.exe, 00000000.00000002.687010442.0000000003C56000.00000004.00000001.sdmp, ORDER.exe, 00000003.00000002.930660789.0000000000402000.00000040.00000001.sdmp, kprUEGC.exe, 0000000A.00000002.765004740.0000000003825000.00000004.00000001.sdmp, kprUEGC.exe, 0000000D.00000002.930696018.0000000000402000.00000040.00000001.sdmp, kprUEGC.exe, 0000000E.00000002.789175486.00000000037D4000.00000004.00000001.sdmp, kprUEGC.exe, 00000011.00000002.930556707.0000000000402000.00000040.00000001.sdmpString found in binary or memory: https://api.telegram.org/bot%telegramapi%/
                  Source: ORDER.exe, 00000003.00000002.934090598.00000000034D1000.00000004.00000001.sdmp, kprUEGC.exe, 0000000D.00000002.934897870.0000000002D91000.00000004.00000001.sdmp, kprUEGC.exe, 00000011.00000002.933961322.0000000002A81000.00000004.00000001.sdmpString found in binary or memory: https://api.telegram.org/bot%telegramapi%/sendDocumentdocument---------------------------x
                  Source: ORDER.exe, 00000003.00000002.934225034.000000000350B000.00000004.00000001.sdmpString found in binary or memory: https://secure.comodo.com/CPS0
                  Source: ORDER.exe, 00000000.00000002.687010442.0000000003C56000.00000004.00000001.sdmp, ORDER.exe, 00000003.00000002.930660789.0000000000402000.00000040.00000001.sdmp, kprUEGC.exe, 0000000A.00000002.765004740.0000000003825000.00000004.00000001.sdmp, kprUEGC.exe, 0000000D.00000002.930696018.0000000000402000.00000040.00000001.sdmp, kprUEGC.exe, 0000000E.00000002.789175486.00000000037D4000.00000004.00000001.sdmp, kprUEGC.exe, 00000011.00000002.930556707.0000000000402000.00000040.00000001.sdmpString found in binary or memory: https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip
                  Source: ORDER.exe, 00000003.00000002.934090598.00000000034D1000.00000004.00000001.sdmp, kprUEGC.exe, 0000000D.00000002.934897870.0000000002D91000.00000004.00000001.sdmp, kprUEGC.exe, 00000011.00000002.933961322.0000000002A81000.00000004.00000001.sdmpString found in binary or memory: https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip%tordir%%ha
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49765
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49765 -> 443
                  Source: ORDER.exe, 00000000.00000002.685708534.0000000000D4A000.00000004.00000020.sdmpBinary or memory string: <HOOK MODULE="DDRAW.DLL" FUNCTION="DirectDrawCreateEx"/>

                  Spam, unwanted Advertisements and Ransom Demands:

                  barindex
                  Modifies the hosts fileShow sources
                  Source: C:\Users\user\Desktop\ORDER.exeFile written: C:\Windows\System32\drivers\etc\hostsJump to behavior

                  System Summary:

                  barindex
                  Initial sample is a PE file and has a suspicious nameShow sources
                  Source: initial sampleStatic PE information: Filename: ORDER.exe
                  Source: C:\Users\user\Desktop\ORDER.exeCode function: 0_2_0299C124
                  Source: C:\Users\user\Desktop\ORDER.exeCode function: 0_2_0299E570
                  Source: C:\Users\user\Desktop\ORDER.exeCode function: 0_2_0299E562
                  Source: C:\Users\user\Desktop\ORDER.exeCode function: 0_2_054F81C7
                  Source: C:\Users\user\Desktop\ORDER.exeCode function: 0_2_054F81D8
                  Source: C:\Users\user\Desktop\ORDER.exeCode function: 0_2_054F4308
                  Source: C:\Users\user\Desktop\ORDER.exeCode function: 0_2_054F4318
                  Source: C:\Users\user\Desktop\ORDER.exeCode function: 0_2_054F5310
                  Source: C:\Users\user\Desktop\ORDER.exeCode function: 0_2_06F0060B
                  Source: C:\Users\user\Desktop\ORDER.exeCode function: 0_2_06F01F52
                  Source: C:\Users\user\Desktop\ORDER.exeCode function: 0_2_06F0388C
                  Source: C:\Users\user\Desktop\ORDER.exeCode function: 0_2_06F01FC2
                  Source: C:\Users\user\Desktop\ORDER.exeCode function: 0_2_06F0246F
                  Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_034147A0
                  Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_034146B0
                  Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_0341D661
                  Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_06A42618
                  Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_06A4E7FC
                  Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_06A4CDA8
                  Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_06A4AB78
                  Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_06A42020
                  Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_06A48FF8
                  Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_06A4DC78
                  Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_06ED3DA8
                  Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_06EDA278
                  Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_06ED1238
                  Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_06EDD200
                  Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_06ED6050
                  Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_0708A228
                  Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_0708555C
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeCode function: 10_2_00ADC124
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeCode function: 10_2_00ADE561
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeCode function: 10_2_00ADE570
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeCode function: 13_2_02CC47A0
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeCode function: 13_2_02CC477F
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeCode function: 13_2_02CCD820
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeCode function: 14_2_009DC124
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeCode function: 14_2_009DE570
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeCode function: 14_2_009DE561
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeCode function: 14_2_067E060B
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeCode function: 14_2_067E1F52
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeCode function: 14_2_067E388C
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeCode function: 14_2_067E1FC2
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeCode function: 14_2_067E246F
                  Source: ORDER.exeBinary or memory string: OriginalFilename vs ORDER.exe
                  Source: ORDER.exe, 00000000.00000002.685708534.0000000000D4A000.00000004.00000020.sdmpBinary or memory string: OriginalFilenameclr.dllT vs ORDER.exe
                  Source: ORDER.exe, 00000000.00000002.691400310.00000000073B0000.00000002.00000001.sdmpBinary or memory string: originalfilename vs ORDER.exe
                  Source: ORDER.exe, 00000000.00000002.691400310.00000000073B0000.00000002.00000001.sdmpBinary or memory string: OriginalFilenamepropsys.dll.mui@ vs ORDER.exe
                  Source: ORDER.exe, 00000000.00000002.687010442.0000000003C56000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameXfhzKePuGoesTHRxzhWZClzMzrsKfKQYJFA.exe4 vs ORDER.exe
                  Source: ORDER.exe, 00000000.00000002.687010442.0000000003C56000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameND vs ORDER.exe
                  Source: ORDER.exe, 00000000.00000002.686353136.0000000002BFC000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameMARCUS.dll4 vs ORDER.exe
                  Source: ORDER.exe, 00000000.00000002.686353136.0000000002BFC000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameB2B.exe4 vs ORDER.exe
                  Source: ORDER.exe, 00000000.00000002.691325272.0000000007350000.00000002.00000001.sdmpBinary or memory string: System.OriginalFileName vs ORDER.exe
                  Source: ORDER.exeBinary or memory string: OriginalFilename vs ORDER.exe
                  Source: ORDER.exe, 00000003.00000002.930660789.0000000000402000.00000040.00000001.sdmpBinary or memory string: OriginalFilenameXfhzKePuGoesTHRxzhWZClzMzrsKfKQYJFA.exe4 vs ORDER.exe
                  Source: ORDER.exe, 00000003.00000002.939417498.0000000005AE0000.00000002.00000001.sdmpBinary or memory string: OriginalFilenamewshom.ocx.mui vs ORDER.exe
                  Source: ORDER.exe, 00000003.00000002.930745603.0000000000F52000.00000002.00020000.sdmpBinary or memory string: OriginalFilenameND vs ORDER.exe
                  Source: ORDER.exe, 00000003.00000002.939634582.0000000006500000.00000002.00000001.sdmpBinary or memory string: OriginalFilenameKernelbase.dll.muij% vs ORDER.exe
                  Source: ORDER.exe, 00000003.00000002.930959168.0000000001358000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameUNKNOWN_FILET vs ORDER.exe
                  Source: ORDER.exe, 00000003.00000002.940329021.00000000070A0000.00000002.00000001.sdmpBinary or memory string: OriginalFilenamemscorrc.dllT vs ORDER.exe
                  Source: ORDER.exeBinary or memory string: OriginalFilenameND vs ORDER.exe
                  Source: ORDER.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                  Source: SpHLicuA.exe.0.drStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                  Source: kprUEGC.exe.3.drStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                  Source: classification engineClassification label: mal100.troj.adwa.spyw.evad.winEXE@18/11@4/3
                  Source: C:\Users\user\Desktop\ORDER.exeFile created: C:\Users\user\AppData\Roaming\SpHLicuA.exeJump to behavior
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeMutant created: \Sessions\1\BaseNamedObjects\SPwQGUGuJuZKtgTucV
                  Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5956:120:WilError_01
                  Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6840:120:WilError_01
                  Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6544:120:WilError_01
                  Source: C:\Users\user\Desktop\ORDER.exeFile created: C:\Users\user\AppData\Local\Temp\tmpFCB1.tmpJump to behavior
                  Source: ORDER.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                  Source: C:\Users\user\Desktop\ORDER.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
                  Source: C:\Users\user\Desktop\ORDER.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
                  Source: C:\Users\user\Desktop\ORDER.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                  Source: C:\Users\user\Desktop\ORDER.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                  Source: C:\Users\user\Desktop\ORDER.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
                  Source: C:\Users\user\Desktop\ORDER.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
                  Source: C:\Users\user\Desktop\ORDER.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                  Source: C:\Users\user\Desktop\ORDER.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                  Source: C:\Users\user\Desktop\ORDER.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                  Source: C:\Users\user\Desktop\ORDER.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                  Source: C:\Users\user\Desktop\ORDER.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                  Source: ORDER.exeVirustotal: Detection: 65%
                  Source: ORDER.exeReversingLabs: Detection: 66%
                  Source: C:\Users\user\Desktop\ORDER.exeFile read: C:\Users\user\Desktop\ORDER.exeJump to behavior
                  Source: unknownProcess created: C:\Users\user\Desktop\ORDER.exe 'C:\Users\user\Desktop\ORDER.exe'
                  Source: unknownProcess created: C:\Windows\SysWOW64\schtasks.exe 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\SpHLicuA' /XML 'C:\Users\user\AppData\Local\Temp\tmpFCB1.tmp'
                  Source: unknownProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                  Source: unknownProcess created: C:\Users\user\Desktop\ORDER.exe {path}
                  Source: unknownProcess created: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exe 'C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exe'
                  Source: unknownProcess created: C:\Windows\SysWOW64\schtasks.exe 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\SpHLicuA' /XML 'C:\Users\user\AppData\Local\Temp\tmp871F.tmp'
                  Source: unknownProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                  Source: unknownProcess created: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exe {path}
                  Source: unknownProcess created: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exe 'C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exe'
                  Source: unknownProcess created: C:\Windows\SysWOW64\schtasks.exe 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\SpHLicuA' /XML 'C:\Users\user\AppData\Local\Temp\tmpAEAC.tmp'
                  Source: unknownProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                  Source: unknownProcess created: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exe {path}
                  Source: C:\Users\user\Desktop\ORDER.exeProcess created: C:\Windows\SysWOW64\schtasks.exe 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\SpHLicuA' /XML 'C:\Users\user\AppData\Local\Temp\tmpFCB1.tmp'
                  Source: C:\Users\user\Desktop\ORDER.exeProcess created: C:\Users\user\Desktop\ORDER.exe {path}
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess created: C:\Windows\SysWOW64\schtasks.exe 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\SpHLicuA' /XML 'C:\Users\user\AppData\Local\Temp\tmp871F.tmp'
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess created: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exe {path}
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess created: C:\Windows\SysWOW64\schtasks.exe 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\SpHLicuA' /XML 'C:\Users\user\AppData\Local\Temp\tmpAEAC.tmp'
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess created: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exe {path}
                  Source: C:\Users\user\Desktop\ORDER.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{95E15D0A-66E6-93D9-C53C-76E6219D3341}\InProcServer32
                  Source: Window RecorderWindow detected: More than 3 window changes detected
                  Source: C:\Users\user\Desktop\ORDER.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dll
                  Source: C:\Users\user\Desktop\ORDER.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676
                  Source: ORDER.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
                  Source: ORDER.exeStatic PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
                  Source: C:\Users\user\Desktop\ORDER.exeCode function: 0_2_00535F61 push es; retf
                  Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_00F55F61 push es; retf
                  Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_06A45A68 push es; iretd
                  Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_06A476BF push es; iretd
                  Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_06A40EC1 push es; ret
                  Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_06A47E3F push edi; retn 0000h
                  Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_06A48E0F push es; ret
                  Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_06A47353 push es; iretd
                  Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_06A41093 push es; ret
                  Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_06A410DD push es; ret
                  Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_06A410D9 push es; ret
                  Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_06A41045 push es; ret
                  Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_06A40040 push es; retf
                  Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_06A41049 push es; ret
                  Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_06ED1528 push es; retn ED1Dh
                  Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_06ED1528 push es; retf
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeCode function: 10_2_00425F61 push es; retf
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeCode function: 10_2_00AD40C0 push eax; retf 0000h
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeCode function: 10_2_00AD4218 push ebp; retf 0000h
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeCode function: 10_2_00AD4449 push edi; retf 0000h
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeCode function: 10_2_00AD450F push edi; retf 0000h
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeCode function: 10_2_00ADB148 pushfd ; retf 0000h
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeCode function: 10_2_00ADF3BD push es; iretd
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeCode function: 10_2_00ADF523 push es; iretd
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeCode function: 10_2_00ADF93C push es; iretd
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeCode function: 10_2_00ADDEEF push cs; iretd
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeCode function: 10_2_00ADDF02 push cs; iretd
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeCode function: 13_2_009F5F61 push es; retf
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeCode function: 14_2_00315F61 push es; retf
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeCode function: 14_2_067E7CC2 push dword ptr [ebx+ebp-75h]; iretd
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeCode function: 14_2_067E7DBD push FFFFFF8Bh; iretd
                  Source: initial sampleStatic PE information: section name: .text entropy: 7.74988411895
                  Source: initial sampleStatic PE information: section name: .text entropy: 7.74988411895
                  Source: initial sampleStatic PE information: section name: .text entropy: 7.74988411895
                  Source: C:\Users\user\Desktop\ORDER.exeFile created: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeJump to dropped file
                  Source: C:\Users\user\Desktop\ORDER.exeFile created: C:\Users\user\AppData\Roaming\SpHLicuA.exeJump to dropped file

                  Boot Survival:

                  barindex
                  Uses schtasks.exe or at.exe to add and modify task schedulesShow sources
                  Source: unknownProcess created: C:\Windows\SysWOW64\schtasks.exe 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\SpHLicuA' /XML 'C:\Users\user\AppData\Local\Temp\tmpFCB1.tmp'
                  Source: C:\Users\user\Desktop\ORDER.exeRegistry value created or modified: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run kprUEGCJump to behavior
                  Source: C:\Users\user\Desktop\ORDER.exeRegistry value created or modified: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run kprUEGCJump to behavior

                  Hooking and other Techniques for Hiding and Protection:

                  barindex
                  Hides that the sample has been downloaded from the Internet (zone.identifier)Show sources
                  Source: C:\Users\user\Desktop\ORDER.exeFile opened: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exe:Zone.Identifier read attributes | delete
                  Source: C:\Users\user\Desktop\ORDER.exeRegistry key monitored for changes: HKEY_CURRENT_USER_Classes
                  Source: C:\Users\user\Desktop\ORDER.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\Desktop\ORDER.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\Desktop\ORDER.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\Desktop\ORDER.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\Desktop\ORDER.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\Desktop\ORDER.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\Desktop\ORDER.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\Desktop\ORDER.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\Desktop\ORDER.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\Desktop\ORDER.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\Desktop\ORDER.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\Desktop\ORDER.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\Desktop\ORDER.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\Desktop\ORDER.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\Desktop\ORDER.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\Desktop\ORDER.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\Desktop\ORDER.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\Desktop\ORDER.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\Desktop\ORDER.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\Desktop\ORDER.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\Desktop\ORDER.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\Desktop\ORDER.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\Desktop\ORDER.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\Desktop\ORDER.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\Desktop\ORDER.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\Desktop\ORDER.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\Desktop\ORDER.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\Desktop\ORDER.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\Desktop\ORDER.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\Desktop\ORDER.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\Desktop\ORDER.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\Desktop\ORDER.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\Desktop\ORDER.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\Desktop\ORDER.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\Desktop\ORDER.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\Desktop\ORDER.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\Desktop\ORDER.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\Desktop\ORDER.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\Desktop\ORDER.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\Desktop\ORDER.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\Desktop\ORDER.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\Desktop\ORDER.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\Desktop\ORDER.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\Desktop\ORDER.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\Desktop\ORDER.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\Desktop\ORDER.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\Desktop\ORDER.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\Desktop\ORDER.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\Desktop\ORDER.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\Desktop\ORDER.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\Desktop\ORDER.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\Desktop\ORDER.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\Desktop\ORDER.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\Desktop\ORDER.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\Desktop\ORDER.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\Desktop\ORDER.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\Desktop\ORDER.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\Desktop\ORDER.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\Desktop\ORDER.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\Desktop\ORDER.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\Desktop\ORDER.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\Desktop\ORDER.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\Desktop\ORDER.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\Desktop\ORDER.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\Desktop\ORDER.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\Desktop\ORDER.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\Desktop\ORDER.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\Desktop\ORDER.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\Desktop\ORDER.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\Desktop\ORDER.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\Desktop\ORDER.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\Desktop\ORDER.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\Desktop\ORDER.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\Desktop\ORDER.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\Desktop\ORDER.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\Desktop\ORDER.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\Desktop\ORDER.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\Desktop\ORDER.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\Desktop\ORDER.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\Desktop\ORDER.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\Desktop\ORDER.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\Desktop\ORDER.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\Desktop\ORDER.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\Desktop\ORDER.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\Desktop\ORDER.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\Desktop\ORDER.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\Desktop\ORDER.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\Desktop\ORDER.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\Desktop\ORDER.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\Desktop\ORDER.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\Desktop\ORDER.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\Desktop\ORDER.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\Desktop\ORDER.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\Desktop\ORDER.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\Desktop\ORDER.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\Desktop\ORDER.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\Desktop\ORDER.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\Desktop\ORDER.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\Desktop\ORDER.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\Desktop\ORDER.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\Desktop\ORDER.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\Desktop\ORDER.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\Desktop\ORDER.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOX

                  Malware Analysis System Evasion:

                  barindex
                  Yara detected AntiVM_3Show sources
                  Source: Yara matchFile source: 00000000.00000002.686353136.0000000002BFC000.00000004.00000001.sdmp, type: MEMORY
                  Source: Yara matchFile source: 0000000E.00000002.786151703.000000000277C000.00000004.00000001.sdmp, type: MEMORY
                  Source: Yara matchFile source: 0000000A.00000002.762865676.00000000027CC000.00000004.00000001.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: kprUEGC.exe PID: 6300, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: ORDER.exe PID: 6128, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: kprUEGC.exe PID: 5608, type: MEMORY
                  Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)Show sources
                  Source: C:\Users\user\Desktop\ORDER.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
                  Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)Show sources
                  Source: C:\Users\user\Desktop\ORDER.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_NetworkAdapterConfiguration
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_NetworkAdapterConfiguration
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_NetworkAdapterConfiguration
                  Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)Show sources
                  Source: ORDER.exe, 00000000.00000002.686353136.0000000002BFC000.00000004.00000001.sdmp, kprUEGC.exe, 0000000A.00000002.762865676.00000000027CC000.00000004.00000001.sdmp, kprUEGC.exe, 0000000E.00000002.786151703.000000000277C000.00000004.00000001.sdmpBinary or memory string: WINE_GET_UNIX_FILE_NAME
                  Source: ORDER.exe, 00000000.00000002.686353136.0000000002BFC000.00000004.00000001.sdmp, kprUEGC.exe, 0000000A.00000002.762865676.00000000027CC000.00000004.00000001.sdmp, kprUEGC.exe, 0000000E.00000002.786151703.000000000277C000.00000004.00000001.sdmpBinary or memory string: SBIEDLL.DLL
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeFile opened / queried: SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&280b647&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}
                  Source: C:\Users\user\Desktop\ORDER.exeThread delayed: delay time: 922337203685477
                  Source: C:\Users\user\Desktop\ORDER.exeThread delayed: delay time: 922337203685477
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeThread delayed: delay time: 922337203685477
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeThread delayed: delay time: 922337203685477
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeThread delayed: delay time: 922337203685477
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeThread delayed: delay time: 922337203685477
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeThread delayed: delay time: 922337203685477
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeThread delayed: delay time: 922337203685477
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeThread delayed: delay time: 922337203685477
                  Source: C:\Users\user\Desktop\ORDER.exeWindow / User API: threadDelayed 537
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeWindow / User API: threadDelayed 411
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeWindow / User API: threadDelayed 364
                  Source: C:\Users\user\Desktop\ORDER.exe TID: 5604Thread sleep time: -922337203685477s >= -30000s
                  Source: C:\Users\user\Desktop\ORDER.exe TID: 4248Thread sleep time: -41500s >= -30000s
                  Source: C:\Users\user\Desktop\ORDER.exe TID: 6716Thread sleep time: -5534023222112862s >= -30000s
                  Source: C:\Users\user\Desktop\ORDER.exe TID: 6644Thread sleep count: 327 > 30
                  Source: C:\Users\user\Desktop\ORDER.exe TID: 6644Thread sleep count: 537 > 30
                  Source: C:\Users\user\Desktop\ORDER.exe TID: 6716Thread sleep time: -59500s >= -30000s
                  Source: C:\Users\user\Desktop\ORDER.exe TID: 6716Thread sleep time: -87891s >= -30000s
                  Source: C:\Users\user\Desktop\ORDER.exe TID: 6716Thread sleep time: -58000s >= -30000s
                  Source: C:\Users\user\Desktop\ORDER.exe TID: 6716Thread sleep time: -56000s >= -30000s
                  Source: C:\Users\user\Desktop\ORDER.exe TID: 6716Thread sleep time: -82641s >= -30000s
                  Source: C:\Users\user\Desktop\ORDER.exe TID: 6716Thread sleep time: -81750s >= -30000s
                  Source: C:\Users\user\Desktop\ORDER.exe TID: 6716Thread sleep time: -54000s >= -30000s
                  Source: C:\Users\user\Desktop\ORDER.exe TID: 6716Thread sleep time: -53594s >= -30000s
                  Source: C:\Users\user\Desktop\ORDER.exe TID: 6716Thread sleep time: -78750s >= -30000s
                  Source: C:\Users\user\Desktop\ORDER.exe TID: 6716Thread sleep time: -52094s >= -30000s
                  Source: C:\Users\user\Desktop\ORDER.exe TID: 6716Thread sleep time: -51594s >= -30000s
                  Source: C:\Users\user\Desktop\ORDER.exe TID: 6716Thread sleep time: -76500s >= -30000s
                  Source: C:\Users\user\Desktop\ORDER.exe TID: 6716Thread sleep time: -75750s >= -30000s
                  Source: C:\Users\user\Desktop\ORDER.exe TID: 6716Thread sleep time: -75141s >= -30000s
                  Source: C:\Users\user\Desktop\ORDER.exe TID: 6716Thread sleep time: -73500s >= -30000s
                  Source: C:\Users\user\Desktop\ORDER.exe TID: 6716Thread sleep time: -48594s >= -30000s
                  Source: C:\Users\user\Desktop\ORDER.exe TID: 6716Thread sleep time: -72141s >= -30000s
                  Source: C:\Users\user\Desktop\ORDER.exe TID: 6716Thread sleep time: -47000s >= -30000s
                  Source: C:\Users\user\Desktop\ORDER.exe TID: 6716Thread sleep time: -46594s >= -30000s
                  Source: C:\Users\user\Desktop\ORDER.exe TID: 6716Thread sleep time: -67500s >= -30000s
                  Source: C:\Users\user\Desktop\ORDER.exe TID: 6716Thread sleep time: -66891s >= -30000s
                  Source: C:\Users\user\Desktop\ORDER.exe TID: 6716Thread sleep time: -43500s >= -30000s
                  Source: C:\Users\user\Desktop\ORDER.exe TID: 6716Thread sleep time: -63891s >= -30000s
                  Source: C:\Users\user\Desktop\ORDER.exe TID: 6716Thread sleep time: -42000s >= -30000s
                  Source: C:\Users\user\Desktop\ORDER.exe TID: 6716Thread sleep time: -62250s >= -30000s
                  Source: C:\Users\user\Desktop\ORDER.exe TID: 6716Thread sleep time: -41094s >= -30000s
                  Source: C:\Users\user\Desktop\ORDER.exe TID: 6716Thread sleep time: -40000s >= -30000s
                  Source: C:\Users\user\Desktop\ORDER.exe TID: 6716Thread sleep time: -39094s >= -30000s
                  Source: C:\Users\user\Desktop\ORDER.exe TID: 6716Thread sleep time: -38500s >= -30000s
                  Source: C:\Users\user\Desktop\ORDER.exe TID: 6716Thread sleep time: -38000s >= -30000s
                  Source: C:\Users\user\Desktop\ORDER.exe TID: 6716Thread sleep time: -55500s >= -30000s
                  Source: C:\Users\user\Desktop\ORDER.exe TID: 6716Thread sleep time: -36594s >= -30000s
                  Source: C:\Users\user\Desktop\ORDER.exe TID: 6716Thread sleep time: -52500s >= -30000s
                  Source: C:\Users\user\Desktop\ORDER.exe TID: 6716Thread sleep time: -34500s >= -30000s
                  Source: C:\Users\user\Desktop\ORDER.exe TID: 6716Thread sleep time: -47250s >= -30000s
                  Source: C:\Users\user\Desktop\ORDER.exe TID: 6716Thread sleep time: -46500s >= -30000s
                  Source: C:\Users\user\Desktop\ORDER.exe TID: 6716Thread sleep time: -45891s >= -30000s
                  Source: C:\Users\user\Desktop\ORDER.exe TID: 6716Thread sleep time: -44250s >= -30000s
                  Source: C:\Users\user\Desktop\ORDER.exe TID: 6716Thread sleep time: -42891s >= -30000s
                  Source: C:\Users\user\Desktop\ORDER.exe TID: 6716Thread sleep time: -41250s >= -30000s
                  Source: C:\Users\user\Desktop\ORDER.exe TID: 6716Thread sleep time: -35250s >= -30000s
                  Source: C:\Users\user\Desktop\ORDER.exe TID: 6716Thread sleep time: -30000s >= -30000s
                  Source: C:\Users\user\Desktop\ORDER.exe TID: 6716Thread sleep time: -58374s >= -30000s
                  Source: C:\Users\user\Desktop\ORDER.exe TID: 6716Thread sleep time: -56686s >= -30000s
                  Source: C:\Users\user\Desktop\ORDER.exe TID: 6716Thread sleep time: -56500s >= -30000s
                  Source: C:\Users\user\Desktop\ORDER.exe TID: 6716Thread sleep time: -56186s >= -30000s
                  Source: C:\Users\user\Desktop\ORDER.exe TID: 6716Thread sleep time: -55780s >= -30000s
                  Source: C:\Users\user\Desktop\ORDER.exe TID: 6716Thread sleep time: -55374s >= -30000s
                  Source: C:\Users\user\Desktop\ORDER.exe TID: 6716Thread sleep time: -54874s >= -30000s
                  Source: C:\Users\user\Desktop\ORDER.exe TID: 6716Thread sleep time: -54686s >= -30000s
                  Source: C:\Users\user\Desktop\ORDER.exe TID: 6716Thread sleep time: -54280s >= -30000s
                  Source: C:\Users\user\Desktop\ORDER.exe TID: 6716Thread sleep time: -53780s >= -30000s
                  Source: C:\Users\user\Desktop\ORDER.exe TID: 6716Thread sleep time: -52686s >= -30000s
                  Source: C:\Users\user\Desktop\ORDER.exe TID: 6716Thread sleep time: -52280s >= -30000s
                  Source: C:\Users\user\Desktop\ORDER.exe TID: 6716Thread sleep time: -51186s >= -30000s
                  Source: C:\Users\user\Desktop\ORDER.exe TID: 6716Thread sleep time: -50280s >= -30000s
                  Source: C:\Users\user\Desktop\ORDER.exe TID: 6716Thread sleep time: -49874s >= -30000s
                  Source: C:\Users\user\Desktop\ORDER.exe TID: 6716Thread sleep time: -49186s >= -30000s
                  Source: C:\Users\user\Desktop\ORDER.exe TID: 6716Thread sleep time: -48780s >= -30000s
                  Source: C:\Users\user\Desktop\ORDER.exe TID: 6716Thread sleep time: -47874s >= -30000s
                  Source: C:\Users\user\Desktop\ORDER.exe TID: 6716Thread sleep time: -45686s >= -30000s
                  Source: C:\Users\user\Desktop\ORDER.exe TID: 6716Thread sleep time: -45186s >= -30000s
                  Source: C:\Users\user\Desktop\ORDER.exe TID: 6716Thread sleep time: -44780s >= -30000s
                  Source: C:\Users\user\Desktop\ORDER.exe TID: 6716Thread sleep time: -44374s >= -30000s
                  Source: C:\Users\user\Desktop\ORDER.exe TID: 6716Thread sleep time: -44094s >= -30000s
                  Source: C:\Users\user\Desktop\ORDER.exe TID: 6716Thread sleep time: -43874s >= -30000s
                  Source: C:\Users\user\Desktop\ORDER.exe TID: 6716Thread sleep time: -43686s >= -30000s
                  Source: C:\Users\user\Desktop\ORDER.exe TID: 6716Thread sleep time: -64500s >= -30000s
                  Source: C:\Users\user\Desktop\ORDER.exe TID: 6716Thread sleep time: -42780s >= -30000s
                  Source: C:\Users\user\Desktop\ORDER.exe TID: 6716Thread sleep time: -42374s >= -30000s
                  Source: C:\Users\user\Desktop\ORDER.exe TID: 6716Thread sleep time: -41686s >= -30000s
                  Source: C:\Users\user\Desktop\ORDER.exe TID: 6716Thread sleep time: -41000s >= -30000s
                  Source: C:\Users\user\Desktop\ORDER.exe TID: 6716Thread sleep time: -40594s >= -30000s
                  Source: C:\Users\user\Desktop\ORDER.exe TID: 6716Thread sleep time: -40374s >= -30000s
                  Source: C:\Users\user\Desktop\ORDER.exe TID: 6716Thread sleep time: -59250s >= -30000s
                  Source: C:\Users\user\Desktop\ORDER.exe TID: 6716Thread sleep time: -39000s >= -30000s
                  Source: C:\Users\user\Desktop\ORDER.exe TID: 6716Thread sleep time: -34094s >= -30000s
                  Source: C:\Users\user\Desktop\ORDER.exe TID: 6716Thread sleep time: -33874s >= -30000s
                  Source: C:\Users\user\Desktop\ORDER.exe TID: 6716Thread sleep time: -33000s >= -30000s
                  Source: C:\Users\user\Desktop\ORDER.exe TID: 6716Thread sleep time: -32780s >= -30000s
                  Source: C:\Users\user\Desktop\ORDER.exe TID: 6716Thread sleep time: -32500s >= -30000s
                  Source: C:\Users\user\Desktop\ORDER.exe TID: 6716Thread sleep time: -32280s >= -30000s
                  Source: C:\Users\user\Desktop\ORDER.exe TID: 6716Thread sleep time: -32094s >= -30000s
                  Source: C:\Users\user\Desktop\ORDER.exe TID: 6716Thread sleep time: -31874s >= -30000s
                  Source: C:\Users\user\Desktop\ORDER.exe TID: 6716Thread sleep time: -31686s >= -30000s
                  Source: C:\Users\user\Desktop\ORDER.exe TID: 6716Thread sleep time: -30780s >= -30000s
                  Source: C:\Users\user\Desktop\ORDER.exe TID: 6716Thread sleep time: -30374s >= -30000s
                  Source: C:\Users\user\Desktop\ORDER.exe TID: 6716Thread sleep time: -30094s >= -30000s
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exe TID: 2740Thread sleep time: -922337203685477s >= -30000s
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exe TID: 5652Thread sleep time: -41500s >= -30000s
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exe TID: 6848Thread sleep time: -922337203685477s >= -30000s
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exe TID: 5424Thread sleep time: -2767011611056431s >= -30000s
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exe TID: 5432Thread sleep count: 86 > 30
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exe TID: 5432Thread sleep count: 411 > 30
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exe TID: 5424Thread sleep time: -30000s >= -30000s
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exe TID: 6452Thread sleep time: -922337203685477s >= -30000s
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exe TID: 6408Thread sleep time: -41500s >= -30000s
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exe TID: 6480Thread sleep time: -922337203685477s >= -30000s
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exe TID: 6552Thread sleep time: -922337203685477s >= -30000s
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exe TID: 6040Thread sleep time: -2767011611056431s >= -30000s
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exe TID: 6332Thread sleep count: 34 > 30
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exe TID: 6332Thread sleep count: 364 > 30
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exe TID: 6040Thread sleep time: -55000s >= -30000s
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exe TID: 6040Thread sleep time: -53906s >= -30000s
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exe TID: 6040Thread sleep time: -53000s >= -30000s
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exe TID: 6040Thread sleep time: -52812s >= -30000s
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exe TID: 6040Thread sleep time: -50812s >= -30000s
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exe TID: 6040Thread sleep time: -46406s >= -30000s
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exe TID: 6040Thread sleep time: -44000s >= -30000s
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exe TID: 6040Thread sleep time: -43312s >= -30000s
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exe TID: 6040Thread sleep time: -37406s >= -30000s
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exe TID: 6040Thread sleep time: -36312s >= -30000s
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exe TID: 6040Thread sleep time: -35000s >= -30000s
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exe TID: 6040Thread sleep time: -33906s >= -30000s
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exe TID: 6040Thread sleep time: -33218s >= -30000s
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exe TID: 6040Thread sleep time: -32812s >= -30000s
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exe TID: 6040Thread sleep time: -31906s >= -30000s
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exe TID: 6040Thread sleep time: -31718s >= -30000s
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exe TID: 6040Thread sleep time: -30812s >= -30000s
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exe TID: 6040Thread sleep time: -30406s >= -30000s
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exe TID: 6040Thread sleep time: -30000s >= -30000s
                  Source: C:\Users\user\Desktop\ORDER.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                  Source: C:\Users\user\Desktop\ORDER.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                  Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                  Source: C:\Users\user\Desktop\ORDER.exeLast function: Thread delayed
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeLast function: Thread delayed
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeLast function: Thread delayed
                  Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeLast function: Thread delayed
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeLast function: Thread delayed
                  Source: kprUEGC.exe, 0000000E.00000002.788783060.0000000002AE7000.00000004.00000001.sdmpBinary or memory string: VMware
                  Source: ORDER.exe, 00000003.00000002.939634582.0000000006500000.00000002.00000001.sdmpBinary or memory string: A Virtual Machine could not be started because Hyper-V is not installed.
                  Source: kprUEGC.exe, 0000000E.00000002.785681445.0000000002731000.00000004.00000001.sdmpBinary or memory string: vmware
                  Source: kprUEGC.exe, 0000000E.00000002.785681445.0000000002731000.00000004.00000001.sdmpBinary or memory string: k%C:\PROGRAM FILES\VMWARE\VMWARE TOOLS\
                  Source: kprUEGC.exe, 0000000E.00000002.785681445.0000000002731000.00000004.00000001.sdmpBinary or memory string: VMWARE
                  Source: kprUEGC.exe, 0000000E.00000002.786151703.000000000277C000.00000004.00000001.sdmpBinary or memory string: InstallPath%C:\PROGRAM FILES\VMWARE\VMWARE TOOLS\
                  Source: ORDER.exe, 00000003.00000002.939634582.0000000006500000.00000002.00000001.sdmpBinary or memory string: A communication protocol error has occurred between the Hyper-V Host and Guest Compute Service.
                  Source: ORDER.exe, 00000003.00000002.939634582.0000000006500000.00000002.00000001.sdmpBinary or memory string: The communication protocol version between the Hyper-V Host and Guest Compute Services is not supported.
                  Source: kprUEGC.exe, 0000000E.00000002.786151703.000000000277C000.00000004.00000001.sdmpBinary or memory string: VMWARE"SOFTWARE\VMware, Inc.\VMware ToolsLHARDWARE\DEVICEMAP\Scsi\Scsi Port 1\Scsi Bus 0\Target Id 0\Logical Unit Id 0LHARDWARE\DEVICEMAP\Scsi\Scsi Port 2\Scsi Bus 0\Target Id 0\Logical Unit Id 0'SYSTEM\ControlSet001\Services\Disk\Enum
                  Source: kprUEGC.exe, 0000000E.00000002.786151703.000000000277C000.00000004.00000001.sdmpBinary or memory string: VMware SVGA II
                  Source: kprUEGC.exe, 0000000E.00000002.788783060.0000000002AE7000.00000004.00000001.sdmpBinary or memory string: VMware
                  Source: kprUEGC.exe, 0000000E.00000002.786151703.000000000277C000.00000004.00000001.sdmpBinary or memory string: vmwareNSYSTEM\ControlSet001\Control\Class\{4D36E968-E325-11CE-BFC1-08002BE10318}\0000
                  Source: kprUEGC.exe, 0000000E.00000002.785681445.0000000002731000.00000004.00000001.sdmpBinary or memory string: k"SOFTWARE\VMware, Inc.\VMware Tools
                  Source: ORDER.exe, 00000003.00000002.939634582.0000000006500000.00000002.00000001.sdmpBinary or memory string: An unknown internal message was received by the Hyper-V Compute Service.
                  Source: C:\Users\user\Desktop\ORDER.exeProcess information queried: ProcessInformation
                  Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_06EDBC48 LdrInitializeThunk,
                  Source: C:\Users\user\Desktop\ORDER.exeProcess token adjusted: Debug
                  Source: C:\Users\user\Desktop\ORDER.exeProcess token adjusted: Debug
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess token adjusted: Debug
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess token adjusted: Debug
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess token adjusted: Debug
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess token adjusted: Debug
                  Source: C:\Users\user\Desktop\ORDER.exeMemory allocated: page read and write | page guard

