Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
7pECKdsaig.exe

Overview

General Information

Sample Name:7pECKdsaig.exe
Original Sample Name:3343ba4097fe8b6b91af0ca46abb0baf6052acf1806571432cc7e9e0ba59fa2a.exe
Analysis ID:830326
MD5:515bf958f062fec724fbe6bdadf39485
SHA1:50fbaeb36e98338dc500e252855abf0152bb6bbf
SHA256:3343ba4097fe8b6b91af0ca46abb0baf6052acf1806571432cc7e9e0ba59fa2a
Tags:exeFormbook
Infos:

Detection

FormBook
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
Yara detected FormBook
Malicious sample detected (through community Yara rule)
Antivirus / Scanner detection for submitted sample
System process connects to network (likely due to code injection or exploit)
Antivirus detection for URL or domain
Snort IDS alert for network traffic
Sample uses process hollowing technique
Maps a DLL or memory area into another process
Machine Learning detection for sample
Modifies the prolog of user mode functions (user mode inline hooks)
Queues an APC in another process (thread injection)
Tries to detect virtualization through RDTSC time measurements
Modifies the context of a thread in another process (thread injection)
C2 URLs / IPs found in malware configuration
Uses 32bit PE files
Found decision node followed by non-executed suspicious APIs
Yara signature match
Antivirus or Machine Learning detection for unpacked file
Uses code obfuscation techniques (call, push, ret)
Detected potential crypto function
Found potential string decryption / allocating functions
Sample execution stops while process was sleeping (likely an evasion)
Contains functionality to call native functions
HTTP GET or POST without a user agent
Contains functionality for execution timing, often used to detect debuggers
Enables debug privileges
Creates a DirectInput object (often for capturing keystrokes)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found inlined nop instructions (likely shell or obfuscated code)
PE file does not import any functions
Sample file is different than original file name gathered from version info
Contains functionality to read the PEB
Checks if the current process is being debugged
Found large amount of non-executed APIs
Creates a process in suspended mode (likely to inject code)
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)

Classification

  • System is w10x64
  • 7pECKdsaig.exe (PID: 6000 cmdline: C:\Users\user\Desktop\7pECKdsaig.exe MD5: 515BF958F062FEC724FBE6BDADF39485)
    • explorer.exe (PID: 3452 cmdline: C:\Windows\Explorer.EXE MD5: AD5296B280E8F522A8A897C96BAB0E1D)
      • msdt.exe (PID: 5148 cmdline: C:\Windows\SysWOW64\msdt.exe MD5: 7F0C51DBA69B9DE5DDF6AA04CE3A69F4)
        • cmd.exe (PID: 1328 cmdline: /c del "C:\Users\user\Desktop\7pECKdsaig.exe" MD5: F3BDBE3BB6F734E357235F4D5898582D)
          • conhost.exe (PID: 3660 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
  • cleanup
{"C2 list": ["www.2348x.com/ar73/"], "decoy": ["classgorilla.com", "b6817.com", "1wwuwa.top", "dgslimited.africa", "deepwaterships.com", "hkshshoptw.shop", "hurricanevalleyatvjamboree.com", "ckpconsulting.com", "laojiangmath.com", "authenticityhacking.com", "family-doctor-53205.com", "investinstgeorgeut.com", "lithoearthsolution.africa", "quickhealcareltd.co.uk", "delightkgrillw.top", "freezeclosettoilet.com", "coo1star.com", "gemgamut.com", "enrichednetworksolutions.com", "betterbeeclean.com", "kbmstr.com", "colorusainc.com", "five-dollar-meals.com", "baozhuang8.com", "la-home-service.com", "innovantexclusive.com", "chateaudevillars.co.uk", "echadholisticbar.com", "naijacarprices.africa", "4652.voto", "kraftheonz.com", "ingrambaby.com", "braeunungsoel.ch", "sweetcariadgifts.co.uk", "kui693.com", "akatov-top.ru", "epollresearch.online", "cupandsaucybooks.com", "arredobagno.club", "gt.sale", "dskincare.com", "cursosemcasa.site", "leaf-spa.net", "deathbeforedeceit.com", "azvvs.com", "laptops-39165.com", "ccwt.vip", "011965.com", "mtevz.online", "jacksontcpassettlement.com", "aldeajerusalen.com", "kellnovaglobalfood.info", "alphametatek.online", "lcssthh.com", "dumelogold9ja.africa", "d-storic.com", "mogi.africa", "ghostt.net", "aksharsigns.online", "goglucofort.com", "b708.com", "controlplus.systems", "lightandstory.info", "invstcai.sbs"]}
SourceRuleDescriptionAuthorStrings
7pECKdsaig.exeJoeSecurity_FormBook_1Yara detected FormBookJoe Security
    7pECKdsaig.exeJoeSecurity_FormBookYara detected FormBookJoe Security
      7pECKdsaig.exeWindows_Trojan_Formbook_1112e116unknownunknown
      • 0x5651:$a1: 3C 30 50 4F 53 54 74 09 40
      • 0x1bfb0:$a2: 74 0A 4E 0F B6 08 8D 44 08 01 75 F6 8D 70 01 0F B6 00 8D 55
      • 0x9dbf:$a3: 1A D2 80 E2 AF 80 C2 7E EB 2A 80 FA 2F 75 11 8A D0 80 E2 01
      • 0x14ca7:$a4: 04 83 C4 0C 83 06 07 5B 5F 5E 8B E5 5D C3 8B 17 03 55 0C 6A 01 83
      7pECKdsaig.exeFormbook_1autogenerated rule brought to you by yara-signatorFelix Bilstein - yara-signator at cocacoding dot com
      • 0x8d08:$sequence_0: 03 C8 0F 31 2B C1 89 45 FC
      • 0x8f72:$sequence_0: 03 C8 0F 31 2B C1 89 45 FC
      • 0x14aa5:$sequence_1: 3C 24 0F 84 76 FF FF FF 3C 25 74 94
      • 0x14591:$sequence_2: 3B 4F 14 73 95 85 C9 74 91
      • 0x14ba7:$sequence_3: 3C 69 75 44 8B 7D 18 8B 0F
      • 0x14d1f:$sequence_4: 5D C3 8D 50 7C 80 FA 07
      • 0x998a:$sequence_5: 0F BE 5C 0E 01 0F B6 54 0E 02 83 E3 0F C1 EA 06
      • 0x1380c:$sequence_6: 57 89 45 FC 89 45 F4 89 45 F8
      • 0xa683:$sequence_7: 66 89 0C 02 5B 8B E5 5D
      • 0x1ad17:$sequence_8: 3C 54 74 04 3C 74 75 F4
      • 0x1bd1a:$sequence_9: 56 68 03 01 00 00 8D 85 95 FE FF FF 6A 00
      7pECKdsaig.exeFormbookdetect Formbook in memoryJPCERT/CC Incident Response Group
      • 0x17c39:$sqlite3step: 68 34 1C 7B E1
      • 0x17d4c:$sqlite3step: 68 34 1C 7B E1
      • 0x17c68:$sqlite3text: 68 38 2A 90 C5
      • 0x17d8d:$sqlite3text: 68 38 2A 90 C5
      • 0x17c7b:$sqlite3blob: 68 53 D8 7F 8C
      • 0x17da3:$sqlite3blob: 68 53 D8 7F 8C
      SourceRuleDescriptionAuthorStrings
      00000000.00000002.288830411.0000000000A81000.00000020.00000001.01000000.00000003.sdmpJoeSecurity_FormBook_1Yara detected FormBookJoe Security
        00000000.00000002.288830411.0000000000A81000.00000020.00000001.01000000.00000003.sdmpJoeSecurity_FormBookYara detected FormBookJoe Security
          00000000.00000002.288830411.0000000000A81000.00000020.00000001.01000000.00000003.sdmpWindows_Trojan_Formbook_1112e116unknownunknown
          • 0x5251:$a1: 3C 30 50 4F 53 54 74 09 40
          • 0x1bbb0:$a2: 74 0A 4E 0F B6 08 8D 44 08 01 75 F6 8D 70 01 0F B6 00 8D 55
          • 0x99bf:$a3: 1A D2 80 E2 AF 80 C2 7E EB 2A 80 FA 2F 75 11 8A D0 80 E2 01
          • 0x148a7:$a4: 04 83 C4 0C 83 06 07 5B 5F 5E 8B E5 5D C3 8B 17 03 55 0C 6A 01 83
          00000000.00000002.288830411.0000000000A81000.00000020.00000001.01000000.00000003.sdmpFormbook_1autogenerated rule brought to you by yara-signatorFelix Bilstein - yara-signator at cocacoding dot com
          • 0x8908:$sequence_0: 03 C8 0F 31 2B C1 89 45 FC
          • 0x8b72:$sequence_0: 03 C8 0F 31 2B C1 89 45 FC
          • 0x146a5:$sequence_1: 3C 24 0F 84 76 FF FF FF 3C 25 74 94
          • 0x14191:$sequence_2: 3B 4F 14 73 95 85 C9 74 91
          • 0x147a7:$sequence_3: 3C 69 75 44 8B 7D 18 8B 0F
          • 0x1491f:$sequence_4: 5D C3 8D 50 7C 80 FA 07
          • 0x958a:$sequence_5: 0F BE 5C 0E 01 0F B6 54 0E 02 83 E3 0F C1 EA 06
          • 0x1340c:$sequence_6: 57 89 45 FC 89 45 F4 89 45 F8
          • 0xa283:$sequence_7: 66 89 0C 02 5B 8B E5 5D
          • 0x1a917:$sequence_8: 3C 54 74 04 3C 74 75 F4
          • 0x1b91a:$sequence_9: 56 68 03 01 00 00 8D 85 95 FE FF FF 6A 00
          00000000.00000002.288830411.0000000000A81000.00000020.00000001.01000000.00000003.sdmpFormbookdetect Formbook in memoryJPCERT/CC Incident Response Group
          • 0x17839:$sqlite3step: 68 34 1C 7B E1
          • 0x1794c:$sqlite3step: 68 34 1C 7B E1
          • 0x17868:$sqlite3text: 68 38 2A 90 C5
          • 0x1798d:$sqlite3text: 68 38 2A 90 C5
          • 0x1787b:$sqlite3blob: 68 53 D8 7F 8C
          • 0x179a3:$sqlite3blob: 68 53 D8 7F 8C
          Click to see the 48 entries
          SourceRuleDescriptionAuthorStrings
          0.2.7pECKdsaig.exe.a80000.0.unpackJoeSecurity_FormBook_1Yara detected FormBookJoe Security
            0.2.7pECKdsaig.exe.a80000.0.unpackJoeSecurity_FormBookYara detected FormBookJoe Security
              0.2.7pECKdsaig.exe.a80000.0.unpackWindows_Trojan_Formbook_1112e116unknownunknown
              • 0x5451:$a1: 3C 30 50 4F 53 54 74 09 40
              • 0x1bdb0:$a2: 74 0A 4E 0F B6 08 8D 44 08 01 75 F6 8D 70 01 0F B6 00 8D 55
              • 0x9bbf:$a3: 1A D2 80 E2 AF 80 C2 7E EB 2A 80 FA 2F 75 11 8A D0 80 E2 01
              • 0x14aa7:$a4: 04 83 C4 0C 83 06 07 5B 5F 5E 8B E5 5D C3 8B 17 03 55 0C 6A 01 83
              0.2.7pECKdsaig.exe.a80000.0.unpackFormbook_1autogenerated rule brought to you by yara-signatorFelix Bilstein - yara-signator at cocacoding dot com
              • 0x8b08:$sequence_0: 03 C8 0F 31 2B C1 89 45 FC
              • 0x8d72:$sequence_0: 03 C8 0F 31 2B C1 89 45 FC
              • 0x148a5:$sequence_1: 3C 24 0F 84 76 FF FF FF 3C 25 74 94
              • 0x14391:$sequence_2: 3B 4F 14 73 95 85 C9 74 91
              • 0x149a7:$sequence_3: 3C 69 75 44 8B 7D 18 8B 0F
              • 0x14b1f:$sequence_4: 5D C3 8D 50 7C 80 FA 07
              • 0x978a:$sequence_5: 0F BE 5C 0E 01 0F B6 54 0E 02 83 E3 0F C1 EA 06
              • 0x1360c:$sequence_6: 57 89 45 FC 89 45 F4 89 45 F8
              • 0xa483:$sequence_7: 66 89 0C 02 5B 8B E5 5D
              • 0x1ab17:$sequence_8: 3C 54 74 04 3C 74 75 F4
              • 0x1bb1a:$sequence_9: 56 68 03 01 00 00 8D 85 95 FE FF FF 6A 00
              0.2.7pECKdsaig.exe.a80000.0.unpackFormbookdetect Formbook in memoryJPCERT/CC Incident Response Group
              • 0x17a39:$sqlite3step: 68 34 1C 7B E1
              • 0x17b4c:$sqlite3step: 68 34 1C 7B E1
              • 0x17a68:$sqlite3text: 68 38 2A 90 C5
              • 0x17b8d:$sqlite3text: 68 38 2A 90 C5
              • 0x17a7b:$sqlite3blob: 68 53 D8 7F 8C
              • 0x17ba3:$sqlite3blob: 68 53 D8 7F 8C
              Click to see the 5 entries
              No Sigma rule has matched
              Timestamp:192.168.2.634.102.136.18049707802031453 03/20/23-09:12:27.000047
              SID:2031453
              Source Port:49707
              Destination Port:80
              Protocol:TCP
              Classtype:A Network Trojan was detected
              Timestamp:192.168.2.634.102.136.18049707802031449 03/20/23-09:12:27.000047
              SID:2031449
              Source Port:49707
              Destination Port:80
              Protocol:TCP
              Classtype:A Network Trojan was detected
              Timestamp:192.168.2.634.102.136.18049707802031412 03/20/23-09:12:27.000047
              SID:2031412
              Source Port:49707
              Destination Port:80
              Protocol:TCP
              Classtype:A Network Trojan was detected

              Click to jump to signature section

              Show All Signature Results

              AV Detection

              barindex
              Source: 7pECKdsaig.exeReversingLabs: Detection: 76%
              Source: 7pECKdsaig.exeVirustotal: Detection: 59%Perma Link
              Source: Yara matchFile source: 7pECKdsaig.exe, type: SAMPLE
              Source: Yara matchFile source: 0.2.7pECKdsaig.exe.a80000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.0.7pECKdsaig.exe.a80000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 00000000.00000002.288830411.0000000000A81000.00000020.00000001.01000000.00000003.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000000.00000002.289101701.0000000001370000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000002.00000002.520351827.0000000004FCF000.00000004.10000000.00040000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000002.00000002.518766538.0000000002EE0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000000.00000002.289007135.0000000001210000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000000.00000000.249149614.0000000000A81000.00000020.00000001.01000000.00000003.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000001.00000002.531047978.000000001389F000.00000004.80000000.00040000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000002.00000002.518698032.0000000002EB0000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000002.00000002.517165647.0000000000580000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000002.00000002.517610096.00000000008C4000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: 7pECKdsaig.exeAvira: detected
              Source: http://www.jacksontcpassettlement.com/ar73/www.ingrambaby.comAvira URL Cloud: Label: malware
              Source: http://www.b708.com/ar73/Avira URL Cloud: Label: malware
              Source: http://www.hurricanevalleyatvjamboree.com/ar73/www.innovantexclusive.comAvira URL Cloud: Label: malware
              Source: http://www.kellnovaglobalfood.info/ar73/Avira URL Cloud: Label: malware
              Source: http://www.echadholisticbar.com/ar73/www.jacksontcpassettlement.comAvira URL Cloud: Label: malware
              Source: http://www.quickhealcareltd.co.uk/ar73/Avira URL Cloud: Label: malware
              Source: http://www.mogi.africa/ar73/www.kellnovaglobalfood.infoAvira URL Cloud: Label: malware
              Source: http://www.ckpconsulting.com/ar73/www.2348x.comAvira URL Cloud: Label: malware
              Source: http://www.kellnovaglobalfood.info/ar73/www.controlplus.systemsAvira URL Cloud: Label: malware
              Source: http://www.controlplus.systems/ar73/www.quickhealcareltd.co.ukAvira URL Cloud: Label: malware
              Source: http://www.kellnovaglobalfood.info/ar73/?Qj=i6BPGBhEPZBlfl7tAP1UBBwzioJGNNDALkR90REkFgMzqoaCb5EMO/kcO5kV95GeH/kMM6gDFg==&x6=n0GdIP_Avira URL Cloud: Label: malware
              Source: http://www.ckpconsulting.com/ar73/Avira URL Cloud: Label: malware
              Source: http://www.mtevz.online/ar73/Avira URL Cloud: Label: malware
              Source: http://www.2348x.com/ar73/Avira URL Cloud: Label: malware
              Source: http://www.arredobagno.club/ar73/www.mtevz.onlineAvira URL Cloud: Label: malware
              Source: http://www.hurricanevalleyatvjamboree.com/ar73/Avira URL Cloud: Label: malware
              Source: http://www.ingrambaby.com/ar73/Avira URL Cloud: Label: malware
              Source: http://www.innovantexclusive.com/ar73/www.1wwuwa.topAvira URL Cloud: Label: malware
              Source: http://www.controlplus.systems/ar73/Avira URL Cloud: Label: malware
              Source: http://www.echadholisticbar.com/ar73/Avira URL Cloud: Label: malware
              Source: http://www.jacksontcpassettlement.com/ar73/Avira URL Cloud: Label: malware
              Source: http://www.authenticityhacking.com/ar73/Avira URL Cloud: Label: malware
              Source: http://www.ingrambaby.com/ar73/www.arredobagno.clubAvira URL Cloud: Label: malware
              Source: http://www.mogi.africa/ar73/Avira URL Cloud: Label: malware
              Source: http://www.arredobagno.club/ar73/Avira URL Cloud: Label: malware
              Source: http://www.1wwuwa.top/ar73/www.echadholisticbar.comAvira URL Cloud: Label: malware
              Source: http://www.b708.com/ar73/www.hurricanevalleyatvjamboree.comAvira URL Cloud: Label: malware
              Source: http://www.controlplus.systems/ar73/?Qj=pTDthzaqbIgyWHdtpzpwnulvL2qvi2wcQCOYQZrmaB3EJlnnV9x+gp8AnzNn3ZLGsW0uMr4raA==&x6=n0GdIP_Avira URL Cloud: Label: malware
              Source: http://www.authenticityhacking.com/ar73/www.ckpconsulting.comAvira URL Cloud: Label: malware
              Source: http://www.mtevz.online/ar73/rAvira URL Cloud: Label: malware
              Source: http://www.2348x.com/ar73/www.b708.comAvira URL Cloud: Label: malware
              Source: www.2348x.com/ar73/Avira URL Cloud: Label: malware
              Source: http://www.1wwuwa.top/ar73/Avira URL Cloud: Label: malware
              Source: http://www.quickhealcareltd.co.uk/ar73/www.authenticityhacking.comAvira URL Cloud: Label: malware
              Source: http://www.innovantexclusive.com/ar73/Avira URL Cloud: Label: malware
              Source: 7pECKdsaig.exeJoe Sandbox ML: detected
              Source: 0.0.7pECKdsaig.exe.a80000.0.unpackAvira: Label: TR/Crypt.ZPACK.Gen
              Source: 0.2.7pECKdsaig.exe.a80000.0.unpackAvira: Label: TR/Crypt.ZPACK.Gen
              Source: 00000000.00000002.289101701.0000000001370000.00000040.10000000.00040000.00000000.sdmpMalware Configuration Extractor: FormBook {"C2 list": ["www.2348x.com/ar73/"], "decoy": ["classgorilla.com", "b6817.com", "1wwuwa.top", "dgslimited.africa", "deepwaterships.com", "hkshshoptw.shop", "hurricanevalleyatvjamboree.com", "ckpconsulting.com", "laojiangmath.com", "authenticityhacking.com", "family-doctor-53205.com", "investinstgeorgeut.com", "lithoearthsolution.africa", "quickhealcareltd.co.uk", "delightkgrillw.top", "freezeclosettoilet.com", "coo1star.com", "gemgamut.com", "enrichednetworksolutions.com", "betterbeeclean.com", "kbmstr.com", "colorusainc.com", "five-dollar-meals.com", "baozhuang8.com", "la-home-service.com", "innovantexclusive.com", "chateaudevillars.co.uk", "echadholisticbar.com", "naijacarprices.africa", "4652.voto", "kraftheonz.com", "ingrambaby.com", "braeunungsoel.ch", "sweetcariadgifts.co.uk", "kui693.com", "akatov-top.ru", "epollresearch.online", "cupandsaucybooks.com", "arredobagno.club", "gt.sale", "dskincare.com", "cursosemcasa.site", "leaf-spa.net", "deathbeforedeceit.com", "azvvs.com", "laptops-39165.com", "ccwt.vip", "011965.com", "mtevz.online", "jacksontcpassettlement.com", "aldeajerusalen.com", "kellnovaglobalfood.info", "alphametatek.online", "lcssthh.com", "dumelogold9ja.africa", "d-storic.com", "mogi.africa", "ghostt.net", "aksharsigns.online", "goglucofort.com", "b708.com", "controlplus.systems", "lightandstory.info", "invstcai.sbs"]}
              Source: 7pECKdsaig.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
              Source: 7pECKdsaig.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
              Source: Binary string: msdt.pdbGCTL source: 7pECKdsaig.exe, 00000000.00000002.293667137.0000000003520000.00000040.10000000.00040000.00000000.sdmp, 7pECKdsaig.exe, 00000000.00000003.281701865.000000000352D000.00000004.00000020.00020000.00000000.sdmp, 7pECKdsaig.exe, 00000000.00000003.287536333.00000000036A4000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: wntdll.pdbUGP source: 7pECKdsaig.exe, 00000000.00000003.251882713.000000000155D000.00000004.00000020.00020000.00000000.sdmp, 7pECKdsaig.exe, 00000000.00000002.289263472.000000000180F000.00000040.00001000.00020000.00000000.sdmp, 7pECKdsaig.exe, 00000000.00000002.289263472.00000000016F0000.00000040.00001000.00020000.00000000.sdmp, msdt.exe, 00000002.00000003.292381298.000000000490D000.00000004.00000020.00020000.00000000.sdmp, msdt.exe, 00000002.00000002.519078571.0000000004BBF000.00000040.00001000.00020000.00000000.sdmp, msdt.exe, 00000002.00000003.289235822.000000000476D000.00000004.00000020.00020000.00000000.sdmp, msdt.exe, 00000002.00000002.519078571.0000000004AA0000.00000040.00001000.00020000.00000000.sdmp
              Source: Binary string: wntdll.pdb source: 7pECKdsaig.exe, 7pECKdsaig.exe, 00000000.00000003.251882713.000000000155D000.00000004.00000020.00020000.00000000.sdmp, 7pECKdsaig.exe, 00000000.00000002.289263472.000000000180F000.00000040.00001000.00020000.00000000.sdmp, 7pECKdsaig.exe, 00000000.00000002.289263472.00000000016F0000.00000040.00001000.00020000.00000000.sdmp, msdt.exe, msdt.exe, 00000002.00000003.292381298.000000000490D000.00000004.00000020.00020000.00000000.sdmp, msdt.exe, 00000002.00000002.519078571.0000000004BBF000.00000040.00001000.00020000.00000000.sdmp, msdt.exe, 00000002.00000003.289235822.000000000476D000.00000004.00000020.00020000.00000000.sdmp, msdt.exe, 00000002.00000002.519078571.0000000004AA0000.00000040.00001000.00020000.00000000.sdmp
              Source: Binary string: msdt.pdb source: 7pECKdsaig.exe, 00000000.00000002.293667137.0000000003520000.00000040.10000000.00040000.00000000.sdmp, 7pECKdsaig.exe, 00000000.00000003.281701865.000000000352D000.00000004.00000020.00020000.00000000.sdmp, 7pECKdsaig.exe, 00000000.00000003.287536333.00000000036A4000.00000004.00000020.00020000.00000000.sdmp
              Source: C:\Users\user\Desktop\7pECKdsaig.exeCode function: 4x nop then pop ebx
              Source: C:\Users\user\Desktop\7pECKdsaig.exeCode function: 4x nop then pop edi
              Source: C:\Windows\SysWOW64\msdt.exeCode function: 4x nop then pop ebx
              Source: C:\Windows\SysWOW64\msdt.exeCode function: 4x nop then pop edi