                  HIPS / PFW / Operating System Protection Evasion:

                  barindex
                  Injects a PE file into a foreign processesShow sources
                  Source: C:\Users\user\Desktop\ORDER.exeMemory written: C:\Users\user\Desktop\ORDER.exe base: 400000 value starts with: 4D5A
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeMemory written: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exe base: 400000 value starts with: 4D5A
                  Modifies the hosts fileShow sources
                  Source: C:\Users\user\Desktop\ORDER.exeFile written: C:\Windows\System32\drivers\etc\hostsJump to behavior
                  Source: C:\Users\user\Desktop\ORDER.exeProcess created: C:\Windows\SysWOW64\schtasks.exe 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\SpHLicuA' /XML 'C:\Users\user\AppData\Local\Temp\tmpFCB1.tmp'
                  Source: C:\Users\user\Desktop\ORDER.exeProcess created: C:\Users\user\Desktop\ORDER.exe {path}
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess created: C:\Windows\SysWOW64\schtasks.exe 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\SpHLicuA' /XML 'C:\Users\user\AppData\Local\Temp\tmp871F.tmp'
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess created: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exe {path}
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess created: C:\Windows\SysWOW64\schtasks.exe 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\SpHLicuA' /XML 'C:\Users\user\AppData\Local\Temp\tmpAEAC.tmp'
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess created: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exe {path}
                  Source: ORDER.exe, 00000003.00000002.932483317.0000000001D30000.00000002.00000001.sdmp, kprUEGC.exe, 0000000D.00000002.933878617.00000000017B0000.00000002.00000001.sdmp, kprUEGC.exe, 00000011.00000002.933606890.0000000001670000.00000002.00000001.sdmpBinary or memory string: Program Manager
                  Source: ORDER.exe, 00000003.00000002.932483317.0000000001D30000.00000002.00000001.sdmp, kprUEGC.exe, 0000000D.00000002.933878617.00000000017B0000.00000002.00000001.sdmp, kprUEGC.exe, 00000011.00000002.933606890.0000000001670000.00000002.00000001.sdmpBinary or memory string: Shell_TrayWnd
                  Source: ORDER.exe, 00000003.00000002.932483317.0000000001D30000.00000002.00000001.sdmp, kprUEGC.exe, 0000000D.00000002.933878617.00000000017B0000.00000002.00000001.sdmp, kprUEGC.exe, 00000011.00000002.933606890.0000000001670000.00000002.00000001.sdmpBinary or memory string: Progman
                  Source: ORDER.exe, 00000003.00000002.932483317.0000000001D30000.00000002.00000001.sdmp, kprUEGC.exe, 0000000D.00000002.933878617.00000000017B0000.00000002.00000001.sdmp, kprUEGC.exe, 00000011.00000002.933606890.0000000001670000.00000002.00000001.sdmpBinary or memory string: Progmanlock
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Users\user\Desktop\ORDER.exe VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\arial.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\ariali.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\arialbd.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\arialbi.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\ARIALN.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\ariblk.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\ARIALNI.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\ARIALNB.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\ARIALNBI.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\calibri.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\calibril.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\calibrii.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\calibrili.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\calibrib.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\calibriz.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\cambria.ttc VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\cambriai.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\cambriab.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\cambriaz.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\Candara.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\Candarai.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\Candarab.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\Candaraz.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\comic.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\comici.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\comicbd.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\comicz.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\consola.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\consolai.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\consolab.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\consolaz.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\constan.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\constani.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\constanb.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\constanz.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\corbel.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\corbeli.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\corbelb.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\corbelz.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\cour.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\couri.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\courbd.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\courbi.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\ebrima.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\ebrimabd.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\framd.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\FRADM.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\framdit.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\FRADMIT.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\FRAMDCN.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\FRADMCN.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\FRAHV.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\FRAHVIT.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\Gabriola.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\gadugi.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\gadugib.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\georgia.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\georgiai.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\georgiab.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\georgiaz.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\impact.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\Inkfree.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\javatext.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\LeelawUI.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\LeelUIsl.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\LeelaUIb.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\lucon.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\l_10646.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\malgun.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\malgunsl.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\malgunbd.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\himalaya.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\msjh.ttc VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\msjhl.ttc VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\msjhbd.ttc VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\ntailu.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\ntailub.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\phagspa.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\phagspab.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\taile.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\taileb.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\msyh.ttc VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\msyhl.ttc VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\msyhbd.ttc VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\msyi.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\mingliub.ttc VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\monbaiti.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\msgothic.ttc VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\mvboli.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\mmrtext.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\mmrtextb.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\Nirmala.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\NirmalaS.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\NirmalaB.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\pala.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\palai.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\palab.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\palabi.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\segoepr.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\segoeprb.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\segoesc.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\segoescb.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\seguiemj.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\seguihis.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\seguisym.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\simsun.ttc VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\simsunb.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\Sitka.ttc VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\SitkaI.ttc VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\SitkaB.ttc VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\SitkaZ.ttc VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\sylfaen.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\symbol.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\tahoma.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\tahomabd.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\trebuc.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\trebucit.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\trebucbd.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\trebucbi.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\verdana.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\verdanai.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\verdanab.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\verdanaz.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\webdings.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\wingding.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\YuGothR.ttc VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\YuGothM.ttc VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\YuGothL.ttc VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\YuGothB.ttc VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\holomdl2.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\CENTURY.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\LEELAWAD.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\LEELAWDB.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\MSUIGHUR.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\MSUIGHUB.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\WINGDNG2.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\WINGDNG3.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\TEMPSITC.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\PRISTINA.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\PAPYRUS.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\MISTRAL.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\LHANDW.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\ITCKRIST.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\JUICE___.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\FRSCRIPT.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\FREESCPT.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\BRADHITC.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\OUTLOOK.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\BKANT.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\ANTQUAI.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\ANTQUAB.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\ANTQUABI.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\GARA.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\GARAIT.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\GARABD.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\MTCORSVA.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\GOTHIC.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\GOTHICI.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\GOTHICB.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\GOTHICBI.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\ALGER.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\BASKVILL.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\BAUHS93.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\BELL.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\BELLI.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\BELLB.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\BRLNSR.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\BRLNSDB.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\BRLNSB.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\BERNHC.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\BOD_PSTC.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\BRITANIC.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\BROADW.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\BRUSHSCI.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\CALIFR.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\CALIFI.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\CALIFB.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\CENTAUR.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\CHILLER.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\COLONNA.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\COOPBL.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\FTLTLT.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\HARLOWSI.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\HARNGTON.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\HTOWERT.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\HTOWERTI.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\JOKERMAN.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\KUNSTLER.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\LBRITE.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\LBRITED.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\LBRITEI.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\LBRITEDI.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\LCALLIG.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\LFAX.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\LFAXD.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\LFAXI.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\LFAXDI.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\MAGNETOB.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\MATURASC.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\MOD20.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\NIAGENG.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\NIAGSOL.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\OLDENGL.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\ONYX.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\PARCHM.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\PLAYBILL.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\POORICH.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\RAVIE.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\INFROMAN.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\SHOWG.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\SNAP____.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\STENCIL.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\VINERITC.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\VIVALDII.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\VLADIMIR.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\LATINWD.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\TCM_____.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\TCMI____.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\TCB_____.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\TCBI____.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\TCCM____.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\TCCB____.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\TCCEB.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\SCRIPTBL.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\ROCK.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\ROCKI.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\ROCKB.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\ROCKEB.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\ROCKBI.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\ROCC____.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\ROCCB___.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\RAGE.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\PERTILI.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\PERTIBD.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\PER_____.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\PERI____.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\PERB____.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\PERBI___.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\PALSCRI.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\OCRAEXT.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\MAIAN.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\LTYPE.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\LTYPEO.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\LTYPEB.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\LTYPEBO.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\LSANS.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\LSANSD.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\LSANSI.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\LSANSDI.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\IMPRISHA.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\HATTEN.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\GOUDYSTO.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\GOUDOS.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\GOUDOSI.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\GOUDOSB.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\GLECB.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\GIL_____.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\GILI____.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\GILB____.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\GILBI___.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\GILC____.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\GLSNECB.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\GIGI.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\FRABK.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\FRABKIT.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\FORTE.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\FELIXTI.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\ERASMD.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\ERASLGHT.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\ERASDEMI.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\ERASBD.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\ENGR.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\ELEPHNT.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\ELEPHNTI.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\ITCEDSCR.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\CURLZ___.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\COPRGTL.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\COPRGTB.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\CENSCBK.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\SCHLBKI.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\SCHLBKB.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\SCHLBKBI.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\CASTELAR.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\CALIST.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\CALISTI.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\CALISTB.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\CALISTBI.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\BOOKOS.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\BOOKOSB.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\BOOKOSI.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\BOOKOSBI.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\BOD_R.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\BOD_I.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\BOD_B.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\BOD_BI.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\BOD_CR.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\BOD_BLAR.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\BOD_CI.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\BOD_CB.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\BOD_BLAI.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\BOD_CBI.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\ITCBLKAD.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\ARLRDBD.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\AGENCYR.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\AGENCYB.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\BSSYM7.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\REFSAN.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\REFSPCL.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\MTEXTRA.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\marlett.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Web\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Web.dll VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Users\user\Desktop\ORDER.exe VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Management.dll VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeQueries volume information: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exe VolumeInformation
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Web\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Web.dll VolumeInformation
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeQueries volume information: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exe VolumeInformation
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformation
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformation
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformation
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Management.dll VolumeInformation
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeQueries volume information: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exe VolumeInformation
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Web\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Web.dll VolumeInformation
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeQueries volume information: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exe VolumeInformation
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformation
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformation
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformation
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Management.dll VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid

                  Lowering of HIPS / PFW / Operating System Security Settings:

                  barindex
                  Modifies the hosts fileShow sources
                  Source: C:\Users\user\Desktop\ORDER.exeFile written: C:\Windows\System32\drivers\etc\hostsJump to behavior

                  Stealing of Sensitive Information:

                  barindex
                  Yara detected AgentTeslaShow sources
                  Source: Yara matchFile source: 0000000D.00000002.930696018.0000000000402000.00000040.00000001.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000003.00000002.930660789.0000000000402000.00000040.00000001.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000003.00000002.935335032.0000000003724000.00000004.00000001.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000000.00000002.687010442.0000000003C56000.00000004.00000001.sdmp, type: MEMORY
                  Source: Yara matchFile source: 0000000A.00000002.765004740.0000000003825000.00000004.00000001.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000000.00000002.687253332.0000000003DD6000.00000004.00000001.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000011.00000002.933961322.0000000002A81000.00000004.00000001.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000011.00000002.930556707.0000000000402000.00000040.00000001.sdmp, type: MEMORY
                  Source: Yara matchFile source: 0000000D.00000002.934897870.0000000002D91000.00000004.00000001.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000003.00000002.934322832.0000000003526000.00000004.00000001.sdmp, type: MEMORY
                  Source: Yara matchFile source: 0000000E.00000002.789175486.00000000037D4000.00000004.00000001.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000003.00000002.934090598.00000000034D1000.00000004.00000001.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: kprUEGC.exe PID: 6648, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: kprUEGC.exe PID: 6300, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: kprUEGC.exe PID: 4928, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: ORDER.exe PID: 6876, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: ORDER.exe PID: 6128, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: kprUEGC.exe PID: 5608, type: MEMORY
                  Source: Yara matchFile source: 3.2.ORDER.exe.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 17.2.kprUEGC.exe.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 13.2.kprUEGC.exe.400000.0.unpack, type: UNPACKEDPE
                  Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)Show sources
                  Source: C:\Users\user\Desktop\ORDER.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Martin Prikryl\WinSCP 2\Sessions
                  Tries to harvest and steal browser information (history, passwords, etc)Show sources
                  Source: C:\Users\user\Desktop\ORDER.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login Data
                  Source: C:\Users\user\Desktop\ORDER.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.ini
                  Tries to harvest and steal ftp login credentialsShow sources
                  Source: C:\Users\user\Desktop\ORDER.exeFile opened: C:\Users\user\AppData\Roaming\FileZilla\recentservers.xml
                  Source: C:\Users\user\Desktop\ORDER.exeFile opened: C:\Users\user\AppData\Roaming\SmartFTP\Client 2.0\Favorites\Quick Connect\
                  Tries to steal Mail credentials (via file access)Show sources
                  Source: C:\Users\user\Desktop\ORDER.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.ini
                  Source: C:\Users\user\Desktop\ORDER.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.ini
                  Source: C:\Users\user\Desktop\ORDER.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676
                  Source: C:\Users\user\Desktop\ORDER.exeKey opened: HKEY_CURRENT_USER\Software\IncrediMail\Identities
                  Source: Yara matchFile source: 00000011.00000002.933961322.0000000002A81000.00000004.00000001.sdmp, type: MEMORY
                  Source: Yara matchFile source: 0000000D.00000002.934897870.0000000002D91000.00000004.00000001.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000003.00000002.934090598.00000000034D1000.00000004.00000001.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: kprUEGC.exe PID: 6648, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: kprUEGC.exe PID: 4928, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: ORDER.exe PID: 6876, type: MEMORY

                  Remote Access Functionality:

                  barindex
                  Yara detected AgentTeslaShow sources
                  Source: Yara matchFile source: 0000000D.00000002.930696018.0000000000402000.00000040.00000001.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000003.00000002.930660789.0000000000402000.00000040.00000001.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000003.00000002.935335032.0000000003724000.00000004.00000001.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000000.00000002.687010442.0000000003C56000.00000004.00000001.sdmp, type: MEMORY
                  Source: Yara matchFile source: 0000000A.00000002.765004740.0000000003825000.00000004.00000001.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000000.00000002.687253332.0000000003DD6000.00000004.00000001.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000011.00000002.933961322.0000000002A81000.00000004.00000001.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000011.00000002.930556707.0000000000402000.00000040.00000001.sdmp, type: MEMORY
                  Source: Yara matchFile source: 0000000D.00000002.934897870.0000000002D91000.00000004.00000001.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000003.00000002.934322832.0000000003526000.00000004.00000001.sdmp, type: MEMORY
                  Source: Yara matchFile source: 0000000E.00000002.789175486.00000000037D4000.00000004.00000001.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000003.00000002.934090598.00000000034D1000.00000004.00000001.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: kprUEGC.exe PID: 6648, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: kprUEGC.exe PID: 6300, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: kprUEGC.exe PID: 4928, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: ORDER.exe PID: 6876, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: ORDER.exe PID: 6128, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: kprUEGC.exe PID: 5608, type: MEMORY
                  Source: Yara matchFile source: 3.2.ORDER.exe.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 17.2.kprUEGC.exe.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 13.2.kprUEGC.exe.400000.0.unpack, type: UNPACKEDPE

                  Mitre Att&ck Matrix

                  Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
                  Valid AccountsWindows Management Instrumentation211Scheduled Task/Job1Process Injection112File and Directory Permissions Modification1OS Credential Dumping2File and Directory Discovery1Remote ServicesArchive Collected Data1Exfiltration Over Other Network MediumEncrypted Channel12Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
                  Default AccountsScheduled Task/Job1Registry Run Keys / Startup Folder1Scheduled Task/Job1Disable or Modify Tools1Input Capture1System Information Discovery114Remote Desktop ProtocolData from Local System2Exfiltration Over BluetoothNon-Standard Port1Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
                  Domain AccountsAt (Linux)Logon Script (Windows)Registry Run Keys / Startup Folder1Obfuscated Files or Information3Credentials in Registry1Query Registry1SMB/Windows Admin SharesEmail Collection1Automated ExfiltrationNon-Application Layer Protocol1Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
                  Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)Software Packing3NTDSSecurity Software Discovery321Distributed Component Object ModelInput Capture1Scheduled TransferApplication Layer Protocol12SIM Card SwapCarrier Billing Fraud
                  Cloud AccountsCronNetwork Logon ScriptNetwork Logon ScriptMasquerading1LSA SecretsVirtualization/Sandbox Evasion14SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
                  Replication Through Removable MediaLaunchdRc.commonRc.commonVirtualization/Sandbox Evasion14Cached Domain CredentialsProcess Discovery2VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
                  External Remote ServicesScheduled TaskStartup ItemsStartup ItemsProcess Injection112DCSyncApplication Window Discovery1Windows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
                  Drive-by CompromiseCommand and Scripting InterpreterScheduled Task/JobScheduled Task/JobHidden Files and Directories1Proc FilesystemRemote System Discovery1Shared WebrootCredential API HookingExfiltration Over Symmetric Encrypted Non-C2 ProtocolApplication Layer ProtocolDowngrade to Insecure ProtocolsGenerate Fraudulent Advertising Revenue
                  Exploit Public-Facing ApplicationPowerShellAt (Linux)At (Linux)Masquerading/etc/passwd and /etc/shadowSystem Network Configuration Discovery1Software Deployment ToolsData StagedExfiltration Over Asymmetric Encrypted Non-C2 ProtocolWeb ProtocolsRogue Cellular Base StationData Destruction

                  Behavior Graph

                  Hide Legend

                  Legend:

                  • Process
                  • Signature
                  • Created File
                  • DNS/IP Info
                  • Is Dropped
                  • Is Windows Process
                  • Number of created Registry Values
                  • Number of created Files
                  • Visual Basic
                  • Delphi
                  • Java
                  • .Net C# or VB.NET
                  • C, C++ or other language
                  • Is malicious
                  • Internet
                  behaviorgraph top1 signatures2 2 Behavior Graph ID: 321193 Sample: ORDER.exe Startdate: 20/11/2020 Architecture: WINDOWS Score: 100 57 Snort IDS alert for network traffic (e.g. based on Emerging Threat rules) 2->57 59 Found malware configuration 2->59 61 Antivirus detection for dropped file 2->61 63 12 other signatures 2->63 7 ORDER.exe 6 2->7         started        12 kprUEGC.exe 5 2->12         started        14 kprUEGC.exe 2->14         started        process3 dnsIp4 55 192.168.2.1 unknown unknown 7->55 43 C:\Users\user\AppData\Roaming\SpHLicuA.exe, PE32 7->43 dropped 45 C:\Users\user\AppData\Local\...\tmpFCB1.tmp, XML 7->45 dropped 47 C:\Users\user\AppData\Local\...\ORDER.exe.log, ASCII 7->47 dropped 73 Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines) 7->73 75 Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines) 7->75 77 Injects a PE file into a foreign processes 7->77 16 ORDER.exe 17 5 7->16         started        21 schtasks.exe 1 7->21         started        79 Antivirus detection for dropped file 12->79 81 Multi AV Scanner detection for dropped file 12->81 83 Machine Learning detection for dropped file 12->83 23 schtasks.exe 1 12->23         started        25 kprUEGC.exe 2 12->25         started        27 kprUEGC.exe 14->27         started        29 schtasks.exe 14->29         started        file5 signatures6 process7 dnsIp8 49 vasudeva.in 68.233.236.158, 49766, 587 HVC-ASUS United States 16->49 51 mail.vasudeva.in 16->51 53 3 other IPs or domains 16->53 37 C:\Users\user\AppData\Roaming\...\kprUEGC.exe, PE32 16->37 dropped 39 C:\Users\user\...\kprUEGC.exe:Zone.Identifier, ASCII 16->39 dropped 65 Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc) 16->65 67 Tries to steal Mail credentials (via file access) 16->67 69 Tries to harvest and steal ftp login credentials 16->69 71 3 other signatures 16->71 31 conhost.exe 21->31         started        33 conhost.exe 23->33         started        41 C:\Windows\System32\drivers\etc\hosts, ASCII 27->41 dropped 35 conhost.exe 29->35         started        file9 signatures10 process11