              Networking

              barindex
              Source: C:\Windows\explorer.exeDomain query: www.controlplus.systems
              Source: C:\Windows\explorer.exeDomain query: www.mogi.africa
              Source: C:\Windows\explorer.exeDomain query: www.kellnovaglobalfood.info
              Source: C:\Windows\explorer.exeNetwork Connect: 34.102.136.180 80
              Source: TrafficSnort IDS: 2031453 ET TROJAN FormBook CnC Checkin (GET) 192.168.2.6:49707 -> 34.102.136.180:80
              Source: TrafficSnort IDS: 2031449 ET TROJAN FormBook CnC Checkin (GET) 192.168.2.6:49707 -> 34.102.136.180:80
              Source: TrafficSnort IDS: 2031412 ET TROJAN FormBook CnC Checkin (GET) 192.168.2.6:49707 -> 34.102.136.180:80
              Source: Malware configuration extractorURLs: www.2348x.com/ar73/
              Source: global trafficHTTP traffic detected: GET /ar73/?Qj=i6BPGBhEPZBlfl7tAP1UBBwzioJGNNDALkR90REkFgMzqoaCb5EMO/kcO5kV95GeH/kMM6gDFg==&x6=n0GdIP_ HTTP/1.1Host: www.kellnovaglobalfood.infoConnection: closeData Raw: 00 00 00 00 00 00 00 Data Ascii:
              Source: global trafficHTTP traffic detected: GET /ar73/?Qj=pTDthzaqbIgyWHdtpzpwnulvL2qvi2wcQCOYQZrmaB3EJlnnV9x+gp8AnzNn3ZLGsW0uMr4raA==&x6=n0GdIP_ HTTP/1.1Host: www.controlplus.systemsConnection: closeData Raw: 00 00 00 00 00 00 00 Data Ascii:
              Source: global trafficHTTP traffic detected: HTTP/1.1 403 ForbiddenServer: openrestyDate: Mon, 20 Mar 2023 08:12:27 GMTContent-Type: text/htmlContent-Length: 291ETag: "64063330-123"Via: 1.1 googleConnection: closeData Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 20 6c 61 6e 67 3d 22 65 6e 22 3e 0a 20 20 3c 68 65 61 64 3e 0a 20 20 20 20 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 63 6f 6e 74 65 6e 74 2d 74 79 70 65 22 20 63 6f 6e 74 65 6e 74 3d 22 74 65 78 74 2f 68 74 6d 6c 3b 63 68 61 72 73 65 74 3d 75 74 66 2d 38 22 20 2f 3e 0a 20 20 20 20 3c 6c 69 6e 6b 20 72 65 6c 3d 22 73 68 6f 72 74 63 75 74 20 69 63 6f 6e 22 20 68 72 65 66 3d 22 64 61 74 61 3a 69 6d 61 67 65 2f 78 2d 69 63 6f 6e 3b 2c 22 20 74 79 70 65 3d 22 69 6d 61 67 65 2f 78 2d 69 63 6f 6e 22 20 2f 3e 0a 20 20 20 20 3c 74 69 74 6c 65 3e 46 6f 72 62 69 64 64 65 6e 3c 2f 74 69 74 6c 65 3e 0a 20 20 3c 2f 68 65 61 64 3e 0a 20 20 3c 62 6f 64 79 3e 0a 20 20 20 20 3c 68 31 3e 41 63 63 65 73 73 20 46 6f 72 62 69 64 64 65 6e 3c 2f 68 31 3e 0a 20 20 3c 2f 62 6f 64 79 3e 0a 3c 2f 68 74 6d 6c 3e 0a Data Ascii: <!DOCTYPE html><html lang="en"> <head> <meta http-equiv="content-type" content="text/html;charset=utf-8" /> <link rel="shortcut icon" href="data:image/x-icon;," type="image/x-icon" /> <title>Forbidden</title> </head> <body> <h1>Access Forbidden</h1> </body></html>
              Source: global trafficHTTP traffic detected: HTTP/1.1 403 ForbiddenServer: openrestyDate: Mon, 20 Mar 2023 08:12:47 GMTContent-Type: text/htmlContent-Length: 291ETag: "63fcb05a-123"Via: 1.1 googleConnection: closeData Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 20 6c 61 6e 67 3d 22 65 6e 22 3e 0a 20 20 3c 68 65 61 64 3e 0a 20 20 20 20 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 63 6f 6e 74 65 6e 74 2d 74 79 70 65 22 20 63 6f 6e 74 65 6e 74 3d 22 74 65 78 74 2f 68 74 6d 6c 3b 63 68 61 72 73 65 74 3d 75 74 66 2d 38 22 20 2f 3e 0a 20 20 20 20 3c 6c 69 6e 6b 20 72 65 6c 3d 22 73 68 6f 72 74 63 75 74 20 69 63 6f 6e 22 20 68 72 65 66 3d 22 64 61 74 61 3a 69 6d 61 67 65 2f 78 2d 69 63 6f 6e 3b 2c 22 20 74 79 70 65 3d 22 69 6d 61 67 65 2f 78 2d 69 63 6f 6e 22 20 2f 3e 0a 20 20 20 20 3c 74 69 74 6c 65 3e 46 6f 72 62 69 64 64 65 6e 3c 2f 74 69 74 6c 65 3e 0a 20 20 3c 2f 68 65 61 64 3e 0a 20 20 3c 62 6f 64 79 3e 0a 20 20 20 20 3c 68 31 3e 41 63 63 65 73 73 20 46 6f 72 62 69 64 64 65 6e 3c 2f 68 31 3e 0a 20 20 3c 2f 62 6f 64 79 3e 0a 3c 2f 68 74 6d 6c 3e 0a Data Ascii: <!DOCTYPE html><html lang="en"> <head> <meta http-equiv="content-type" content="text/html;charset=utf-8" /> <link rel="shortcut icon" href="data:image/x-icon;," type="image/x-icon" /> <title>Forbidden</title> </head> <body> <h1>Access Forbidden</h1> </body></html>
              Source: explorer.exe, 00000001.00000002.525713546.000000000833A000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000001.00000003.461649448.0000000008356000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.1wwuwa.top
              Source: explorer.exe, 00000001.00000002.525713546.000000000833A000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000001.00000003.461649448.0000000008356000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.1wwuwa.top/ar73/
              Source: explorer.exe, 00000001.00000002.525713546.000000000833A000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000001.00000003.461649448.0000000008356000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.1wwuwa.top/ar73/www.echadholisticbar.com
              Source: explorer.exe, 00000001.00000002.525713546.000000000833A000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000001.00000003.461649448.0000000008356000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.1wwuwa.topReferer:
              Source: explorer.exe, 00000001.00000002.525713546.000000000833A000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000001.00000003.461649448.0000000008356000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.2348x.com
              Source: explorer.exe, 00000001.00000002.525713546.000000000833A000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000001.00000003.461649448.0000000008356000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.2348x.com/ar73/
              Source: explorer.exe, 00000001.00000002.525713546.000000000833A000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000001.00000003.461649448.0000000008356000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.2348x.com/ar73/www.b708.com
              Source: explorer.exe, 00000001.00000002.525713546.000000000833A000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000001.00000003.461649448.0000000008356000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.2348x.comReferer:
              Source: explorer.exe, 00000001.00000002.525713546.000000000833A000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000001.00000003.461649448.0000000008356000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.arredobagno.club
              Source: explorer.exe, 00000001.00000002.525713546.000000000833A000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000001.00000003.461649448.0000000008356000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.arredobagno.club/ar73/
              Source: explorer.exe, 00000001.00000002.525713546.000000000833A000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000001.00000003.461649448.0000000008356000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.arredobagno.club/ar73/www.mtevz.online
              Source: explorer.exe, 00000001.00000002.525713546.000000000833A000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000001.00000003.461649448.0000000008356000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.arredobagno.clubReferer:
              Source: explorer.exe, 00000001.00000002.525713546.000000000833A000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000001.00000003.461649448.0000000008356000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.authenticityhacking.com
              Source: explorer.exe, 00000001.00000002.525713546.000000000833A000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000001.00000003.461649448.0000000008356000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.authenticityhacking.com/ar73/
              Source: explorer.exe, 00000001.00000002.525713546.000000000833A000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000001.00000003.461649448.0000000008356000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.authenticityhacking.com/ar73/www.ckpconsulting.com
              Source: explorer.exe, 00000001.00000002.525713546.000000000833A000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000001.00000003.461649448.0000000008356000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.authenticityhacking.comReferer:
              Source: explorer.exe, 00000001.00000003.461649448.0000000008442000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000001.00000003.292213498.000000000F5A7000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000001.00000003.461216185.000000000F53F000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000001.00000000.267709513.000000000F5A7000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000001.00000003.462393796.000000000F5B3000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000001.00000000.254183869.0000000000AC8000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000001.00000003.289061192.0000000008442000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000001.00000002.526453234.0000000008442000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000001.00000002.517440543.0000000000AC8000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000001.00000002.530310030.000000000F5B6000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000001.00000003.288711256.000000000F5A7000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000001.00000000.263735895.0000000008442000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.autoitscript.com/autoit3/J
              Source: explorer.exe, 00000001.00000002.525713546.000000000833A000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000001.00000003.461649448.0000000008356000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.b708.com
              Source: explorer.exe, 00000001.00000002.525713546.000000000833A000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000001.00000003.461649448.0000000008356000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.b708.com/ar73/
              Source: explorer.exe, 00000001.00000002.525713546.000000000833A000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000001.00000003.461649448.0000000008356000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.b708.com/ar73/www.hurricanevalleyatvjamboree.com
              Source: explorer.exe, 00000001.00000002.525713546.000000000833A000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000001.00000003.461649448.0000000008356000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.b708.comReferer:
              Source: explorer.exe, 00000001.00000002.525713546.000000000833A000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000001.00000003.461649448.0000000008356000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.ckpconsulting.com
              Source: explorer.exe, 00000001.00000002.525713546.000000000833A000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000001.00000003.461649448.0000000008356000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.ckpconsulting.com/ar73/
              Source: explorer.exe, 00000001.00000002.525713546.000000000833A000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000001.00000003.461649448.0000000008356000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.ckpconsulting.com/ar73/www.2348x.com
              Source: explorer.exe, 00000001.00000002.525713546.000000000833A000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000001.00000003.461649448.0000000008356000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.ckpconsulting.comReferer:
              Source: explorer.exe, 00000001.00000002.525713546.000000000833A000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000001.00000003.461649448.0000000008356000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.controlplus.systems
              Source: explorer.exe, 00000001.00000002.525713546.000000000833A000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000001.00000003.461649448.0000000008356000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.controlplus.systems/ar73/
              Source: explorer.exe, 00000001.00000002.525713546.000000000833A000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000001.00000003.461649448.0000000008356000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.controlplus.systems/ar73/www.quickhealcareltd.co.uk
              Source: explorer.exe, 00000001.00000002.525713546.000000000833A000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000001.00000003.461649448.0000000008356000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.controlplus.systemsReferer:
              Source: explorer.exe, 00000001.00000002.525713546.000000000833A000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000001.00000003.461649448.0000000008356000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.echadholisticbar.com
              Source: explorer.exe, 00000001.00000002.525713546.000000000833A000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000001.00000003.461649448.0000000008356000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.echadholisticbar.com/ar73/
              Source: explorer.exe, 00000001.00000002.525713546.000000000833A000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000001.00000003.461649448.0000000008356000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.echadholisticbar.com/ar73/www.jacksontcpassettlement.com
              Source: explorer.exe, 00000001.00000002.525713546.000000000833A000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000001.00000003.461649448.0000000008356000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.echadholisticbar.comReferer:
              Source: explorer.exe, 00000001.00000002.525713546.000000000833A000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000001.00000003.461649448.0000000008356000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.hurricanevalleyatvjamboree.com
              Source: explorer.exe, 00000001.00000002.525713546.000000000833A000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000001.00000003.461649448.0000000008356000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.hurricanevalleyatvjamboree.com/ar73/
              Source: explorer.exe, 00000001.00000002.525713546.000000000833A000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000001.00000003.461649448.0000000008356000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.hurricanevalleyatvjamboree.com/ar73/www.innovantexclusive.com
              Source: explorer.exe, 00000001.00000002.525713546.000000000833A000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000001.00000003.461649448.0000000008356000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.hurricanevalleyatvjamboree.comReferer:
              Source: explorer.exe, 00000001.00000002.525713546.000000000833A000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000001.00000003.461649448.0000000008356000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.ingrambaby.com
              Source: explorer.exe, 00000001.00000002.525713546.000000000833A000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000001.00000003.461649448.0000000008356000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.ingrambaby.com/ar73/
              Source: explorer.exe, 00000001.00000002.525713546.000000000833A000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000001.00000003.461649448.0000000008356000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.ingrambaby.com/ar73/www.arredobagno.club
              Source: explorer.exe, 00000001.00000002.525713546.000000000833A000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000001.00000003.461649448.0000000008356000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.ingrambaby.comReferer:
              Source: explorer.exe, 00000001.00000002.525713546.000000000833A000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000001.00000003.461649448.0000000008356000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.innovantexclusive.com
              Source: explorer.exe, 00000001.00000002.525713546.000000000833A000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000001.00000003.461649448.0000000008356000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.innovantexclusive.com/ar73/
              Source: explorer.exe, 00000001.00000002.525713546.000000000833A000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000001.00000003.461649448.0000000008356000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.innovantexclusive.com/ar73/www.1wwuwa.top
              Source: explorer.exe, 00000001.00000002.525713546.000000000833A000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000001.00000003.461649448.0000000008356000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.innovantexclusive.comReferer:
              Source: explorer.exe, 00000001.00000002.525713546.000000000833A000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000001.00000003.461649448.0000000008356000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.jacksontcpassettlement.com
              Source: explorer.exe, 00000001.00000002.525713546.000000000833A000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000001.00000003.461649448.0000000008356000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.jacksontcpassettlement.com/ar73/
              Source: explorer.exe, 00000001.00000002.525713546.000000000833A000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000001.00000003.461649448.0000000008356000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.jacksontcpassettlement.com/ar73/www.ingrambaby.com
              Source: explorer.exe, 00000001.00000002.525713546.000000000833A000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000001.00000003.461649448.0000000008356000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.jacksontcpassettlement.comReferer:
              Source: explorer.exe, 00000001.00000002.525713546.000000000833A000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000001.00000003.461649448.0000000008356000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.kellnovaglobalfood.info
              Source: explorer.exe, 00000001.00000002.525713546.000000000833A000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000001.00000003.461649448.0000000008356000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.kellnovaglobalfood.info/ar73/
              Source: explorer.exe, 00000001.00000002.525713546.000000000833A000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000001.00000003.461649448.0000000008356000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.kellnovaglobalfood.info/ar73/www.controlplus.systems
              Source: explorer.exe, 00000001.00000002.525713546.000000000833A000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000001.00000003.461649448.0000000008356000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.kellnovaglobalfood.infoReferer:
              Source: explorer.exe, 00000001.00000002.525713546.000000000833A000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000001.00000003.461649448.0000000008356000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.mogi.africa
              Source: explorer.exe, 00000001.00000002.525713546.000000000833A000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000001.00000003.461649448.0000000008356000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.mogi.africa/ar73/
              Source: explorer.exe, 00000001.00000002.525713546.000000000833A000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000001.00000003.461649448.0000000008356000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.mogi.africa/ar73/www.kellnovaglobalfood.info
              Source: explorer.exe, 00000001.00000002.525713546.000000000833A000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000001.00000003.461649448.0000000008356000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.mogi.africaReferer:
              Source: explorer.exe, 00000001.00000002.525713546.000000000833A000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000001.00000003.461649448.0000000008356000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.mtevz.online
              Source: explorer.exe, 00000001.00000002.525713546.000000000833A000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000001.00000003.461649448.0000000008356000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.mtevz.online/ar73/
              Source: explorer.exe, 00000001.00000002.525713546.000000000833A000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000001.00000003.461649448.0000000008356000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.mtevz.online/ar73/r
              Source: explorer.exe, 00000001.00000002.525713546.000000000833A000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000001.00000003.461649448.0000000008356000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.mtevz.onlineReferer:
              Source: explorer.exe, 00000001.00000002.525713546.000000000833A000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000001.00000003.461649448.0000000008356000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.quickhealcareltd.co.uk
              Source: explorer.exe, 00000001.00000002.525713546.000000000833A000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000001.00000003.461649448.0000000008356000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.quickhealcareltd.co.uk/ar73/
              Source: explorer.exe, 00000001.00000002.525713546.000000000833A000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000001.00000003.461649448.0000000008356000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.quickhealcareltd.co.uk/ar73/www.authenticityhacking.com
              Source: explorer.exe, 00000001.00000002.525713546.000000000833A000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000001.00000003.461649448.0000000008356000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.quickhealcareltd.co.ukReferer:
              Source: unknownDNS traffic detected: queries for: www.mogi.africa
              Source: C:\Windows\explorer.exeCode function: 1_2_100D8F82 getaddrinfo,setsockopt,recv,
              Source: global trafficHTTP traffic detected: GET /ar73/?Qj=i6BPGBhEPZBlfl7tAP1UBBwzioJGNNDALkR90REkFgMzqoaCb5EMO/kcO5kV95GeH/kMM6gDFg==&x6=n0GdIP_ HTTP/1.1Host: www.kellnovaglobalfood.infoConnection: closeData Raw: 00 00 00 00 00 00 00 Data Ascii:
              Source: global trafficHTTP traffic detected: GET /ar73/?Qj=pTDthzaqbIgyWHdtpzpwnulvL2qvi2wcQCOYQZrmaB3EJlnnV9x+gp8AnzNn3ZLGsW0uMr4raA==&x6=n0GdIP_ HTTP/1.1Host: www.controlplus.systemsConnection: closeData Raw: 00 00 00 00 00 00 00 Data Ascii:
              Source: 7pECKdsaig.exe, 00000000.00000002.289211291.000000000145A000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: <HOOK MODULE="DDRAW.DLL" FUNCTION="DirectDrawCreateEx"/>

              E-Banking Fraud

              barindex
              Source: Yara matchFile source: 7pECKdsaig.exe, type: SAMPLE
              Source: Yara matchFile source: 0.2.7pECKdsaig.exe.a80000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.0.7pECKdsaig.exe.a80000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 00000000.00000002.288830411.0000000000A81000.00000020.00000001.01000000.00000003.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000000.00000002.289101701.0000000001370000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000002.00000002.520351827.0000000004FCF000.00000004.10000000.00040000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000002.00000002.518766538.0000000002EE0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000000.00000002.289007135.0000000001210000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000000.00000000.249149614.0000000000A81000.00000020.00000001.01000000.00000003.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000001.00000002.531047978.000000001389F000.00000004.80000000.00040000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000002.00000002.518698032.0000000002EB0000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000002.00000002.517165647.0000000000580000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000002.00000002.517610096.00000000008C4000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY

              System Summary

              barindex
              Source: 7pECKdsaig.exe, type: SAMPLEMatched rule: Windows_Trojan_Formbook_1112e116 Author: unknown
              Source: 7pECKdsaig.exe, type: SAMPLEMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
              Source: 7pECKdsaig.exe, type: SAMPLEMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
              Source: 0.2.7pECKdsaig.exe.a80000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Formbook_1112e116 Author: unknown
              Source: 0.2.7pECKdsaig.exe.a80000.0.unpack, type: UNPACKEDPEMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
              Source: 0.2.7pECKdsaig.exe.a80000.0.unpack, type: UNPACKEDPEMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
              Source: 0.0.7pECKdsaig.exe.a80000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Formbook_1112e116 Author: unknown
              Source: 0.0.7pECKdsaig.exe.a80000.0.unpack, type: UNPACKEDPEMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
              Source: 0.0.7pECKdsaig.exe.a80000.0.unpack, type: UNPACKEDPEMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
              Source: 00000000.00000002.288830411.0000000000A81000.00000020.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 Author: unknown
              Source: 00000000.00000002.288830411.0000000000A81000.00000020.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
              Source: 00000000.00000002.288830411.0000000000A81000.00000020.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
              Source: 00000000.00000002.289101701.0000000001370000.00000040.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 Author: unknown
              Source: 00000000.00000002.289101701.0000000001370000.00000040.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
              Source: 00000000.00000002.289101701.0000000001370000.00000040.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
              Source: 00000002.00000002.520351827.0000000004FCF000.00000004.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 Author: unknown
              Source: 00000002.00000002.520351827.0000000004FCF000.00000004.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
              Source: 00000002.00000002.520351827.0000000004FCF000.00000004.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
              Source: 00000002.00000002.518766538.0000000002EE0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 Author: unknown
              Source: 00000002.00000002.518766538.0000000002EE0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
              Source: 00000002.00000002.518766538.0000000002EE0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
              Source: 00000000.00000002.289007135.0000000001210000.00000040.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 Author: unknown
              Source: 00000000.00000002.289007135.0000000001210000.00000040.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
              Source: 00000000.00000002.289007135.0000000001210000.00000040.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
              Source: 00000000.00000000.249149614.0000000000A81000.00000020.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 Author: unknown
              Source: 00000000.00000000.249149614.0000000000A81000.00000020.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
              Source: 00000000.00000000.249149614.0000000000A81000.00000020.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
              Source: 00000001.00000002.531047978.000000001389F000.00000004.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 Author: unknown
              Source: 00000001.00000002.531047978.000000001389F000.00000004.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
              Source: 00000001.00000002.531047978.000000001389F000.00000004.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
              Source: 00000002.00000002.518698032.0000000002EB0000.00000040.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 Author: unknown
              Source: 00000002.00000002.518698032.0000000002EB0000.00000040.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
              Source: 00000002.00000002.518698032.0000000002EB0000.00000040.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
              Source: 00000002.00000002.517165647.0000000000580000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 Author: unknown
              Source: 00000002.00000002.517165647.0000000000580000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
              Source: 00000002.00000002.517165647.0000000000580000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
              Source: 00000002.00000002.517610096.00000000008C4000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 Author: unknown
              Source: 00000002.00000002.517610096.00000000008C4000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
              Source: 00000002.00000002.517610096.00000000008C4000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
              Source: Process Memory Space: 7pECKdsaig.exe PID: 6000, type: MEMORYSTRMatched rule: Windows_Trojan_Formbook_1112e116 Author: unknown
              Source: Process Memory Space: explorer.exe PID: 3452, type: MEMORYSTRMatched rule: Windows_Trojan_Formbook_1112e116 Author: unknown
              Source: Process Memory Space: msdt.exe PID: 5148, type: MEMORYSTRMatched rule: Windows_Trojan_Formbook_1112e116 Author: unknown
              Source: 7pECKdsaig.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
              Source: 7pECKdsaig.exe, type: SAMPLEMatched rule: Windows_Trojan_Formbook_1112e116 reference_sample = 6246f3b89f0e4913abd88ae535ae3597865270f58201dc7f8ec0c87f15ff370a, os = windows, severity = x86, creation_date = 2021-06-14, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Formbook, fingerprint = b8b88451ad8c66b54e21455d835a5d435e52173c86e9b813ffab09451aff7134, id = 1112e116-dee0-4818-a41f-ca5c1c41b4b8, last_modified = 2021-08-23
              Source: 7pECKdsaig.exe, type: SAMPLEMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
              Source: 7pECKdsaig.exe, type: SAMPLEMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
              Source: 0.2.7pECKdsaig.exe.a80000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Formbook_1112e116 reference_sample = 6246f3b89f0e4913abd88ae535ae3597865270f58201dc7f8ec0c87f15ff370a, os = windows, severity = x86, creation_date = 2021-06-14, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Formbook, fingerprint = b8b88451ad8c66b54e21455d835a5d435e52173c86e9b813ffab09451aff7134, id = 1112e116-dee0-4818-a41f-ca5c1c41b4b8, last_modified = 2021-08-23
              Source: 0.2.7pECKdsaig.exe.a80000.0.unpack, type: UNPACKEDPEMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
              Source: 0.2.7pECKdsaig.exe.a80000.0.unpack, type: UNPACKEDPEMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
              Source: 0.0.7pECKdsaig.exe.a80000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Formbook_1112e116 reference_sample = 6246f3b89f0e4913abd88ae535ae3597865270f58201dc7f8ec0c87f15ff370a, os = windows, severity = x86, creation_date = 2021-06-14, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Formbook, fingerprint = b8b88451ad8c66b54e21455d835a5d435e52173c86e9b813ffab09451aff7134, id = 1112e116-dee0-4818-a41f-ca5c1c41b4b8, last_modified = 2021-08-23
              Source: 0.0.7pECKdsaig.exe.a80000.0.unpack, type: UNPACKEDPEMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
              Source: 0.0.7pECKdsaig.exe.a80000.0.unpack, type: UNPACKEDPEMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
              Source: 00000000.00000002.288830411.0000000000A81000.00000020.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 reference_sample = 6246f3b89f0e4913abd88ae535ae3597865270f58201dc7f8ec0c87f15ff370a, os = windows, severity = x86, creation_date = 2021-06-14, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Formbook, fingerprint = b8b88451ad8c66b54e21455d835a5d435e52173c86e9b813ffab09451aff7134, id = 1112e116-dee0-4818-a41f-ca5c1c41b4b8, last_modified = 2021-08-23
              Source: 00000000.00000002.288830411.0000000000A81000.00000020.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
              Source: 00000000.00000002.288830411.0000000000A81000.00000020.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
              Source: 00000000.00000002.289101701.0000000001370000.00000040.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 reference_sample = 6246f3b89f0e4913abd88ae535ae3597865270f58201dc7f8ec0c87f15ff370a, os = windows, severity = x86, creation_date = 2021-06-14, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Formbook, fingerprint = b8b88451ad8c66b54e21455d835a5d435e52173c86e9b813ffab09451aff7134, id = 1112e116-dee0-4818-a41f-ca5c1c41b4b8, last_modified = 2021-08-23
              Source: 00000000.00000002.289101701.0000000001370000.00000040.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
              Source: 00000000.00000002.289101701.0000000001370000.00000040.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
              Source: 00000002.00000002.520351827.0000000004FCF000.00000004.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 reference_sample = 6246f3b89f0e4913abd88ae535ae3597865270f58201dc7f8ec0c87f15ff370a, os = windows, severity = x86, creation_date = 2021-06-14, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Formbook, fingerprint = b8b88451ad8c66b54e21455d835a5d435e52173c86e9b813ffab09451aff7134, id = 1112e116-dee0-4818-a41f-ca5c1c41b4b8, last_modified = 2021-08-23
              Source: 00000002.00000002.520351827.0000000004FCF000.00000004.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
              Source: 00000002.00000002.520351827.0000000004FCF000.00000004.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
              Source: 00000002.00000002.518766538.0000000002EE0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 reference_sample = 6246f3b89f0e4913abd88ae535ae3597865270f58201dc7f8ec0c87f15ff370a, os = windows, severity = x86, creation_date = 2021-06-14, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Formbook, fingerprint = b8b88451ad8c66b54e21455d835a5d435e52173c86e9b813ffab09451aff7134, id = 1112e116-dee0-4818-a41f-ca5c1c41b4b8, last_modified = 2021-08-23
              Source: 00000002.00000002.518766538.0000000002EE0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
              Source: 00000002.00000002.518766538.0000000002EE0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
              Source: 00000000.00000002.289007135.0000000001210000.00000040.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 reference_sample = 6246f3b89f0e4913abd88ae535ae3597865270f58201dc7f8ec0c87f15ff370a, os = windows, severity = x86, creation_date = 2021-06-14, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Formbook, fingerprint = b8b88451ad8c66b54e21455d835a5d435e52173c86e9b813ffab09451aff7134, id = 1112e116-dee0-4818-a41f-ca5c1c41b4b8, last_modified = 2021-08-23
              Source: 00000000.00000002.289007135.0000000001210000.00000040.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
              Source: 00000000.00000002.289007135.0000000001210000.00000040.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
              Source: 00000000.00000000.249149614.0000000000A81000.00000020.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 reference_sample = 6246f3b89f0e4913abd88ae535ae3597865270f58201dc7f8ec0c87f15ff370a, os = windows, severity = x86, creation_date = 2021-06-14, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Formbook, fingerprint = b8b88451ad8c66b54e21455d835a5d435e52173c86e9b813ffab09451aff7134, id = 1112e116-dee0-4818-a41f-ca5c1c41b4b8, last_modified = 2021-08-23
              Source: 00000000.00000000.249149614.0000000000A81000.00000020.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
              Source: 00000000.00000000.249149614.0000000000A81000.00000020.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
              Source: 00000001.00000002.531047978.000000001389F000.00000004.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 reference_sample = 6246f3b89f0e4913abd88ae535ae3597865270f58201dc7f8ec0c87f15ff370a, os = windows, severity = x86, creation_date = 2021-06-14, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Formbook, fingerprint = b8b88451ad8c66b54e21455d835a5d435e52173c86e9b813ffab09451aff7134, id = 1112e116-dee0-4818-a41f-ca5c1c41b4b8, last_modified = 2021-08-23
              Source: 00000001.00000002.531047978.000000001389F000.00000004.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
              Source: 00000001.00000002.531047978.000000001389F000.00000004.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
              Source: 00000002.00000002.518698032.0000000002EB0000.00000040.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 reference_sample = 6246f3b89f0e4913abd88ae535ae3597865270f58201dc7f8ec0c87f15ff370a, os = windows, severity = x86, creation_date = 2021-06-14, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Formbook, fingerprint = b8b88451ad8c66b54e21455d835a5d435e52173c86e9b813ffab09451aff7134, id = 1112e116-dee0-4818-a41f-ca5c1c41b4b8, last_modified = 2021-08-23
              Source: 00000002.00000002.518698032.0000000002EB0000.00000040.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
              Source: 00000002.00000002.518698032.0000000002EB0000.00000040.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
              Source: 00000002.00000002.517165647.0000000000580000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 reference_sample = 6246f3b89f0e4913abd88ae535ae3597865270f58201dc7f8ec0c87f15ff370a, os = windows, severity = x86, creation_date = 2021-06-14, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Formbook, fingerprint = b8b88451ad8c66b54e21455d835a5d435e52173c86e9b813ffab09451aff7134, id = 1112e116-dee0-4818-a41f-ca5c1c41b4b8, last_modified = 2021-08-23
              Source: 00000002.00000002.517165647.0000000000580000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
              Source: 00000002.00000002.517165647.0000000000580000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
              Source: 00000002.00000002.517610096.00000000008C4000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 reference_sample = 6246f3b89f0e4913abd88ae535ae3597865270f58201dc7f8ec0c87f15ff370a, os = windows, severity = x86, creation_date = 2021-06-14, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Formbook, fingerprint = b8b88451ad8c66b54e21455d835a5d435e52173c86e9b813ffab09451aff7134, id = 1112e116-dee0-4818-a41f-ca5c1c41b4b8, last_modified = 2021-08-23
              Source: 00000002.00000002.517610096.00000000008C4000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
              Source: 00000002.00000002.517610096.00000000008C4000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
              Source: Process Memory Space: 7pECKdsaig.exe PID: 6000, type: MEMORYSTRMatched rule: Windows_Trojan_Formbook_1112e116 reference_sample = 6246f3b89f0e4913abd88ae535ae3597865270f58201dc7f8ec0c87f15ff370a, os = windows, severity = x86, creation_date = 2021-06-14, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Formbook, fingerprint = b8b88451ad8c66b54e21455d835a5d435e52173c86e9b813ffab09451aff7134, id = 1112e116-dee0-4818-a41f-ca5c1c41b4b8, last_modified = 2021-08-23
              Source: Process Memory Space: explorer.exe PID: 3452, type: MEMORYSTRMatched rule: Windows_Trojan_Formbook_1112e116 reference_sample = 6246f3b89f0e4913abd88ae535ae3597865270f58201dc7f8ec0c87f15ff370a, os = windows, severity = x86, creation_date = 2021-06-14, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Formbook, fingerprint = b8b88451ad8c66b54e21455d835a5d435e52173c86e9b813ffab09451aff7134, id = 1112e116-dee0-4818-a41f-ca5c1c41b4b8, last_modified = 2021-08-23
              Source: Process Memory Space: msdt.exe PID: 5148, type: MEMORYSTRMatched rule: Windows_Trojan_Formbook_1112e116 reference_sample = 6246f3b89f0e4913abd88ae535ae3597865270f58201dc7f8ec0c87f15ff370a, os = windows, severity = x86, creation_date = 2021-06-14, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Formbook, fingerprint = b8b88451ad8c66b54e21455d835a5d435e52173c86e9b813ffab09451aff7134, id = 1112e116-dee0-4818-a41f-ca5c1c41b4b8, last_modified = 2021-08-23
              Source: C:\Users\user\Desktop\7pECKdsaig.exeCode function: 0_2_00A81030
              Source: C:\Users\user\Desktop\7pECKdsaig.exeCode function: 0_2_00A9E866
              Source: C:\Users\user\Desktop\7pECKdsaig.exeCode function: 0_2_00A9E1F5
              Source: C:\Users\user\Desktop\7pECKdsaig.exeCode function: 0_2_00A9D5AD
              Source: C:\Users\user\Desktop\7pECKdsaig.exeCode function: 0_2_00A82D8E
              Source: C:\Users\user\Desktop\7pECKdsaig.exeCode function: 0_2_00A82D90
              Source: C:\Users\user\Desktop\7pECKdsaig.exeCode function: 0_2_00A9ED31
              Source: C:\Users\user\Desktop\7pECKdsaig.exeCode function: 0_2_00A89E50
              Source: C:\Users\user\Desktop\7pECKdsaig.exeCode function: 0_2_00A82FB0
              Source: C:\Users\user\Desktop\7pECKdsaig.exeCode function: 0_2_01734120
              Source: C:\Users\user\Desktop\7pECKdsaig.exeCode function: 0_2_0171F900
              Source: C:\Users\user\Desktop\7pECKdsaig.exeCode function: 0_2_017D1002
              Source: C:\Users\user\Desktop\7pECKdsaig.exeCode function: 0_2_017E28EC
              Source: C:\Users\user\Desktop\7pECKdsaig.exeCode function: 0_2_017420A0
              Source: C:\Users\user\Desktop\7pECKdsaig.exeCode function: 0_2_017E20A8
              Source: C:\Users\user\Desktop\7pECKdsaig.exeCode function: 0_2_0172B090
              Source: C:\Users\user\Desktop\7pECKdsaig.exeCode function: 0_2_017E2B28
              Source: C:\Users\user\Desktop\7pECKdsaig.exeCode function: 0_2_017DDBD2
              Source: C:\Users\user\Desktop\7pECKdsaig.exeCode function: 0_2_0174EBB0
              Source: C:\Users\user\Desktop\7pECKdsaig.exeCode function: 0_2_017E22AE
              Source: C:\Users\user\Desktop\7pECKdsaig.exeCode function: 0_2_017E1D55
              Source: C:\Users\user\Desktop\7pECKdsaig.exeCode function: 0_2_01710D20
              Source: C:\Users\user\Desktop\7pECKdsaig.exeCode function: 0_2_017E2D07
              Source: C:\Users\user\Desktop\7pECKdsaig.exeCode function: 0_2_0172D5E0
              Source: C:\Windows\explorer.exeCode function: 1_2_0E173232
              Source: C:\Windows\explorer.exeCode function: 1_2_0E16DB32
              Source: C:\Windows\explorer.exeCode function: 1_2_0E16DB30
              Source: C:\Windows\explorer.exeCode function: 1_2_0E172036
              Source: C:\Windows\explorer.exeCode function: 1_2_0E169082
              Source: C:\Windows\explorer.exeCode function: 1_2_0E170912
              Source: C:\Windows\explorer.exeCode function: 1_2_0E16AD02
              Source: C:\Windows\explorer.exeCode function: 1_2_0E1765CD
              Source: C:\Windows\explorer.exeCode function: 1_2_100D8232
              Source: C:\Windows\explorer.exeCode function: 1_2_100D7036
              Source: C:\Windows\explorer.exeCode function: 1_2_100CE082
              Source: C:\Windows\explorer.exeCode function: 1_2_100CFD02
              Source: C:\Windows\explorer.exeCode function: 1_2_100D5912
              Source: C:\Windows\explorer.exeCode function: 1_2_100D2B30
              Source: C:\Windows\explorer.exeCode function: 1_2_100D2B32
              Source: C:\Windows\explorer.exeCode function: 1_2_100DB5CD
              Source: C:\Windows\SysWOW64\msdt.exeCode function: 2_2_04AF20A0
              Source: C:\Windows\SysWOW64\msdt.exeCode function: 2_2_04B920A8
              Source: C:\Windows\SysWOW64\msdt.exeCode function: 2_2_04ADB090
              Source: C:\Windows\SysWOW64\msdt.exeCode function: 2_2_04B928EC
              Source: C:\Windows\SysWOW64\msdt.exeCode function: 2_2_04AD841F
              Source: C:\Windows\SysWOW64\msdt.exeCode function: 2_2_04B81002
              Source: C:\Windows\SysWOW64\msdt.exeCode function: 2_2_04AF2581
              Source: C:\Windows\SysWOW64\msdt.exeCode function: 2_2_04ADD5E0
              Source: C:\Windows\SysWOW64\msdt.exeCode function: 2_2_04B925DD
              Source: C:\Windows\SysWOW64\msdt.exeCode function: 2_2_04AC0D20
              Source: C:\Windows\SysWOW64\msdt.exeCode function: 2_2_04AE4120
              Source: C:\Windows\SysWOW64\msdt.exeCode function: 2_2_04ACF900
              Source: C:\Windows\SysWOW64\msdt.exeCode function: 2_2_04B92D07
              Source: C:\Windows\SysWOW64\msdt.exeCode function: 2_2_04B91D55
              Source: C:\Windows\SysWOW64\msdt.exeCode function: 2_2_04B922AE
              Source: C:\Windows\SysWOW64\msdt.exeCode function: 2_2_04B92EF7
              Source: C:\Windows\SysWOW64\msdt.exeCode function: 2_2_04AE6E30
              Source: C:\Windows\SysWOW64\msdt.exeCode function: 2_2_04AFEBB0
              Source: C:\Windows\SysWOW64\msdt.exeCode function: 2_2_04B91FF1
              Source: C:\Windows\SysWOW64\msdt.exeCode function: 2_2_04B8DBD2
              Source: C:\Windows\SysWOW64\msdt.exeCode function: 2_2_04B92B28
              Source: C:\Windows\SysWOW64\msdt.exeCode function: 2_2_0059E866
              Source: C:\Windows\SysWOW64\msdt.exeCode function: 2_2_00582D90
              Source: C:\Windows\SysWOW64\msdt.exeCode function: 2_2_00582D8E
              Source: C:\Windows\SysWOW64\msdt.exeCode function: 2_2_0059D5AD
              Source: C:\Windows\SysWOW64\msdt.exeCode function: 2_2_00589E50
              Source: C:\Windows\SysWOW64\msdt.exeCode function: 2_2_00582FB0
              Source: C:\Windows\SysWOW64\msdt.exeCode function: String function: 04ACB150 appears 35 times
              Source: C:\Users\user\Desktop\7pECKdsaig.exeCode function: 0_2_00A9A350 NtCreateFile,
              Source: C:\Users\user\Desktop\7pECKdsaig.exeCode function: 0_2_00A9A480 NtClose,
              Source: C:\Users\user\Desktop\7pECKdsaig.exeCode function: 0_2_00A9A400 NtReadFile,
              Source: C:\Users\user\Desktop\7pECKdsaig.exeCode function: 0_2_00A9A530 NtAllocateVirtualMemory,
              Source: C:\Users\user\Desktop\7pECKdsaig.exeCode function: 0_2_00A9A3FB NtReadFile,
              Source: C:\Users\user\Desktop\7pECKdsaig.exeCode function: 0_2_00A9A47A NtClose,
              Source: C:\Users\user\Desktop\7pECKdsaig.exeCode function: 0_2_01759910 NtAdjustPrivilegesToken,LdrInitializeThunk,
              Source: C:\Users\user\Desktop\7pECKdsaig.exeCode function: 0_2_017599A0 NtCreateSection,LdrInitializeThunk,
              Source: C:\Users\user\Desktop\7pECKdsaig.exeCode function: 0_2_01759860 NtQuerySystemInformation,LdrInitializeThunk,
              Source: C:\Users\user\Desktop\7pECKdsaig.exeCode function: 0_2_01759840 NtDelayExecution,LdrInitializeThunk,
              Source: C:\Users\user\Desktop\7pECKdsaig.exeCode function: 0_2_017598F0 NtReadVirtualMemory,LdrInitializeThunk,
              Source: C:\Users\user\Desktop\7pECKdsaig.exeCode function: 0_2_01759A50 NtCreateFile,LdrInitializeThunk,
              Source: C:\Users\user\Desktop\7pECKdsaig.exeCode function: 0_2_01759A20 NtResumeThread,LdrInitializeThunk,
              Source: C:\Users\user\Desktop\7pECKdsaig.exeCode function: 0_2_01759A00 NtProtectVirtualMemory,LdrInitializeThunk,
              Source: C:\Users\user\Desktop\7pECKdsaig.exeCode function: 0_2_01759540 NtReadFile,LdrInitializeThunk,
              Source: C:\Users\user\Desktop\7pECKdsaig.exeCode function: 0_2_017595D0 NtClose,LdrInitializeThunk,
              Source: C:\Users\user\Desktop\7pECKdsaig.exeCode function: 0_2_01759710 NtQueryInformationToken,LdrInitializeThunk,
              Source: C:\Users\user\Desktop\7pECKdsaig.exeCode function: 0_2_017597A0 NtUnmapViewOfSection,LdrInitializeThunk,
              Source: C:\Users\user\Desktop\7pECKdsaig.exeCode function: 0_2_01759780 NtMapViewOfSection,LdrInitializeThunk,
              Source: C:\Users\user\Desktop\7pECKdsaig.exeCode function: 0_2_01759660 NtAllocateVirtualMemory,LdrInitializeThunk,
              Source: C:\Users\user\Desktop\7pECKdsaig.exeCode function: 0_2_017596E0 NtFreeVirtualMemory,LdrInitializeThunk,
              Source: C:\Users\user\Desktop\7pECKdsaig.exeCode function: 0_2_01759950 NtQueueApcThread,
              Source: C:\Users\user\Desktop\7pECKdsaig.exeCode function: 0_2_017599D0 NtCreateProcessEx,
              Source: C:\Users\user\Desktop\7pECKdsaig.exeCode function: 0_2_0175B040 NtSuspendThread,
              Source: C:\Users\user\Desktop\7pECKdsaig.exeCode function: 0_2_01759820 NtEnumerateKey,
              Source: C:\Users\user\Desktop\7pECKdsaig.exeCode function: 0_2_017598A0 NtWriteVirtualMemory,
              Source: C:\Users\user\Desktop\7pECKdsaig.exeCode function: 0_2_01759B00 NtSetValueKey,
              Source: C:\Users\user\Desktop\7pECKdsaig.exeCode function: 0_2_0175A3B0 NtGetContextThread,
              Source: C:\Users\user\Desktop\7pECKdsaig.exeCode function: 0_2_01759A10 NtQuerySection,
              Source: C:\Users\user\Desktop\7pECKdsaig.exeCode function: 0_2_01759A80 NtOpenDirectoryObject,
              Source: C:\Users\user\Desktop\7pECKdsaig.exeCode function: 0_2_01759560 NtWriteFile,
              Source: C:\Users\user\Desktop\7pECKdsaig.exeCode function: 0_2_0175AD30 NtSetContextThread,
              Source: C:\Users\user\Desktop\7pECKdsaig.exeCode function: 0_2_01759520 NtWaitForSingleObject,
              Source: C:\Users\user\Desktop\7pECKdsaig.exeCode function: 0_2_017595F0 NtQueryInformationFile,
              Source: C:\Windows\explorer.exeCode function: 1_2_100D9E12 NtProtectVirtualMemory,
              Source: C:\Windows\explorer.exeCode function: 1_2_100D8232 NtCreateFile,
              Source: C:\Windows\explorer.exeCode function: 1_2_100D9E0A NtProtectVirtualMemory,
              Source: C:\Windows\SysWOW64\msdt.exeCode function: 2_2_04B09860 NtQuerySystemInformation,LdrInitializeThunk,
              Source: C:\Windows\SysWOW64\msdt.exeCode function: 2_2_04B09840 NtDelayExecution,LdrInitializeThunk,
              Source: C:\Windows\SysWOW64\msdt.exeCode function: 2_2_04B099A0 NtCreateSection,LdrInitializeThunk,
              Source: C:\Windows\SysWOW64\msdt.exeCode function: 2_2_04B095D0 NtClose,LdrInitializeThunk,
              Source: C:\Windows\SysWOW64\msdt.exeCode function: 2_2_04B09910 NtAdjustPrivilegesToken,LdrInitializeThunk,
              Source: C:\Windows\SysWOW64\msdt.exeCode function: 2_2_04B09540 NtReadFile,LdrInitializeThunk,
              Source: C:\Windows\SysWOW64\msdt.exeCode function: 2_2_04B096E0 NtFreeVirtualMemory,LdrInitializeThunk,
              Source: C:\Windows\SysWOW64\msdt.exeCode function: 2_2_04B096D0 NtCreateKey,LdrInitializeThunk,
              Source: C:\Windows\SysWOW64\msdt.exeCode function: 2_2_04B09660 NtAllocateVirtualMemory,LdrInitializeThunk,
              Source: C:\Windows\SysWOW64\msdt.exeCode function: 2_2_04B09650 NtQueryValueKey,LdrInitializeThunk,
              Source: C:\Windows\SysWOW64\msdt.exeCode function: 2_2_04B09A50 NtCreateFile,LdrInitializeThunk,
              Source: C:\Windows\SysWOW64\msdt.exeCode function: 2_2_04B09780 NtMapViewOfSection,LdrInitializeThunk,
              Source: C:\Windows\SysWOW64\msdt.exeCode function: 2_2_04B09FE0 NtCreateMutant,LdrInitializeThunk,
              Source: C:\Windows\SysWOW64\msdt.exeCode function: 2_2_04B09710 NtQueryInformationToken,LdrInitializeThunk,
              Source: C:\Windows\SysWOW64\msdt.exeCode function: 2_2_04B098A0 NtWriteVirtualMemory,
              Source: C:\Windows\SysWOW64\msdt.exeCode function: 2_2_04B098F0 NtReadVirtualMemory,
              Source: C:\Windows\SysWOW64\msdt.exeCode function: 2_2_04B09820 NtEnumerateKey,
              Source: C:\Windows\SysWOW64\msdt.exeCode function: 2_2_04B0B040 NtSuspendThread,
              Source: C:\Windows\SysWOW64\msdt.exeCode function: 2_2_04B095F0 NtQueryInformationFile,
              Source: C:\Windows\SysWOW64\msdt.exeCode function: 2_2_04B099D0 NtCreateProcessEx,
              Source: C:\Windows\SysWOW64\msdt.exeCode function: 2_2_04B0AD30 NtSetContextThread,
              Source: C:\Windows\SysWOW64\msdt.exeCode function: 2_2_04B09520 NtWaitForSingleObject,
              Source: C:\Windows\SysWOW64\msdt.exeCode function: 2_2_04B09560 NtWriteFile,
              Source: C:\Windows\SysWOW64\msdt.exeCode function: 2_2_04B09950 NtQueueApcThread,
              Source: C:\Windows\SysWOW64\msdt.exeCode function: 2_2_04B09A80 NtOpenDirectoryObject,
              Source: C:\Windows\SysWOW64\msdt.exeCode function: 2_2_04B09A20 NtResumeThread,
              Source: C:\Windows\SysWOW64\msdt.exeCode function: 2_2_04B09610 NtEnumerateValueKey,
              Source: C:\Windows\SysWOW64\msdt.exeCode function: 2_2_04B09A10 NtQuerySection,
              Source: C:\Windows\SysWOW64\msdt.exeCode function: 2_2_04B09A00 NtProtectVirtualMemory,
              Source: C:\Windows\SysWOW64\msdt.exeCode function: 2_2_04B09670 NtQueryInformationProcess,
              Source: C:\Windows\SysWOW64\msdt.exeCode function: 2_2_04B0A3B0 NtGetContextThread,
              Source: C:\Windows\SysWOW64\msdt.exeCode function: 2_2_04B097A0 NtUnmapViewOfSection,
              Source: C:\Windows\SysWOW64\msdt.exeCode function: 2_2_04B09730 NtQueryVirtualMemory,
              Source: C:\Windows\SysWOW64\msdt.exeCode function: 2_2_04B0A710 NtOpenProcessToken,
              Source: C:\Windows\SysWOW64\msdt.exeCode function: 2_2_04B09B00 NtSetValueKey,
              Source: C:\Windows\SysWOW64\msdt.exeCode function: 2_2_04B09770 NtSetInformationFile,
              Source: C:\Windows\SysWOW64\msdt.exeCode function: 2_2_04B0A770 NtOpenThread,
              Source: C:\Windows\SysWOW64\msdt.exeCode function: 2_2_04B09760 NtOpenProcess,
              Source: C:\Windows\SysWOW64\msdt.exeCode function: 2_2_0059A350 NtCreateFile,
              Source: C:\Windows\SysWOW64\msdt.exeCode function: 2_2_0059A400 NtReadFile,
              Source: C:\Windows\SysWOW64\msdt.exeCode function: 2_2_0059A480 NtClose,
              Source: C:\Windows\SysWOW64\msdt.exeCode function: 2_2_0059A530 NtAllocateVirtualMemory,
              Source: C:\Windows\SysWOW64\msdt.exeCode function: 2_2_0059A3FB NtReadFile,
              Source: C:\Windows\SysWOW64\msdt.exeCode function: 2_2_0059A47A NtClose,
              Source: 7pECKdsaig.exeStatic PE information: No import functions for PE file found
              Source: 7pECKdsaig.exe, 00000000.00000002.293667137.0000000003520000.00000040.10000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenamemsdt.exej% vs 7pECKdsaig.exe
              Source: 7pECKdsaig.exe, 00000000.00000002.289263472.000000000199F000.00000040.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenamentdll.dllj% vs 7pECKdsaig.exe
              Source: 7pECKdsaig.exe, 00000000.00000003.251882713.000000000167C000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenamentdll.dllj% vs 7pECKdsaig.exe
              Source: 7pECKdsaig.exe, 00000000.00000002.289263472.000000000180F000.00000040.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenamentdll.dllj% vs 7pECKdsaig.exe
              Source: 7pECKdsaig.exe, 00000000.00000003.287536333.00000000036A4000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenamemsdt.exej% vs 7pECKdsaig.exe
              Source: 7pECKdsaig.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
              Source: 7pECKdsaig.exeStatic PE information: Section .text
              Source: 7pECKdsaig.exeReversingLabs: Detection: 76%
              Source: 7pECKdsaig.exeVirustotal: Detection: 59%
              Source: 7pECKdsaig.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
              Source: C:\Users\user\Desktop\7pECKdsaig.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
              Source: unknownProcess created: C:\Users\user\Desktop\7pECKdsaig.exe C:\Users\user\Desktop\7pECKdsaig.exe
              Source: C:\Windows\explorer.exeProcess created: C:\Windows\SysWOW64\msdt.exe C:\Windows\SysWOW64\msdt.exe
              Source: C:\Windows\SysWOW64\msdt.exeProcess created: C:\Windows\SysWOW64\cmd.exe /c del "C:\Users\user\Desktop\7pECKdsaig.exe"
              Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
              Source: C:\Windows\explorer.exeProcess created: C:\Windows\SysWOW64\msdt.exe C:\Windows\SysWOW64\msdt.exe
              Source: C:\Windows\SysWOW64\msdt.exeProcess created: C:\Windows\SysWOW64\cmd.exe /c del "C:\Users\user\Desktop\7pECKdsaig.exe"
              Source: C:\Windows\explorer.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{F324E4F9-8496-40b2-A1FF-9617C1C9AFFE}\InProcServer32
              Source: C:\Windows\explorer.exeFile created: C:\Users\user\AppData\Local\Microsoft\Windows\WER\ERC\statecache.lockJump to behavior
              Source: classification engineClassification label: mal100.troj.evad.winEXE@6/1@4/1
              Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:3660:120:WilError_01
              Source: C:\Windows\explorer.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
              Source: C:\Windows\explorer.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
              Source: 7pECKdsaig.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
              Source: Binary string: msdt.pdbGCTL source: 7pECKdsaig.exe, 00000000.00000002.293667137.0000000003520000.00000040.10000000.00040000.00000000.sdmp, 7pECKdsaig.exe, 00000000.00000003.281701865.000000000352D000.00000004.00000020.00020000.00000000.sdmp, 7pECKdsaig.exe, 00000000.00000003.287536333.00000000036A4000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: wntdll.pdbUGP source: 7pECKdsaig.exe, 00000000.00000003.251882713.000000000155D000.00000004.00000020.00020000.00000000.sdmp, 7pECKdsaig.exe, 00000000.00000002.289263472.000000000180F000.00000040.00001000.00020000.00000000.sdmp, 7pECKdsaig.exe, 00000000.00000002.289263472.00000000016F0000.00000040.00001000.00020000.00000000.sdmp, msdt.exe, 00000002.00000003.292381298.000000000490D000.00000004.00000020.00020000.00000000.sdmp, msdt.exe, 00000002.00000002.519078571.0000000004BBF000.00000040.00001000.00020000.00000000.sdmp, msdt.exe, 00000002.00000003.289235822.000000000476D000.00000004.00000020.00020000.00000000.sdmp, msdt.exe, 00000002.00000002.519078571.0000000004AA0000.00000040.00001000.00020000.00000000.sdmp
              Source: Binary string: wntdll.pdb source: 7pECKdsaig.exe, 7pECKdsaig.exe, 00000000.00000003.251882713.000000000155D000.00000004.00000020.00020000.00000000.sdmp, 7pECKdsaig.exe, 00000000.00000002.289263472.000000000180F000.00000040.00001000.00020000.00000000.sdmp, 7pECKdsaig.exe, 00000000.00000002.289263472.00000000016F0000.00000040.00001000.00020000.00000000.sdmp, msdt.exe, msdt.exe, 00000002.00000003.292381298.000000000490D000.00000004.00000020.00020000.00000000.sdmp, msdt.exe, 00000002.00000002.519078571.0000000004BBF000.00000040.00001000.00020000.00000000.sdmp, msdt.exe, 00000002.00000003.289235822.000000000476D000.00000004.00000020.00020000.00000000.sdmp, msdt.exe, 00000002.00000002.519078571.0000000004AA0000.00000040.00001000.00020000.00000000.sdmp
              Source: Binary string: msdt.pdb source: 7pECKdsaig.exe, 00000000.00000002.293667137.0000000003520000.00000040.10000000.00040000.00000000.sdmp, 7pECKdsaig.exe, 00000000.00000003.281701865.000000000352D000.00000004.00000020.00020000.00000000.sdmp, 7pECKdsaig.exe, 00000000.00000003.287536333.00000000036A4000.00000004.00000020.00020000.00000000.sdmp
              Source: C:\Users\user\Desktop\7pECKdsaig.exeCode function: 0_2_00A9798E push cs; retf
              Source: C:\Users\user\Desktop\7pECKdsaig.exeCode function: 0_2_00A9719C push esp; retf
              Source: C:\Users\user\Desktop\7pECKdsaig.exeCode function: 0_2_00A979D3 push esi; ret
              Source: C:\Users\user\Desktop\7pECKdsaig.exeCode function: 0_2_00A96911 push edi; ret
              Source: C:\Users\user\Desktop\7pECKdsaig.exeCode function: 0_2_00A9F110 push ecx; ret
              Source: C:\Users\user\Desktop\7pECKdsaig.exeCode function: 0_2_00A9D4A5 push eax; ret
              Source: C:\Users\user\Desktop\7pECKdsaig.exeCode function: 0_2_00A9D4FB push eax; ret
              Source: C:\Users\user\Desktop\7pECKdsaig.exeCode function: 0_2_00A9D4F2 push eax; ret
              Source: C:\Users\user\Desktop\7pECKdsaig.exeCode function: 0_2_00A9D55C push eax; ret
              Source: C:\Users\user\Desktop\7pECKdsaig.exeCode function: 0_2_0176D0D1 push ecx; ret
              Source: C:\Windows\explorer.exeCode function: 1_2_0E176B1E push esp; retn 0000h
              Source: C:\Windows\explorer.exeCode function: 1_2_0E176B02 push esp; retn 0000h
              Source: C:\Windows\explorer.exeCode function: 1_2_0E1769B5 push esp; retn 0000h
              Source: C:\Windows\explorer.exeCode function: 1_2_100DBB02 push esp; retn 0000h
              Source: C:\Windows\explorer.exeCode function: 1_2_100DBB1E push esp; retn 0000h
              Source: C:\Windows\explorer.exeCode function: 1_2_100DB9B5 push esp; retn 0000h
              Source: C:\Windows\SysWOW64\msdt.exeCode function: 2_2_04B1D0D1 push ecx; ret
              Source: C:\Windows\SysWOW64\msdt.exeCode function: 2_2_0059E158 push 150B24F0h; iretd
              Source: C:\Windows\SysWOW64\msdt.exeCode function: 2_2_0059F11E push ecx; ret
              Source: C:\Windows\SysWOW64\msdt.exeCode function: 2_2_00596911 push edi; ret
              Source: C:\Windows\SysWOW64\msdt.exeCode function: 2_2_005979D3 push esi; ret
              Source: C:\Windows\SysWOW64\msdt.exeCode function: 2_2_0059719C push esp; retf
              Source: C:\Windows\SysWOW64\msdt.exeCode function: 2_2_0059798E push cs; retf
              Source: C:\Windows\SysWOW64\msdt.exeCode function: 2_2_0059E224 pushfd ; ret
              Source: C:\Windows\SysWOW64\msdt.exeCode function: 2_2_0059D4FB push eax; ret
              Source: C:\Windows\SysWOW64\msdt.exeCode function: 2_2_0059D4F2 push eax; ret
              Source: C:\Windows\SysWOW64\msdt.exeCode function: 2_2_0059D4A5 push eax; ret
              Source: C:\Windows\SysWOW64\msdt.exeCode function: 2_2_0059D55C push eax; ret
              Source: initial sampleStatic PE information: section name: .text entropy: 7.409588215160137

              Hooking and other Techniques for Hiding and Protection

              barindex
              Source: explorer.exeUser mode code has changed: module: user32.dll function: PeekMessageA new code: 0x48 0x8B 0xB8 0x80 0x0E 0xE1
              Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\msdt.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\cmd.exeProcess information set: NOOPENFILEERRORBOX

              Malware Analysis System Evasion

              barindex
              Source: C:\Users\user\Desktop\7pECKdsaig.exeRDTSC instruction interceptor: First address: 0000000000A89904 second address: 0000000000A8990A instructions: 0x00000000 rdtsc 0x00000002 xor ecx, ecx 0x00000004 add ecx, eax 0x00000006 rdtsc
              Source: C:\Users\user\Desktop\7pECKdsaig.exeRDTSC instruction interceptor: First address: 0000000000A89B6E second address: 0000000000A89B74 instructions: 0x00000000 rdtsc 0x00000002 xor ecx, ecx 0x00000004 add ecx, eax 0x00000006 rdtsc
              Source: C:\Windows\SysWOW64\msdt.exeRDTSC instruction interceptor: First address: 0000000000589904 second address: 000000000058990A instructions: 0x00000000 rdtsc 0x00000002 xor ecx, ecx 0x00000004 add ecx, eax 0x00000006 rdtsc
              Source: C:\Windows\SysWOW64\msdt.exeRDTSC instruction interceptor: First address: 0000000000589B6E second address: 0000000000589B74 instructions: 0x00000000 rdtsc 0x00000002 xor ecx, ecx 0x00000004 add ecx, eax 0x00000006 rdtsc
              Source: C:\Windows\explorer.exeDecision node followed by non-executed suspicious API: DecisionNode, Non Executed (send or recv or WinExec)
              Source: C:\Windows\explorer.exeLast function: Thread delayed
              Source: C:\Windows\SysWOW64\msdt.exeLast function: Thread delayed
              Source: C:\Windows\SysWOW64\msdt.exeLast function: Thread delayed
              Source: C:\Users\user\Desktop\7pECKdsaig.exeCode function: 0_2_00A89AA0 rdtsc
              Source: C:\Windows\explorer.exeWindow / User API: foregroundWindowGot 865
              Source: C:\Windows\SysWOW64\msdt.exeAPI coverage: 9.7 %
              Source: C:\Users\user\Desktop\7pECKdsaig.exeProcess information queried: ProcessInformation
              Source: explorer.exe, 00000001.00000003.289061192.00000000084D8000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: AGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000025700000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#000000001F400000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000026700000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000000100000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&280b647&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_Msft&Prod_Virtual_DVD-ROM#2&1f4adffe&0&000001#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}
              Source: explorer.exe, 00000001.00000003.461296315.000000000683A000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: \\?\scsi#cdrom&ven_necvmwar&prod_vmware_sata_cd00#5&280b647&0&000000#{53f56308-b6bf-11d0-94f2-00a0c91efb8b}
              Source: explorer.exe, 00000001.00000000.263735895.00000000081DD000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: SCSI\Disk&Ven_VMware&Prod_Virtual_disk\5&1ec51bf7&0&000000^
              Source: explorer.exe, 00000001.00000002.523833052.0000000006710000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: \\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&280b647&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}y
              Source: explorer.exe, 00000001.00000003.461216185.000000000F53F000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000001.00000002.530259036.000000000F54E000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dllte
              Source: explorer.exe, 00000001.00000000.263735895.0000000008304000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: SCSI\CDROM&VEN_NECVMWAR&PROD_VMWARE_SATA_CD00\5&280B647&0&000000
              Source: explorer.exe, 00000001.00000003.462488828.00000000084D8000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: @%SystemRoot%\System32\mswsock.dll,-60101a0%SystemRoot%\system32\mswsock.dll-98f2-11e9-90ce-806e6f6e6963}#0000000000100000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&280b647&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_Msft&Prod_Vir~
              Source: explorer.exe, 00000001.00000000.263735895.00000000082B2000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: \\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000025700000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#000000001F400000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000026700000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000000100000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&280b647&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_Msft&Prod_Virtual_DVD-ROM#2&1f4adffe&0&000001#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}osoft S
              Source: explorer.exe, 00000001.00000002.525713546.00000000082B2000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: SCSI\CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00\5&280b647&0&000000
              Source: explorer.exe, 00000001.00000002.525713546.0000000008200000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: \\?\scsi#cdrom&ven_necvmwar&prod_vmware_sata_cd00#5&280b647&0&000000#{53f56308-b6bf-11d0-94f2-00a0c91efb8b}>&
              Source: C:\Users\user\Desktop\7pECKdsaig.exeCode function: 0_2_00A89AA0 rdtsc
              Source: C:\Users\user\Desktop\7pECKdsaig.exeProcess token adjusted: Debug
              Source: C:\Users\user\Desktop\7pECKdsaig.exeCode function: 0_2_0171B171 mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\7pECKdsaig.exeCode function: 0_2_0171B171 mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\7pECKdsaig.exeCode function: 0_2_0171C962 mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\7pECKdsaig.exeCode function: 0_2_0173B944 mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\7pECKdsaig.exeCode function: 0_2_0173B944 mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\7pECKdsaig.exeCode function: 0_2_0174513A mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\7pECKdsaig.exeCode function: 0_2_0174513A mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\7pECKdsaig.exeCode function: 0_2_01734120 mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\7pECKdsaig.exeCode function: 0_2_01734120 mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\7pECKdsaig.exeCode function: 0_2_01734120 mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\7pECKdsaig.exeCode function: 0_2_01734120 mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\7pECKdsaig.exeCode function: 0_2_01734120 mov ecx, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\7pECKdsaig.exeCode function: 0_2_01719100 mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\7pECKdsaig.exeCode function: 0_2_01719100 mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\7pECKdsaig.exeCode function: 0_2_01719100 mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\7pECKdsaig.exeCode function: 0_2_0171B1E1 mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\7pECKdsaig.exeCode function: 0_2_0171B1E1 mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\7pECKdsaig.exeCode function: 0_2_0171B1E1 mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\7pECKdsaig.exeCode function: 0_2_017A41E8 mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\7pECKdsaig.exeCode function: 0_2_017951BE mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\7pECKdsaig.exeCode function: 0_2_017951BE mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\7pECKdsaig.exeCode function: 0_2_017951BE mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\7pECKdsaig.exeCode function: 0_2_017951BE mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\7pECKdsaig.exeCode function: 0_2_017461A0 mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\7pECKdsaig.exeCode function: 0_2_017461A0 mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\7pECKdsaig.exeCode function: 0_2_017969A6 mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\7pECKdsaig.exeCode function: 0_2_01742990 mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\7pECKdsaig.exeCode function: 0_2_0174A185 mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\7pECKdsaig.exeCode function: 0_2_0173C182 mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\7pECKdsaig.exeCode function: 0_2_017E1074 mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\7pECKdsaig.exeCode function: 0_2_017D2073 mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\7pECKdsaig.exeCode function: 0_2_01730050 mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\7pECKdsaig.exeCode function: 0_2_01730050 mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\7pECKdsaig.exeCode function: 0_2_0172B02A mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\7pECKdsaig.exeCode function: 0_2_0172B02A mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\7pECKdsaig.exeCode function: 0_2_0172B02A mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\7pECKdsaig.exeCode function: 0_2_0172B02A mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\7pECKdsaig.exeCode function: 0_2_0174002D mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\7pECKdsaig.exeCode function: 0_2_0174002D mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\7pECKdsaig.exeCode function: 0_2_0174002D mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\7pECKdsaig.exeCode function: 0_2_0174002D mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\7pECKdsaig.exeCode function: 0_2_0174002D mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\7pECKdsaig.exeCode function: 0_2_017E4015 mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\7pECKdsaig.exeCode function: 0_2_017E4015 mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\7pECKdsaig.exeCode function: 0_2_01797016 mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\7pECKdsaig.exeCode function: 0_2_01797016 mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\7pECKdsaig.exeCode function: 0_2_01797016 mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\7pECKdsaig.exeCode function: 0_2_017158EC mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\7pECKdsaig.exeCode function: 0_2_017AB8D0 mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\7pECKdsaig.exeCode function: 0_2_017AB8D0 mov ecx, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\7pECKdsaig.exeCode function: 0_2_017AB8D0 mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\7pECKdsaig.exeCode function: 0_2_017AB8D0 mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\7pECKdsaig.exeCode function: 0_2_017AB8D0 mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\7pECKdsaig.exeCode function: 0_2_017AB8D0 mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\7pECKdsaig.exeCode function: 0_2_0174F0BF mov ecx, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\7pECKdsaig.exeCode function: 0_2_0174F0BF mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\7pECKdsaig.exeCode function: 0_2_0174F0BF mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\7pECKdsaig.exeCode function: 0_2_017420A0 mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\7pECKdsaig.exeCode function: 0_2_017420A0 mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\7pECKdsaig.exeCode function: 0_2_017420A0 mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\7pECKdsaig.exeCode function: 0_2_017420A0 mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\7pECKdsaig.exeCode function: 0_2_017420A0 mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\7pECKdsaig.exeCode function: 0_2_017420A0 mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\7pECKdsaig.exeCode function: 0_2_017590AF mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\7pECKdsaig.exeCode function: 0_2_01719080 mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\7pECKdsaig.exeCode function: 0_2_01793884 mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\7pECKdsaig.exeCode function: 0_2_01793884 mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\7pECKdsaig.exeCode function: 0_2_01743B7A mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\7pECKdsaig.exeCode function: 0_2_01743B7A mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\7pECKdsaig.exeCode function: 0_2_0171DB60 mov ecx, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\7pECKdsaig.exeCode function: 0_2_017E8B58 mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\7pECKdsaig.exeCode function: 0_2_0171F358 mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\7pECKdsaig.exeCode function: 0_2_0171DB40 mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\7pECKdsaig.exeCode function: 0_2_017D131B mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\7pECKdsaig.exeCode function: 0_2_017403E2 mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\7pECKdsaig.exeCode function: 0_2_017403E2 mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\7pECKdsaig.exeCode function: 0_2_017403E2 mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\7pECKdsaig.exeCode function: 0_2_017403E2 mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\7pECKdsaig.exeCode function: 0_2_017403E2 mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\7pECKdsaig.exeCode function: 0_2_017403E2 mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\7pECKdsaig.exeCode function: 0_2_0173DBE9 mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\7pECKdsaig.exeCode function: 0_2_017953CA mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\7pECKdsaig.exeCode function: 0_2_017953CA mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\7pECKdsaig.exeCode function: 0_2_01744BAD mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\7pECKdsaig.exeCode function: 0_2_01744BAD mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\7pECKdsaig.exeCode function: 0_2_01744BAD mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\7pECKdsaig.exeCode function: 0_2_017E5BA5 mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\7pECKdsaig.exeCode function: 0_2_01742397 mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\7pECKdsaig.exeCode function: 0_2_0174B390 mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\7pECKdsaig.exeCode function: 0_2_017D138A mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\7pECKdsaig.exeCode function: 0_2_017CD380 mov ecx, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\7pECKdsaig.exeCode function: 0_2_01721B8F mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\7pECKdsaig.exeCode function: 0_2_01721B8F mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\7pECKdsaig.exeCode function: 0_2_0175927A mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\7pECKdsaig.exeCode function: 0_2_017CB260 mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\7pECKdsaig.exeCode function: 0_2_017CB260 mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\7pECKdsaig.exeCode function: 0_2_017E8A62 mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\7pECKdsaig.exeCode function: 0_2_017DEA55 mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\7pECKdsaig.exeCode function: 0_2_017A4257 mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\7pECKdsaig.exeCode function: 0_2_01719240 mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\7pECKdsaig.exeCode function: 0_2_01719240 mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\7pECKdsaig.exeCode function: 0_2_01719240 mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\7pECKdsaig.exeCode function: 0_2_01719240 mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\7pECKdsaig.exeCode function: 0_2_01754A2C mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\7pECKdsaig.exeCode function: 0_2_01754A2C mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\7pECKdsaig.exeCode function: 0_2_01715210 mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\7pECKdsaig.exeCode function: 0_2_01715210 mov ecx, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\7pECKdsaig.exeCode function: 0_2_01715210 mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\7pECKdsaig.exeCode function: 0_2_01715210 mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\7pECKdsaig.exeCode function: 0_2_0171AA16 mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\7pECKdsaig.exeCode function: 0_2_0171AA16 mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\7pECKdsaig.exeCode function: 0_2_017DAA16 mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\7pECKdsaig.exeCode function: 0_2_017DAA16 mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\7pECKdsaig.exeCode function: 0_2_01733A1C mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\7pECKdsaig.exeCode function: 0_2_01728A0A mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\7pECKdsaig.exeCode function: 0_2_01742AE4 mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\7pECKdsaig.exeCode function: 0_2_01742ACB mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\7pECKdsaig.exeCode function: 0_2_0172AAB0 mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\7pECKdsaig.exeCode function: 0_2_0172AAB0 mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\7pECKdsaig.exeCode function: 0_2_0174FAB0 mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\7pECKdsaig.exeCode function: 0_2_017152A5 mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\7pECKdsaig.exeCode function: 0_2_017152A5 mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\7pECKdsaig.exeCode function: 0_2_017152A5 mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\7pECKdsaig.exeCode function: 0_2_017152A5 mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\7pECKdsaig.exeCode function: 0_2_017152A5 mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\7pECKdsaig.exeCode function: 0_2_0174D294 mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\7pECKdsaig.exeCode function: 0_2_0174D294 mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\7pECKdsaig.exeCode function: 0_2_0173C577 mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\7pECKdsaig.exeCode function: 0_2_0173C577 mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\7pECKdsaig.exeCode function: 0_2_01737D50 mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\7pECKdsaig.exeCode function: 0_2_01753D43 mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\7pECKdsaig.exeCode function: 0_2_01793540 mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\7pECKdsaig.exeCode function: 0_2_0171AD30 mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\7pECKdsaig.exeCode function: 0_2_017DE539 mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\7pECKdsaig.exeCode function: 0_2_01723D34 mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\7pECKdsaig.exeCode function: 0_2_01723D34 mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\7pECKdsaig.exeCode function: 0_2_01723D34 mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\7pECKdsaig.exeCode function: 0_2_01723D34 mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\7pECKdsaig.exeCode function: 0_2_01723D34 mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\7pECKdsaig.exeCode function: 0_2_01723D34 mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\7pECKdsaig.exeCode function: 0_2_01723D34 mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\7pECKdsaig.exeCode function: 0_2_01723D34 mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\7pECKdsaig.exeCode function: 0_2_01723D34 mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\7pECKdsaig.exeCode function: 0_2_01723D34 mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\7pECKdsaig.exeCode function: 0_2_01723D34 mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\7pECKdsaig.exeCode function: 0_2_01723D34 mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\7pECKdsaig.exeCode function: 0_2_01723D34 mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\7pECKdsaig.exeCode function: 0_2_017E8D34 mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\7pECKdsaig.exeCode function: 0_2_0179A537 mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\7pECKdsaig.exeCode function: 0_2_01744D3B mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\7pECKdsaig.exeCode function: 0_2_01744D3B mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\7pECKdsaig.exeCode function: 0_2_01744D3B mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\7pECKdsaig.exeCode function: 0_2_017C8DF1 mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\7pECKdsaig.exeCode function: 0_2_0172D5E0 mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\7pECKdsaig.exeCode function: 0_2_0172D5E0 mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\7pECKdsaig.exeCode function: 0_2_017DFDE2 mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\7pECKdsaig.exeCode function: 0_2_017DFDE2 mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\7pECKdsaig.exeCode function: 0_2_017DFDE2 mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\7pECKdsaig.exeCode function: 0_2_017DFDE2 mov eax, dword ptr fs:[00000030h]
              Source: C:\Windows\SysWOW64\msdt.exeCode function: 2_2_04AF20A0 mov eax, dword ptr fs:[00000030h]
              Source: C:\Windows\SysWOW64\msdt.exeCode function: 2_2_04AF20A0 mov eax, dword ptr fs:[00000030h]
              Source: C:\Windows\SysWOW64\msdt.exeCode function: 2_2_04AF20A0 mov eax, dword ptr fs:[00000030h]
              Source: C:\Windows\SysWOW64\msdt.exeCode function: 2_2_04AF20A0 mov eax, dword ptr fs:[00000030h]
              Source: C:\Windows\SysWOW64\msdt.exeCode function: 2_2_04AF20A0 mov eax, dword ptr fs:[00000030h]
              Source: C:\Windows\SysWOW64\msdt.exeCode function: 2_2_04AF20A0 mov eax, dword ptr fs:[00000030h]
              Source: C:\Windows\SysWOW64\msdt.exeCode function: 2_2_04AFF0BF mov ecx, dword ptr fs:[00000030h]
              Source: C:\Windows\SysWOW64\msdt.exeCode function: 2_2_04AFF0BF mov eax, dword ptr fs:[00000030h]
              Source: C:\Windows\SysWOW64\msdt.exeCode function: 2_2_04AFF0BF mov eax, dword ptr fs:[00000030h]
              Source: C:\Windows\SysWOW64\msdt.exeCode function: 2_2_04B090AF mov eax, dword ptr fs:[00000030h]
              Source: C:\Windows\SysWOW64\msdt.exeCode function: 2_2_04AC9080 mov eax, dword ptr fs:[00000030h]
              Source: C:\Windows\SysWOW64\msdt.exeCode function: 2_2_04B43884 mov eax, dword ptr fs:[00000030h]
              Source: C:\Windows\SysWOW64\msdt.exeCode function: 2_2_04B43884 mov eax, dword ptr fs:[00000030h]
              Source: C:\Windows\SysWOW64\msdt.exeCode function: 2_2_04AD849B mov eax, dword ptr fs:[00000030h]
              Source: C:\Windows\SysWOW64\msdt.exeCode function: 2_2_04AC58EC mov eax, dword ptr fs:[00000030h]
              Source: C:\Windows\SysWOW64\msdt.exeCode function: 2_2_04B814FB mov eax, dword ptr fs:[00000030h]
              Source: C:\Windows\SysWOW64\msdt.exeCode function: 2_2_04B46CF0 mov eax, dword ptr fs:[00000030h]
              Source: C:\Windows\SysWOW64\msdt.exeCode function: 2_2_04B46CF0 mov eax, dword ptr fs:[00000030h]
              Source: C:\Windows\SysWOW64\msdt.exeCode function: 2_2_04B46CF0 mov eax, dword ptr fs:[00000030h]
              Source: C:\Windows\SysWOW64\msdt.exeCode function: 2_2_04B5B8D0 mov eax, dword ptr fs:[00000030h]
              Source: C:\Windows\SysWOW64\msdt.exeCode function: 2_2_04B5B8D0 mov ecx, dword ptr fs:[00000030h]
              Source: C:\Windows\SysWOW64\msdt.exeCode function: 2_2_04B5B8D0 mov eax, dword ptr fs:[00000030h]
              Source: C:\Windows\SysWOW64\msdt.exeCode function: 2_2_04B5B8D0 mov eax, dword ptr fs:[00000030h]
              Source: C:\Windows\SysWOW64\msdt.exeCode function: 2_2_04B5B8D0 mov eax, dword ptr fs:[00000030h]
              Source: C:\Windows\SysWOW64\msdt.exeCode function: 2_2_04B5B8D0 mov eax, dword ptr fs:[00000030h]
              Source: C:\Windows\SysWOW64\msdt.exeCode function: 2_2_04B98CD6 mov eax, dword ptr fs:[00000030h]
              Source: C:\Windows\SysWOW64\msdt.exeCode function: 2_2_04AF002D mov eax, dword ptr fs:[00000030h]
              Source: C:\Windows\SysWOW64\msdt.exeCode function: 2_2_04AF002D mov eax, dword ptr fs:[00000030h]
              Source: C:\Windows\SysWOW64\msdt.exeCode function: 2_2_04AF002D mov eax, dword ptr fs:[00000030h]
              Source: C:\Windows\SysWOW64\msdt.exeCode function: 2_2_04AF002D mov eax, dword ptr fs:[00000030h]
              Source: C:\Windows\SysWOW64\msdt.exeCode function: 2_2_04AF002D mov eax, dword ptr fs:[00000030h]
              Source: C:\Windows\SysWOW64\msdt.exeCode function: 2_2_04AFBC2C mov eax, dword ptr fs:[00000030h]
              Source: C:\Windows\SysWOW64\msdt.exeCode function: 2_2_04ADB02A mov eax, dword ptr fs:[00000030h]
              Source: C:\Windows\SysWOW64\msdt.exeCode function: 2_2_04ADB02A mov eax, dword ptr fs:[00000030h]
              Source: C:\Windows\SysWOW64\msdt.exeCode function: 2_2_04ADB02A mov eax, dword ptr fs:[00000030h]
              Source: C:\Windows\SysWOW64\msdt.exeCode function: 2_2_04ADB02A mov eax, dword ptr fs:[00000030h]
              Source: C:\Windows\SysWOW64\msdt.exeCode function: 2_2_04B47016 mov eax, dword ptr fs:[00000030h]
              Source: C:\Windows\SysWOW64\msdt.exeCode function: 2_2_04B47016 mov eax, dword ptr fs:[00000030h]
              Source: C:\Windows\SysWOW64\msdt.exeCode function: 2_2_04B47016 mov eax, dword ptr fs:[00000030h]