                  Screenshots

                  Thumbnails

                  This section contains all screenshots as thumbnails, including those not shown in the slideshow.

                  windows-stand

                  Antivirus, Machine Learning and Genetic Malware Detection

                  Initial Sample

                  SourceDetectionScannerLabelLink
                  ORDER.exe65%VirustotalBrowse
                  ORDER.exe67%ReversingLabsByteCode-MSIL.Trojan.AgentTesla
                  ORDER.exe100%AviraTR/Kryptik.lesvd
                  ORDER.exe100%Joe Sandbox ML

                  Dropped Files

                  SourceDetectionScannerLabelLink
                  C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exe100%AviraTR/Kryptik.lesvd
                  C:\Users\user\AppData\Roaming\SpHLicuA.exe100%AviraTR/Kryptik.lesvd
                  C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exe100%Joe Sandbox ML
                  C:\Users\user\AppData\Roaming\SpHLicuA.exe100%Joe Sandbox ML
                  C:\Users\user\AppData\Roaming\SpHLicuA.exe67%ReversingLabsByteCode-MSIL.Trojan.AgentTesla
                  C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exe67%ReversingLabsByteCode-MSIL.Trojan.AgentTesla

                  Unpacked PE Files

                  SourceDetectionScannerLabelLinkDownload
                  3.2.ORDER.exe.400000.0.unpack100%AviraTR/Spy.Gen8Download File
                  17.2.kprUEGC.exe.400000.0.unpack100%AviraTR/Spy.Gen8Download File
                  13.2.kprUEGC.exe.400000.0.unpack100%AviraTR/Spy.Gen8Download File

                  Domains

                  SourceDetectionScannerLabelLink
                  vasudeva.in0%VirustotalBrowse
                  mail.vasudeva.in0%VirustotalBrowse

                  URLs

                  SourceDetectionScannerLabelLink
                  http://127.0.0.1:HTTP/1.10%Avira URL Cloudsafe
                  http://DynDns.comDynDNS0%URL Reputationsafe
                  http://DynDns.comDynDNS0%URL Reputationsafe
                  http://DynDns.comDynDNS0%URL Reputationsafe
                  http://DynDns.comDynDNS0%URL Reputationsafe
                  http://www.founder.com.cn/cn/bThe0%URL Reputationsafe
                  http://www.founder.com.cn/cn/bThe0%URL Reputationsafe
                  http://www.founder.com.cn/cn/bThe0%URL Reputationsafe
                  http://www.founder.com.cn/cn/bThe0%URL Reputationsafe
                  https://5PX8nQFyXZqeL8oi.com853321935-2125563209-4053062332-1002_Classes0%Avira URL Cloudsafe
                  https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip%tordir%%ha0%URL Reputationsafe
                  https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip%tordir%%ha0%URL Reputationsafe
                  https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip%tordir%%ha0%URL Reputationsafe
                  https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip%tordir%%ha0%URL Reputationsafe
                  http://RKhkfz.com0%Avira URL Cloudsafe
                  http://www.tiro.com0%URL Reputationsafe
                  http://www.tiro.com0%URL Reputationsafe
                  http://www.tiro.com0%URL Reputationsafe
                  http://www.goodfont.co.kr0%URL Reputationsafe
                  http://www.goodfont.co.kr0%URL Reputationsafe
                  http://www.goodfont.co.kr0%URL Reputationsafe
                  http://www.fontbureau.comiona0%Avira URL Cloudsafe
                  http://www.carterandcone.coml0%URL Reputationsafe
                  http://www.carterandcone.coml0%URL Reputationsafe
                  http://www.carterandcone.coml0%URL Reputationsafe
                  https://api.ipify.orgGETMozilla/5.00%URL Reputationsafe
                  https://api.ipify.orgGETMozilla/5.00%URL Reputationsafe
                  https://api.ipify.orgGETMozilla/5.00%URL Reputationsafe
                  http://www.sajatypeworks.com0%URL Reputationsafe
                  http://www.sajatypeworks.com0%URL Reputationsafe
                  http://www.sajatypeworks.com0%URL Reputationsafe
                  https://5PX8nQFyXZqeL8oi.com0%Avira URL Cloudsafe
                  http://www.typography.netD0%URL Reputationsafe
                  http://www.typography.netD0%URL Reputationsafe
                  http://www.typography.netD0%URL Reputationsafe
                  http://www.founder.com.cn/cn/cThe0%URL Reputationsafe
                  http://www.founder.com.cn/cn/cThe0%URL Reputationsafe
                  http://www.founder.com.cn/cn/cThe0%URL Reputationsafe
                  http://www.galapagosdesign.com/staff/dennis.htm0%URL Reputationsafe
                  http://www.galapagosdesign.com/staff/dennis.htm0%URL Reputationsafe
                  http://www.galapagosdesign.com/staff/dennis.htm0%URL Reputationsafe
                  http://fontfabrik.com0%URL Reputationsafe
                  http://fontfabrik.com0%URL Reputationsafe
                  http://fontfabrik.com0%URL Reputationsafe
                  http://www.founder.com.cn/cn0%URL Reputationsafe
                  http://www.founder.com.cn/cn0%URL Reputationsafe
                  http://www.founder.com.cn/cn0%URL Reputationsafe
                  http://mail.vasudeva.in0%Avira URL Cloudsafe
                  http://www.jiyu-kobo.co.jp/0%URL Reputationsafe
                  http://www.jiyu-kobo.co.jp/0%URL Reputationsafe
                  http://www.jiyu-kobo.co.jp/0%URL Reputationsafe
                  http://vasudeva.in0%Avira URL Cloudsafe
                  http://www.galapagosdesign.com/DPlease0%URL Reputationsafe
                  http://www.galapagosdesign.com/DPlease0%URL Reputationsafe
                  http://www.galapagosdesign.com/DPlease0%URL Reputationsafe
                  https://5PX8nQFyXZqeL8oi.com40%Avira URL Cloudsafe
                  http://www.sandoll.co.kr0%URL Reputationsafe
                  http://www.sandoll.co.kr0%URL Reputationsafe
                  http://www.sandoll.co.kr0%URL Reputationsafe
                  http://www.urwpp.deDPlease0%URL Reputationsafe
                  http://www.urwpp.deDPlease0%URL Reputationsafe
                  http://www.urwpp.deDPlease0%URL Reputationsafe
                  http://www.zhongyicts.com.cn0%URL Reputationsafe
                  http://www.zhongyicts.com.cn0%URL Reputationsafe
                  http://www.zhongyicts.com.cn0%URL Reputationsafe
                  http://www.sakkal.com0%URL Reputationsafe
                  http://www.sakkal.com0%URL Reputationsafe
                  http://www.sakkal.com0%URL Reputationsafe
                  https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip0%URL Reputationsafe
                  https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip0%URL Reputationsafe
                  https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip0%URL Reputationsafe

                  Domains and IPs

                  Contacted Domains

                  NameIPActiveMaliciousAntivirus DetectionReputation
                  elb097307-934924932.us-east-1.elb.amazonaws.com
                  54.235.142.93
                  truefalse
                    high
                    vasudeva.in
                    68.233.236.158
                    truetrueunknown
                    mail.vasudeva.in
                    unknown
                    unknowntrueunknown
                    api.ipify.org
                    unknown
                    unknownfalse
                      high

                      URLs from Memory and Binaries

                      NameSourceMaliciousAntivirus DetectionReputation
                      https://api.ipify.org/ORDER.exe, 00000003.00000002.934090598.00000000034D1000.00000004.00000001.sdmpfalse
                        high
                        http://127.0.0.1:HTTP/1.1ORDER.exe, 00000003.00000002.934090598.00000000034D1000.00000004.00000001.sdmp, kprUEGC.exe, 0000000D.00000002.934897870.0000000002D91000.00000004.00000001.sdmp, kprUEGC.exe, 00000011.00000002.933961322.0000000002A81000.00000004.00000001.sdmpfalse
                        • Avira URL Cloud: safe
                        low
                        http://www.apache.org/licenses/LICENSE-2.0ORDER.exe, 00000000.00000002.689402690.0000000005A00000.00000002.00000001.sdmp, kprUEGC.exe, 0000000A.00000002.768443744.0000000005860000.00000002.00000001.sdmp, kprUEGC.exe, 0000000E.00000002.794248791.00000000056E0000.00000002.00000001.sdmpfalse
                          high
                          http://www.fontbureau.comORDER.exe, 00000000.00000002.685971628.00000000010E7000.00000004.00000040.sdmp, kprUEGC.exe, 0000000A.00000002.768443744.0000000005860000.00000002.00000001.sdmp, kprUEGC.exe, 0000000E.00000002.794248791.00000000056E0000.00000002.00000001.sdmpfalse
                            high
                            http://www.fontbureau.com/designersGORDER.exe, 00000000.00000002.689402690.0000000005A00000.00000002.00000001.sdmp, kprUEGC.exe, 0000000A.00000002.768443744.0000000005860000.00000002.00000001.sdmp, kprUEGC.exe, 0000000E.00000002.794248791.00000000056E0000.00000002.00000001.sdmpfalse
                              high
                              http://DynDns.comDynDNSkprUEGC.exe, 00000011.00000002.933961322.0000000002A81000.00000004.00000001.sdmpfalse
                              • URL Reputation: safe
                              • URL Reputation: safe
                              • URL Reputation: safe
                              • URL Reputation: safe
                              unknown
                              http://www.fontbureau.com/designers/?ORDER.exe, 00000000.00000002.689402690.0000000005A00000.00000002.00000001.sdmp, kprUEGC.exe, 0000000A.00000002.768443744.0000000005860000.00000002.00000001.sdmp, kprUEGC.exe, 0000000E.00000002.794248791.00000000056E0000.00000002.00000001.sdmpfalse
                                high
                                http://www.founder.com.cn/cn/bTheORDER.exe, 00000000.00000002.689402690.0000000005A00000.00000002.00000001.sdmp, kprUEGC.exe, 0000000A.00000002.768443744.0000000005860000.00000002.00000001.sdmp, kprUEGC.exe, 0000000E.00000002.794248791.00000000056E0000.00000002.00000001.sdmpfalse
                                • URL Reputation: safe
                                • URL Reputation: safe
                                • URL Reputation: safe
                                • URL Reputation: safe
                                unknown
                                https://5PX8nQFyXZqeL8oi.com853321935-2125563209-4053062332-1002_ClassesORDER.exe, 00000003.00000003.899825885.00000000015B4000.00000004.00000001.sdmpfalse
                                • Avira URL Cloud: safe
                                low
                                https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip%tordir%%haORDER.exe, 00000003.00000002.934090598.00000000034D1000.00000004.00000001.sdmp, kprUEGC.exe, 0000000D.00000002.934897870.0000000002D91000.00000004.00000001.sdmp, kprUEGC.exe, 00000011.00000002.933961322.0000000002A81000.00000004.00000001.sdmpfalse
                                • URL Reputation: safe
                                • URL Reputation: safe
                                • URL Reputation: safe
                                • URL Reputation: safe
                                unknown
                                http://RKhkfz.comkprUEGC.exe, 00000011.00000002.933961322.0000000002A81000.00000004.00000001.sdmpfalse
                                • Avira URL Cloud: safe
                                unknown
                                http://www.fontbureau.com/designers?ORDER.exe, 00000000.00000002.689402690.0000000005A00000.00000002.00000001.sdmp, kprUEGC.exe, 0000000A.00000002.768443744.0000000005860000.00000002.00000001.sdmp, kprUEGC.exe, 0000000E.00000002.794248791.00000000056E0000.00000002.00000001.sdmpfalse
                                  high
                                  http://www.tiro.comkprUEGC.exe, 0000000E.00000002.794248791.00000000056E0000.00000002.00000001.sdmpfalse
                                  • URL Reputation: safe
                                  • URL Reputation: safe
                                  • URL Reputation: safe
                                  unknown
                                  http://www.fontbureau.com/designerskprUEGC.exe, 0000000E.00000002.794248791.00000000056E0000.00000002.00000001.sdmpfalse
                                    high
                                    http://www.goodfont.co.krORDER.exe, 00000000.00000002.689402690.0000000005A00000.00000002.00000001.sdmp, kprUEGC.exe, 0000000A.00000002.768443744.0000000005860000.00000002.00000001.sdmp, kprUEGC.exe, 0000000E.00000002.794248791.00000000056E0000.00000002.00000001.sdmpfalse
                                    • URL Reputation: safe
                                    • URL Reputation: safe
                                    • URL Reputation: safe
                                    unknown
                                    http://www.fontbureau.comionaORDER.exe, 00000000.00000002.685971628.00000000010E7000.00000004.00000040.sdmpfalse
                                    • Avira URL Cloud: safe
                                    unknown
                                    http://www.carterandcone.comlORDER.exe, 00000000.00000002.689402690.0000000005A00000.00000002.00000001.sdmp, kprUEGC.exe, 0000000A.00000002.768443744.0000000005860000.00000002.00000001.sdmp, kprUEGC.exe, 0000000E.00000002.794248791.00000000056E0000.00000002.00000001.sdmpfalse
                                    • URL Reputation: safe
                                    • URL Reputation: safe
                                    • URL Reputation: safe
                                    unknown
                                    https://api.ipify.orgGETMozilla/5.0kprUEGC.exe, 00000011.00000002.933961322.0000000002A81000.00000004.00000001.sdmpfalse
                                    • URL Reputation: safe
                                    • URL Reputation: safe
                                    • URL Reputation: safe
                                    unknown
                                    http://www.sajatypeworks.comORDER.exe, 00000000.00000002.689402690.0000000005A00000.00000002.00000001.sdmp, kprUEGC.exe, 0000000A.00000002.768443744.0000000005860000.00000002.00000001.sdmp, kprUEGC.exe, 0000000E.00000002.794248791.00000000056E0000.00000002.00000001.sdmpfalse
                                    • URL Reputation: safe
                                    • URL Reputation: safe
                                    • URL Reputation: safe
                                    unknown
                                    https://5PX8nQFyXZqeL8oi.comORDER.exe, 00000003.00000002.934322832.0000000003526000.00000004.00000001.sdmptrue
                                    • Avira URL Cloud: safe
                                    unknown
                                    http://www.typography.netDORDER.exe, 00000000.00000002.689402690.0000000005A00000.00000002.00000001.sdmp, kprUEGC.exe, 0000000A.00000002.768443744.0000000005860000.00000002.00000001.sdmp, kprUEGC.exe, 0000000E.00000002.794248791.00000000056E0000.00000002.00000001.sdmpfalse
                                    • URL Reputation: safe
                                    • URL Reputation: safe
                                    • URL Reputation: safe
                                    unknown
                                    http://www.fontbureau.com/designers/cabarga.htmlNORDER.exe, 00000000.00000002.689402690.0000000005A00000.00000002.00000001.sdmp, kprUEGC.exe, 0000000A.00000002.768443744.0000000005860000.00000002.00000001.sdmp, kprUEGC.exe, 0000000E.00000002.794248791.00000000056E0000.00000002.00000001.sdmpfalse
                                      high
                                      http://www.founder.com.cn/cn/cTheORDER.exe, 00000000.00000002.689402690.0000000005A00000.00000002.00000001.sdmp, kprUEGC.exe, 0000000A.00000002.768443744.0000000005860000.00000002.00000001.sdmp, kprUEGC.exe, 0000000E.00000002.794248791.00000000056E0000.00000002.00000001.sdmpfalse
                                      • URL Reputation: safe
                                      • URL Reputation: safe
                                      • URL Reputation: safe
                                      unknown
                                      http://www.galapagosdesign.com/staff/dennis.htmORDER.exe, 00000000.00000002.689402690.0000000005A00000.00000002.00000001.sdmp, kprUEGC.exe, 0000000A.00000002.768443744.0000000005860000.00000002.00000001.sdmp, kprUEGC.exe, 0000000E.00000002.794248791.00000000056E0000.00000002.00000001.sdmpfalse
                                      • URL Reputation: safe
                                      • URL Reputation: safe
                                      • URL Reputation: safe
                                      unknown
                                      https://api.ipify.orgORDER.exe, 00000003.00000002.934090598.00000000034D1000.00000004.00000001.sdmpfalse
                                        high
                                        http://fontfabrik.comORDER.exe, 00000000.00000002.689402690.0000000005A00000.00000002.00000001.sdmp, kprUEGC.exe, 0000000A.00000002.768443744.0000000005860000.00000002.00000001.sdmp, kprUEGC.exe, 0000000E.00000002.794248791.00000000056E0000.00000002.00000001.sdmpfalse
                                        • URL Reputation: safe
                                        • URL Reputation: safe
                                        • URL Reputation: safe
                                        unknown
                                        http://www.founder.com.cn/cnORDER.exe, 00000000.00000002.689402690.0000000005A00000.00000002.00000001.sdmp, kprUEGC.exe, 0000000A.00000002.768443744.0000000005860000.00000002.00000001.sdmp, kprUEGC.exe, 0000000E.00000002.794248791.00000000056E0000.00000002.00000001.sdmpfalse
                                        • URL Reputation: safe
                                        • URL Reputation: safe
                                        • URL Reputation: safe
                                        unknown
                                        http://mail.vasudeva.inORDER.exe, 00000003.00000002.935479787.0000000003788000.00000004.00000001.sdmpfalse
                                        • Avira URL Cloud: safe
                                        unknown
                                        http://www.fontbureau.com/designers/frere-user.htmlORDER.exe, 00000000.00000002.689402690.0000000005A00000.00000002.00000001.sdmp, kprUEGC.exe, 0000000A.00000002.768443744.0000000005860000.00000002.00000001.sdmp, kprUEGC.exe, 0000000E.00000002.794248791.00000000056E0000.00000002.00000001.sdmpfalse
                                          high
                                          https://api.telegram.org/bot%telegramapi%/ORDER.exe, 00000000.00000002.687010442.0000000003C56000.00000004.00000001.sdmp, ORDER.exe, 00000003.00000002.930660789.0000000000402000.00000040.00000001.sdmp, kprUEGC.exe, 0000000A.00000002.765004740.0000000003825000.00000004.00000001.sdmp, kprUEGC.exe, 0000000D.00000002.930696018.0000000000402000.00000040.00000001.sdmp, kprUEGC.exe, 0000000E.00000002.789175486.00000000037D4000.00000004.00000001.sdmp, kprUEGC.exe, 00000011.00000002.930556707.0000000000402000.00000040.00000001.sdmpfalse
                                            high
                                            http://www.jiyu-kobo.co.jp/ORDER.exe, 00000000.00000002.689402690.0000000005A00000.00000002.00000001.sdmp, kprUEGC.exe, 0000000A.00000002.768443744.0000000005860000.00000002.00000001.sdmp, kprUEGC.exe, 0000000E.00000002.794248791.00000000056E0000.00000002.00000001.sdmpfalse
                                            • URL Reputation: safe
                                            • URL Reputation: safe
                                            • URL Reputation: safe
                                            unknown
                                            http://vasudeva.inORDER.exe, 00000003.00000002.935479787.0000000003788000.00000004.00000001.sdmpfalse
                                            • Avira URL Cloud: safe
                                            unknown
                                            http://www.galapagosdesign.com/DPleaseORDER.exe, 00000000.00000002.689402690.0000000005A00000.00000002.00000001.sdmp, kprUEGC.exe, 0000000A.00000002.768443744.0000000005860000.00000002.00000001.sdmp, kprUEGC.exe, 0000000E.00000002.794248791.00000000056E0000.00000002.00000001.sdmpfalse
                                            • URL Reputation: safe
                                            • URL Reputation: safe
                                            • URL Reputation: safe
                                            unknown
                                            http://www.fontbureau.com/designers8ORDER.exe, 00000000.00000002.689402690.0000000005A00000.00000002.00000001.sdmp, kprUEGC.exe, 0000000A.00000002.768443744.0000000005860000.00000002.00000001.sdmp, kprUEGC.exe, 0000000E.00000002.794248791.00000000056E0000.00000002.00000001.sdmpfalse
                                              high
                                              https://5PX8nQFyXZqeL8oi.com4ORDER.exe, 00000003.00000002.934322832.0000000003526000.00000004.00000001.sdmpfalse
                                              • Avira URL Cloud: safe
                                              unknown
                                              http://www.fonts.comORDER.exe, 00000000.00000002.689402690.0000000005A00000.00000002.00000001.sdmp, kprUEGC.exe, 0000000A.00000002.768443744.0000000005860000.00000002.00000001.sdmp, kprUEGC.exe, 0000000E.00000002.794248791.00000000056E0000.00000002.00000001.sdmpfalse
                                                high
                                                http://www.sandoll.co.krORDER.exe, 00000000.00000002.689402690.0000000005A00000.00000002.00000001.sdmp, kprUEGC.exe, 0000000A.00000002.768443744.0000000005860000.00000002.00000001.sdmp, kprUEGC.exe, 0000000E.00000002.794248791.00000000056E0000.00000002.00000001.sdmpfalse
                                                • URL Reputation: safe
                                                • URL Reputation: safe
                                                • URL Reputation: safe
                                                unknown
                                                http://www.urwpp.deDPleaseORDER.exe, 00000000.00000002.689402690.0000000005A00000.00000002.00000001.sdmp, kprUEGC.exe, 0000000A.00000002.768443744.0000000005860000.00000002.00000001.sdmp, kprUEGC.exe, 0000000E.00000002.794248791.00000000056E0000.00000002.00000001.sdmpfalse
                                                • URL Reputation: safe
                                                • URL Reputation: safe
                                                • URL Reputation: safe
                                                unknown
                                                http://www.zhongyicts.com.cnORDER.exe, 00000000.00000002.689402690.0000000005A00000.00000002.00000001.sdmp, kprUEGC.exe, 0000000A.00000002.768443744.0000000005860000.00000002.00000001.sdmp, kprUEGC.exe, 0000000E.00000002.794248791.00000000056E0000.00000002.00000001.sdmpfalse
                                                • URL Reputation: safe
                                                • URL Reputation: safe
                                                • URL Reputation: safe
                                                unknown
                                                http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameORDER.exe, 00000000.00000002.686353136.0000000002BFC000.00000004.00000001.sdmp, ORDER.exe, 00000003.00000002.934090598.00000000034D1000.00000004.00000001.sdmp, kprUEGC.exe, 0000000A.00000002.762688179.0000000002781000.00000004.00000001.sdmp, kprUEGC.exe, 0000000E.00000002.786151703.000000000277C000.00000004.00000001.sdmpfalse
                                                  high
                                                  http://www.sakkal.comORDER.exe, 00000000.00000002.689402690.0000000005A00000.00000002.00000001.sdmp, kprUEGC.exe, 0000000A.00000002.768443744.0000000005860000.00000002.00000001.sdmp, kprUEGC.exe, 0000000E.00000002.794248791.00000000056E0000.00000002.00000001.sdmpfalse
                                                  • URL Reputation: safe
                                                  • URL Reputation: safe
                                                  • URL Reputation: safe
                                                  unknown
                                                  https://secure.comodo.com/CPS0ORDER.exe, 00000003.00000002.934225034.000000000350B000.00000004.00000001.sdmpfalse
                                                    high
                                                    https://api.telegram.org/bot%telegramapi%/sendDocumentdocument---------------------------xORDER.exe, 00000003.00000002.934090598.00000000034D1000.00000004.00000001.sdmp, kprUEGC.exe, 0000000D.00000002.934897870.0000000002D91000.00000004.00000001.sdmp, kprUEGC.exe, 00000011.00000002.933961322.0000000002A81000.00000004.00000001.sdmpfalse
                                                      high
                                                      https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zipORDER.exe, 00000000.00000002.687010442.0000000003C56000.00000004.00000001.sdmp, ORDER.exe, 00000003.00000002.930660789.0000000000402000.00000040.00000001.sdmp, kprUEGC.exe, 0000000A.00000002.765004740.0000000003825000.00000004.00000001.sdmp, kprUEGC.exe, 0000000D.00000002.930696018.0000000000402000.00000040.00000001.sdmp, kprUEGC.exe, 0000000E.00000002.789175486.00000000037D4000.00000004.00000001.sdmp, kprUEGC.exe, 00000011.00000002.930556707.0000000000402000.00000040.00000001.sdmpfalse
                                                      • URL Reputation: safe
                                                      • URL Reputation: safe
                                                      • URL Reputation: safe
                                                      unknown