              Source: C:\Windows\SysWOW64\msdt.exeCode function: 2_2_04B94015 mov eax, dword ptr fs:[00000030h]
              Source: C:\Windows\SysWOW64\msdt.exeCode function: 2_2_04B94015 mov eax, dword ptr fs:[00000030h]
              Source: C:\Windows\SysWOW64\msdt.exeCode function: 2_2_04B9740D mov eax, dword ptr fs:[00000030h]
              Source: C:\Windows\SysWOW64\msdt.exeCode function: 2_2_04B9740D mov eax, dword ptr fs:[00000030h]
              Source: C:\Windows\SysWOW64\msdt.exeCode function: 2_2_04B9740D mov eax, dword ptr fs:[00000030h]
              Source: C:\Windows\SysWOW64\msdt.exeCode function: 2_2_04B81C06 mov eax, dword ptr fs:[00000030h]
              Source: C:\Windows\SysWOW64\msdt.exeCode function: 2_2_04B81C06 mov eax, dword ptr fs:[00000030h]
              Source: C:\Windows\SysWOW64\msdt.exeCode function: 2_2_04B81C06 mov eax, dword ptr fs:[00000030h]
              Source: C:\Windows\SysWOW64\msdt.exeCode function: 2_2_04B81C06 mov eax, dword ptr fs:[00000030h]
              Source: C:\Windows\SysWOW64\msdt.exeCode function: 2_2_04B81C06 mov eax, dword ptr fs:[00000030h]
              Source: C:\Windows\SysWOW64\msdt.exeCode function: 2_2_04B81C06 mov eax, dword ptr fs:[00000030h]
              Source: C:\Windows\SysWOW64\msdt.exeCode function: 2_2_04B81C06 mov eax, dword ptr fs:[00000030h]
              Source: C:\Windows\SysWOW64\msdt.exeCode function: 2_2_04B81C06 mov eax, dword ptr fs:[00000030h]
              Source: C:\Windows\SysWOW64\msdt.exeCode function: 2_2_04B81C06 mov eax, dword ptr fs:[00000030h]
              Source: C:\Windows\SysWOW64\msdt.exeCode function: 2_2_04B81C06 mov eax, dword ptr fs:[00000030h]
              Source: C:\Windows\SysWOW64\msdt.exeCode function: 2_2_04B81C06 mov eax, dword ptr fs:[00000030h]
              Source: C:\Windows\SysWOW64\msdt.exeCode function: 2_2_04B81C06 mov eax, dword ptr fs:[00000030h]
              Source: C:\Windows\SysWOW64\msdt.exeCode function: 2_2_04B81C06 mov eax, dword ptr fs:[00000030h]
              Source: C:\Windows\SysWOW64\msdt.exeCode function: 2_2_04B81C06 mov eax, dword ptr fs:[00000030h]
              Source: C:\Windows\SysWOW64\msdt.exeCode function: 2_2_04B46C0A mov eax, dword ptr fs:[00000030h]
              Source: C:\Windows\SysWOW64\msdt.exeCode function: 2_2_04B46C0A mov eax, dword ptr fs:[00000030h]
              Source: C:\Windows\SysWOW64\msdt.exeCode function: 2_2_04B46C0A mov eax, dword ptr fs:[00000030h]
              Source: C:\Windows\SysWOW64\msdt.exeCode function: 2_2_04B46C0A mov eax, dword ptr fs:[00000030h]
              Source: C:\Windows\SysWOW64\msdt.exeCode function: 2_2_04AE746D mov eax, dword ptr fs:[00000030h]
              Source: C:\Windows\SysWOW64\msdt.exeCode function: 2_2_04B82073 mov eax, dword ptr fs:[00000030h]
              Source: C:\Windows\SysWOW64\msdt.exeCode function: 2_2_04B91074 mov eax, dword ptr fs:[00000030h]
              Source: C:\Windows\SysWOW64\msdt.exeCode function: 2_2_04AFA44B mov eax, dword ptr fs:[00000030h]
              Source: C:\Windows\SysWOW64\msdt.exeCode function: 2_2_04B5C450 mov eax, dword ptr fs:[00000030h]
              Source: C:\Windows\SysWOW64\msdt.exeCode function: 2_2_04B5C450 mov eax, dword ptr fs:[00000030h]
              Source: C:\Windows\SysWOW64\msdt.exeCode function: 2_2_04AE0050 mov eax, dword ptr fs:[00000030h]
              Source: C:\Windows\SysWOW64\msdt.exeCode function: 2_2_04AE0050 mov eax, dword ptr fs:[00000030h]
              Source: C:\Windows\SysWOW64\msdt.exeCode function: 2_2_04B451BE mov eax, dword ptr fs:[00000030h]
              Source: C:\Windows\SysWOW64\msdt.exeCode function: 2_2_04B451BE mov eax, dword ptr fs:[00000030h]
              Source: C:\Windows\SysWOW64\msdt.exeCode function: 2_2_04B451BE mov eax, dword ptr fs:[00000030h]
              Source: C:\Windows\SysWOW64\msdt.exeCode function: 2_2_04B451BE mov eax, dword ptr fs:[00000030h]
              Source: C:\Windows\SysWOW64\msdt.exeCode function: 2_2_04AF35A1 mov eax, dword ptr fs:[00000030h]
              Source: C:\Windows\SysWOW64\msdt.exeCode function: 2_2_04AF61A0 mov eax, dword ptr fs:[00000030h]
              Source: C:\Windows\SysWOW64\msdt.exeCode function: 2_2_04AF61A0 mov eax, dword ptr fs:[00000030h]
              Source: C:\Windows\SysWOW64\msdt.exeCode function: 2_2_04B469A6 mov eax, dword ptr fs:[00000030h]
              Source: C:\Windows\SysWOW64\msdt.exeCode function: 2_2_04B905AC mov eax, dword ptr fs:[00000030h]
              Source: C:\Windows\SysWOW64\msdt.exeCode function: 2_2_04B905AC mov eax, dword ptr fs:[00000030h]
              Source: C:\Windows\SysWOW64\msdt.exeCode function: 2_2_04AF1DB5 mov eax, dword ptr fs:[00000030h]
              Source: C:\Windows\SysWOW64\msdt.exeCode function: 2_2_04AF1DB5 mov eax, dword ptr fs:[00000030h]
              Source: C:\Windows\SysWOW64\msdt.exeCode function: 2_2_04AF1DB5 mov eax, dword ptr fs:[00000030h]
              Source: C:\Windows\SysWOW64\msdt.exeCode function: 2_2_04AC2D8A mov eax, dword ptr fs:[00000030h]
              Source: C:\Windows\SysWOW64\msdt.exeCode function: 2_2_04AC2D8A mov eax, dword ptr fs:[00000030h]
              Source: C:\Windows\SysWOW64\msdt.exeCode function: 2_2_04AC2D8A mov eax, dword ptr fs:[00000030h]
              Source: C:\Windows\SysWOW64\msdt.exeCode function: 2_2_04AC2D8A mov eax, dword ptr fs:[00000030h]
              Source: C:\Windows\SysWOW64\msdt.exeCode function: 2_2_04AC2D8A mov eax, dword ptr fs:[00000030h]
              Source: C:\Windows\SysWOW64\msdt.exeCode function: 2_2_04AFA185 mov eax, dword ptr fs:[00000030h]
              Source: C:\Windows\SysWOW64\msdt.exeCode function: 2_2_04AEC182 mov eax, dword ptr fs:[00000030h]
              Source: C:\Windows\SysWOW64\msdt.exeCode function: 2_2_04AF2581 mov eax, dword ptr fs:[00000030h]
              Source: C:\Windows\SysWOW64\msdt.exeCode function: 2_2_04AF2581 mov eax, dword ptr fs:[00000030h]
              Source: C:\Windows\SysWOW64\msdt.exeCode function: 2_2_04AF2581 mov eax, dword ptr fs:[00000030h]
              Source: C:\Windows\SysWOW64\msdt.exeCode function: 2_2_04AF2581 mov eax, dword ptr fs:[00000030h]
              Source: C:\Windows\SysWOW64\msdt.exeCode function: 2_2_04AFFD9B mov eax, dword ptr fs:[00000030h]
              Source: C:\Windows\SysWOW64\msdt.exeCode function: 2_2_04AFFD9B mov eax, dword ptr fs:[00000030h]
              Source: C:\Windows\SysWOW64\msdt.exeCode function: 2_2_04AF2990 mov eax, dword ptr fs:[00000030h]
              Source: C:\Windows\SysWOW64\msdt.exeCode function: 2_2_04B78DF1 mov eax, dword ptr fs:[00000030h]
              Source: C:\Windows\SysWOW64\msdt.exeCode function: 2_2_04ACB1E1 mov eax, dword ptr fs:[00000030h]
              Source: C:\Windows\SysWOW64\msdt.exeCode function: 2_2_04ACB1E1 mov eax, dword ptr fs:[00000030h]
              Source: C:\Windows\SysWOW64\msdt.exeCode function: 2_2_04ACB1E1 mov eax, dword ptr fs:[00000030h]
              Source: C:\Windows\SysWOW64\msdt.exeCode function: 2_2_04ADD5E0 mov eax, dword ptr fs:[00000030h]
              Source: C:\Windows\SysWOW64\msdt.exeCode function: 2_2_04ADD5E0 mov eax, dword ptr fs:[00000030h]
              Source: C:\Windows\SysWOW64\msdt.exeCode function: 2_2_04B8FDE2 mov eax, dword ptr fs:[00000030h]
              Source: C:\Windows\SysWOW64\msdt.exeCode function: 2_2_04B8FDE2 mov eax, dword ptr fs:[00000030h]
              Source: C:\Windows\SysWOW64\msdt.exeCode function: 2_2_04B8FDE2 mov eax, dword ptr fs:[00000030h]
              Source: C:\Windows\SysWOW64\msdt.exeCode function: 2_2_04B8FDE2 mov eax, dword ptr fs:[00000030h]
              Source: C:\Windows\SysWOW64\msdt.exeCode function: 2_2_04B541E8 mov eax, dword ptr fs:[00000030h]
              Source: C:\Windows\SysWOW64\msdt.exeCode function: 2_2_04B46DC9 mov eax, dword ptr fs:[00000030h]
              Source: C:\Windows\SysWOW64\msdt.exeCode function: 2_2_04B46DC9 mov eax, dword ptr fs:[00000030h]
              Source: C:\Windows\SysWOW64\msdt.exeCode function: 2_2_04B46DC9 mov eax, dword ptr fs:[00000030h]
              Source: C:\Windows\SysWOW64\msdt.exeCode function: 2_2_04B46DC9 mov ecx, dword ptr fs:[00000030h]
              Source: C:\Windows\SysWOW64\msdt.exeCode function: 2_2_04B46DC9 mov eax, dword ptr fs:[00000030h]
              Source: C:\Windows\SysWOW64\msdt.exeCode function: 2_2_04B46DC9 mov eax, dword ptr fs:[00000030h]
              Source: C:\Windows\SysWOW64\msdt.exeCode function: 2_2_04B8E539 mov eax, dword ptr fs:[00000030h]
              Source: C:\Windows\SysWOW64\msdt.exeCode function: 2_2_04B4A537 mov eax, dword ptr fs:[00000030h]
              Source: C:\Windows\SysWOW64\msdt.exeCode function: 2_2_04B98D34 mov eax, dword ptr fs:[00000030h]
              Source: C:\Windows\SysWOW64\msdt.exeCode function: 2_2_04AE4120 mov eax, dword ptr fs:[00000030h]
              Source: C:\Windows\SysWOW64\msdt.exeCode function: 2_2_04AE4120 mov eax, dword ptr fs:[00000030h]
              Source: C:\Windows\SysWOW64\msdt.exeCode function: 2_2_04AE4120 mov eax, dword ptr fs:[00000030h]
              Source: C:\Windows\SysWOW64\msdt.exeCode function: 2_2_04AE4120 mov eax, dword ptr fs:[00000030h]
              Source: C:\Windows\SysWOW64\msdt.exeCode function: 2_2_04AE4120 mov ecx, dword ptr fs:[00000030h]
              Source: C:\Windows\SysWOW64\msdt.exeCode function: 2_2_04AF4D3B mov eax, dword ptr fs:[00000030h]
              Source: C:\Windows\SysWOW64\msdt.exeCode function: 2_2_04AF4D3B mov eax, dword ptr fs:[00000030h]
              Source: C:\Windows\SysWOW64\msdt.exeCode function: 2_2_04AF4D3B mov eax, dword ptr fs:[00000030h]
              Source: C:\Windows\SysWOW64\msdt.exeCode function: 2_2_04AF513A mov eax, dword ptr fs:[00000030h]
              Source: C:\Windows\SysWOW64\msdt.exeCode function: 2_2_04AF513A mov eax, dword ptr fs:[00000030h]
              Source: C:\Windows\SysWOW64\msdt.exeCode function: 2_2_04AD3D34 mov eax, dword ptr fs:[00000030h]
              Source: C:\Windows\SysWOW64\msdt.exeCode function: 2_2_04AD3D34 mov eax, dword ptr fs:[00000030h]
              Source: C:\Windows\SysWOW64\msdt.exeCode function: 2_2_04AD3D34 mov eax, dword ptr fs:[00000030h]
              Source: C:\Windows\SysWOW64\msdt.exeCode function: 2_2_04AD3D34 mov eax, dword ptr fs:[00000030h]
              Source: C:\Windows\SysWOW64\msdt.exeCode function: 2_2_04AD3D34 mov eax, dword ptr fs:[00000030h]
              Source: C:\Windows\SysWOW64\msdt.exeCode function: 2_2_04AD3D34 mov eax, dword ptr fs:[00000030h]
              Source: C:\Windows\SysWOW64\msdt.exeCode function: 2_2_04AD3D34 mov eax, dword ptr fs:[00000030h]
              Source: C:\Windows\SysWOW64\msdt.exeCode function: 2_2_04AD3D34 mov eax, dword ptr fs:[00000030h]
              Source: C:\Windows\SysWOW64\msdt.exeCode function: 2_2_04AD3D34 mov eax, dword ptr fs:[00000030h]
              Source: C:\Windows\SysWOW64\msdt.exeCode function: 2_2_04AD3D34 mov eax, dword ptr fs:[00000030h]
              Source: C:\Windows\SysWOW64\msdt.exeCode function: 2_2_04AD3D34 mov eax, dword ptr fs:[00000030h]
              Source: C:\Windows\SysWOW64\msdt.exeCode function: 2_2_04AD3D34 mov eax, dword ptr fs:[00000030h]
              Source: C:\Windows\SysWOW64\msdt.exeCode function: 2_2_04AD3D34 mov eax, dword ptr fs:[00000030h]
              Source: C:\Windows\SysWOW64\msdt.exeCode function: 2_2_04ACAD30 mov eax, dword ptr fs:[00000030h]
              Source: C:\Windows\SysWOW64\msdt.exeCode function: 2_2_04AC9100 mov eax, dword ptr fs:[00000030h]
              Source: C:\Windows\SysWOW64\msdt.exeCode function: 2_2_04AC9100 mov eax, dword ptr fs:[00000030h]
              Source: C:\Windows\SysWOW64\msdt.exeCode function: 2_2_04AC9100 mov eax, dword ptr fs:[00000030h]
              Source: C:\Windows\SysWOW64\msdt.exeCode function: 2_2_04ACC962 mov eax, dword ptr fs:[00000030h]
              Source: C:\Windows\SysWOW64\msdt.exeCode function: 2_2_04AEC577 mov eax, dword ptr fs:[00000030h]
              Source: C:\Windows\SysWOW64\msdt.exeCode function: 2_2_04AEC577 mov eax, dword ptr fs:[00000030h]
              Source: C:\Windows\SysWOW64\msdt.exeCode function: 2_2_04ACB171 mov eax, dword ptr fs:[00000030h]
              Source: C:\Windows\SysWOW64\msdt.exeCode function: 2_2_04ACB171 mov eax, dword ptr fs:[00000030h]
              Source: C:\Windows\SysWOW64\msdt.exeCode function: 2_2_04AEB944 mov eax, dword ptr fs:[00000030h]
              Source: C:\Windows\SysWOW64\msdt.exeCode function: 2_2_04AEB944 mov eax, dword ptr fs:[00000030h]
              Source: C:\Windows\SysWOW64\msdt.exeCode function: 2_2_04B03D43 mov eax, dword ptr fs:[00000030h]
              Source: C:\Windows\SysWOW64\msdt.exeCode function: 2_2_04B43540 mov eax, dword ptr fs:[00000030h]
              Source: C:\Windows\SysWOW64\msdt.exeCode function: 2_2_04AE7D50 mov eax, dword ptr fs:[00000030h]
              Source: C:\Windows\SysWOW64\msdt.exeCode function: 2_2_04AC52A5 mov eax, dword ptr fs:[00000030h]
              Source: C:\Windows\SysWOW64\msdt.exeCode function: 2_2_04AC52A5 mov eax, dword ptr fs:[00000030h]
              Source: C:\Windows\SysWOW64\msdt.exeCode function: 2_2_04AC52A5 mov eax, dword ptr fs:[00000030h]
              Source: C:\Windows\SysWOW64\msdt.exeCode function: 2_2_04AC52A5 mov eax, dword ptr fs:[00000030h]
              Source: C:\Windows\SysWOW64\msdt.exeCode function: 2_2_04AC52A5 mov eax, dword ptr fs:[00000030h]
              Source: C:\Windows\SysWOW64\msdt.exeCode function: 2_2_04B446A7 mov eax, dword ptr fs:[00000030h]
              Source: C:\Windows\SysWOW64\msdt.exeCode function: 2_2_04B90EA5 mov eax, dword ptr fs:[00000030h]
              Source: C:\Windows\SysWOW64\msdt.exeCode function: 2_2_04B90EA5 mov eax, dword ptr fs:[00000030h]
              Source: C:\Windows\SysWOW64\msdt.exeCode function: 2_2_04B90EA5 mov eax, dword ptr fs:[00000030h]
              Source: C:\Windows\SysWOW64\msdt.exeCode function: 2_2_04ADAAB0 mov eax, dword ptr fs:[00000030h]
              Source: C:\Windows\SysWOW64\msdt.exeCode function: 2_2_04ADAAB0 mov eax, dword ptr fs:[00000030h]
              Source: C:\Windows\SysWOW64\msdt.exeCode function: 2_2_04AFFAB0 mov eax, dword ptr fs:[00000030h]
              Source: C:\Windows\SysWOW64\msdt.exeCode function: 2_2_04B5FE87 mov eax, dword ptr fs:[00000030h]
              Source: C:\Windows\SysWOW64\msdt.exeCode function: 2_2_04AFD294 mov eax, dword ptr fs:[00000030h]
              Source: C:\Windows\SysWOW64\msdt.exeCode function: 2_2_04AFD294 mov eax, dword ptr fs:[00000030h]
              Source: C:\Windows\SysWOW64\msdt.exeCode function: 2_2_04AF2AE4 mov eax, dword ptr fs:[00000030h]
              Source: C:\Windows\SysWOW64\msdt.exeCode function: 2_2_04AF16E0 mov ecx, dword ptr fs:[00000030h]
              Source: C:\Windows\SysWOW64\msdt.exeCode function: 2_2_04AD76E2 mov eax, dword ptr fs:[00000030h]
              Source: C:\Windows\SysWOW64\msdt.exeCode function: 2_2_04AF36CC mov eax, dword ptr fs:[00000030h]
              Source: C:\Windows\SysWOW64\msdt.exeCode function: 2_2_04AF2ACB mov eax, dword ptr fs:[00000030h]
              Source: C:\Windows\SysWOW64\msdt.exeCode function: 2_2_04B98ED6 mov eax, dword ptr fs:[00000030h]
              Source: C:\Windows\SysWOW64\msdt.exeCode function: 2_2_04B7FEC0 mov eax, dword ptr fs:[00000030h]
              Source: C:\Windows\SysWOW64\msdt.exeCode function: 2_2_04B08EC7 mov eax, dword ptr fs:[00000030h]
              Source: C:\Windows\SysWOW64\msdt.exeCode function: 2_2_04B7FE3F mov eax, dword ptr fs:[00000030h]
              Source: C:\Windows\SysWOW64\msdt.exeCode function: 2_2_04ACE620 mov eax, dword ptr fs:[00000030h]
              Source: C:\Windows\SysWOW64\msdt.exeCode function: 2_2_04B04A2C mov eax, dword ptr fs:[00000030h]
              Source: C:\Windows\SysWOW64\msdt.exeCode function: 2_2_04B04A2C mov eax, dword ptr fs:[00000030h]
              Source: C:\Windows\SysWOW64\msdt.exeCode function: 2_2_04AD8A0A mov eax, dword ptr fs:[00000030h]
              Source: C:\Windows\SysWOW64\msdt.exeCode function: 2_2_04ACC600 mov eax, dword ptr fs:[00000030h]
              Source: C:\Windows\SysWOW64\msdt.exeCode function: 2_2_04ACC600 mov eax, dword ptr fs:[00000030h]
              Source: C:\Windows\SysWOW64\msdt.exeCode function: 2_2_04ACC600 mov eax, dword ptr fs:[00000030h]
              Source: C:\Windows\SysWOW64\msdt.exeCode function: 2_2_04AF8E00 mov eax, dword ptr fs:[00000030h]
              Source: C:\Windows\SysWOW64\msdt.exeCode function: 2_2_04B81608 mov eax, dword ptr fs:[00000030h]
              Source: C:\Windows\SysWOW64\msdt.exeCode function: 2_2_04AE3A1C mov eax, dword ptr fs:[00000030h]
              Source: C:\Windows\SysWOW64\msdt.exeCode function: 2_2_04AFA61C mov eax, dword ptr fs:[00000030h]
              Source: C:\Windows\SysWOW64\msdt.exeCode function: 2_2_04AFA61C mov eax, dword ptr fs:[00000030h]
              Source: C:\Windows\SysWOW64\msdt.exeCode function: 2_2_04ACAA16 mov eax, dword ptr fs:[00000030h]
              Source: C:\Windows\SysWOW64\msdt.exeCode function: 2_2_04ACAA16 mov eax, dword ptr fs:[00000030h]
              Source: C:\Windows\SysWOW64\msdt.exeCode function: 2_2_04AC5210 mov eax, dword ptr fs:[00000030h]
              Source: C:\Windows\SysWOW64\msdt.exeCode function: 2_2_04AC5210 mov ecx, dword ptr fs:[00000030h]
              Source: C:\Windows\SysWOW64\msdt.exeCode function: 2_2_04AC5210 mov eax, dword ptr fs:[00000030h]
              Source: C:\Windows\SysWOW64\msdt.exeCode function: 2_2_04AC5210 mov eax, dword ptr fs:[00000030h]
              Source: C:\Windows\SysWOW64\msdt.exeCode function: 2_2_04AD766D mov eax, dword ptr fs:[00000030h]
              Source: C:\Windows\SysWOW64\msdt.exeCode function: 2_2_04B0927A mov eax, dword ptr fs:[00000030h]
              Source: C:\Windows\SysWOW64\msdt.exeCode function: 2_2_04B7B260 mov eax, dword ptr fs:[00000030h]
              Source: C:\Windows\SysWOW64\msdt.exeCode function: 2_2_04B7B260 mov eax, dword ptr fs:[00000030h]
              Source: C:\Windows\SysWOW64\msdt.exeCode function: 2_2_04B98A62 mov eax, dword ptr fs:[00000030h]
              Source: C:\Windows\SysWOW64\msdt.exeCode function: 2_2_04AEAE73 mov eax, dword ptr fs:[00000030h]
              Source: C:\Windows\SysWOW64\msdt.exeCode function: 2_2_04AEAE73 mov eax, dword ptr fs:[00000030h]
              Source: C:\Windows\SysWOW64\msdt.exeCode function: 2_2_04AEAE73 mov eax, dword ptr fs:[00000030h]
              Source: C:\Windows\SysWOW64\msdt.exeCode function: 2_2_04AEAE73 mov eax, dword ptr fs:[00000030h]
              Source: C:\Windows\SysWOW64\msdt.exeCode function: 2_2_04AEAE73 mov eax, dword ptr fs:[00000030h]
              Source: C:\Windows\SysWOW64\msdt.exeCode function: 2_2_04B54257 mov eax, dword ptr fs:[00000030h]
              Source: C:\Windows\SysWOW64\msdt.exeCode function: 2_2_04AC9240 mov eax, dword ptr fs:[00000030h]
              Source: C:\Windows\SysWOW64\msdt.exeCode function: 2_2_04AC9240 mov eax, dword ptr fs:[00000030h]
              Source: C:\Windows\SysWOW64\msdt.exeCode function: 2_2_04AC9240 mov eax, dword ptr fs:[00000030h]
              Source: C:\Windows\SysWOW64\msdt.exeCode function: 2_2_04AC9240 mov eax, dword ptr fs:[00000030h]
              Source: C:\Windows\SysWOW64\msdt.exeCode function: 2_2_04AD7E41 mov eax, dword ptr fs:[00000030h]
              Source: C:\Windows\SysWOW64\msdt.exeCode function: 2_2_04AD7E41 mov eax, dword ptr fs:[00000030h]
              Source: C:\Windows\SysWOW64\msdt.exeCode function: 2_2_04AD7E41 mov eax, dword ptr fs:[00000030h]
              Source: C:\Windows\SysWOW64\msdt.exeCode function: 2_2_04AD7E41 mov eax, dword ptr fs:[00000030h]
              Source: C:\Windows\SysWOW64\msdt.exeCode function: 2_2_04AD7E41 mov eax, dword ptr fs:[00000030h]
              Source: C:\Windows\SysWOW64\msdt.exeCode function: 2_2_04AD7E41 mov eax, dword ptr fs:[00000030h]
              Source: C:\Windows\SysWOW64\msdt.exeCode function: 2_2_04B8EA55 mov eax, dword ptr fs:[00000030h]
              Source: C:\Windows\SysWOW64\msdt.exeCode function: 2_2_04B8AE44 mov eax, dword ptr fs:[00000030h]
              Source: C:\Windows\SysWOW64\msdt.exeCode function: 2_2_04B8AE44 mov eax, dword ptr fs:[00000030h]
              Source: C:\Windows\SysWOW64\msdt.exeCode function: 2_2_04AF4BAD mov eax, dword ptr fs:[00000030h]
              Source: C:\Windows\SysWOW64\msdt.exeCode function: 2_2_04AF4BAD mov eax, dword ptr fs:[00000030h]
              Source: C:\Windows\SysWOW64\msdt.exeCode function: 2_2_04AF4BAD mov eax, dword ptr fs:[00000030h]
              Source: C:\Windows\SysWOW64\msdt.exeCode function: 2_2_04B95BA5 mov eax, dword ptr fs:[00000030h]
              Source: C:\Windows\SysWOW64\msdt.exeCode function: 2_2_04B47794 mov eax, dword ptr fs:[00000030h]
              Source: C:\Windows\SysWOW64\msdt.exeCode function: 2_2_04B47794 mov eax, dword ptr fs:[00000030h]
              Source: C:\Windows\SysWOW64\msdt.exeCode function: 2_2_04B47794 mov eax, dword ptr fs:[00000030h]
              Source: C:\Windows\SysWOW64\msdt.exeCode function: 2_2_04AD1B8F mov eax, dword ptr fs:[00000030h]
              Source: C:\Windows\SysWOW64\msdt.exeCode function: 2_2_04AD1B8F mov eax, dword ptr fs:[00000030h]
              Source: C:\Windows\SysWOW64\msdt.exeCode function: 2_2_04B8138A mov eax, dword ptr fs:[00000030h]
              Source: C:\Windows\SysWOW64\msdt.exeCode function: 2_2_04B7D380 mov ecx, dword ptr fs:[00000030h]
              Source: C:\Windows\SysWOW64\msdt.exeCode function: 2_2_04AF2397 mov eax, dword ptr fs:[00000030h]
              Source: C:\Windows\SysWOW64\msdt.exeCode function: 2_2_04AD8794 mov eax, dword ptr fs:[00000030h]
              Source: C:\Windows\SysWOW64\msdt.exeCode function: 2_2_04AFB390 mov eax, dword ptr fs:[00000030h]
              Source: C:\Windows\SysWOW64\msdt.exeCode function: 2_2_04B037F5 mov eax, dword ptr fs:[00000030h]
              Source: C:\Windows\SysWOW64\msdt.exeCode function: 2_2_04AEDBE9 mov eax, dword ptr fs:[00000030h]
              Source: C:\Windows\SysWOW64\msdt.exeCode function: 2_2_04AF03E2 mov eax, dword ptr fs:[00000030h]
              Source: C:\Windows\SysWOW64\msdt.exeCode function: 2_2_04AF03E2 mov eax, dword ptr fs:[00000030h]
              Source: C:\Windows\SysWOW64\msdt.exeCode function: 2_2_04AF03E2 mov eax, dword ptr fs:[00000030h]
              Source: C:\Windows\SysWOW64\msdt.exeCode function: 2_2_04AF03E2 mov eax, dword ptr fs:[00000030h]
              Source: C:\Windows\SysWOW64\msdt.exeCode function: 2_2_04AF03E2 mov eax, dword ptr fs:[00000030h]
              Source: C:\Windows\SysWOW64\msdt.exeCode function: 2_2_04AF03E2 mov eax, dword ptr fs:[00000030h]
              Source: C:\Windows\SysWOW64\msdt.exeCode function: 2_2_04B453CA mov eax, dword ptr fs:[00000030h]
              Source: C:\Windows\SysWOW64\msdt.exeCode function: 2_2_04B453CA mov eax, dword ptr fs:[00000030h]
              Source: C:\Windows\SysWOW64\msdt.exeCode function: 2_2_04AC4F2E mov eax, dword ptr fs:[00000030h]
              Source: C:\Windows\SysWOW64\msdt.exeCode function: 2_2_04AC4F2E mov eax, dword ptr fs:[00000030h]
              Source: C:\Windows\SysWOW64\msdt.exeCode function: 2_2_04AFE730 mov eax, dword ptr fs:[00000030h]
              Source: C:\Windows\SysWOW64\msdt.exeCode function: 2_2_04AFA70E mov eax, dword ptr fs:[00000030h]
              Source: C:\Windows\SysWOW64\msdt.exeCode function: 2_2_04AFA70E mov eax, dword ptr fs:[00000030h]
              Source: C:\Windows\SysWOW64\msdt.exeCode function: 2_2_04B8131B mov eax, dword ptr fs:[00000030h]
              Source: C:\Windows\SysWOW64\msdt.exeCode function: 2_2_04B5FF10 mov eax, dword ptr fs:[00000030h]
              Source: C:\Windows\SysWOW64\msdt.exeCode function: 2_2_04B5FF10 mov eax, dword ptr fs:[00000030h]
              Source: C:\Windows\SysWOW64\msdt.exeCode function: 2_2_04B9070D mov eax, dword ptr fs:[00000030h]
              Source: C:\Windows\SysWOW64\msdt.exeCode function: 2_2_04B9070D mov eax, dword ptr fs:[00000030h]
              Source: C:\Windows\SysWOW64\msdt.exeCode function: 2_2_04AEF716 mov eax, dword ptr fs:[00000030h]
              Source: C:\Windows\SysWOW64\msdt.exeCode function: 2_2_04ACDB60 mov ecx, dword ptr fs:[00000030h]
              Source: C:\Windows\SysWOW64\msdt.exeCode function: 2_2_04ADFF60 mov eax, dword ptr fs:[00000030h]
              Source: C:\Windows\SysWOW64\msdt.exeCode function: 2_2_04B98F6A mov eax, dword ptr fs:[00000030h]
              Source: C:\Windows\SysWOW64\msdt.exeCode function: 2_2_04AF3B7A mov eax, dword ptr fs:[00000030h]
              Source: C:\Windows\SysWOW64\msdt.exeCode function: 2_2_04AF3B7A mov eax, dword ptr fs:[00000030h]
              Source: C:\Windows\SysWOW64\msdt.exeCode function: 2_2_04B98B58 mov eax, dword ptr fs:[00000030h]
              Source: C:\Windows\SysWOW64\msdt.exeCode function: 2_2_04ACDB40 mov eax, dword ptr fs:[00000030h]
              Source: C:\Windows\SysWOW64\msdt.exeCode function: 2_2_04ADEF40 mov eax, dword ptr fs:[00000030h]
              Source: C:\Windows\SysWOW64\msdt.exeCode function: 2_2_04ACF358 mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\7pECKdsaig.exeProcess queried: DebugPort
              Source: C:\Windows\SysWOW64\msdt.exeProcess queried: DebugPort
              Source: C:\Users\user\Desktop\7pECKdsaig.exeCode function: 0_2_00A8ACE0 LdrLoadDll,