                                                      Contacted IPs

                                                      • No. of IPs < 25%
                                                      • 25% < No. of IPs < 50%
                                                      • 50% < No. of IPs < 75%
                                                      • 75% < No. of IPs

                                                      Public

                                                      IPDomainCountryFlagASNASN NameMalicious
                                                      54.235.142.93
                                                      unknownUnited States
                                                      14618AMAZON-AESUSfalse
                                                      68.233.236.158
                                                      unknownUnited States
                                                      29802HVC-ASUStrue

                                                      Private

                                                      IP
                                                      192.168.2.1

                                                      General Information

                                                      Joe Sandbox Version:31.0.0 Red Diamond
                                                      Analysis ID:321193
                                                      Start date:20.11.2020
                                                      Start time:15:34:21
                                                      Joe Sandbox Product:CloudBasic
                                                      Overall analysis duration:0h 13m 13s
                                                      Hypervisor based Inspection enabled:false
                                                      Report type:light
                                                      Sample file name:ORDER.exe
                                                      Cookbook file name:default.jbs
                                                      Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
                                                      Number of analysed new started processes analysed:22
                                                      Number of new started drivers analysed:0
                                                      Number of existing processes analysed:0
                                                      Number of existing drivers analysed:0
                                                      Number of injected processes analysed:0
                                                      Technologies:
                                                      • HCA enabled
                                                      • EGA enabled
                                                      • HDC enabled
                                                      • AMSI enabled
                                                      Analysis Mode:default
                                                      Analysis stop reason:Timeout
                                                      Detection:MAL
                                                      Classification:mal100.troj.adwa.spyw.evad.winEXE@18/11@4/3
                                                      EGA Information:Failed
                                                      HDC Information:Failed
                                                      HCA Information:
                                                      • Successful, ratio: 99%
                                                      • Number of executed functions: 0
                                                      • Number of non-executed functions: 0
                                                      Cookbook Comments:
                                                      • Adjust boot time
                                                      • Enable AMSI
                                                      • Found application associated with file extension: .exe
                                                      Warnings:
                                                      Show All
                                                      • Exclude process from analysis (whitelisted): BackgroundTransferHost.exe, backgroundTaskHost.exe, svchost.exe, wuapihost.exe
                                                      • Excluded IPs from analysis (whitelisted): 13.88.21.125, 52.147.198.201, 51.104.139.180, 52.155.217.156, 20.54.26.129, 92.122.213.247, 92.122.213.194
                                                      • Excluded domains from analysis (whitelisted): displaycatalog-europeeap.md.mp.microsoft.com.akadns.net, arc.msn.com.nsatc.net, db3p-ris-pf-prod-atm.trafficmanager.net, displaycatalog.md.mp.microsoft.com.akadns.net, ris-prod.trafficmanager.net, a1449.dscg2.akamai.net, arc.msn.com, skypedataprdcoleus16.cloudapp.net, db5eap.displaycatalog.md.mp.microsoft.com.akadns.net, ris.api.iris.microsoft.com, umwatsonrouting.trafficmanager.net, displaycatalog.mp.microsoft.com, watson.telemetry.microsoft.com, img-prod-cms-rt-microsoft-com.akamaized.net, skypedataprdcolwus15.cloudapp.net
                                                      • Report creation exceeded maximum time and may have missing disassembly code information.
                                                      • Report size exceeded maximum capacity and may have missing behavior information.
                                                      • Report size getting too big, too many NtAllocateVirtualMemory calls found.
                                                      • Report size getting too big, too many NtOpenKeyEx calls found.
                                                      • Report size getting too big, too many NtProtectVirtualMemory calls found.
                                                      • Report size getting too big, too many NtQueryValueKey calls found.

                                                      Simulations

                                                      Behavior and APIs

                                                      TimeTypeDescription
                                                      15:35:27API Interceptor783x Sleep call for process: ORDER.exe modified
                                                      15:35:52AutostartRun: HKCU\Software\Microsoft\Windows\CurrentVersion\Run kprUEGC C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exe
                                                      15:36:00AutostartRun: HKCU64\Software\Microsoft\Windows\CurrentVersion\Run kprUEGC C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exe
                                                      15:36:02API Interceptor920x Sleep call for process: kprUEGC.exe modified

                                                      Joe Sandbox View / Context

                                                      IPs

                                                      MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                                      54.235.142.93RVAgYSH2qh.exeGet hashmaliciousBrowse
                                                      • api.ipify.org/?format=xml
                                                      BUILDING ORDER_PROPERTY SPECS.exeGet hashmaliciousBrowse
                                                      • api.ipify.org/
                                                      1118_8732615.docGet hashmaliciousBrowse
                                                      • api.ipify.org/
                                                      XN33CLWH.EXEGet hashmaliciousBrowse
                                                      • api.ipify.org/
                                                      Al-Hbb_Doc-EUR_Pdf.exeGet hashmaliciousBrowse
                                                      • api.ipify.org/
                                                      YV2q4nAPVQ.exeGet hashmaliciousBrowse
                                                      • api.ipify.org/
                                                      1105_748543.docGet hashmaliciousBrowse
                                                      • api.ipify.org/
                                                      174028911-035110-sanlccjavap0004-1.exeGet hashmaliciousBrowse
                                                      • api.ipify.org/
                                                      RFQ-NOV-2020.exeGet hashmaliciousBrowse
                                                      • api.ipify.org/
                                                      OZmn6gKEgi.exeGet hashmaliciousBrowse
                                                      • api.ipify.org/
                                                      WFDKJ4wsQ6.exeGet hashmaliciousBrowse
                                                      • api.ipify.org/
                                                      68.233.236.158TT COPY.exeGet hashmaliciousBrowse
                                                        TT COPY.exeGet hashmaliciousBrowse
                                                          TT COPY.exeGet hashmaliciousBrowse
                                                            New order 20001789.exeGet hashmaliciousBrowse
                                                              ORD002344536.exeGet hashmaliciousBrowse
                                                                ORD002344536.exeGet hashmaliciousBrowse
                                                                  bank slip.exeGet hashmaliciousBrowse
                                                                    PO#ZT20-09.exeGet hashmaliciousBrowse

                                                                      Domains

                                                                      MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                                                      elb097307-934924932.us-east-1.elb.amazonaws.comBill # 2.xlsxGet hashmaliciousBrowse
                                                                      • 23.21.42.25
                                                                      PO1.xlsxGet hashmaliciousBrowse
                                                                      • 174.129.214.20
                                                                      a7UZzCVWKO.exeGet hashmaliciousBrowse
                                                                      • 54.204.14.42
                                                                      QKLQkaCe9M.exeGet hashmaliciousBrowse
                                                                      • 50.19.252.36
                                                                      sAPuJAvs52.exeGet hashmaliciousBrowse
                                                                      • 54.243.161.145
                                                                      JlgyVmPWZr.exeGet hashmaliciousBrowse
                                                                      • 174.129.214.20
                                                                      EIUOzWW2JX.exeGet hashmaliciousBrowse
                                                                      • 174.129.214.20
                                                                      RVAgYSH2qh.exeGet hashmaliciousBrowse
                                                                      • 54.235.142.93
                                                                      yCyc4rN0u8.exeGet hashmaliciousBrowse
                                                                      • 54.235.83.248
                                                                      9cXAnovmQX.exeGet hashmaliciousBrowse
                                                                      • 54.225.66.103
                                                                      T2HDck1Mmy.exeGet hashmaliciousBrowse
                                                                      • 54.235.142.93
                                                                      Purchase Order.exeGet hashmaliciousBrowse
                                                                      • 54.225.66.103
                                                                      Payment Advice Note from 19.11.2020.exeGet hashmaliciousBrowse
                                                                      • 23.21.126.66
                                                                      phy__1__31629__2649094674__1605642612.exeGet hashmaliciousBrowse
                                                                      • 23.21.126.66
                                                                      BBVA confirming Aviso de pago Eur5780201120.exeGet hashmaliciousBrowse
                                                                      • 54.204.14.42
                                                                      Ejgvvuwuu8.exeGet hashmaliciousBrowse
                                                                      • 54.225.169.28
                                                                      PO N0.1500243224._PDF.exeGet hashmaliciousBrowse
                                                                      • 54.204.14.42
                                                                      Avion Quotation Request.docGet hashmaliciousBrowse
                                                                      • 54.204.14.42
                                                                      zRHI9DJ0YKIPfBX.exeGet hashmaliciousBrowse
                                                                      • 54.235.182.194
                                                                      {REQUEST FOR QUOTATION-local lot.1,2,3,4,6container..exeGet hashmaliciousBrowse
                                                                      • 174.129.214.20

                                                                      ASN

                                                                      MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                                                      AMAZON-AESUShttp://s1022.t.en25.com/e/er?s=1022&lid=2184&elqTrackId=BEDFF87609C7D9DEAD041308DD8FFFB8&lb_email=bkirwer%40farbestfoods.com&elq=b095bd096fb54161953a2cf8316b5d13&elqaid=3115&elqat=1Get hashmaliciousBrowse
                                                                      • 52.1.99.77
                                                                      Bill # 2.xlsxGet hashmaliciousBrowse
                                                                      • 23.21.42.25
                                                                      https://ubereats.app.link/cwmLFZfMz5?%243p=a_custom_354088&%24deeplink_path=promo%2Fapply%3FpromoCode%3DRECONFORT7&%24desktop_url=tracking.spectrumemp.com/el?aid=8feeb968-bdd0-11e8-b27f-22000be0a14e&rid=50048635&pid=285843&cid=513&dest=overlordscan.com/cmV0by5tZXR6bGVyQGlzb2x1dGlvbnMuY2g=%23#kkowfocjoyuynaip#Get hashmaliciousBrowse
                                                                      • 35.170.181.205
                                                                      BANK ACCOUNT INFO!.exeGet hashmaliciousBrowse
                                                                      • 107.22.223.163
                                                                      PO1.xlsxGet hashmaliciousBrowse
                                                                      • 174.129.214.20
                                                                      https://rebrand.ly/zkp0yGet hashmaliciousBrowse
                                                                      • 54.227.164.140
                                                                      AccountStatements.htmlGet hashmaliciousBrowse
                                                                      • 18.209.113.162
                                                                      a7UZzCVWKO.exeGet hashmaliciousBrowse
                                                                      • 54.204.14.42
                                                                      QKLQkaCe9M.exeGet hashmaliciousBrowse
                                                                      • 50.19.252.36
                                                                      sAPuJAvs52.exeGet hashmaliciousBrowse
                                                                      • 54.243.161.145
                                                                      JlgyVmPWZr.exeGet hashmaliciousBrowse
                                                                      • 174.129.214.20
                                                                      EIUOzWW2JX.exeGet hashmaliciousBrowse
                                                                      • 174.129.214.20
                                                                      RVAgYSH2qh.exeGet hashmaliciousBrowse
                                                                      • 54.235.142.93
                                                                      yCyc4rN0u8.exeGet hashmaliciousBrowse
                                                                      • 54.235.83.248
                                                                      9cXAnovmQX.exeGet hashmaliciousBrowse
                                                                      • 54.225.66.103
                                                                      T2HDck1Mmy.exeGet hashmaliciousBrowse
                                                                      • 54.235.142.93
                                                                      Purchase Order 40,7045$.exeGet hashmaliciousBrowse
                                                                      • 52.71.133.130
                                                                      Payment Advice Note from 19.11.2020.exeGet hashmaliciousBrowse
                                                                      • 23.21.126.66
                                                                      phy__1__31629__2649094674__1605642612.exeGet hashmaliciousBrowse
                                                                      • 23.21.126.66
                                                                      BBVA confirming Aviso de pago Eur5780201120.exeGet hashmaliciousBrowse
                                                                      • 50.19.252.36
                                                                      HVC-ASUSa7UZzCVWKO.exeGet hashmaliciousBrowse
                                                                      • 194.126.175.2
                                                                      sAPuJAvs52.exeGet hashmaliciousBrowse
                                                                      • 194.126.175.2
                                                                      JlgyVmPWZr.exeGet hashmaliciousBrowse
                                                                      • 194.126.175.2
                                                                      EIUOzWW2JX.exeGet hashmaliciousBrowse
                                                                      • 194.126.175.2
                                                                      yCyc4rN0u8.exeGet hashmaliciousBrowse
                                                                      • 194.126.175.2
                                                                      9cXAnovmQX.exeGet hashmaliciousBrowse
                                                                      • 194.126.175.2
                                                                      T2HDck1Mmy.exeGet hashmaliciousBrowse
                                                                      • 194.126.175.2
                                                                      chib(1).exeGet hashmaliciousBrowse
                                                                      • 194.126.175.2
                                                                      dede.exeGet hashmaliciousBrowse
                                                                      • 194.126.175.2
                                                                      obi(1).exeGet hashmaliciousBrowse
                                                                      • 194.126.175.2
                                                                      frc(1).exeGet hashmaliciousBrowse
                                                                      • 194.126.175.2
                                                                      s5Hgh2z9mq.exeGet hashmaliciousBrowse
                                                                      • 194.126.175.2
                                                                      7PTbHgCUy6.exeGet hashmaliciousBrowse
                                                                      • 194.126.175.2
                                                                      DjP9Ogzsz8.exeGet hashmaliciousBrowse
                                                                      • 194.126.175.2
                                                                      NYm3MN6z8D.exeGet hashmaliciousBrowse
                                                                      • 194.126.175.2
                                                                      sX1UqYq8cS.exeGet hashmaliciousBrowse
                                                                      • 194.126.175.2
                                                                      noaVP0hNm2.exeGet hashmaliciousBrowse
                                                                      • 194.126.175.2
                                                                      Company profile and products.exeGet hashmaliciousBrowse
                                                                      • 103.28.70.59
                                                                      TT COPY.exeGet hashmaliciousBrowse
                                                                      • 68.233.236.158
                                                                      baf6b9fcec491619b45c1dd7db56ad3d.exeGet hashmaliciousBrowse
                                                                      • 104.156.57.155