              HIPS / PFW / Operating System Protection Evasion

              barindex
              Source: C:\Windows\explorer.exeDomain query: www.controlplus.systems
              Source: C:\Windows\explorer.exeDomain query: www.mogi.africa
              Source: C:\Windows\explorer.exeDomain query: www.kellnovaglobalfood.info
              Source: C:\Windows\explorer.exeNetwork Connect: 34.102.136.180 80
              Source: C:\Users\user\Desktop\7pECKdsaig.exeSection unmapped: C:\Windows\SysWOW64\msdt.exe base address: B60000
              Source: C:\Users\user\Desktop\7pECKdsaig.exeSection loaded: unknown target: C:\Windows\explorer.exe protection: execute and read and write
              Source: C:\Users\user\Desktop\7pECKdsaig.exeSection loaded: unknown target: C:\Windows\SysWOW64\msdt.exe protection: execute and read and write
              Source: C:\Users\user\Desktop\7pECKdsaig.exeSection loaded: unknown target: C:\Windows\SysWOW64\msdt.exe protection: execute and read and write
              Source: C:\Windows\SysWOW64\msdt.exeSection loaded: unknown target: C:\Windows\explorer.exe protection: read write
              Source: C:\Windows\SysWOW64\msdt.exeSection loaded: unknown target: C:\Windows\explorer.exe protection: execute and read and write
              Source: C:\Users\user\Desktop\7pECKdsaig.exeThread APC queued: target process: C:\Windows\explorer.exe
              Source: C:\Users\user\Desktop\7pECKdsaig.exeThread register set: target process: 3452
              Source: C:\Windows\SysWOW64\msdt.exeThread register set: target process: 3452
              Source: C:\Windows\SysWOW64\msdt.exeProcess created: C:\Windows\SysWOW64\cmd.exe /c del "C:\Users\user\Desktop\7pECKdsaig.exe"
              Source: explorer.exe, 00000001.00000000.254881372.0000000001080000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 00000001.00000002.518259542.0000000001080000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: XProgram Manager
              Source: explorer.exe, 00000001.00000000.254881372.0000000001080000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 00000001.00000002.525713546.000000000833A000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000001.00000000.263735895.000000000833A000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: Shell_TrayWnd
              Source: explorer.exe, 00000001.00000000.254881372.0000000001080000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 00000001.00000000.254183869.0000000000AC8000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000001.00000002.518259542.0000000001080000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: Progman
              Source: explorer.exe, 00000001.00000000.254881372.0000000001080000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 00000001.00000002.518259542.0000000001080000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: Progmanlock

              Stealing of Sensitive Information

              barindex
              Source: Yara matchFile source: 7pECKdsaig.exe, type: SAMPLE
              Source: Yara matchFile source: 0.2.7pECKdsaig.exe.a80000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.0.7pECKdsaig.exe.a80000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 00000000.00000002.288830411.0000000000A81000.00000020.00000001.01000000.00000003.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000000.00000002.289101701.0000000001370000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000002.00000002.520351827.0000000004FCF000.00000004.10000000.00040000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000002.00000002.518766538.0000000002EE0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000000.00000002.289007135.0000000001210000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000000.00000000.249149614.0000000000A81000.00000020.00000001.01000000.00000003.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000001.00000002.531047978.000000001389F000.00000004.80000000.00040000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000002.00000002.518698032.0000000002EB0000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000002.00000002.517165647.0000000000580000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000002.00000002.517610096.00000000008C4000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY

              Remote Access Functionality

              barindex
              Source: Yara matchFile source: 7pECKdsaig.exe, type: SAMPLE
              Source: Yara matchFile source: 0.2.7pECKdsaig.exe.a80000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.0.7pECKdsaig.exe.a80000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 00000000.00000002.288830411.0000000000A81000.00000020.00000001.01000000.00000003.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000000.00000002.289101701.0000000001370000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000002.00000002.520351827.0000000004FCF000.00000004.10000000.00040000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000002.00000002.518766538.0000000002EE0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000000.00000002.289007135.0000000001210000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000000.00000000.249149614.0000000000A81000.00000020.00000001.01000000.00000003.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000001.00000002.531047978.000000001389F000.00000004.80000000.00040000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000002.00000002.518698032.0000000002EB0000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000002.00000002.517165647.0000000000580000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000002.00000002.517610096.00000000008C4000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
              Valid Accounts1
              Shared Modules
              Path Interception512
              Process Injection
              1
              Rootkit
              1
              Credential API Hooking
              121
              Security Software Discovery
              Remote Services1
              Credential API Hooking
              Exfiltration Over Other Network Medium1
              Encrypted Channel
              Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
              Default AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization Scripts1
              Masquerading
              1
              Input Capture
              1
              Virtualization/Sandbox Evasion
              Remote Desktop Protocol1
              Input Capture
              Exfiltration Over Bluetooth4
              Ingress Tool Transfer
              Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
              Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)1
              Virtualization/Sandbox Evasion
              Security Account Manager2
              Process Discovery
              SMB/Windows Admin Shares1
              Archive Collected Data
              Automated Exfiltration3
              Non-Application Layer Protocol
              Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
              Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)512
              Process Injection
              NTDS1
              Application Window Discovery
              Distributed Component Object ModelInput CaptureScheduled Transfer13
              Application Layer Protocol
              SIM Card SwapCarrier Billing Fraud
              Cloud AccountsCronNetwork Logon ScriptNetwork Logon Script1
              Deobfuscate/Decode Files or Information
              LSA Secrets1
              Remote System Discovery
              SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
              Replication Through Removable MediaLaunchdRc.commonRc.common4
              Obfuscated Files or Information
              Cached Domain Credentials11
              System Information Discovery
              VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
              External Remote ServicesScheduled TaskStartup ItemsStartup Items3
              Software Packing
              DCSyncNetwork SniffingWindows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
              Hide Legend

              Legend:

              • Process
              • Signature
              • Created File
              • DNS/IP Info
              • Is Dropped
              • Is Windows Process
              • Number of created Registry Values
              • Number of created Files
              • Visual Basic
              • Delphi
              • Java
              • .Net C# or VB.NET
              • C, C++ or other language
              • Is malicious
              • Internet

              This section contains all screenshots as thumbnails, including those not shown in the slideshow.


              windows-stand
              SourceDetectionScannerLabelLink
              7pECKdsaig.exe77%ReversingLabsWin32.Trojan.FormBook
              7pECKdsaig.exe59%VirustotalBrowse
              7pECKdsaig.exe100%AviraTR/Crypt.ZPACK.Gen
              7pECKdsaig.exe100%Joe Sandbox ML
              No Antivirus matches
              SourceDetectionScannerLabelLinkDownload
              0.0.7pECKdsaig.exe.a80000.0.unpack100%AviraTR/Crypt.ZPACK.GenDownload File
              0.2.7pECKdsaig.exe.a80000.0.unpack100%AviraTR/Crypt.ZPACK.GenDownload File
              SourceDetectionScannerLabelLink
              www.quickhealcareltd.co.uk0%VirustotalBrowse
              SourceDetectionScannerLabelLink
              http://www.jacksontcpassettlement.com/ar73/www.ingrambaby.com100%Avira URL Cloudmalware
              http://www.b708.com/ar73/100%Avira URL Cloudmalware
              http://www.ckpconsulting.com0%Avira URL Cloudsafe
              http://www.kellnovaglobalfood.infoReferer:0%Avira URL Cloudsafe
              http://www.innovantexclusive.comReferer:0%Avira URL Cloudsafe
              http://www.jacksontcpassettlement.comReferer:0%Avira URL Cloudsafe
              http://www.hurricanevalleyatvjamboree.com/ar73/www.innovantexclusive.com100%Avira URL Cloudmalware
              http://www.kellnovaglobalfood.info/ar73/100%Avira URL Cloudmalware
              http://www.2348x.com0%Avira URL Cloudsafe
              http://www.echadholisticbar.com/ar73/www.jacksontcpassettlement.com100%Avira URL Cloudmalware
              http://www.controlplus.systems0%Avira URL Cloudsafe
              http://www.quickhealcareltd.co.uk/ar73/100%Avira URL Cloudmalware
              http://www.mogi.africa/ar73/www.kellnovaglobalfood.info100%Avira URL Cloudmalware
              http://www.ckpconsulting.com/ar73/www.2348x.com100%Avira URL Cloudmalware
              http://www.kellnovaglobalfood.info/ar73/www.controlplus.systems100%Avira URL Cloudmalware
              http://www.controlplus.systems/ar73/www.quickhealcareltd.co.uk100%Avira URL Cloudmalware
              http://www.mogi.africaReferer:0%Avira URL Cloudsafe
              http://www.kellnovaglobalfood.info/ar73/?Qj=i6BPGBhEPZBlfl7tAP1UBBwzioJGNNDALkR90REkFgMzqoaCb5EMO/kcO5kV95GeH/kMM6gDFg==&x6=n0GdIP_100%Avira URL Cloudmalware
              http://www.ckpconsulting.comReferer:0%Avira URL Cloudsafe
              http://www.b708.comReferer:0%Avira URL Cloudsafe
              http://www.quickhealcareltd.co.ukReferer:0%Avira URL Cloudsafe
              http://www.ckpconsulting.com/ar73/100%Avira URL Cloudmalware
              http://www.mtevz.online/ar73/100%Avira URL Cloudmalware
              http://www.2348x.com/ar73/100%Avira URL Cloudmalware
              http://www.kellnovaglobalfood.info0%Avira URL Cloudsafe
              http://www.arredobagno.club/ar73/www.mtevz.online100%Avira URL Cloudmalware
              http://www.hurricanevalleyatvjamboree.com/ar73/100%Avira URL Cloudmalware
              http://www.ingrambaby.com/ar73/100%Avira URL Cloudmalware
              http://www.innovantexclusive.com/ar73/www.1wwuwa.top100%Avira URL Cloudmalware
              http://www.mogi.africa0%Avira URL Cloudsafe
              http://www.controlplus.systems/ar73/100%Avira URL Cloudmalware
              http://www.arredobagno.clubReferer:0%Avira URL Cloudsafe
              http://www.echadholisticbar.com/ar73/100%Avira URL Cloudmalware
              http://www.1wwuwa.top0%Avira URL Cloudsafe
              http://www.ingrambaby.com0%Avira URL Cloudsafe
              http://www.jacksontcpassettlement.com/ar73/100%Avira URL Cloudmalware
              http://www.authenticityhacking.com/ar73/100%Avira URL Cloudmalware
              http://www.ingrambaby.com/ar73/www.arredobagno.club100%Avira URL Cloudmalware
              http://www.hurricanevalleyatvjamboree.com0%Avira URL Cloudsafe
              http://www.1wwuwa.topReferer:0%Avira URL Cloudsafe
              http://www.mogi.africa/ar73/100%Avira URL Cloudmalware
              http://www.echadholisticbar.comReferer:0%Avira URL Cloudsafe
              http://www.arredobagno.club/ar73/100%Avira URL Cloudmalware
              http://www.mtevz.onlineReferer:0%Avira URL Cloudsafe
              http://www.authenticityhacking.comReferer:0%Avira URL Cloudsafe
              http://www.b708.com0%Avira URL Cloudsafe
              http://www.quickhealcareltd.co.uk0%Avira URL Cloudsafe
              http://www.innovantexclusive.com0%Avira URL Cloudsafe
              http://www.jacksontcpassettlement.com0%Avira URL Cloudsafe
              http://www.1wwuwa.top/ar73/www.echadholisticbar.com100%Avira URL Cloudmalware
              http://www.ingrambaby.comReferer:0%Avira URL Cloudsafe
              http://www.hurricanevalleyatvjamboree.comReferer:0%Avira URL Cloudsafe
              http://www.b708.com/ar73/www.hurricanevalleyatvjamboree.com100%Avira URL Cloudmalware
              http://www.2348x.comReferer:0%Avira URL Cloudsafe
              http://www.controlplus.systemsReferer:0%Avira URL Cloudsafe
              http://www.controlplus.systems/ar73/?Qj=pTDthzaqbIgyWHdtpzpwnulvL2qvi2wcQCOYQZrmaB3EJlnnV9x+gp8AnzNn3ZLGsW0uMr4raA==&x6=n0GdIP_100%Avira URL Cloudmalware
              http://www.mtevz.online0%Avira URL Cloudsafe
              http://www.authenticityhacking.com/ar73/www.ckpconsulting.com100%Avira URL Cloudmalware
              http://www.mtevz.online/ar73/r100%Avira URL Cloudmalware
              http://www.2348x.com/ar73/www.b708.com100%Avira URL Cloudmalware
              www.2348x.com/ar73/100%Avira URL Cloudmalware
              http://www.echadholisticbar.com0%Avira URL Cloudsafe
              http://www.authenticityhacking.com0%Avira URL Cloudsafe
              http://www.1wwuwa.top/ar73/100%Avira URL Cloudmalware
              http://www.arredobagno.club0%Avira URL Cloudsafe
              http://www.quickhealcareltd.co.uk/ar73/www.authenticityhacking.com100%Avira URL Cloudmalware
              http://www.innovantexclusive.com/ar73/100%Avira URL Cloudmalware
              NameIPActiveMaliciousAntivirus DetectionReputation
              controlplus.systems
              34.102.136.180
              truefalse
                unknown
                kellnovaglobalfood.info
                34.102.136.180
                truefalse
                  unknown
                  www.quickhealcareltd.co.uk
                  unknown
                  unknowntrueunknown
                  www.mogi.africa
                  unknown
                  unknowntrue
                    unknown
                    www.kellnovaglobalfood.info
                    unknown
                    unknowntrue
                      unknown
                      www.controlplus.systems
                      unknown
                      unknowntrue
                        unknown
                        NameMaliciousAntivirus DetectionReputation
                        http://www.kellnovaglobalfood.info/ar73/?Qj=i6BPGBhEPZBlfl7tAP1UBBwzioJGNNDALkR90REkFgMzqoaCb5EMO/kcO5kV95GeH/kMM6gDFg==&x6=n0GdIP_false
                        • Avira URL Cloud: malware
                        unknown
                        http://www.controlplus.systems/ar73/?Qj=pTDthzaqbIgyWHdtpzpwnulvL2qvi2wcQCOYQZrmaB3EJlnnV9x+gp8AnzNn3ZLGsW0uMr4raA==&x6=n0GdIP_false
                        • Avira URL Cloud: malware
                        unknown
                        www.2348x.com/ar73/true
                        • Avira URL Cloud: malware
                        low
                        NameSourceMaliciousAntivirus DetectionReputation
                        http://www.b708.com/ar73/explorer.exe, 00000001.00000002.525713546.000000000833A000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000001.00000003.461649448.0000000008356000.00000004.00000001.00020000.00000000.sdmptrue
                        • Avira URL Cloud: malware
                        unknown
                        http://www.jacksontcpassettlement.com/ar73/www.ingrambaby.comexplorer.exe, 00000001.00000002.525713546.000000000833A000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000001.00000003.461649448.0000000008356000.00000004.00000001.00020000.00000000.sdmptrue
                        • Avira URL Cloud: malware
                        unknown
                        http://www.innovantexclusive.comReferer:explorer.exe, 00000001.00000002.525713546.000000000833A000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000001.00000003.461649448.0000000008356000.00000004.00000001.00020000.00000000.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        http://www.mtevz.online/ar73/explorer.exe, 00000001.00000002.525713546.000000000833A000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000001.00000003.461649448.0000000008356000.00000004.00000001.00020000.00000000.sdmptrue
                        • Avira URL Cloud: malware
                        unknown
                        http://www.ckpconsulting.comexplorer.exe, 00000001.00000002.525713546.000000000833A000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000001.00000003.461649448.0000000008356000.00000004.00000001.00020000.00000000.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        http://www.jacksontcpassettlement.comReferer:explorer.exe, 00000001.00000002.525713546.000000000833A000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000001.00000003.461649448.0000000008356000.00000004.00000001.00020000.00000000.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        http://www.kellnovaglobalfood.infoReferer:explorer.exe, 00000001.00000002.525713546.000000000833A000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000001.00000003.461649448.0000000008356000.00000004.00000001.00020000.00000000.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        http://www.hurricanevalleyatvjamboree.com/ar73/www.innovantexclusive.comexplorer.exe, 00000001.00000002.525713546.000000000833A000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000001.00000003.461649448.0000000008356000.00000004.00000001.00020000.00000000.sdmptrue
                        • Avira URL Cloud: malware
                        unknown
                        http://www.kellnovaglobalfood.info/ar73/explorer.exe, 00000001.00000002.525713546.000000000833A000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000001.00000003.461649448.0000000008356000.00000004.00000001.00020000.00000000.sdmptrue
                        • Avira URL Cloud: malware
                        unknown
                        http://www.2348x.com/ar73/explorer.exe, 00000001.00000002.525713546.000000000833A000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000001.00000003.461649448.0000000008356000.00000004.00000001.00020000.00000000.sdmptrue
                        • Avira URL Cloud: malware
                        unknown
                        http://www.ckpconsulting.com/ar73/explorer.exe, 00000001.00000002.525713546.000000000833A000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000001.00000003.461649448.0000000008356000.00000004.00000001.00020000.00000000.sdmptrue
                        • Avira URL Cloud: malware
                        unknown
                        http://www.2348x.comexplorer.exe, 00000001.00000002.525713546.000000000833A000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000001.00000003.461649448.0000000008356000.00000004.00000001.00020000.00000000.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        http://www.controlplus.systemsexplorer.exe, 00000001.00000002.525713546.000000000833A000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000001.00000003.461649448.0000000008356000.00000004.00000001.00020000.00000000.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        http://www.echadholisticbar.com/ar73/www.jacksontcpassettlement.comexplorer.exe, 00000001.00000002.525713546.000000000833A000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000001.00000003.461649448.0000000008356000.00000004.00000001.00020000.00000000.sdmptrue
                        • Avira URL Cloud: malware
                        unknown
                        http://www.mogi.africa/ar73/www.kellnovaglobalfood.infoexplorer.exe, 00000001.00000002.525713546.000000000833A000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000001.00000003.461649448.0000000008356000.00000004.00000001.00020000.00000000.sdmptrue
                        • Avira URL Cloud: malware
                        unknown
                        http://www.quickhealcareltd.co.uk/ar73/explorer.exe, 00000001.00000002.525713546.000000000833A000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000001.00000003.461649448.0000000008356000.00000004.00000001.00020000.00000000.sdmptrue
                        • Avira URL Cloud: malware
                        unknown
                        http://www.ckpconsulting.com/ar73/www.2348x.comexplorer.exe, 00000001.00000002.525713546.000000000833A000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000001.00000003.461649448.0000000008356000.00000004.00000001.00020000.00000000.sdmptrue
                        • Avira URL Cloud: malware
                        unknown
                        http://www.kellnovaglobalfood.info/ar73/www.controlplus.systemsexplorer.exe, 00000001.00000002.525713546.000000000833A000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000001.00000003.461649448.0000000008356000.00000004.00000001.00020000.00000000.sdmptrue
                        • Avira URL Cloud: malware
                        unknown
                        http://www.controlplus.systems/ar73/www.quickhealcareltd.co.ukexplorer.exe, 00000001.00000002.525713546.000000000833A000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000001.00000003.461649448.0000000008356000.00000004.00000001.00020000.00000000.sdmptrue
                        • Avira URL Cloud: malware
                        unknown
                        http://www.b708.comReferer:explorer.exe, 00000001.00000002.525713546.000000000833A000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000001.00000003.461649448.0000000008356000.00000004.00000001.00020000.00000000.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        http://www.mogi.africaReferer:explorer.exe, 00000001.00000002.525713546.000000000833A000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000001.00000003.461649448.0000000008356000.00000004.00000001.00020000.00000000.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        http://www.quickhealcareltd.co.ukReferer:explorer.exe, 00000001.00000002.525713546.000000000833A000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000001.00000003.461649448.0000000008356000.00000004.00000001.00020000.00000000.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        http://www.ckpconsulting.comReferer:explorer.exe, 00000001.00000002.525713546.000000000833A000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000001.00000003.461649448.0000000008356000.00000004.00000001.00020000.00000000.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        http://www.hurricanevalleyatvjamboree.com/ar73/explorer.exe, 00000001.00000002.525713546.000000000833A000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000001.00000003.461649448.0000000008356000.00000004.00000001.00020000.00000000.sdmptrue
                        • Avira URL Cloud: malware
                        unknown
                        http://www.arredobagno.club/ar73/www.mtevz.onlineexplorer.exe, 00000001.00000002.525713546.000000000833A000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000001.00000003.461649448.0000000008356000.00000004.00000001.00020000.00000000.sdmptrue
                        • Avira URL Cloud: malware
                        unknown
                        http://www.ingrambaby.com/ar73/explorer.exe, 00000001.00000002.525713546.000000000833A000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000001.00000003.461649448.0000000008356000.00000004.00000001.00020000.00000000.sdmptrue
                        • Avira URL Cloud: malware
                        unknown
                        http://www.kellnovaglobalfood.infoexplorer.exe, 00000001.00000002.525713546.000000000833A000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000001.00000003.461649448.0000000008356000.00000004.00000001.00020000.00000000.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        http://www.mogi.africaexplorer.exe, 00000001.00000002.525713546.000000000833A000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000001.00000003.461649448.0000000008356000.00000004.00000001.00020000.00000000.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        http://www.innovantexclusive.com/ar73/www.1wwuwa.topexplorer.exe, 00000001.00000002.525713546.000000000833A000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000001.00000003.461649448.0000000008356000.00000004.00000001.00020000.00000000.sdmptrue
                        • Avira URL Cloud: malware
                        unknown
                        http://www.controlplus.systems/ar73/explorer.exe, 00000001.00000002.525713546.000000000833A000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000001.00000003.461649448.0000000008356000.00000004.00000001.00020000.00000000.sdmptrue
                        • Avira URL Cloud: malware
                        unknown
                        http://www.jacksontcpassettlement.com/ar73/explorer.exe, 00000001.00000002.525713546.000000000833A000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000001.00000003.461649448.0000000008356000.00000004.00000001.00020000.00000000.sdmptrue
                        • Avira URL Cloud: malware
                        unknown
                        http://www.arredobagno.clubReferer:explorer.exe, 00000001.00000002.525713546.000000000833A000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000001.00000003.461649448.0000000008356000.00000004.00000001.00020000.00000000.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        http://www.autoitscript.com/autoit3/Jexplorer.exe, 00000001.00000003.461649448.0000000008442000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000001.00000003.292213498.000000000F5A7000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000001.00000003.461216185.000000000F53F000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000001.00000000.267709513.000000000F5A7000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000001.00000003.462393796.000000000F5B3000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000001.00000000.254183869.0000000000AC8000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000001.00000003.289061192.0000000008442000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000001.00000002.526453234.0000000008442000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000001.00000002.517440543.0000000000AC8000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000001.00000002.530310030.000000000F5B6000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000001.00000003.288711256.000000000F5A7000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000001.00000000.263735895.0000000008442000.00000004.00000001.00020000.00000000.sdmpfalse
                          high
                          http://www.echadholisticbar.com/ar73/explorer.exe, 00000001.00000002.525713546.000000000833A000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000001.00000003.461649448.0000000008356000.00000004.00000001.00020000.00000000.sdmptrue
                          • Avira URL Cloud: malware
                          unknown
                          http://www.ingrambaby.comexplorer.exe, 00000001.00000002.525713546.000000000833A000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000001.00000003.461649448.0000000008356000.00000004.00000001.00020000.00000000.sdmpfalse
                          • Avira URL Cloud: safe
                          unknown
                          http://www.1wwuwa.topexplorer.exe, 00000001.00000002.525713546.000000000833A000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000001.00000003.461649448.0000000008356000.00000004.00000001.00020000.00000000.sdmpfalse
                          • Avira URL Cloud: safe
                          unknown
                          http://www.authenticityhacking.com/ar73/explorer.exe, 00000001.00000002.525713546.000000000833A000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000001.00000003.461649448.0000000008356000.00000004.00000001.00020000.00000000.sdmptrue
                          • Avira URL Cloud: malware
                          unknown
                          http://www.ingrambaby.com/ar73/www.arredobagno.clubexplorer.exe, 00000001.00000002.525713546.000000000833A000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000001.00000003.461649448.0000000008356000.00000004.00000001.00020000.00000000.sdmptrue
                          • Avira URL Cloud: malware
                          unknown
                          http://www.hurricanevalleyatvjamboree.comexplorer.exe, 00000001.00000002.525713546.000000000833A000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000001.00000003.461649448.0000000008356000.00000004.00000001.00020000.00000000.sdmpfalse
                          • Avira URL Cloud: safe
                          unknown
                          http://www.1wwuwa.topReferer:explorer.exe, 00000001.00000002.525713546.000000000833A000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000001.00000003.461649448.0000000008356000.00000004.00000001.00020000.00000000.sdmpfalse
                          • Avira URL Cloud: safe
                          unknown
                          http://www.mogi.africa/ar73/explorer.exe, 00000001.00000002.525713546.000000000833A000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000001.00000003.461649448.0000000008356000.00000004.00000001.00020000.00000000.sdmpfalse
                          • Avira URL Cloud: malware
                          unknown
                          http://www.authenticityhacking.comReferer:explorer.exe, 00000001.00000002.525713546.000000000833A000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000001.00000003.461649448.0000000008356000.00000004.00000001.00020000.00000000.sdmpfalse
                          • Avira URL Cloud: safe
                          unknown
                          http://www.arredobagno.club/ar73/explorer.exe, 00000001.00000002.525713546.000000000833A000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000001.00000003.461649448.0000000008356000.00000004.00000001.00020000.00000000.sdmpfalse
                          • Avira URL Cloud: malware
                          unknown
                          http://www.echadholisticbar.comReferer:explorer.exe, 00000001.00000002.525713546.000000000833A000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000001.00000003.461649448.0000000008356000.00000004.00000001.00020000.00000000.sdmpfalse
                          • Avira URL Cloud: safe
                          unknown
                          http://www.mtevz.onlineReferer:explorer.exe, 00000001.00000002.525713546.000000000833A000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000001.00000003.461649448.0000000008356000.00000004.00000001.00020000.00000000.sdmpfalse
                          • Avira URL Cloud: safe
                          unknown
                          http://www.b708.comexplorer.exe, 00000001.00000002.525713546.000000000833A000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000001.00000003.461649448.0000000008356000.00000004.00000001.00020000.00000000.sdmpfalse
                          • Avira URL Cloud: safe
                          unknown
                          http://www.quickhealcareltd.co.ukexplorer.exe, 00000001.00000002.525713546.000000000833A000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000001.00000003.461649448.0000000008356000.00000004.00000001.00020000.00000000.sdmpfalse
                          • Avira URL Cloud: safe
                          unknown
                          http://www.innovantexclusive.comexplorer.exe, 00000001.00000002.525713546.000000000833A000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000001.00000003.461649448.0000000008356000.00000004.00000001.00020000.00000000.sdmpfalse
                          • Avira URL Cloud: safe
                          unknown
                          http://www.jacksontcpassettlement.comexplorer.exe, 00000001.00000002.525713546.000000000833A000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000001.00000003.461649448.0000000008356000.00000004.00000001.00020000.00000000.sdmpfalse
                          • Avira URL Cloud: safe
                          unknown
                          http://www.1wwuwa.top/ar73/www.echadholisticbar.comexplorer.exe, 00000001.00000002.525713546.000000000833A000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000001.00000003.461649448.0000000008356000.00000004.00000001.00020000.00000000.sdmpfalse
                          • Avira URL Cloud: malware
                          unknown
                          http://www.hurricanevalleyatvjamboree.comReferer:explorer.exe, 00000001.00000002.525713546.000000000833A000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000001.00000003.461649448.0000000008356000.00000004.00000001.00020000.00000000.sdmpfalse
                          • Avira URL Cloud: safe
                          unknown
                          http://www.ingrambaby.comReferer:explorer.exe, 00000001.00000002.525713546.000000000833A000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000001.00000003.461649448.0000000008356000.00000004.00000001.00020000.00000000.sdmpfalse
                          • Avira URL Cloud: safe
                          unknown
                          http://www.controlplus.systemsReferer:explorer.exe, 00000001.00000002.525713546.000000000833A000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000001.00000003.461649448.0000000008356000.00000004.00000001.00020000.00000000.sdmpfalse
                          • Avira URL Cloud: safe
                          unknown
                          http://www.authenticityhacking.com/ar73/www.ckpconsulting.comexplorer.exe, 00000001.00000002.525713546.000000000833A000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000001.00000003.461649448.0000000008356000.00000004.00000001.00020000.00000000.sdmptrue
                          • Avira URL Cloud: malware
                          unknown
                          http://www.b708.com/ar73/www.hurricanevalleyatvjamboree.comexplorer.exe, 00000001.00000002.525713546.000000000833A000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000001.00000003.461649448.0000000008356000.00000004.00000001.00020000.00000000.sdmptrue
                          • Avira URL Cloud: malware
                          unknown
                          http://www.mtevz.onlineexplorer.exe, 00000001.00000002.525713546.000000000833A000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000001.00000003.461649448.0000000008356000.00000004.00000001.00020000.00000000.sdmpfalse
                          • Avira URL Cloud: safe
                          unknown
                          http://www.2348x.comReferer:explorer.exe, 00000001.00000002.525713546.000000000833A000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000001.00000003.461649448.0000000008356000.00000004.00000001.00020000.00000000.sdmpfalse
                          • Avira URL Cloud: safe
                          unknown
                          http://www.2348x.com/ar73/www.b708.comexplorer.exe, 00000001.00000002.525713546.000000000833A000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000001.00000003.461649448.0000000008356000.00000004.00000001.00020000.00000000.sdmptrue
                          • Avira URL Cloud: malware
                          unknown
                          http://www.mtevz.online/ar73/rexplorer.exe, 00000001.00000002.525713546.000000000833A000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000001.00000003.461649448.0000000008356000.00000004.00000001.00020000.00000000.sdmptrue
                          • Avira URL Cloud: malware
                          unknown
                          http://www.authenticityhacking.comexplorer.exe, 00000001.00000002.525713546.000000000833A000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000001.00000003.461649448.0000000008356000.00000004.00000001.00020000.00000000.sdmpfalse
                          • Avira URL Cloud: safe
                          unknown
                          http://www.1wwuwa.top/ar73/explorer.exe, 00000001.00000002.525713546.000000000833A000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000001.00000003.461649448.0000000008356000.00000004.00000001.00020000.00000000.sdmpfalse
                          • Avira URL Cloud: malware
                          unknown
                          http://www.echadholisticbar.comexplorer.exe, 00000001.00000002.525713546.000000000833A000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000001.00000003.461649448.0000000008356000.00000004.00000001.00020000.00000000.sdmpfalse
                          • Avira URL Cloud: safe
                          unknown
                          http://www.quickhealcareltd.co.uk/ar73/www.authenticityhacking.comexplorer.exe, 00000001.00000002.525713546.000000000833A000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000001.00000003.461649448.0000000008356000.00000004.00000001.00020000.00000000.sdmptrue
                          • Avira URL Cloud: malware
                          unknown
                          http://www.arredobagno.clubexplorer.exe, 00000001.00000002.525713546.000000000833A000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000001.00000003.461649448.0000000008356000.00000004.00000001.00020000.00000000.sdmpfalse
                          • Avira URL Cloud: safe
                          unknown
                          http://www.innovantexclusive.com/ar73/explorer.exe, 00000001.00000002.525713546.000000000833A000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000001.00000003.461649448.0000000008356000.00000004.00000001.00020000.00000000.sdmpfalse
                          • Avira URL Cloud: malware
                          unknown
                          • No. of IPs < 25%
                          • 25% < No. of IPs < 50%
                          • 50% < No. of IPs < 75%
                          • 75% < No. of IPs
                          IPDomainCountryFlagASNASN NameMalicious
                          34.102.136.180
                          controlplus.systemsUnited States
                          15169GOOGLEUSfalse
                          Joe Sandbox Version:37.0.0 Beryl
                          Analysis ID:830326
                          Start date and time:2023-03-20 09:10:07 +01:00
                          Joe Sandbox Product:CloudBasic
                          Overall analysis duration:0h 10m 24s
                          Hypervisor based Inspection enabled:false
                          Report type:light
                          Cookbook file name:default.jbs
                          Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 104, IE 11, Adobe Reader DC 19, Java 8 Update 211
                          Number of analysed new started processes analysed:15
                          Number of new started drivers analysed:0
                          Number of existing processes analysed:0
                          Number of existing drivers analysed:0
                          Number of injected processes analysed:1
                          Technologies:
                          • HCA enabled
                          • EGA enabled
                          • HDC enabled
                          • AMSI enabled
                          Analysis Mode:default
                          Analysis stop reason:Timeout
                          Sample file name:7pECKdsaig.exe
                          Original Sample Name:3343ba4097fe8b6b91af0ca46abb0baf6052acf1806571432cc7e9e0ba59fa2a.exe
                          Detection:MAL
                          Classification:mal100.troj.evad.winEXE@6/1@4/1
                          EGA Information:
                          • Successful, ratio: 100%
                          HDC Information:
                          • Successful, ratio: 66.3% (good quality ratio 61%)
                          • Quality average: 71.7%
                          • Quality standard deviation: 31.3%
                          HCA Information:
                          • Successful, ratio: 100%
                          • Number of executed functions: 0
                          • Number of non-executed functions: 0
                          Cookbook Comments:
                          • Found application associated with file extension: .exe
                          • Exclude process from analysis (whitelisted): MpCmdRun.exe, SgrmBroker.exe, conhost.exe, svchost.exe
                          • Excluded domains from analysis (whitelisted): fs.microsoft.com
                          • Not all processes where analyzed, report is missing behavior information
                          • Report creation exceeded maximum time and may have missing disassembly code information.
                          • Report size getting too big, too many NtOpenKeyEx calls found.
                          • Report size getting too big, too many NtQueryValueKey calls found.
                          TimeTypeDescription
                          09:11:24API Interceptor563x Sleep call for process: explorer.exe modified
                          No context
                          No context
                          No context
                          No context
                          No context
                          Process:C:\Windows\explorer.exe
                          File Type:JSON data
                          Category:dropped
                          Size (bytes):984
                          Entropy (8bit):5.204081515204597
                          Encrypted:false
                          SSDEEP:24:Yq6CUXyhmQmnbNdB6hmxjmnz0JahmemnHZ6T06MhmDmnbxdB6hmktmn7KTdB6hm0:YqDUXyctnbNdUcAnz0JacPnHZ6T06McW
                          MD5:160494591DCB3DD4E2C36F71207A87F3
                          SHA1:D611935CA91C155B10A449DB72B3D5C8308A6EB7
                          SHA-256:B82EC6928AAA7C30ABBE26DF13CA514DC4508C704F03EB28A4B2ABE40F60DF6E
                          SHA-512:301BD7B6A4B7B2D3261C3A10FE98B2B4B811B861FCA077AF8732B7FCDFB2D106FFE82F0072CD859A4436E2EBD9347EACF44539E11AEAD2CA83703737B3030881
                          Malicious:false
                          Reputation:moderate, very likely benign file
                          Preview:{"RecentItems":[{"AppID":"Microsoft.Office.OneNote_8wekyb3d8bbwe!microsoft.onenoteim","PenUsageSec":15,"LastSwitchedLowPart":3648731648,"LastSwitchedHighPart":30747937,"PrePopulated":true},{"AppID":"Microsoft.WindowsMaps_8wekyb3d8bbwe!App","PenUsageSec":15,"LastSwitchedLowPart":3638731648,"LastSwitchedHighPart":30747937,"PrePopulated":true},{"AppID":"Microsoft.MSPaint_8wekyb3d8bbwe!Microsoft.MSPaint","PenUsageSec":15,"LastSwitchedLowPart":3628731648,"LastSwitchedHighPart":30747937,"PrePopulated":true},{"AppID":"Microsoft.MicrosoftEdge_8wekyb3d8bbwe!MicrosoftEdge","PenUsageSec":15,"LastSwitchedLowPart":3618731648,"LastSwitchedHighPart":30747937,"PrePopulated":true},{"AppID":"Microsoft.Windows.Photos_8wekyb3d8bbwe!App","PenUsageSec":15,"LastSwitchedLowPart":3608731648,"LastSwitchedHighPart":30747937,"PrePopulated":true},{"AppID":"Microsoft.Getstarted_8wekyb3d8bbwe!App","PenUsageSec":15,"LastSwitchedLowPart":3598731648,"LastSwitchedHighPart":30747937,"PrePopulated":true}]}
                          File type:PE32 executable (GUI) Intel 80386, for MS Windows
                          Entropy (8bit):7.393944417418745
                          TrID:
                          • Win32 Executable (generic) a (10002005/4) 99.98%
                          • DOS Executable Generic (2002/1) 0.02%
                          File name:7pECKdsaig.exe
                          File size:185856
                          MD5:515bf958f062fec724fbe6bdadf39485
                          SHA1:50fbaeb36e98338dc500e252855abf0152bb6bbf
                          SHA256:3343ba4097fe8b6b91af0ca46abb0baf6052acf1806571432cc7e9e0ba59fa2a
                          SHA512:9b336130dc79e9dba0bdba735cc780c4c39148ca38668f660a6b6b15aeb0b8111a687ac4111a7c0bb84663b7c3ba963cefbf8fe4b4e4777fb5394b91d2272ed6
                          SSDEEP:3072:F3k9Eu2PDPlFm3TiZHhJmoapMZRrr9d+/eqeibwnFUMGBY8:MkQTeHlaGZRX9K4XeY8
                          TLSH:8904BF32D602C071F2B211B5F67D1B7B493D0E343295A4EAA7A225E06EF09E5B53931F
                          File Content Preview:MZER.....X.......<......(...............................................!..L.!This program cannot be run in DOS mode....$.............f...f...f.......f.......f.......f.Rich..f.................PE..L....i.?............................@......................
                          Icon Hash:00828e8e8686b000
                          Entrypoint:0xfdf140
                          Entrypoint Section:.text
                          Digitally signed:false
                          Imagebase:0xfc0000
                          Subsystem:windows gui
                          Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                          DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
                          Time Stamp:0x3F0769F8 [Sun Jul 6 00:14:48 2003 UTC]
                          TLS Callbacks:
                          CLR (.Net) Version:
                          OS Version Major:5
                          OS Version Minor:1
                          File Version Major:5
                          File Version Minor:1
                          Subsystem Version Major:5
                          Subsystem Version Minor:1
                          Import Hash:
                          Instruction
                          push ebp
                          mov ebp, esp
                          sub esp, 64h
                          call 00007FDF6CAC6D4Ah
                          mov esp, ebp
                          pop ebp
                          ret
                          call 00007FDF6CACA535h
                          pop eax
                          ret
                          call 00007FDF6CACA535h
                          pop eax
                          ret
                          call 00007FDF6CAC6D93h
                          ret
                          call 00007FDF6CACA535h
                          pop eax
                          ret
                          jmp 00007FDF6CAC6DF6h
                          ret
                          call 00007FDF6CACA535h
                          pop eax
                          ret
                          push 88888888h
                          jmp 00007FDF6CAC8764h
                          ret
                          call 00007FDF6CACA535h
                          pop eax
                          ret
                          push 88888888h
                          jmp 00007FDF6CAC8767h
                          ret
                          call 00007FDF6CACA535h
                          pop eax
                          ret
                          push 88888888h
                          jmp 00007FDF6CAC876Ah
                          ret
                          call 00007FDF6CACA535h
                          pop eax
                          ret
                          push 88888888h
                          jmp 00007FDF6CAC876Dh
                          ret
                          call 00007FDF6CACA535h
                          pop eax
                          ret
                          push 88888888h
                          jmp 00007FDF6CAC8770h
                          ret
                          call 00007FDF6CACA535h
                          pop eax
                          ret
                          push 88888888h
                          jmp 00007FDF6CAC8773h
                          ret
                          call 00007FDF6CACA535h
                          pop eax
                          ret
                          push 88888888h
                          jmp 00007FDF6CAC8776h
                          ret
                          call 00007FDF6CACA535h
                          pop eax
                          ret
                          push 88888888h
                          jmp 00007FDF6CAC8779h
                          ret
                          call 00007FDF6CACA535h
                          pop eax
                          ret
                          Programming Language:
                          • [C++] VS2010 SP1 build 40219
                          • [ASM] VS2010 SP1 build 40219
                          • [LNK] VS2010 SP1 build 40219
                          NameVirtual AddressVirtual Size Is in Section
                          IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                          IMAGE_DIRECTORY_ENTRY_IMPORT0x00x0
                          IMAGE_DIRECTORY_ENTRY_RESOURCE0x00x0
                          IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                          IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                          IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                          IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                          IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                          IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                          IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                          IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                          IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                          IMAGE_DIRECTORY_ENTRY_IAT0x00x0
                          IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                          IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                          IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                          NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                          .text0x10000x2d1a40x2d200False0.7623950398199446data7.409588215160137IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                          TimestampProtocolSIDMessageSource PortDest PortSource IPDest IP
                          192.168.2.634.102.136.18049707802031453 03/20/23-09:12:27.000047TCP2031453ET TROJAN FormBook CnC Checkin (GET)4970780192.168.2.634.102.136.180
                          192.168.2.634.102.136.18049707802031449 03/20/23-09:12:27.000047TCP2031449ET TROJAN FormBook CnC Checkin (GET)4970780192.168.2.634.102.136.180
                          192.168.2.634.102.136.18049707802031412 03/20/23-09:12:27.000047TCP2031412ET TROJAN FormBook CnC Checkin (GET)4970780192.168.2.634.102.136.180
                          TimestampSource PortDest PortSource IPDest IP
                          Mar 20, 2023 09:12:26.979583979 CET4970780192.168.2.634.102.136.180
                          Mar 20, 2023 09:12:26.998944998 CET804970734.102.136.180192.168.2.6
                          Mar 20, 2023 09:12:26.999897003 CET4970780192.168.2.634.102.136.180
                          Mar 20, 2023 09:12:27.000046968 CET4970780192.168.2.634.102.136.180
                          Mar 20, 2023 09:12:27.019110918 CET804970734.102.136.180192.168.2.6
                          Mar 20, 2023 09:12:27.245915890 CET804970734.102.136.180192.168.2.6
                          Mar 20, 2023 09:12:27.245950937 CET804970734.102.136.180192.168.2.6
                          Mar 20, 2023 09:12:27.246295929 CET4970780192.168.2.634.102.136.180
                          Mar 20, 2023 09:12:27.246371031 CET4970780192.168.2.634.102.136.180
                          Mar 20, 2023 09:12:27.263668060 CET804970734.102.136.180192.168.2.6
                          Mar 20, 2023 09:12:47.472598076 CET4970880192.168.2.634.102.136.180
                          Mar 20, 2023 09:12:47.490624905 CET804970834.102.136.180192.168.2.6
                          Mar 20, 2023 09:12:47.490818977 CET4970880192.168.2.634.102.136.180
                          Mar 20, 2023 09:12:47.491030931 CET4970880192.168.2.634.102.136.180
                          Mar 20, 2023 09:12:47.508877993 CET804970834.102.136.180192.168.2.6
                          Mar 20, 2023 09:12:47.672036886 CET804970834.102.136.180192.168.2.6
                          Mar 20, 2023 09:12:47.672099113 CET804970834.102.136.180192.168.2.6
                          Mar 20, 2023 09:12:47.672249079 CET4970880192.168.2.634.102.136.180
                          Mar 20, 2023 09:12:47.672713995 CET4970880192.168.2.634.102.136.180
                          Mar 20, 2023 09:12:47.690121889 CET804970834.102.136.180192.168.2.6
                          TimestampSource PortDest PortSource IPDest IP
                          Mar 20, 2023 09:12:03.883550882 CET4978653192.168.2.68.8.8.8
                          Mar 20, 2023 09:12:04.092940092 CET53497868.8.8.8192.168.2.6
                          Mar 20, 2023 09:12:26.905668974 CET5859553192.168.2.68.8.8.8
                          Mar 20, 2023 09:12:26.958081961 CET53585958.8.8.8192.168.2.6
                          Mar 20, 2023 09:12:47.423398018 CET5633153192.168.2.68.8.8.8
                          Mar 20, 2023 09:12:47.469249010 CET53563318.8.8.8192.168.2.6
                          Mar 20, 2023 09:13:18.738394976 CET5050653192.168.2.68.8.8.8
                          Mar 20, 2023 09:13:18.759357929 CET53505068.8.8.8192.168.2.6
                          TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                          Mar 20, 2023 09:12:03.883550882 CET192.168.2.68.8.8.80xb81bStandard query (0)www.mogi.africaA (IP address)IN (0x0001)false
                          Mar 20, 2023 09:12:26.905668974 CET192.168.2.68.8.8.80x6157Standard query (0)www.kellnovaglobalfood.infoA (IP address)IN (0x0001)false
                          Mar 20, 2023 09:12:47.423398018 CET192.168.2.68.8.8.80xddbbStandard query (0)www.controlplus.systemsA (IP address)IN (0x0001)false
                          Mar 20, 2023 09:13:18.738394976 CET192.168.2.68.8.8.80x9ab2Standard query (0)www.quickhealcareltd.co.ukA (IP address)IN (0x0001)false
                          TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                          Mar 20, 2023 09:12:04.092940092 CET8.8.8.8192.168.2.60xb81bServer failure (2)www.mogi.africanonenoneA (IP address)IN (0x0001)false
                          Mar 20, 2023 09:12:26.958081961 CET8.8.8.8192.168.2.60x6157No error (0)www.kellnovaglobalfood.infokellnovaglobalfood.infoCNAME (Canonical name)IN (0x0001)false
                          Mar 20, 2023 09:12:26.958081961 CET8.8.8.8192.168.2.60x6157No error (0)kellnovaglobalfood.info34.102.136.180A (IP address)IN (0x0001)false
                          Mar 20, 2023 09:12:47.469249010 CET8.8.8.8192.168.2.60xddbbNo error (0)www.controlplus.systemscontrolplus.systemsCNAME (Canonical name)IN (0x0001)false
                          Mar 20, 2023 09:12:47.469249010 CET8.8.8.8192.168.2.60xddbbNo error (0)controlplus.systems34.102.136.180A (IP address)IN (0x0001)false
                          Mar 20, 2023 09:13:18.759357929 CET8.8.8.8192.168.2.60x9ab2Name error (3)www.quickhealcareltd.co.uknonenoneA (IP address)IN (0x0001)false
                          • www.kellnovaglobalfood.info
                          • www.controlplus.systems