                                                                      JA3 Fingerprints

                                                                      MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                                                      3b5074b1b5d032e5620f69f9f700ff0ea7UZzCVWKO.exeGet hashmaliciousBrowse
                                                                      • 54.235.142.93
                                                                      QKLQkaCe9M.exeGet hashmaliciousBrowse
                                                                      • 54.235.142.93
                                                                      sAPuJAvs52.exeGet hashmaliciousBrowse
                                                                      • 54.235.142.93
                                                                      JlgyVmPWZr.exeGet hashmaliciousBrowse
                                                                      • 54.235.142.93
                                                                      EIUOzWW2JX.exeGet hashmaliciousBrowse
                                                                      • 54.235.142.93
                                                                      yCyc4rN0u8.exeGet hashmaliciousBrowse
                                                                      • 54.235.142.93
                                                                      9cXAnovmQX.exeGet hashmaliciousBrowse
                                                                      • 54.235.142.93
                                                                      T2HDck1Mmy.exeGet hashmaliciousBrowse
                                                                      • 54.235.142.93
                                                                      Payment Advice Note from 19.11.2020.exeGet hashmaliciousBrowse
                                                                      • 54.235.142.93
                                                                      PO N0.1500243224._PDF.exeGet hashmaliciousBrowse
                                                                      • 54.235.142.93
                                                                      zRHI9DJ0YKIPfBX.exeGet hashmaliciousBrowse
                                                                      • 54.235.142.93
                                                                      chib(1).exeGet hashmaliciousBrowse
                                                                      • 54.235.142.93
                                                                      dede.exeGet hashmaliciousBrowse
                                                                      • 54.235.142.93
                                                                      obi(1).exeGet hashmaliciousBrowse
                                                                      • 54.235.142.93
                                                                      frc(1).exeGet hashmaliciousBrowse
                                                                      • 54.235.142.93
                                                                      knitted yarn documents.exeGet hashmaliciousBrowse
                                                                      • 54.235.142.93
                                                                      ano.exeGet hashmaliciousBrowse
                                                                      • 54.235.142.93
                                                                      kiiDjfpu2x.exeGet hashmaliciousBrowse
                                                                      • 54.235.142.93
                                                                      s5Hgh2z9mq.exeGet hashmaliciousBrowse
                                                                      • 54.235.142.93
                                                                      0hgHwEkIWY.exeGet hashmaliciousBrowse
                                                                      • 54.235.142.93

                                                                      Dropped Files

                                                                      No context

                                                                      Created / dropped Files

                                                                      C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\ORDER.exe.log
                                                                      Process:C:\Users\user\Desktop\ORDER.exe
                                                                      File Type:ASCII text, with CRLF line terminators
                                                                      Category:dropped
                                                                      Size (bytes):1301
                                                                      Entropy (8bit):5.345637324625647
                                                                      Encrypted:false
                                                                      SSDEEP:24:MLUE4K5E4Ks2E1qE4qXKDE4KhK3VZ9pKhPKIE4oKFKHKoZAE4Kzr7FE4VE4x84j:MIHK5HKXE1qHiYHKhQnoPtHoxHhAHKz5
                                                                      MD5:6C42AAF2F2FABAD2BAB70543AE48CEDB
                                                                      SHA1:8552031F83C078FE1C035191A32BA43261A63DA9
                                                                      SHA-256:51D07DD061EA9665DA070B95A4AC2AC17E20524E30BF6A0DA8381C2AF29CA967
                                                                      SHA-512:014E89857B811765EA7AA0B030AB04A2DA1957571608C4512EC7662F6A4DCE8B0409626624DABC96CBFF079E7F0F4A916E6F49C789E00B6E46AD37C36C806DCA
                                                                      Malicious:true
                                                                      Reputation:moderate, very likely benign file
                                                                      Preview: 1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\4f0a7eefa3cd3e0ba98b5ebddbbc72e6\System.ni.dll",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\f1d8480152e0da9a60ad49c6d16a3b6d\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\8d67d92724ba494b6c7fd089d6f25b48\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Xml\b219d4630d26b88041b59c21
                                                                      C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\kprUEGC.exe.log
                                                                      Process:C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exe
                                                                      File Type:ASCII text, with CRLF line terminators
                                                                      Category:dropped
                                                                      Size (bytes):1301
                                                                      Entropy (8bit):5.345637324625647
                                                                      Encrypted:false
                                                                      SSDEEP:24:MLUE4K5E4Ks2E1qE4qXKDE4KhK3VZ9pKhPKIE4oKFKHKoZAE4Kzr7FE4VE4x84j:MIHK5HKXE1qHiYHKhQnoPtHoxHhAHKz5
                                                                      MD5:6C42AAF2F2FABAD2BAB70543AE48CEDB
                                                                      SHA1:8552031F83C078FE1C035191A32BA43261A63DA9
                                                                      SHA-256:51D07DD061EA9665DA070B95A4AC2AC17E20524E30BF6A0DA8381C2AF29CA967
                                                                      SHA-512:014E89857B811765EA7AA0B030AB04A2DA1957571608C4512EC7662F6A4DCE8B0409626624DABC96CBFF079E7F0F4A916E6F49C789E00B6E46AD37C36C806DCA
                                                                      Malicious:false
                                                                      Reputation:moderate, very likely benign file
                                                                      Preview: 1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\4f0a7eefa3cd3e0ba98b5ebddbbc72e6\System.ni.dll",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\f1d8480152e0da9a60ad49c6d16a3b6d\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\8d67d92724ba494b6c7fd089d6f25b48\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Xml\b219d4630d26b88041b59c21
                                                                      C:\Users\user\AppData\Local\Temp\tmp871F.tmp
                                                                      Process:C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exe
                                                                      File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                                                      Category:dropped
                                                                      Size (bytes):1641
                                                                      Entropy (8bit):5.174942804027994
                                                                      Encrypted:false
                                                                      SSDEEP:24:2dH4+SEqC/S7hblNMFp//rlMhEMjnGpwjpIgUYODOLD9RJh7h8gKBG7tn:cbhK79lNQR/rydbz9I3YODOLNdq3m
                                                                      MD5:4053FC2B2E317FEBE143C11AD6E6F358
                                                                      SHA1:DC51CAEB255C2B5B980BDF25571F19DAFDC70807
                                                                      SHA-256:83FD4AE9CEE6A842DCF3CC995E74DA61AC503DCDC5AC60F78F38F18F544A8124
                                                                      SHA-512:A709BADFDBDE6EEB537670A7947DD436758D01FECBDF2343588D6EBAEF5124BCCE486B53A76C5BDCE413DA80D1B934B0B1EA33A7C1F80E6F94AA9A9110030326
                                                                      Malicious:false
                                                                      Reputation:low
                                                                      Preview: <?xml version="1.0" encoding="UTF-16"?>..<Task version="1.2" xmlns="http://schemas.microsoft.com/windows/2004/02/mit/task">.. <RegistrationInfo>.. <Date>2014-10-25T14:27:44.8929027</Date>.. <Author>computer\user</Author>.. </RegistrationInfo>.. <Triggers>.. <LogonTrigger>.. <Enabled>true</Enabled>.. <UserId>computer\user</UserId>.. </LogonTrigger>.. <RegistrationTrigger>.. <Enabled>false</Enabled>.. </RegistrationTrigger>.. </Triggers>.. <Principals>.. <Principal id="Author">.. <UserId>computer\user</UserId>.. <LogonType>InteractiveToken</LogonType>.. <RunLevel>LeastPrivilege</RunLevel>.. </Principal>.. </Principals>.. <Settings>.. <MultipleInstancesPolicy>StopExisting</MultipleInstancesPolicy>.. <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>.. <StopIfGoingOnBatteries>true</StopIfGoingOnBatteries>.. <AllowHardTerminate>false</AllowHardTerminate>.. <StartWhenAvailable>true
                                                                      C:\Users\user\AppData\Local\Temp\tmpAEAC.tmp
                                                                      Process:C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exe
                                                                      File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                                                      Category:dropped
                                                                      Size (bytes):1641
                                                                      Entropy (8bit):5.174942804027994
                                                                      Encrypted:false
                                                                      SSDEEP:24:2dH4+SEqC/S7hblNMFp//rlMhEMjnGpwjpIgUYODOLD9RJh7h8gKBG7tn:cbhK79lNQR/rydbz9I3YODOLNdq3m
                                                                      MD5:4053FC2B2E317FEBE143C11AD6E6F358
                                                                      SHA1:DC51CAEB255C2B5B980BDF25571F19DAFDC70807
                                                                      SHA-256:83FD4AE9CEE6A842DCF3CC995E74DA61AC503DCDC5AC60F78F38F18F544A8124
                                                                      SHA-512:A709BADFDBDE6EEB537670A7947DD436758D01FECBDF2343588D6EBAEF5124BCCE486B53A76C5BDCE413DA80D1B934B0B1EA33A7C1F80E6F94AA9A9110030326
                                                                      Malicious:false
                                                                      Reputation:low
                                                                      Preview: <?xml version="1.0" encoding="UTF-16"?>..<Task version="1.2" xmlns="http://schemas.microsoft.com/windows/2004/02/mit/task">.. <RegistrationInfo>.. <Date>2014-10-25T14:27:44.8929027</Date>.. <Author>computer\user</Author>.. </RegistrationInfo>.. <Triggers>.. <LogonTrigger>.. <Enabled>true</Enabled>.. <UserId>computer\user</UserId>.. </LogonTrigger>.. <RegistrationTrigger>.. <Enabled>false</Enabled>.. </RegistrationTrigger>.. </Triggers>.. <Principals>.. <Principal id="Author">.. <UserId>computer\user</UserId>.. <LogonType>InteractiveToken</LogonType>.. <RunLevel>LeastPrivilege</RunLevel>.. </Principal>.. </Principals>.. <Settings>.. <MultipleInstancesPolicy>StopExisting</MultipleInstancesPolicy>.. <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>.. <StopIfGoingOnBatteries>true</StopIfGoingOnBatteries>.. <AllowHardTerminate>false</AllowHardTerminate>.. <StartWhenAvailable>true
                                                                      C:\Users\user\AppData\Local\Temp\tmpFCB1.tmp
                                                                      Process:C:\Users\user\Desktop\ORDER.exe
                                                                      File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                                                      Category:dropped
                                                                      Size (bytes):1641
                                                                      Entropy (8bit):5.174942804027994
                                                                      Encrypted:false
                                                                      SSDEEP:24:2dH4+SEqC/S7hblNMFp//rlMhEMjnGpwjpIgUYODOLD9RJh7h8gKBG7tn:cbhK79lNQR/rydbz9I3YODOLNdq3m
                                                                      MD5:4053FC2B2E317FEBE143C11AD6E6F358
                                                                      SHA1:DC51CAEB255C2B5B980BDF25571F19DAFDC70807
                                                                      SHA-256:83FD4AE9CEE6A842DCF3CC995E74DA61AC503DCDC5AC60F78F38F18F544A8124
                                                                      SHA-512:A709BADFDBDE6EEB537670A7947DD436758D01FECBDF2343588D6EBAEF5124BCCE486B53A76C5BDCE413DA80D1B934B0B1EA33A7C1F80E6F94AA9A9110030326
                                                                      Malicious:true
                                                                      Reputation:low
                                                                      Preview: <?xml version="1.0" encoding="UTF-16"?>..<Task version="1.2" xmlns="http://schemas.microsoft.com/windows/2004/02/mit/task">.. <RegistrationInfo>.. <Date>2014-10-25T14:27:44.8929027</Date>.. <Author>computer\user</Author>.. </RegistrationInfo>.. <Triggers>.. <LogonTrigger>.. <Enabled>true</Enabled>.. <UserId>computer\user</UserId>.. </LogonTrigger>.. <RegistrationTrigger>.. <Enabled>false</Enabled>.. </RegistrationTrigger>.. </Triggers>.. <Principals>.. <Principal id="Author">.. <UserId>computer\user</UserId>.. <LogonType>InteractiveToken</LogonType>.. <RunLevel>LeastPrivilege</RunLevel>.. </Principal>.. </Principals>.. <Settings>.. <MultipleInstancesPolicy>StopExisting</MultipleInstancesPolicy>.. <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>.. <StopIfGoingOnBatteries>true</StopIfGoingOnBatteries>.. <AllowHardTerminate>false</AllowHardTerminate>.. <StartWhenAvailable>true
                                                                      C:\Users\user\AppData\Roaming\SpHLicuA.exe
                                                                      Process:C:\Users\user\Desktop\ORDER.exe
                                                                      File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                      Category:dropped
                                                                      Size (bytes):467968
                                                                      Entropy (8bit):7.74232130024318
                                                                      Encrypted:false
                                                                      SSDEEP:12288:Tt8LFePtVDcvShCStzi4bZ2krC5F0uCC:J84PLUT8JDBM
                                                                      MD5:BB942C948639F5C88FB33D5E4B7D7728
                                                                      SHA1:3CF9D798266AACC9BFDAF1C2D0A5EDA2B6D069EA
                                                                      SHA-256:5CFD185A582C4A6811966FB1585769FA8C17D67A969C72E1135F8DE537D106D4
                                                                      SHA-512:386C643398F8BB3D6F46319964EF320B9F79003765BE184699DEE8582D974F658A47F4D72D04280F376D9F3B5637E9876A1183B6350B2350D372E234C09FA719
                                                                      Malicious:true
                                                                      Antivirus:
                                                                      • Antivirus: Avira, Detection: 100%
                                                                      • Antivirus: Joe Sandbox ML, Detection: 100%
                                                                      • Antivirus: ReversingLabs, Detection: 67%
                                                                      Reputation:low
                                                                      Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...._..............0..............8... ...@....@.. ....................................@.................................X8..O....@.......................`....................................................... ............... ..H............text........ ...................... ..`.rsrc........@......................@..@.reloc.......`......."..............@..B.................8......H........Y...C......o...................................................B.(........}....*....0..!.........{....r...p.|....(....(.....+..*....0..<.............6...%..*.o.......o.......+.......o........X.........-....o...........,..r...p(....&...8..........(....}.......&.r?..p(....&.............(....}.......&.ro..p(....&...........}.....{....r...p(........,..r...p(....&...+X....}.....{....r...p(........,..r...p(....&...+(......(....}.......&.r...p(....&......+...*.(....b..t..
                                                                      C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exe
                                                                      Process:C:\Users\user\Desktop\ORDER.exe
                                                                      File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                      Category:dropped
                                                                      Size (bytes):467968
                                                                      Entropy (8bit):7.74232130024318
                                                                      Encrypted:false
                                                                      SSDEEP:12288:Tt8LFePtVDcvShCStzi4bZ2krC5F0uCC:J84PLUT8JDBM
                                                                      MD5:BB942C948639F5C88FB33D5E4B7D7728
                                                                      SHA1:3CF9D798266AACC9BFDAF1C2D0A5EDA2B6D069EA
                                                                      SHA-256:5CFD185A582C4A6811966FB1585769FA8C17D67A969C72E1135F8DE537D106D4
                                                                      SHA-512:386C643398F8BB3D6F46319964EF320B9F79003765BE184699DEE8582D974F658A47F4D72D04280F376D9F3B5637E9876A1183B6350B2350D372E234C09FA719
                                                                      Malicious:true
                                                                      Antivirus:
                                                                      • Antivirus: Avira, Detection: 100%
                                                                      • Antivirus: Joe Sandbox ML, Detection: 100%
                                                                      • Antivirus: ReversingLabs, Detection: 67%
                                                                      Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...._..............0..............8... ...@....@.. ....................................@.................................X8..O....@.......................`....................................................... ............... ..H............text........ ...................... ..`.rsrc........@......................@..@.reloc.......`......."..............@..B.................8......H........Y...C......o...................................................B.(........}....*....0..!.........{....r...p.|....(....(.....+..*....0..<.............6...%..*.o.......o.......+.......o........X.........-....o...........,..r...p(....&...8..........(....}.......&.r?..p(....&.............(....}.......&.ro..p(....&...........}.....{....r...p(........,..r...p(....&...+X....}.....{....r...p(........,..r...p(....&...+(......(....}.......&.r...p(....&......+...*.(....b..t..
                                                                      C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exe:Zone.Identifier
                                                                      Process:C:\Users\user\Desktop\ORDER.exe
                                                                      File Type:ASCII text, with CRLF line terminators
                                                                      Category:dropped
                                                                      Size (bytes):26
                                                                      Entropy (8bit):3.95006375643621
                                                                      Encrypted:false
                                                                      SSDEEP:3:ggPYV:rPYV
                                                                      MD5:187F488E27DB4AF347237FE461A079AD
                                                                      SHA1:6693BA299EC1881249D59262276A0D2CB21F8E64
                                                                      SHA-256:255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309
                                                                      SHA-512:89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E
                                                                      Malicious:true
                                                                      Preview: [ZoneTransfer]....ZoneId=0
                                                                      C:\Windows\System32\drivers\etc\hosts
                                                                      Process:C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exe
                                                                      File Type:ASCII text, with CRLF line terminators
                                                                      Category:modified
                                                                      Size (bytes):11
                                                                      Entropy (8bit):2.663532754804255
                                                                      Encrypted:false
                                                                      SSDEEP:3:iLE:iLE
                                                                      MD5:B24D295C1F84ECBFB566103374FB91C5
                                                                      SHA1:6A750D3F8B45C240637332071D34B403FA1FF55A
                                                                      SHA-256:4DC7B65075FBC5B5421551F0CB814CAFDC8CACA5957D393C222EE388B6F405F4
                                                                      SHA-512:9BE279BFA70A859608B50EF5D30BF2345F334E5F433C410EA6A188DCAB395BFF50C95B165177E59A29261464871C11F903A9ECE55B2D900FE49A9F3C49EB88FA
                                                                      Malicious:true
                                                                      Preview: ..127.0.0.1

                                                                      Static File Info

                                                                      General

                                                                      File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                      Entropy (8bit):7.74232130024318
                                                                      TrID:
                                                                      • Win32 Executable (generic) Net Framework (10011505/4) 49.80%
                                                                      • Win32 Executable (generic) a (10002005/4) 49.75%
                                                                      • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                                                                      • Windows Screen Saver (13104/52) 0.07%
                                                                      • Generic Win/DOS Executable (2004/3) 0.01%
                                                                      File name:ORDER.exe
                                                                      File size:467968
                                                                      MD5:bb942c948639f5c88fb33d5e4b7d7728
                                                                      SHA1:3cf9d798266aacc9bfdaf1c2d0a5eda2b6d069ea
                                                                      SHA256:5cfd185a582c4a6811966fb1585769fa8c17d67a969c72e1135f8de537d106d4
                                                                      SHA512:386c643398f8bb3d6f46319964ef320b9f79003765be184699dee8582d974f658a47f4d72d04280f376d9f3b5637e9876a1183b6350b2350d372e234c09fa719
                                                                      SSDEEP:12288:Tt8LFePtVDcvShCStzi4bZ2krC5F0uCC:J84PLUT8JDBM
                                                                      File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L......_..............0..............8... ...@....@.. ....................................@................................