                          Code Manipulations

                          Function NameHook TypeActive in Processes
                          PeekMessageAINLINEexplorer.exe
                          PeekMessageWINLINEexplorer.exe
                          GetMessageWINLINEexplorer.exe
                          GetMessageAINLINEexplorer.exe
                          Function NameHook TypeNew Data
                          PeekMessageAINLINE0x48 0x8B 0xB8 0x80 0x0E 0xE1
                          PeekMessageWINLINE0x48 0x8B 0xB8 0x88 0x8E 0xE1
                          GetMessageWINLINE0x48 0x8B 0xB8 0x88 0x8E 0xE1
                          GetMessageAINLINE0x48 0x8B 0xB8 0x80 0x0E 0xE1

                          Click to jump to process

                          Target ID:0
                          Start time:09:11:04
                          Start date:20/03/2023
                          Path:C:\Users\user\Desktop\7pECKdsaig.exe
                          Wow64 process (32bit):true
                          Commandline:C:\Users\user\Desktop\7pECKdsaig.exe
                          Imagebase:0xa80000
                          File size:185856 bytes
                          MD5 hash:515BF958F062FEC724FBE6BDADF39485
                          Has elevated privileges:true
                          Has administrator privileges:true
                          Programmed in:C, C++ or other language
                          Yara matches:
                          • Rule: JoeSecurity_FormBook_1, Description: Yara detected FormBook, Source: 00000000.00000002.288830411.0000000000A81000.00000020.00000001.01000000.00000003.sdmp, Author: Joe Security
                          • Rule: JoeSecurity_FormBook, Description: Yara detected FormBook, Source: 00000000.00000002.288830411.0000000000A81000.00000020.00000001.01000000.00000003.sdmp, Author: Joe Security
                          • Rule: Windows_Trojan_Formbook_1112e116, Description: unknown, Source: 00000000.00000002.288830411.0000000000A81000.00000020.00000001.01000000.00000003.sdmp, Author: unknown
                          • Rule: Formbook_1, Description: autogenerated rule brought to you by yara-signator, Source: 00000000.00000002.288830411.0000000000A81000.00000020.00000001.01000000.00000003.sdmp, Author: Felix Bilstein - yara-signator at cocacoding dot com
                          • Rule: Formbook, Description: detect Formbook in memory, Source: 00000000.00000002.288830411.0000000000A81000.00000020.00000001.01000000.00000003.sdmp, Author: JPCERT/CC Incident Response Group
                          • Rule: JoeSecurity_FormBook_1, Description: Yara detected FormBook, Source: 00000000.00000002.289101701.0000000001370000.00000040.10000000.00040000.00000000.sdmp, Author: Joe Security
                          • Rule: JoeSecurity_FormBook, Description: Yara detected FormBook, Source: 00000000.00000002.289101701.0000000001370000.00000040.10000000.00040000.00000000.sdmp, Author: Joe Security
                          • Rule: Windows_Trojan_Formbook_1112e116, Description: unknown, Source: 00000000.00000002.289101701.0000000001370000.00000040.10000000.00040000.00000000.sdmp, Author: unknown
                          • Rule: Formbook_1, Description: autogenerated rule brought to you by yara-signator, Source: 00000000.00000002.289101701.0000000001370000.00000040.10000000.00040000.00000000.sdmp, Author: Felix Bilstein - yara-signator at cocacoding dot com
                          • Rule: Formbook, Description: detect Formbook in memory, Source: 00000000.00000002.289101701.0000000001370000.00000040.10000000.00040000.00000000.sdmp, Author: JPCERT/CC Incident Response Group
                          • Rule: JoeSecurity_FormBook_1, Description: Yara detected FormBook, Source: 00000000.00000002.289007135.0000000001210000.00000040.10000000.00040000.00000000.sdmp, Author: Joe Security
                          • Rule: JoeSecurity_FormBook, Description: Yara detected FormBook, Source: 00000000.00000002.289007135.0000000001210000.00000040.10000000.00040000.00000000.sdmp, Author: Joe Security
                          • Rule: Windows_Trojan_Formbook_1112e116, Description: unknown, Source: 00000000.00000002.289007135.0000000001210000.00000040.10000000.00040000.00000000.sdmp, Author: unknown
                          • Rule: Formbook_1, Description: autogenerated rule brought to you by yara-signator, Source: 00000000.00000002.289007135.0000000001210000.00000040.10000000.00040000.00000000.sdmp, Author: Felix Bilstein - yara-signator at cocacoding dot com
                          • Rule: Formbook, Description: detect Formbook in memory, Source: 00000000.00000002.289007135.0000000001210000.00000040.10000000.00040000.00000000.sdmp, Author: JPCERT/CC Incident Response Group
                          • Rule: JoeSecurity_FormBook_1, Description: Yara detected FormBook, Source: 00000000.00000000.249149614.0000000000A81000.00000020.00000001.01000000.00000003.sdmp, Author: Joe Security
                          • Rule: JoeSecurity_FormBook, Description: Yara detected FormBook, Source: 00000000.00000000.249149614.0000000000A81000.00000020.00000001.01000000.00000003.sdmp, Author: Joe Security
                          • Rule: Windows_Trojan_Formbook_1112e116, Description: unknown, Source: 00000000.00000000.249149614.0000000000A81000.00000020.00000001.01000000.00000003.sdmp, Author: unknown
                          • Rule: Formbook_1, Description: autogenerated rule brought to you by yara-signator, Source: 00000000.00000000.249149614.0000000000A81000.00000020.00000001.01000000.00000003.sdmp, Author: Felix Bilstein - yara-signator at cocacoding dot com
                          • Rule: Formbook, Description: detect Formbook in memory, Source: 00000000.00000000.249149614.0000000000A81000.00000020.00000001.01000000.00000003.sdmp, Author: JPCERT/CC Incident Response Group
                          Reputation:low

                          Target ID:1
                          Start time:09:11:06
                          Start date:20/03/2023
                          Path:C:\Windows\explorer.exe
                          Wow64 process (32bit):false
                          Commandline:C:\Windows\Explorer.EXE
                          Imagebase:0x7ff647860000
                          File size:3933184 bytes
                          MD5 hash:AD5296B280E8F522A8A897C96BAB0E1D
                          Has elevated privileges:false
                          Has administrator privileges:false
                          Programmed in:C, C++ or other language
                          Yara matches:
                          • Rule: JoeSecurity_FormBook_1, Description: Yara detected FormBook, Source: 00000001.00000002.531047978.000000001389F000.00000004.80000000.00040000.00000000.sdmp, Author: Joe Security
                          • Rule: JoeSecurity_FormBook, Description: Yara detected FormBook, Source: 00000001.00000002.531047978.000000001389F000.00000004.80000000.00040000.00000000.sdmp, Author: Joe Security
                          • Rule: Windows_Trojan_Formbook_1112e116, Description: unknown, Source: 00000001.00000002.531047978.000000001389F000.00000004.80000000.00040000.00000000.sdmp, Author: unknown
                          • Rule: Formbook_1, Description: autogenerated rule brought to you by yara-signator, Source: 00000001.00000002.531047978.000000001389F000.00000004.80000000.00040000.00000000.sdmp, Author: Felix Bilstein - yara-signator at cocacoding dot com
                          • Rule: Formbook, Description: detect Formbook in memory, Source: 00000001.00000002.531047978.000000001389F000.00000004.80000000.00040000.00000000.sdmp, Author: JPCERT/CC Incident Response Group
                          Reputation:high

                          Target ID:2
                          Start time:09:11:16
                          Start date:20/03/2023
                          Path:C:\Windows\SysWOW64\msdt.exe
                          Wow64 process (32bit):true
                          Commandline:C:\Windows\SysWOW64\msdt.exe
                          Imagebase:0xb60000
                          File size:1508352 bytes
                          MD5 hash:7F0C51DBA69B9DE5DDF6AA04CE3A69F4
                          Has elevated privileges:false
                          Has administrator privileges:false
                          Programmed in:C, C++ or other language
                          Yara matches:
                          • Rule: JoeSecurity_FormBook_1, Description: Yara detected FormBook, Source: 00000002.00000002.520351827.0000000004FCF000.00000004.10000000.00040000.00000000.sdmp, Author: Joe Security
                          • Rule: JoeSecurity_FormBook, Description: Yara detected FormBook, Source: 00000002.00000002.520351827.0000000004FCF000.00000004.10000000.00040000.00000000.sdmp, Author: Joe Security
                          • Rule: Windows_Trojan_Formbook_1112e116, Description: unknown, Source: 00000002.00000002.520351827.0000000004FCF000.00000004.10000000.00040000.00000000.sdmp, Author: unknown
                          • Rule: Formbook_1, Description: autogenerated rule brought to you by yara-signator, Source: 00000002.00000002.520351827.0000000004FCF000.00000004.10000000.00040000.00000000.sdmp, Author: Felix Bilstein - yara-signator at cocacoding dot com
                          • Rule: Formbook, Description: detect Formbook in memory, Source: 00000002.00000002.520351827.0000000004FCF000.00000004.10000000.00040000.00000000.sdmp, Author: JPCERT/CC Incident Response Group
                          • Rule: JoeSecurity_FormBook_1, Description: Yara detected FormBook, Source: 00000002.00000002.518766538.0000000002EE0000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                          • Rule: JoeSecurity_FormBook, Description: Yara detected FormBook, Source: 00000002.00000002.518766538.0000000002EE0000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                          • Rule: Windows_Trojan_Formbook_1112e116, Description: unknown, Source: 00000002.00000002.518766538.0000000002EE0000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                          • Rule: Formbook_1, Description: autogenerated rule brought to you by yara-signator, Source: 00000002.00000002.518766538.0000000002EE0000.00000004.00000800.00020000.00000000.sdmp, Author: Felix Bilstein - yara-signator at cocacoding dot com
                          • Rule: Formbook, Description: detect Formbook in memory, Source: 00000002.00000002.518766538.0000000002EE0000.00000004.00000800.00020000.00000000.sdmp, Author: JPCERT/CC Incident Response Group
                          • Rule: JoeSecurity_FormBook_1, Description: Yara detected FormBook, Source: 00000002.00000002.518698032.0000000002EB0000.00000040.10000000.00040000.00000000.sdmp, Author: Joe Security
                          • Rule: JoeSecurity_FormBook, Description: Yara detected FormBook, Source: 00000002.00000002.518698032.0000000002EB0000.00000040.10000000.00040000.00000000.sdmp, Author: Joe Security
                          • Rule: Windows_Trojan_Formbook_1112e116, Description: unknown, Source: 00000002.00000002.518698032.0000000002EB0000.00000040.10000000.00040000.00000000.sdmp, Author: unknown
                          • Rule: Formbook_1, Description: autogenerated rule brought to you by yara-signator, Source: 00000002.00000002.518698032.0000000002EB0000.00000040.10000000.00040000.00000000.sdmp, Author: Felix Bilstein - yara-signator at cocacoding dot com
                          • Rule: Formbook, Description: detect Formbook in memory, Source: 00000002.00000002.518698032.0000000002EB0000.00000040.10000000.00040000.00000000.sdmp, Author: JPCERT/CC Incident Response Group
                          • Rule: JoeSecurity_FormBook_1, Description: Yara detected FormBook, Source: 00000002.00000002.517165647.0000000000580000.00000040.80000000.00040000.00000000.sdmp, Author: Joe Security
                          • Rule: JoeSecurity_FormBook, Description: Yara detected FormBook, Source: 00000002.00000002.517165647.0000000000580000.00000040.80000000.00040000.00000000.sdmp, Author: Joe Security
                          • Rule: Windows_Trojan_Formbook_1112e116, Description: unknown, Source: 00000002.00000002.517165647.0000000000580000.00000040.80000000.00040000.00000000.sdmp, Author: unknown
                          • Rule: Formbook_1, Description: autogenerated rule brought to you by yara-signator, Source: 00000002.00000002.517165647.0000000000580000.00000040.80000000.00040000.00000000.sdmp, Author: Felix Bilstein - yara-signator at cocacoding dot com
                          • Rule: Formbook, Description: detect Formbook in memory, Source: 00000002.00000002.517165647.0000000000580000.00000040.80000000.00040000.00000000.sdmp, Author: JPCERT/CC Incident Response Group
                          • Rule: JoeSecurity_FormBook_1, Description: Yara detected FormBook, Source: 00000002.00000002.517610096.00000000008C4000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                          • Rule: JoeSecurity_FormBook, Description: Yara detected FormBook, Source: 00000002.00000002.517610096.00000000008C4000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                          • Rule: Windows_Trojan_Formbook_1112e116, Description: unknown, Source: 00000002.00000002.517610096.00000000008C4000.00000004.00000020.00020000.00000000.sdmp, Author: unknown
                          • Rule: Formbook_1, Description: autogenerated rule brought to you by yara-signator, Source: 00000002.00000002.517610096.00000000008C4000.00000004.00000020.00020000.00000000.sdmp, Author: Felix Bilstein - yara-signator at cocacoding dot com
                          • Rule: Formbook, Description: detect Formbook in memory, Source: 00000002.00000002.517610096.00000000008C4000.00000004.00000020.00020000.00000000.sdmp, Author: JPCERT/CC Incident Response Group
                          Reputation:moderate

                          Target ID:8
                          Start time:09:11:25
                          Start date:20/03/2023
                          Path:C:\Windows\SysWOW64\cmd.exe
                          Wow64 process (32bit):true
                          Commandline:/c del "C:\Users\user\Desktop\7pECKdsaig.exe"
                          Imagebase:0x1b0000
                          File size:232960 bytes
                          MD5 hash:F3BDBE3BB6F734E357235F4D5898582D
                          Has elevated privileges:false
                          Has administrator privileges:false
                          Programmed in:C, C++ or other language
                          Reputation:high

                          Target ID:9
                          Start time:09:11:25
                          Start date:20/03/2023
                          Path:C:\Windows\System32\conhost.exe
                          Wow64 process (32bit):false
                          Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                          Imagebase:0x7ff6da640000
                          File size:625664 bytes
                          MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                          Has elevated privileges:false
                          Has administrator privileges:false
                          Programmed in:C, C++ or other language
                          Reputation:high

                          No disassembly