                                                                      File Icon

                                                                      Icon Hash:00828e8e8686b000

                                                                      Static PE Info

                                                                      General

                                                                      Entrypoint:0x4738aa
                                                                      Entrypoint Section:.text
                                                                      Digitally signed:false
                                                                      Imagebase:0x400000
                                                                      Subsystem:windows gui
                                                                      Image File Characteristics:32BIT_MACHINE, EXECUTABLE_IMAGE
                                                                      DLL Characteristics:NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
                                                                      Time Stamp:0x5FB59CF1 [Wed Nov 18 22:15:13 2020 UTC]
                                                                      TLS Callbacks:
                                                                      CLR (.Net) Version:v4.0.30319
                                                                      OS Version Major:4
                                                                      OS Version Minor:0
                                                                      File Version Major:4
                                                                      File Version Minor:0
                                                                      Subsystem Version Major:4
                                                                      Subsystem Version Minor:0
                                                                      Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744

                                                                      Entrypoint Preview

                                                                      Instruction
                                                                      jmp dword ptr [00402000h]
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al

                                                                      Data Directories

                                                                      NameVirtual AddressVirtual Size Is in Section
                                                                      IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                                      IMAGE_DIRECTORY_ENTRY_IMPORT0x738580x4f.text
                                                                      IMAGE_DIRECTORY_ENTRY_RESOURCE0x740000x5ec.rsrc
                                                                      IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                                      IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                                      IMAGE_DIRECTORY_ENTRY_BASERELOC0x760000xc.reloc
                                                                      IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                                                      IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                                      IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                                      IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                                      IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                                      IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                                      IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                                                                      IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                                      IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                                                                      IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0

                                                                      Sections

                                                                      NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                                      .text0x20000x718b00x71a00False0.858554214796PGP symmetric key encrypted data - Plaintext or unencrypted data7.74988411895IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                                                                      .rsrc0x740000x5ec0x600False0.434895833333data4.19215691018IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                      .reloc0x760000xc0x200False0.044921875data0.101910425663IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ

                                                                      Resources

                                                                      NameRVASizeTypeLanguageCountry
                                                                      RT_VERSION0x740900x35cdata
                                                                      RT_MANIFEST0x743fc0x1eaXML 1.0 document, UTF-8 Unicode (with BOM) text, with CRLF line terminators

                                                                      Imports

                                                                      DLLImport
                                                                      mscoree.dll_CorExeMain

                                                                      Version Infos

                                                                      DescriptionData
                                                                      Translation0x0000 0x04b0
                                                                      LegalCopyrightCopyright Microsoft 2017 - 2020
                                                                      Assembly Version1.0.0.0
                                                                      InternalNameN.exe
                                                                      FileVersion1.0.0.0
                                                                      CompanyNameMicrosoft
                                                                      LegalTrademarks
                                                                      Comments
                                                                      ProductNameMonopoly Simulator
                                                                      ProductVersion1.0.0.0
                                                                      FileDescriptionMonopoly Simulator
                                                                      OriginalFilenameN.exe

                                                                      Network Behavior

                                                                      Snort IDS Alerts

                                                                      TimestampProtocolSIDMessageSource PortDest PortSource IPDest IP
                                                                      11/20/20-15:37:14.072742TCP2030171ET TROJAN AgentTesla Exfil Via SMTP49766587192.168.2.468.233.236.158

                                                                      Network Port Distribution

                                                                      TCP Packets

                                                                      TimestampSource PortDest PortSource IPDest IP
                                                                      Nov 20, 2020 15:37:00.175952911 CET49765443192.168.2.454.235.142.93
                                                                      Nov 20, 2020 15:37:00.278529882 CET4434976554.235.142.93192.168.2.4
                                                                      Nov 20, 2020 15:37:00.278748989 CET49765443192.168.2.454.235.142.93
                                                                      Nov 20, 2020 15:37:00.363682032 CET49765443192.168.2.454.235.142.93
                                                                      Nov 20, 2020 15:37:00.466259003 CET4434976554.235.142.93192.168.2.4
                                                                      Nov 20, 2020 15:37:00.466310978 CET4434976554.235.142.93192.168.2.4
                                                                      Nov 20, 2020 15:37:00.466362000 CET4434976554.235.142.93192.168.2.4
                                                                      Nov 20, 2020 15:37:00.466402054 CET4434976554.235.142.93192.168.2.4
                                                                      Nov 20, 2020 15:37:00.466428995 CET4434976554.235.142.93192.168.2.4
                                                                      Nov 20, 2020 15:37:00.466450930 CET49765443192.168.2.454.235.142.93
                                                                      Nov 20, 2020 15:37:00.466489077 CET49765443192.168.2.454.235.142.93
                                                                      Nov 20, 2020 15:37:00.467485905 CET4434976554.235.142.93192.168.2.4
                                                                      Nov 20, 2020 15:37:00.515758991 CET49765443192.168.2.454.235.142.93
                                                                      Nov 20, 2020 15:37:00.618624926 CET4434976554.235.142.93192.168.2.4
                                                                      Nov 20, 2020 15:37:00.662503958 CET49765443192.168.2.454.235.142.93
                                                                      Nov 20, 2020 15:37:00.964855909 CET49765443192.168.2.454.235.142.93
                                                                      Nov 20, 2020 15:37:01.073878050 CET4434976554.235.142.93192.168.2.4
                                                                      Nov 20, 2020 15:37:01.115556002 CET49765443192.168.2.454.235.142.93
                                                                      Nov 20, 2020 15:37:12.682447910 CET49766587192.168.2.468.233.236.158
                                                                      Nov 20, 2020 15:37:12.826040983 CET5874976668.233.236.158192.168.2.4
                                                                      Nov 20, 2020 15:37:12.826261044 CET49766587192.168.2.468.233.236.158
                                                                      Nov 20, 2020 15:37:13.155530930 CET5874976668.233.236.158192.168.2.4
                                                                      Nov 20, 2020 15:37:13.156238079 CET49766587192.168.2.468.233.236.158
                                                                      Nov 20, 2020 15:37:13.299855947 CET5874976668.233.236.158192.168.2.4
                                                                      Nov 20, 2020 15:37:13.301517963 CET49766587192.168.2.468.233.236.158
                                                                      Nov 20, 2020 15:37:13.445301056 CET5874976668.233.236.158192.168.2.4
                                                                      Nov 20, 2020 15:37:13.445930004 CET49766587192.168.2.468.233.236.158
                                                                      Nov 20, 2020 15:37:13.609587908 CET5874976668.233.236.158192.168.2.4
                                                                      Nov 20, 2020 15:37:13.610651970 CET49766587192.168.2.468.233.236.158
                                                                      Nov 20, 2020 15:37:13.754324913 CET5874976668.233.236.158192.168.2.4
                                                                      Nov 20, 2020 15:37:13.768420935 CET49766587192.168.2.468.233.236.158
                                                                      Nov 20, 2020 15:37:13.921685934 CET5874976668.233.236.158192.168.2.4
                                                                      Nov 20, 2020 15:37:13.922374964 CET49766587192.168.2.468.233.236.158
                                                                      Nov 20, 2020 15:37:14.066087961 CET5874976668.233.236.158192.168.2.4
                                                                      Nov 20, 2020 15:37:14.066122055 CET5874976668.233.236.158192.168.2.4
                                                                      Nov 20, 2020 15:37:14.072741985 CET49766587192.168.2.468.233.236.158
                                                                      Nov 20, 2020 15:37:14.072946072 CET49766587192.168.2.468.233.236.158
                                                                      Nov 20, 2020 15:37:14.073107004 CET49766587192.168.2.468.233.236.158
                                                                      Nov 20, 2020 15:37:14.073297977 CET49766587192.168.2.468.233.236.158
                                                                      Nov 20, 2020 15:37:14.216444969 CET5874976668.233.236.158192.168.2.4
                                                                      Nov 20, 2020 15:37:14.216491938 CET5874976668.233.236.158192.168.2.4
                                                                      Nov 20, 2020 15:37:14.218482018 CET5874976668.233.236.158192.168.2.4
                                                                      Nov 20, 2020 15:37:14.272945881 CET49766587192.168.2.468.233.236.158

                                                                      UDP Packets

                                                                      TimestampSource PortDest PortSource IPDest IP
                                                                      Nov 20, 2020 15:35:12.914658070 CET5299153192.168.2.48.8.8.8
                                                                      Nov 20, 2020 15:35:12.941885948 CET53529918.8.8.8192.168.2.4
                                                                      Nov 20, 2020 15:35:14.616111040 CET5370053192.168.2.48.8.8.8
                                                                      Nov 20, 2020 15:35:14.643402100 CET53537008.8.8.8192.168.2.4
                                                                      Nov 20, 2020 15:35:15.490892887 CET5172653192.168.2.48.8.8.8
                                                                      Nov 20, 2020 15:35:15.518047094 CET53517268.8.8.8192.168.2.4
                                                                      Nov 20, 2020 15:35:16.164829969 CET5679453192.168.2.48.8.8.8
                                                                      Nov 20, 2020 15:35:16.191960096 CET53567948.8.8.8192.168.2.4
                                                                      Nov 20, 2020 15:35:17.527013063 CET5653453192.168.2.48.8.8.8
                                                                      Nov 20, 2020 15:35:17.554275036 CET53565348.8.8.8192.168.2.4
                                                                      Nov 20, 2020 15:35:18.575421095 CET5662753192.168.2.48.8.8.8
                                                                      Nov 20, 2020 15:35:18.602494001 CET53566278.8.8.8192.168.2.4
                                                                      Nov 20, 2020 15:35:19.795495033 CET5662153192.168.2.48.8.8.8
                                                                      Nov 20, 2020 15:35:19.822566032 CET53566218.8.8.8192.168.2.4
                                                                      Nov 20, 2020 15:35:20.542124987 CET6311653192.168.2.48.8.8.8
                                                                      Nov 20, 2020 15:35:20.569293976 CET53631168.8.8.8192.168.2.4
                                                                      Nov 20, 2020 15:35:21.194839001 CET6407853192.168.2.48.8.8.8
                                                                      Nov 20, 2020 15:35:21.221848011 CET53640788.8.8.8192.168.2.4
                                                                      Nov 20, 2020 15:35:21.877516031 CET6480153192.168.2.48.8.8.8
                                                                      Nov 20, 2020 15:35:21.904726982 CET53648018.8.8.8192.168.2.4
                                                                      Nov 20, 2020 15:35:22.630449057 CET6172153192.168.2.48.8.8.8
                                                                      Nov 20, 2020 15:35:22.666033983 CET53617218.8.8.8192.168.2.4
                                                                      Nov 20, 2020 15:35:23.313229084 CET5125553192.168.2.48.8.8.8
                                                                      Nov 20, 2020 15:35:23.348787069 CET53512558.8.8.8192.168.2.4
                                                                      Nov 20, 2020 15:35:37.904980898 CET6152253192.168.2.48.8.8.8
                                                                      Nov 20, 2020 15:35:37.932054996 CET53615228.8.8.8192.168.2.4
                                                                      Nov 20, 2020 15:35:56.967084885 CET5233753192.168.2.48.8.8.8
                                                                      Nov 20, 2020 15:35:57.010198116 CET53523378.8.8.8192.168.2.4
                                                                      Nov 20, 2020 15:35:57.842834949 CET5504653192.168.2.48.8.8.8
                                                                      Nov 20, 2020 15:35:57.869908094 CET53550468.8.8.8192.168.2.4
                                                                      Nov 20, 2020 15:35:58.396017075 CET4961253192.168.2.48.8.8.8
                                                                      Nov 20, 2020 15:35:58.461549997 CET53496128.8.8.8192.168.2.4
                                                                      Nov 20, 2020 15:35:58.770025015 CET4928553192.168.2.48.8.8.8
                                                                      Nov 20, 2020 15:35:58.805774927 CET53492858.8.8.8192.168.2.4
                                                                      Nov 20, 2020 15:35:59.287940025 CET5060153192.168.2.48.8.8.8
                                                                      Nov 20, 2020 15:35:59.315059900 CET53506018.8.8.8192.168.2.4
                                                                      Nov 20, 2020 15:35:59.802416086 CET6087553192.168.2.48.8.8.8
                                                                      Nov 20, 2020 15:35:59.838213921 CET53608758.8.8.8192.168.2.4
                                                                      Nov 20, 2020 15:36:00.278412104 CET5644853192.168.2.48.8.8.8
                                                                      Nov 20, 2020 15:36:00.305439949 CET53564488.8.8.8192.168.2.4
                                                                      Nov 20, 2020 15:36:01.149400949 CET5917253192.168.2.48.8.8.8
                                                                      Nov 20, 2020 15:36:01.176583052 CET53591728.8.8.8192.168.2.4
                                                                      Nov 20, 2020 15:36:01.721554041 CET6242053192.168.2.48.8.8.8
                                                                      Nov 20, 2020 15:36:01.757261038 CET53624208.8.8.8192.168.2.4
                                                                      Nov 20, 2020 15:36:02.574343920 CET6057953192.168.2.48.8.8.8
                                                                      Nov 20, 2020 15:36:02.609684944 CET53605798.8.8.8192.168.2.4
                                                                      Nov 20, 2020 15:36:02.961649895 CET5018353192.168.2.48.8.8.8
                                                                      Nov 20, 2020 15:36:02.997490883 CET53501838.8.8.8192.168.2.4
                                                                      Nov 20, 2020 15:36:16.322583914 CET6153153192.168.2.48.8.8.8
                                                                      Nov 20, 2020 15:36:16.359389067 CET53615318.8.8.8192.168.2.4
                                                                      Nov 20, 2020 15:36:48.597218037 CET4922853192.168.2.48.8.8.8
                                                                      Nov 20, 2020 15:36:48.624423027 CET53492288.8.8.8192.168.2.4
                                                                      Nov 20, 2020 15:36:50.580859900 CET5979453192.168.2.48.8.8.8
                                                                      Nov 20, 2020 15:36:50.607964039 CET53597948.8.8.8192.168.2.4
                                                                      Nov 20, 2020 15:36:59.958941936 CET5591653192.168.2.48.8.8.8
                                                                      Nov 20, 2020 15:36:59.986032963 CET53559168.8.8.8192.168.2.4
                                                                      Nov 20, 2020 15:37:00.023001909 CET5275253192.168.2.48.8.8.8
                                                                      Nov 20, 2020 15:37:00.050034046 CET53527528.8.8.8192.168.2.4
                                                                      Nov 20, 2020 15:37:12.547585011 CET6054253192.168.2.48.8.8.8
                                                                      Nov 20, 2020 15:37:12.617464066 CET53605428.8.8.8192.168.2.4
                                                                      Nov 20, 2020 15:37:12.643642902 CET6068953192.168.2.48.8.8.8
                                                                      Nov 20, 2020 15:37:12.679339886 CET53606898.8.8.8192.168.2.4

                                                                      DNS Queries

                                                                      TimestampSource IPDest IPTrans IDOP CodeNameTypeClass
                                                                      Nov 20, 2020 15:36:59.958941936 CET192.168.2.48.8.8.80xcd07Standard query (0)api.ipify.orgA (IP address)IN (0x0001)
                                                                      Nov 20, 2020 15:37:00.023001909 CET192.168.2.48.8.8.80xfe5dStandard query (0)api.ipify.orgA (IP address)IN (0x0001)
                                                                      Nov 20, 2020 15:37:12.547585011 CET192.168.2.48.8.8.80x1baaStandard query (0)mail.vasudeva.inA (IP address)IN (0x0001)
                                                                      Nov 20, 2020 15:37:12.643642902 CET192.168.2.48.8.8.80x76f8Standard query (0)mail.vasudeva.inA (IP address)IN (0x0001)

                                                                      DNS Answers

                                                                      TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClass
                                                                      Nov 20, 2020 15:36:59.986032963 CET8.8.8.8192.168.2.40xcd07No error (0)api.ipify.orgnagano-19599.herokussl.comCNAME (Canonical name)IN (0x0001)
                                                                      Nov 20, 2020 15:36:59.986032963 CET8.8.8.8192.168.2.40xcd07No error (0)nagano-19599.herokussl.comelb097307-934924932.us-east-1.elb.amazonaws.comCNAME (Canonical name)IN (0x0001)
                                                                      Nov 20, 2020 15:36:59.986032963 CET8.8.8.8192.168.2.40xcd07No error (0)elb097307-934924932.us-east-1.elb.amazonaws.com54.235.142.93A (IP address)IN (0x0001)
                                                                      Nov 20, 2020 15:36:59.986032963 CET8.8.8.8192.168.2.40xcd07No error (0)elb097307-934924932.us-east-1.elb.amazonaws.com54.243.161.145A (IP address)IN (0x0001)
                                                                      Nov 20, 2020 15:36:59.986032963 CET8.8.8.8192.168.2.40xcd07No error (0)elb097307-934924932.us-east-1.elb.amazonaws.com54.235.182.194A (IP address)IN (0x0001)
                                                                      Nov 20, 2020 15:36:59.986032963 CET8.8.8.8192.168.2.40xcd07No error (0)elb097307-934924932.us-east-1.elb.amazonaws.com174.129.214.20A (IP address)IN (0x0001)
                                                                      Nov 20, 2020 15:36:59.986032963 CET8.8.8.8192.168.2.40xcd07No error (0)elb097307-934924932.us-east-1.elb.amazonaws.com54.235.83.248A (IP address)IN (0x0001)
                                                                      Nov 20, 2020 15:36:59.986032963 CET8.8.8.8192.168.2.40xcd07No error (0)elb097307-934924932.us-east-1.elb.amazonaws.com23.21.252.4A (IP address)IN (0x0001)
                                                                      Nov 20, 2020 15:36:59.986032963 CET8.8.8.8192.168.2.40xcd07No error (0)elb097307-934924932.us-east-1.elb.amazonaws.com54.243.164.148A (IP address)IN (0x0001)
                                                                      Nov 20, 2020 15:36:59.986032963 CET8.8.8.8192.168.2.40xcd07No error (0)elb097307-934924932.us-east-1.elb.amazonaws.com54.225.153.147A (IP address)IN (0x0001)
                                                                      Nov 20, 2020 15:37:00.050034046 CET8.8.8.8192.168.2.40xfe5dNo error (0)api.ipify.orgnagano-19599.herokussl.comCNAME (Canonical name)IN (0x0001)
                                                                      Nov 20, 2020 15:37:00.050034046 CET8.8.8.8192.168.2.40xfe5dNo error (0)nagano-19599.herokussl.comelb097307-934924932.us-east-1.elb.amazonaws.comCNAME (Canonical name)IN (0x0001)
                                                                      Nov 20, 2020 15:37:00.050034046 CET8.8.8.8192.168.2.40xfe5dNo error (0)elb097307-934924932.us-east-1.elb.amazonaws.com54.235.142.93A (IP address)IN (0x0001)
                                                                      Nov 20, 2020 15:37:00.050034046 CET8.8.8.8192.168.2.40xfe5dNo error (0)elb097307-934924932.us-east-1.elb.amazonaws.com184.73.247.141A (IP address)IN (0x0001)
                                                                      Nov 20, 2020 15:37:00.050034046 CET8.8.8.8192.168.2.40xfe5dNo error (0)elb097307-934924932.us-east-1.elb.amazonaws.com50.19.252.36A (IP address)IN (0x0001)
                                                                      Nov 20, 2020 15:37:00.050034046 CET8.8.8.8192.168.2.40xfe5dNo error (0)elb097307-934924932.us-east-1.elb.amazonaws.com54.204.14.42A (IP address)IN (0x0001)
                                                                      Nov 20, 2020 15:37:00.050034046 CET8.8.8.8192.168.2.40xfe5dNo error (0)elb097307-934924932.us-east-1.elb.amazonaws.com23.21.42.25A (IP address)IN (0x0001)
                                                                      Nov 20, 2020 15:37:00.050034046 CET8.8.8.8192.168.2.40xfe5dNo error (0)elb097307-934924932.us-east-1.elb.amazonaws.com54.235.83.248A (IP address)IN (0x0001)
                                                                      Nov 20, 2020 15:37:00.050034046 CET8.8.8.8192.168.2.40xfe5dNo error (0)elb097307-934924932.us-east-1.elb.amazonaws.com54.243.161.145A (IP address)IN (0x0001)
                                                                      Nov 20, 2020 15:37:00.050034046 CET8.8.8.8192.168.2.40xfe5dNo error (0)elb097307-934924932.us-east-1.elb.amazonaws.com23.21.126.66A (IP address)IN (0x0001)
                                                                      Nov 20, 2020 15:37:12.617464066 CET8.8.8.8192.168.2.40x1baaNo error (0)mail.vasudeva.invasudeva.inCNAME (Canonical name)IN (0x0001)
                                                                      Nov 20, 2020 15:37:12.617464066 CET8.8.8.8192.168.2.40x1baaNo error (0)vasudeva.in68.233.236.158A (IP address)IN (0x0001)
                                                                      Nov 20, 2020 15:37:12.679339886 CET8.8.8.8192.168.2.40x76f8No error (0)mail.vasudeva.invasudeva.inCNAME (Canonical name)IN (0x0001)
                                                                      Nov 20, 2020 15:37:12.679339886 CET8.8.8.8192.168.2.40x76f8No error (0)vasudeva.in68.233.236.158A (IP address)IN (0x0001)

                                                                      HTTPS Packets

                                                                      TimestampSource IPSource PortDest IPDest PortSubjectIssuerNot BeforeNot AfterJA3 SSL Client FingerprintJA3 SSL Client Digest
                                                                      Nov 20, 2020 15:37:00.467485905 CET54.235.142.93443192.168.2.449765CN=*.ipify.org, OU=PositiveSSL Wildcard, OU=Domain Control Validated CN=COMODO RSA Domain Validation Secure Server CA, O=COMODO CA Limited, L=Salford, ST=Greater Manchester, C=GB CN=COMODO RSA Certification Authority, O=COMODO CA Limited, L=Salford, ST=Greater Manchester, C=GBCN=COMODO RSA Domain Validation Secure Server CA, O=COMODO CA Limited, L=Salford, ST=Greater Manchester, C=GB CN=COMODO RSA Certification Authority, O=COMODO CA Limited, L=Salford, ST=Greater Manchester, C=GB CN=COMODO RSA Certification Authority, O=COMODO CA Limited, L=Salford, ST=Greater Manchester, C=GBWed Jan 24 01:00:00 CET 2018 Wed Feb 12 01:00:00 CET 2014 Tue Jan 19 01:00:00 CET 2010Sun Jan 24 00:59:59 CET 2021 Mon Feb 12 00:59:59 CET 2029 Tue Jan 19 00:59:59 CET 2038771,49196-49195-49200-49199-159-158-49188-49187-49192-49191-49162-49161-49172-49171-157-156-61-60-53-47-10,0-10-11-13-35-23-65281,29-23-24,03b5074b1b5d032e5620f69f9f700ff0e
                                                                      CN=COMODO RSA Domain Validation Secure Server CA, O=COMODO CA Limited, L=Salford, ST=Greater Manchester, C=GBCN=COMODO RSA Certification Authority, O=COMODO CA Limited, L=Salford, ST=Greater Manchester, C=GBWed Feb 12 01:00:00 CET 2014Mon Feb 12 00:59:59 CET 2029
                                                                      CN=COMODO RSA Certification Authority, O=COMODO CA Limited, L=Salford, ST=Greater Manchester, C=GBCN=COMODO RSA Certification Authority, O=COMODO CA Limited, L=Salford, ST=Greater Manchester, C=GBTue Jan 19 01:00:00 CET 2010Tue Jan 19 00:59:59 CET 2038

                                                                      SMTP Packets

                                                                      TimestampSource PortDest PortSource IPDest IPCommands
                                                                      Nov 20, 2020 15:37:13.155530930 CET5874976668.233.236.158192.168.2.4220-cherry.herosite.pro ESMTP Exim 4.93 #2 Fri, 20 Nov 2020 09:37:13 -0500
                                                                      220-We do not authorize the use of this system to transport unsolicited,
                                                                      220 and/or bulk e-mail.
                                                                      Nov 20, 2020 15:37:13.156238079 CET49766587192.168.2.468.233.236.158EHLO 468325
                                                                      Nov 20, 2020 15:37:13.299855947 CET5874976668.233.236.158192.168.2.4250-cherry.herosite.pro Hello 468325 [84.17.52.25]
                                                                      250-SIZE 52428800
                                                                      250-8BITMIME
                                                                      250-PIPELINING
                                                                      250-AUTH PLAIN LOGIN
                                                                      250-STARTTLS
                                                                      250 HELP
                                                                      Nov 20, 2020 15:37:13.301517963 CET49766587192.168.2.468.233.236.158AUTH login d2VhdmluZ2FjYzFAdmFzdWRldmEuaW4=
                                                                      Nov 20, 2020 15:37:13.445301056 CET5874976668.233.236.158192.168.2.4334 UGFzc3dvcmQ6
                                                                      Nov 20, 2020 15:37:13.609587908 CET5874976668.233.236.158192.168.2.4235 Authentication succeeded
                                                                      Nov 20, 2020 15:37:13.610651970 CET49766587192.168.2.468.233.236.158MAIL FROM:<weavingacc1@vasudeva.in>
                                                                      Nov 20, 2020 15:37:13.754324913 CET5874976668.233.236.158192.168.2.4250 OK
                                                                      Nov 20, 2020 15:37:13.768420935 CET49766587192.168.2.468.233.236.158RCPT TO:<weavingacc1@vasudeva.in>
                                                                      Nov 20, 2020 15:37:13.921685934 CET5874976668.233.236.158192.168.2.4250 Accepted
                                                                      Nov 20, 2020 15:37:13.922374964 CET49766587192.168.2.468.233.236.158DATA
                                                                      Nov 20, 2020 15:37:14.066122055 CET5874976668.233.236.158192.168.2.4354 Enter message, ending with "." on a line by itself
                                                                      Nov 20, 2020 15:37:14.073297977 CET49766587192.168.2.468.233.236.158.
                                                                      Nov 20, 2020 15:37:14.218482018 CET5874976668.233.236.158192.168.2.4250 OK id=1kg7XG-0034uj-05

                                                                      Code Manipulations

                                                                      Statistics

                                                                      Behavior

                                                                      Click to jump to process

                                                                      System Behavior

                                                                      General

                                                                      Start time:15:35:20
                                                                      Start date:20/11/2020
                                                                      Path:C:\Users\user\Desktop\ORDER.exe
                                                                      Wow64 process (32bit):true
                                                                      Commandline:'C:\Users\user\Desktop\ORDER.exe'
                                                                      Imagebase:0x530000
                                                                      File size:467968 bytes
                                                                      MD5 hash:BB942C948639F5C88FB33D5E4B7D7728
                                                                      Has elevated privileges:true
                                                                      Has administrator privileges:true
                                                                      Programmed in:.Net C# or VB.NET
                                                                      Yara matches:
                                                                      • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000000.00000002.687010442.0000000003C56000.00000004.00000001.sdmp, Author: Joe Security
                                                                      • Rule: JoeSecurity_AntiVM_3, Description: Yara detected AntiVM_3, Source: 00000000.00000002.686353136.0000000002BFC000.00000004.00000001.sdmp, Author: Joe Security
                                                                      • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000000.00000002.687253332.0000000003DD6000.00000004.00000001.sdmp, Author: Joe Security
                                                                      Reputation:low

                                                                      General

                                                                      Start time:15:35:28
                                                                      Start date:20/11/2020
                                                                      Path:C:\Windows\SysWOW64\schtasks.exe
                                                                      Wow64 process (32bit):true
                                                                      Commandline:'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\SpHLicuA' /XML 'C:\Users\user\AppData\Local\Temp\tmpFCB1.tmp'
                                                                      Imagebase:0x380000
                                                                      File size:185856 bytes
                                                                      MD5 hash:15FF7D8324231381BAD48A052F85DF04
                                                                      Has elevated privileges:true
                                                                      Has administrator privileges:true
                                                                      Programmed in:C, C++ or other language
                                                                      Reputation:high

                                                                      General

                                                                      Start time:15:35:29
                                                                      Start date:20/11/2020
                                                                      Path:C:\Windows\System32\conhost.exe
                                                                      Wow64 process (32bit):false
                                                                      Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                      Imagebase:0x7ff724c50000
                                                                      File size:625664 bytes
                                                                      MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                                                      Has elevated privileges:true
                                                                      Has administrator privileges:true
                                                                      Programmed in:C, C++ or other language
                                                                      Reputation:high

                                                                      General

                                                                      Start time:15:35:29
                                                                      Start date:20/11/2020
                                                                      Path:C:\Users\user\Desktop\ORDER.exe
                                                                      Wow64 process (32bit):true
                                                                      Commandline:{path}
                                                                      Imagebase:0xf50000
                                                                      File size:467968 bytes
                                                                      MD5 hash:BB942C948639F5C88FB33D5E4B7D7728
                                                                      Has elevated privileges:true
                                                                      Has administrator privileges:true
                                                                      Programmed in:.Net C# or VB.NET
                                                                      Yara matches:
                                                                      • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000003.00000002.930660789.0000000000402000.00000040.00000001.sdmp, Author: Joe Security
                                                                      • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000003.00000002.935335032.0000000003724000.00000004.00000001.sdmp, Author: Joe Security
                                                                      • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000003.00000002.934322832.0000000003526000.00000004.00000001.sdmp, Author: Joe Security
                                                                      • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000003.00000002.934090598.00000000034D1000.00000004.00000001.sdmp, Author: Joe Security
                                                                      • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000003.00000002.934090598.00000000034D1000.00000004.00000001.sdmp, Author: Joe Security
                                                                      Reputation:low

                                                                      General

                                                                      Start time:15:36:00
                                                                      Start date:20/11/2020
                                                                      Path:C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exe
                                                                      Wow64 process (32bit):true
                                                                      Commandline:'C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exe'
                                                                      Imagebase:0x420000
                                                                      File size:467968 bytes
                                                                      MD5 hash:BB942C948639F5C88FB33D5E4B7D7728
                                                                      Has elevated privileges:true
                                                                      Has administrator privileges:true
                                                                      Programmed in:.Net C# or VB.NET
                                                                      Yara matches:
                                                                      • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 0000000A.00000002.765004740.0000000003825000.00000004.00000001.sdmp, Author: Joe Security
                                                                      • Rule: JoeSecurity_AntiVM_3, Description: Yara detected AntiVM_3, Source: 0000000A.00000002.762865676.00000000027CC000.00000004.00000001.sdmp, Author: Joe Security
                                                                      Antivirus matches:
                                                                      • Detection: 100%, Avira
                                                                      • Detection: 100%, Joe Sandbox ML
                                                                      • Detection: 67%, ReversingLabs
                                                                      Reputation:low

                                                                      General

                                                                      Start time:15:36:04
                                                                      Start date:20/11/2020
                                                                      Path:C:\Windows\SysWOW64\schtasks.exe
                                                                      Wow64 process (32bit):true
                                                                      Commandline:'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\SpHLicuA' /XML 'C:\Users\user\AppData\Local\Temp\tmp871F.tmp'
                                                                      Imagebase:0x380000
                                                                      File size:185856 bytes
                                                                      MD5 hash:15FF7D8324231381BAD48A052F85DF04
                                                                      Has elevated privileges:true
                                                                      Has administrator privileges:true
                                                                      Programmed in:C, C++ or other language
                                                                      Reputation:high

                                                                      General

                                                                      Start time:15:36:05
                                                                      Start date:20/11/2020
                                                                      Path:C:\Windows\System32\conhost.exe
                                                                      Wow64 process (32bit):false
                                                                      Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                      Imagebase:0x7ff724c50000
                                                                      File size:625664 bytes
                                                                      MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                                                      Has elevated privileges:true
                                                                      Has administrator privileges:true
                                                                      Programmed in:C, C++ or other language
                                                                      Reputation:high

                                                                      General

                                                                      Start time:15:36:05
                                                                      Start date:20/11/2020
                                                                      Path:C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exe
                                                                      Wow64 process (32bit):true
                                                                      Commandline:{path}
                                                                      Imagebase:0x9f0000
                                                                      File size:467968 bytes
                                                                      MD5 hash:BB942C948639F5C88FB33D5E4B7D7728
                                                                      Has elevated privileges:true
                                                                      Has administrator privileges:true
                                                                      Programmed in:.Net C# or VB.NET
                                                                      Yara matches:
                                                                      • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 0000000D.00000002.930696018.0000000000402000.00000040.00000001.sdmp, Author: Joe Security
                                                                      • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 0000000D.00000002.934897870.0000000002D91000.00000004.00000001.sdmp, Author: Joe Security
                                                                      • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 0000000D.00000002.934897870.0000000002D91000.00000004.00000001.sdmp, Author: Joe Security
                                                                      Reputation:low

                                                                      General

                                                                      Start time:15:36:08
                                                                      Start date:20/11/2020
                                                                      Path:C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exe
                                                                      Wow64 process (32bit):true
                                                                      Commandline:'C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exe'
                                                                      Imagebase:0x310000
                                                                      File size:467968 bytes
                                                                      MD5 hash:BB942C948639F5C88FB33D5E4B7D7728
                                                                      Has elevated privileges:true
                                                                      Has administrator privileges:true
                                                                      Programmed in:.Net C# or VB.NET
                                                                      Yara matches:
                                                                      • Rule: JoeSecurity_AntiVM_3, Description: Yara detected AntiVM_3, Source: 0000000E.00000002.786151703.000000000277C000.00000004.00000001.sdmp, Author: Joe Security
                                                                      • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 0000000E.00000002.789175486.00000000037D4000.00000004.00000001.sdmp, Author: Joe Security
                                                                      Reputation:low

                                                                      General

                                                                      Start time:15:36:14
                                                                      Start date:20/11/2020
                                                                      Path:C:\Windows\SysWOW64\schtasks.exe
                                                                      Wow64 process (32bit):true
                                                                      Commandline:'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\SpHLicuA' /XML 'C:\Users\user\AppData\Local\Temp\tmpAEAC.tmp'
                                                                      Imagebase:0x380000
                                                                      File size:185856 bytes
                                                                      MD5 hash:15FF7D8324231381BAD48A052F85DF04
                                                                      Has elevated privileges:true
                                                                      Has administrator privileges:true
                                                                      Programmed in:C, C++ or other language
                                                                      Reputation:high

                                                                      General

                                                                      Start time:15:36:14
                                                                      Start date:20/11/2020
                                                                      Path:C:\Windows\System32\conhost.exe
                                                                      Wow64 process (32bit):false
                                                                      Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                      Imagebase:0x7ff724c50000
                                                                      File size:625664 bytes
                                                                      MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                                                      Has elevated privileges:true
                                                                      Has administrator privileges:true
                                                                      Programmed in:C, C++ or other language
                                                                      Reputation:high

                                                                      General

                                                                      Start time:15:36:15
                                                                      Start date:20/11/2020
                                                                      Path:C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exe
                                                                      Wow64 process (32bit):true
                                                                      Commandline:{path}
                                                                      Imagebase:0x760000
                                                                      File size:467968 bytes
                                                                      MD5 hash:BB942C948639F5C88FB33D5E4B7D7728
                                                                      Has elevated privileges:true
                                                                      Has administrator privileges:true
                                                                      Programmed in:.Net C# or VB.NET
                                                                      Yara matches:
                                                                      • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000011.00000002.933961322.0000000002A81000.00000004.00000001.sdmp, Author: Joe Security
                                                                      • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000011.00000002.933961322.0000000002A81000.00000004.00000001.sdmp, Author: Joe Security
                                                                      • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000011.00000002.930556707.0000000000402000.00000040.00000001.sdmp, Author: Joe Security
                                                                      Reputation:low

                                                                      Disassembly

                                                                      Code Analysis

                                                                      Reset < >